Search dblp for Publications

export results for "stream:conf/bigdatase:"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@inproceedings{DBLP:conf/bigdatase/GuptaKKYMN22,
  author       = {Ankit Gupta and
                  Adriel Kim and
                  Abhir Karande and
                  Shuo Yan and
                  Shiva Manandhar and
                  Nhat Rich Nguyen},
  title        = {Validating Crowdsourced Flood Images using Machine Learning and Real-time
                  Weather Data},
  booktitle    = {16th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2022, Wuhan, China, December 9-11, 2022},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/BigDataSE56411.2022.00011},
  doi          = {10.1109/BIGDATASE56411.2022.00011},
  timestamp    = {Sat, 10 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatase/GuptaKKYMN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/KaurKKLNPS22,
  author       = {Sukhmandeep Kaur and
                  Nikola N. Kokilev and
                  Michael R. Kuzie and
                  Carson K. Leung and
                  Ben Nguyen and
                  Adam G. M. Pazdor and
                  Mark J. D. Shinnie},
  title        = {A Big Data Science Solution for Transportation Analytics with Meteorological
                  Data},
  booktitle    = {16th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2022, Wuhan, China, December 9-11, 2022},
  pages        = {21--28},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/BigDataSE56411.2022.00013},
  doi          = {10.1109/BIGDATASE56411.2022.00013},
  timestamp    = {Wed, 22 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/KaurKKLNPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/LauYCLCW22,
  author       = {Chi Yat Lau and
                  Man{-}Ching Yuen and
                  Wing{-}Fat Cheng and
                  Ming{-}Yeung Lau and
                  Wing{-}Fu Chan and
                  Hin{-}Ching Wong},
  title        = {Intellectual Social Scanning and Analytics platform},
  booktitle    = {16th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2022, Wuhan, China, December 9-11, 2022},
  pages        = {13--20},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/BigDataSE56411.2022.00012},
  doi          = {10.1109/BIGDATASE56411.2022.00012},
  timestamp    = {Wed, 22 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/LauYCLCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/ZhangYDLY22,
  author       = {Sirui Zhang and
                  Zhiwei Yan and
                  Kejun Dong and
                  Hongtao Li and
                  Xuebiao Yuchi},
  title        = {Phishing Domain Name Detection Based on Hierarchical Fusion of Multimodal
                  Features},
  booktitle    = {16th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2022, Wuhan, China, December 9-11, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/BigDataSE56411.2022.00010},
  doi          = {10.1109/BIGDATASE56411.2022.00010},
  timestamp    = {Wed, 22 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/ZhangYDLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/bigdatase/2022,
  title        = {16th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2022, Wuhan, China, December 9-11, 2022},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/BigDataSE56411.2022},
  doi          = {10.1109/BIGDATASE56411.2022},
  isbn         = {978-1-6654-6523-6},
  timestamp    = {Wed, 22 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/0005JSM21,
  author       = {Yuanyuan Wei and
                  Julian Jang{-}Jaccard and
                  Fariza Sabrina and
                  Timothy R. McIntosh},
  editor       = {Jia Hu and
                  Shahid Mumtaz and
                  Xinzhou Cheng},
  title        = {MSD-Kmeans: {A} Hybrid Algorithm for Efficient Detection of Global
                  and Local Outliers},
  booktitle    = {15th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2021, Shenyang, China, October 20-22, 2021},
  pages        = {87--94},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigDataSE53435.2021.00022},
  doi          = {10.1109/BIGDATASE53435.2021.00022},
  timestamp    = {Tue, 15 Mar 2022 13:00:54 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/0005JSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/ChenDSFBYCH21,
  author       = {Ye Chen and
                  Jingguo Dai and
                  Xinduo Su and
                  Yaorong Fan and
                  Wendong Bian and
                  Peng Ye and
                  Guang Chen and
                  Yuezhen Huang},
  editor       = {Jia Hu and
                  Shahid Mumtaz and
                  Xinzhou Cheng},
  title        = {Partnership-based Collaborative Learning Approach from Decentralized
                  Data},
  booktitle    = {15th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2021, Shenyang, China, October 20-22, 2021},
  pages        = {103--110},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigDataSE53435.2021.00024},
  doi          = {10.1109/BIGDATASE53435.2021.00024},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/ChenDSFBYCH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/DengLZWZ21,
  author       = {Deyu Deng and
                  Carson K. Leung and
                  Chenru Zhao and
                  Yan Wen and
                  Hao Zheng},
  editor       = {Jia Hu and
                  Shahid Mumtaz and
                  Xinzhou Cheng},
  title        = {Spatial-Temporal Data Science of {COVID-19} Data},
  booktitle    = {15th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2021, Shenyang, China, October 20-22, 2021},
  pages        = {7--14},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigDataSE53435.2021.00011},
  doi          = {10.1109/BIGDATASE53435.2021.00011},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/DengLZWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/HuangZL21,
  author       = {Wen Huang and
                  Shijie Zhou and
                  Yongjian Liao},
  editor       = {Jia Hu and
                  Shahid Mumtaz and
                  Xinzhou Cheng},
  title        = {Improving the Number of Queries Supported by Differentially Private
                  Mechanisms},
  booktitle    = {15th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2021, Shenyang, China, October 20-22, 2021},
  pages        = {65--71},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigDataSE53435.2021.00019},
  doi          = {10.1109/BIGDATASE53435.2021.00019},
  timestamp    = {Thu, 14 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/HuangZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/LuZCLT21,
  author       = {Yuhai Lu and
                  Chunyan Zhang and
                  Cong Cao and
                  Yanbing Liu and
                  Jianlong Tan},
  editor       = {Jia Hu and
                  Shahid Mumtaz and
                  Xinzhou Cheng},
  title        = {{BV-CEI:} {A} Compact Implementation of Interval Query Indexing Algorithm},
  booktitle    = {15th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2021, Shenyang, China, October 20-22, 2021},
  pages        = {80--86},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigDataSE53435.2021.00021},
  doi          = {10.1109/BIGDATASE53435.2021.00021},
  timestamp    = {Wed, 29 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatase/LuZCLT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/NgLXGNL21,
  author       = {Jer Shyuan Ng and
                  Wei Yang Bryan Lim and
                  Zehui Xiong and
                  Sahil Garg and
                  Dusit Niyato and
                  Cyril Leung},
  editor       = {Jia Hu and
                  Shahid Mumtaz and
                  Xinzhou Cheng},
  title        = {An Incentive Mechanism for Resource Allocation in Coded Distributed
                  Computing},
  booktitle    = {15th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2021, Shenyang, China, October 20-22, 2021},
  pages        = {15--22},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigDataSE53435.2021.00012},
  doi          = {10.1109/BIGDATASE53435.2021.00012},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatase/NgLXGNL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/NieZOL21,
  author       = {Wenyi Nie and
                  Quanjiang Zhang and
                  Zhiqiang Ouyang and
                  Xingang Liu},
  editor       = {Jia Hu and
                  Shahid Mumtaz and
                  Xinzhou Cheng},
  title        = {Design of big data integration platform based on hybrid hierarchy
                  architecture},
  booktitle    = {15th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2021, Shenyang, China, October 20-22, 2021},
  pages        = {135--140},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigDataSE53435.2021.00028},
  doi          = {10.1109/BIGDATASE53435.2021.00028},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/NieZOL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/PengX021,
  author       = {Junru Peng and
                  Heng Xu and
                  Jun Song},
  editor       = {Jia Hu and
                  Shahid Mumtaz and
                  Xinzhou Cheng},
  title        = {{HRSE:} {A} novel high-speed random sampling encryption scheme on
                  big data},
  booktitle    = {15th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2021, Shenyang, China, October 20-22, 2021},
  pages        = {57--64},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigDataSE53435.2021.00018},
  doi          = {10.1109/BIGDATASE53435.2021.00018},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatase/PengX021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/RahaliLMRM21,
  author       = {Seryne Rahali and
                  Maryline Laurent and
                  Souha Masmoudi and
                  Charles Roux and
                  Brice Mazeau},
  editor       = {Jia Hu and
                  Shahid Mumtaz and
                  Xinzhou Cheng},
  title        = {A Validated Privacy-Utility Preserving Recommendation System with
                  Local Differential Privacy},
  booktitle    = {15th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2021, Shenyang, China, October 20-22, 2021},
  pages        = {118--127},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigDataSE53435.2021.00026},
  doi          = {10.1109/BIGDATASE53435.2021.00026},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatase/RahaliLMRM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/TangCDS21,
  author       = {Xiao Tang and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Jiachen Shen},
  editor       = {Jia Hu and
                  Shahid Mumtaz and
                  Xinzhou Cheng},
  title        = {PKMark: {A} Robust Zero-distortion Blind Reversible Scheme for Watermarking
                  Relational Databases},
  booktitle    = {15th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2021, Shenyang, China, October 20-22, 2021},
  pages        = {72--79},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigDataSE53435.2021.00020},
  doi          = {10.1109/BIGDATASE53435.2021.00020},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/TangCDS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/TongMFJZ021,
  author       = {Xinyu Tong and
                  Haining Meng and
                  Kai Feng and
                  Wenjiang Ji and
                  Yi Zheng and
                  Xinhong Hei},
  editor       = {Jia Hu and
                  Shahid Mumtaz and
                  Xinzhou Cheng},
  title        = {A {STL-GALSTM} Model to Predict the Track Irregularity of High-Speed
                  Railway},
  booktitle    = {15th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2021, Shenyang, China, October 20-22, 2021},
  pages        = {42--48},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigDataSE53435.2021.00016},
  doi          = {10.1109/BIGDATASE53435.2021.00016},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatase/TongMFJZ021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/XuSQSHH21,
  author       = {Jianxiong Xu and
                  Xiaoyu Shi and
                  Hezhe Qiao and
                  Mingsheng Shang and
                  Xianbo He and
                  Qingyu He},
  editor       = {Jia Hu and
                  Shahid Mumtaz and
                  Xinzhou Cheng},
  title        = {{UEIN:} {A} User Evolving Interests Network for Click-Through Rate
                  Prediction},
  booktitle    = {15th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2021, Shenyang, China, October 20-22, 2021},
  pages        = {34--41},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigDataSE53435.2021.00015},
  doi          = {10.1109/BIGDATASE53435.2021.00015},
  timestamp    = {Wed, 13 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/XuSQSHH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/XueSSZF21,
  author       = {Hui Xue and
                  Bo Sun and
                  Chengxiang Si and
                  Wei Zhang and
                  Jing Fang},
  editor       = {Jia Hu and
                  Shahid Mumtaz and
                  Xinzhou Cheng},
  title        = {{KMUL:} {A} User Identity Linkage Method across Social Networks Based
                  on Spatiotemporal Data},
  booktitle    = {15th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2021, Shenyang, China, October 20-22, 2021},
  pages        = {111--117},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigDataSE53435.2021.00025},
  doi          = {10.1109/BIGDATASE53435.2021.00025},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/XueSSZF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/XueSSZF21a,
  author       = {Hui Xue and
                  Bo Sun and
                  Chengxiang Si and
                  Wei Zhang and
                  Jing Fang},
  editor       = {Jia Hu and
                  Shahid Mumtaz and
                  Xinzhou Cheng},
  title        = {{SDCCD:} Spatiotemporal Data Cleaning based on Collision Detection},
  booktitle    = {15th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2021, Shenyang, China, October 20-22, 2021},
  pages        = {128--134},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigDataSE53435.2021.00027},
  doi          = {10.1109/BIGDATASE53435.2021.00027},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/XueSSZF21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/YangMX21,
  author       = {Fan Yang and
                  Zhao Ma and
                  Heng Xu},
  editor       = {Jia Hu and
                  Shahid Mumtaz and
                  Xinzhou Cheng},
  title        = {An Efficient Redundancy Control and Load Balancing Scheme for Cloud
                  Storage},
  booktitle    = {15th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2021, Shenyang, China, October 20-22, 2021},
  pages        = {49--56},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigDataSE53435.2021.00017},
  doi          = {10.1109/BIGDATASE53435.2021.00017},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/YangMX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/ZhangGDS21,
  author       = {Deyuan Zhang and
                  Hongwei Gao and
                  Hailong Dai and
                  Xiangbin Shi},
  editor       = {Jia Hu and
                  Shahid Mumtaz and
                  Xinzhou Cheng},
  title        = {Two-stream Graph Attention Convolutional for Video Action Recognition},
  booktitle    = {15th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2021, Shenyang, China, October 20-22, 2021},
  pages        = {23--27},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigDataSE53435.2021.00013},
  doi          = {10.1109/BIGDATASE53435.2021.00013},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/ZhangGDS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/ZhaoL0WLTWL21,
  author       = {Meng Zhao and
                  Lingang Liu and
                  Yong Ding and
                  Yujue Wang and
                  Hai Liang and
                  Shijie Tang and
                  Baodong Wen and
                  Weiyou Liang},
  editor       = {Jia Hu and
                  Shahid Mumtaz and
                  Xinzhou Cheng},
  title        = {Verifiable and Privacy-Preserving Ranked Multi-Keyword Search over
                  Outsourced Data in Clouds},
  booktitle    = {15th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2021, Shenyang, China, October 20-22, 2021},
  pages        = {95--102},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigDataSE53435.2021.00023},
  doi          = {10.1109/BIGDATASE53435.2021.00023},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/ZhaoL0WLTWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/Zhou0PLWG21,
  author       = {Xuan Zhou and
                  Xiaoming Wang and
                  Guangyao Pang and
                  Yaguang Lin and
                  Pengfei Wan and
                  Meiling Ge},
  editor       = {Jia Hu and
                  Shahid Mumtaz and
                  Xinzhou Cheng},
  title        = {Dual Attention-based Interest Network for Personalized Recommendation
                  System},
  booktitle    = {15th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2021, Shenyang, China, October 20-22, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigDataSE53435.2021.00010},
  doi          = {10.1109/BIGDATASE53435.2021.00010},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/Zhou0PLWG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/ZhouGZCWH21,
  author       = {Chengyang Zhou and
                  Renchu Guan and
                  Chuntao Zhao and
                  Gonglei Chai and
                  Leigang Wang and
                  Xiaosong Han},
  editor       = {Jia Hu and
                  Shahid Mumtaz and
                  Xinzhou Cheng},
  title        = {A Chinese Medical Question Answering System Based on Knowledge Graph},
  booktitle    = {15th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2021, Shenyang, China, October 20-22, 2021},
  pages        = {28--33},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigDataSE53435.2021.00014},
  doi          = {10.1109/BIGDATASE53435.2021.00014},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/ZhouGZCWH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/bigdatase/2021,
  editor       = {Jia Hu and
                  Shahid Mumtaz and
                  Xinzhou Cheng},
  title        = {15th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2021, Shenyang, China, October 20-22, 2021},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigDataSE53435.2021},
  doi          = {10.1109/BIGDATASE53435.2021},
  isbn         = {978-1-6654-0038-1},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/AbbasZHSH20,
  author       = {Syed Ghazanfar Abbas and
                  Shahzaib Zahid and
                  Faisal Bashir Hussain and
                  Ghalib A. Shah and
                  Muhammad Husnain},
  editor       = {Guojun Wang and
                  Carlos Becker Westphall and
                  Arcangelo Castiglione},
  title        = {A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks
                  in Smart Home Use Case},
  booktitle    = {14th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021},
  pages        = {122--129},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigDataSE50710.2020.00024},
  doi          = {10.1109/BIGDATASE50710.2020.00024},
  timestamp    = {Wed, 17 Feb 2021 12:27:49 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/AbbasZHSH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/AhmetA20,
  author       = {Ahmed Ahmet and
                  Tariq Abdullah},
  editor       = {Guojun Wang and
                  Carlos Becker Westphall and
                  Arcangelo Castiglione},
  title        = {Real-Time Social Media Analytics with Deep Transformer Language Models:
                  {A} Big Data Approach},
  booktitle    = {14th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021},
  pages        = {41--48},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigDataSE50710.2020.00014},
  doi          = {10.1109/BIGDATASE50710.2020.00014},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/AhmetA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/AliceaMTY20,
  author       = {Michael Alicea and
                  Arlen P. McDonald and
                  Chunyang Tang and
                  Jeong Yang},
  editor       = {Guojun Wang and
                  Carlos Becker Westphall and
                  Arcangelo Castiglione},
  title        = {Exploring the Application of Machine Learning Algorithms to the City
                  Public Bus Transport},
  booktitle    = {14th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021},
  pages        = {22--27},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigDataSE50710.2020.00011},
  doi          = {10.1109/BIGDATASE50710.2020.00011},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/AliceaMTY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/CaiWLL20,
  author       = {Hanbo Cai and
                  Jinyan Wang and
                  Xiaohong Liu and
                  Xianxian Li},
  editor       = {Guojun Wang and
                  Carlos Becker Westphall and
                  Arcangelo Castiglione},
  title        = {{DP-AP:} Differential Privacy-Preserving Affinity Propagation Clustering},
  booktitle    = {14th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021},
  pages        = {73--79},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigDataSE50710.2020.00018},
  doi          = {10.1109/BIGDATASE50710.2020.00018},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatase/CaiWLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/FanLZCZ20,
  author       = {Yulin Fan and
                  Yang Li and
                  Mengqi Zhan and
                  Huajun Cui and
                  Yan Zhang},
  editor       = {Guojun Wang and
                  Carlos Becker Westphall and
                  Arcangelo Castiglione},
  title        = {IoTDefender: {A} Federated Transfer Learning Intrusion Detection Framework
                  for 5G IoT},
  booktitle    = {14th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021},
  pages        = {88--95},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigDataSE50710.2020.00020},
  doi          = {10.1109/BIGDATASE50710.2020.00020},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatase/FanLZCZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/HaddajiAF20,
  author       = {Achref Haddaji and
                  Samiha Ayed and
                  Lamia Chaari Fourati},
  editor       = {Guojun Wang and
                  Carlos Becker Westphall and
                  Arcangelo Castiglione},
  title        = {Blockchain-based Multi-Levels Trust Mechanism Against Sybil Attacks
                  for Vehicular Networks},
  booktitle    = {14th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021},
  pages        = {155--163},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigDataSE50710.2020.00028},
  doi          = {10.1109/BIGDATASE50710.2020.00028},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatase/HaddajiAF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/HuWZL20,
  author       = {Taifeng Hu and
                  Liji Wu and
                  Xiangmin Zhang and
                  Zhaopo Liao},
  editor       = {Guojun Wang and
                  Carlos Becker Westphall and
                  Arcangelo Castiglione},
  title        = {Hardware Trojan Detection Combines with Machine Learning: an Isolation
                  Forest-based Detection Method},
  booktitle    = {14th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021},
  pages        = {96--103},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigDataSE50710.2020.00021},
  doi          = {10.1109/BIGDATASE50710.2020.00021},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/HuWZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/JiaYZ20,
  author       = {Anni Jia and
                  Wei Yang and
                  Gongxuan Zhang},
  editor       = {Guojun Wang and
                  Carlos Becker Westphall and
                  Arcangelo Castiglione},
  title        = {Side Channel Leakage Alignment Based on Longest Common Subsequence},
  booktitle    = {14th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021},
  pages        = {130--137},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigDataSE50710.2020.00025},
  doi          = {10.1109/BIGDATASE50710.2020.00025},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/JiaYZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/Kapetanidou0SCT20,
  author       = {Ioanna Angeliki Kapetanidou and
                  Muhammad Hassan and
                  Christos{-}Alexandros Sarros and
                  Mauro Conti and
                  Vassilis Tsaoussidis},
  editor       = {Guojun Wang and
                  Carlos Becker Westphall and
                  Arcangelo Castiglione},
  title        = {Reputation-based Trust: {A} robust mechanism for Dynamic Adaptive
                  Streaming over Named Data Networking},
  booktitle    = {14th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021},
  pages        = {114--121},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigDataSE50710.2020.00023},
  doi          = {10.1109/BIGDATASE50710.2020.00023},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatase/Kapetanidou0SCT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/Leung0SD20,
  author       = {Carson K. Leung and
                  Yubo Chen and
                  Siyuan Shang and
                  Deyu Deng},
  editor       = {Guojun Wang and
                  Carlos Becker Westphall and
                  Arcangelo Castiglione},
  title        = {Big Data Science on {COVID-19} Data},
  booktitle    = {14th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021},
  pages        = {14--21},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigDataSE50710.2020.00010},
  doi          = {10.1109/BIGDATASE50710.2020.00010},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatase/Leung0SD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/ManakkaduDT20,
  author       = {Sheheeda Manakkadu and
                  Sourav Dutta and
                  Sam R. Thangiah},
  editor       = {Guojun Wang and
                  Carlos Becker Westphall and
                  Arcangelo Castiglione},
  title        = {Profiling of Disease-Associated Proteins Neighborhood Networks},
  booktitle    = {14th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021},
  pages        = {9--13},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigDataSE50710.2020.00009},
  doi          = {10.1109/BIGDATASE50710.2020.00009},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/ManakkaduDT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/NingW20,
  author       = {Lulu Ning and
                  Jian Wang},
  editor       = {Guojun Wang and
                  Carlos Becker Westphall and
                  Arcangelo Castiglione},
  title        = {A Novel Bilateral Oblivious Transfer Protocol Based on Cut-and-Choose
                  Technique},
  booktitle    = {14th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021},
  pages        = {49--56},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigDataSE50710.2020.00015},
  doi          = {10.1109/BIGDATASE50710.2020.00015},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/NingW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/PurevdagvaZHM20,
  author       = {Chinguun Purevdagva and
                  Rui Zhao and
                  Pei{-}Chi Huang and
                  William Mahoney},
  editor       = {Guojun Wang and
                  Carlos Becker Westphall and
                  Arcangelo Castiglione},
  title        = {A machine-learning based framework for detection of fake political
                  speech},
  booktitle    = {14th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021},
  pages        = {80--87},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigDataSE50710.2020.00019},
  doi          = {10.1109/BIGDATASE50710.2020.00019},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatase/PurevdagvaZHM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/TongZRX20,
  author       = {Yan Tong and
                  Huanguo Zhang and
                  Zhengwei Ren and
                  Shiwei Xu},
  editor       = {Guojun Wang and
                  Carlos Becker Westphall and
                  Arcangelo Castiglione},
  title        = {Invariance of Algebraic Immunity of Vectorial Boolean Functions under
                  Equivalence Relations},
  booktitle    = {14th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021},
  pages        = {147--154},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigDataSE50710.2020.00027},
  doi          = {10.1109/BIGDATASE50710.2020.00027},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatase/TongZRX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/VermaKD20,
  author       = {Nisha Verma and
                  Sangaralingam Kajanan and
                  Anindya Datta},
  editor       = {Guojun Wang and
                  Carlos Becker Westphall and
                  Arcangelo Castiglione},
  title        = {Goal-driven Look-alike Modelingfor Mobile Consumers},
  booktitle    = {14th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021},
  pages        = {28--35},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigDataSE50710.2020.00012},
  doi          = {10.1109/BIGDATASE50710.2020.00012},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/VermaKD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/WangGLJ20,
  author       = {Ryan Yixiang Wang and
                  Tim Qinsong Guo and
                  Leo Guanhua Li and
                  Julia Yutian Jiao},
  editor       = {Guojun Wang and
                  Carlos Becker Westphall and
                  Arcangelo Castiglione},
  title        = {Using {GWAS} SNPs to Determine Association between {COVID-19} and
                  Comorbid Diseases},
  booktitle    = {14th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021},
  pages        = {36--40},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigDataSE50710.2020.00013},
  doi          = {10.1109/BIGDATASE50710.2020.00013},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/WangGLJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/YanTR20,
  author       = {Jie Yan and
                  Claude Turner and
                  Dwight H. Richards},
  editor       = {Guojun Wang and
                  Carlos Becker Westphall and
                  Arcangelo Castiglione},
  title        = {Animated Commentator Enhanced Network Monitoring and Visualization
                  Application for Cyber Security Competition},
  booktitle    = {14th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021},
  pages        = {57--64},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigDataSE50710.2020.00016},
  doi          = {10.1109/BIGDATASE50710.2020.00016},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatase/YanTR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/ZengP20,
  author       = {Kungan Zeng and
                  Incheon Paik},
  editor       = {Guojun Wang and
                  Carlos Becker Westphall and
                  Arcangelo Castiglione},
  title        = {Web Service Composition Sequence Learning Based on Neural Language
                  Networks},
  booktitle    = {14th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigDataSE50710.2020.00008},
  doi          = {10.1109/BIGDATASE50710.2020.00008},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/ZengP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/ZhangCWCLL20,
  author       = {Fangjiao Zhang and
                  Xiang Cui and
                  Zhi Wang and
                  Shaomian Chen and
                  Qixu Liu and
                  Chaoge Liu},
  editor       = {Guojun Wang and
                  Carlos Becker Westphall and
                  Arcangelo Castiglione},
  title        = {A Systematic Study of {AI} Applications in Cybersecurity Competitions},
  booktitle    = {14th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021},
  pages        = {138--146},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigDataSE50710.2020.00026},
  doi          = {10.1109/BIGDATASE50710.2020.00026},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatase/ZhangCWCLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/ZhouCKBGKEL20,
  author       = {Xin Zhou and
                  Reginald Cushing and
                  Ralph Koning and
                  Adam Belloum and
                  Paola Grosso and
                  Sander Klous and
                  Tom M. van Engers and
                  Cees de Laat},
  editor       = {Guojun Wang and
                  Carlos Becker Westphall and
                  Arcangelo Castiglione},
  title        = {Policy Enforcement for Secure and Trustworthy Data Sharing in Multi-domain
                  Infrastructures},
  booktitle    = {14th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021},
  pages        = {104--113},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigDataSE50710.2020.00022},
  doi          = {10.1109/BIGDATASE50710.2020.00022},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatase/ZhouCKBGKEL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatase/ZhuHXZW20,
  author       = {Rong Zhu and
                  Xiaoxi He and
                  Jiahong Xie and
                  Zongjie Zhang and
                  Ping Wang},
  editor       = {Guojun Wang and
                  Carlos Becker Westphall and
                  Arcangelo Castiglione},
  title        = {An Improved RFID-based Authentication Protocol for Rail Transit},
  booktitle    = {14th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021},
  pages        = {65--72},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigDataSE50710.2020.00017},
  doi          = {10.1109/BIGDATASE50710.2020.00017},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatase/ZhuHXZW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/bigdatase/2020,
  editor       = {Guojun Wang and
                  Carlos Becker Westphall and
                  Arcangelo Castiglione},
  title        = {14th {IEEE} International Conference on Big Data Science and Engineering,
                  BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigDataSE50710.2020},
  doi          = {10.1109/BIGDATASE50710.2020},
  isbn         = {978-0-7381-1114-8},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdatase/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/00020ML19,
  author       = {Ning Xi and
                  Cong Sun and
                  Jianfeng Ma and
                  Jing Lv},
  title        = {Distributed Quantitative Information Flow Evaluation for Service Composition
                  in Clouds},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {200--207},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00035},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00035},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/00020ML19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Al-ShabotiCW19,
  author       = {Mohammed Al{-}Shaboti and
                  Aaron Chen and
                  Ian Welch},
  title        = {Automatic Device Selection and Access Policy Generation Based on User
                  Preference for IoT Activity Workflow},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {769--774},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00111},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00111},
  timestamp    = {Thu, 29 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Al-ShabotiCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AladwanACPAA19,
  author       = {Mohammad Aladwan and
                  Feras M. Awaysheh and
                  Jos{\'{e}} Carlos Cabaleiro and
                  Tom{\'{a}}s F. Pena and
                  Hamzeh Alabool and
                  Mamoun Alazab},
  title        = {Common Security Criteria for Vehicular Clouds and Internet of Vehicles
                  Evaluation and Selection},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {814--820},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00118},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00118},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AladwanACPAA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AleFCW019,
  author       = {Laha Ale and
                  Xiaojie Fang and
                  Dajiang Chen and
                  Ye Wang and
                  Ning Zhang},
  title        = {Lightweight Deep Learning Model For Facial Expression Recognition},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {707--712},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00100},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00100},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AleFCW019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Alnabulsi019,
  author       = {Hussein Alnabulsi and
                  Md. Rafiqul Islam},
  title        = {Protecting Code Injection Attacks in Intelligent Transportation System},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {799--806},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00116},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00116},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Alnabulsi019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AnEPHNFKK19,
  author       = {SeongMo An and
                  Taehoon Eom and
                  Jong Sou Park and
                  Jin Bum Hong and
                  Armstrong Nhlabatsi and
                  Noora Fetais and
                  Khaled M. Khan and
                  Dong Seong Kim},
  title        = {CloudSafe: {A} Tool for an Automated Security Analysis for Cloud Computing},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {602--609},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00086},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00086},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AnEPHNFKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AwayshehCPA19,
  author       = {Feras M. Awaysheh and
                  Jos{\'{e}} Carlos Cabaleiro and
                  Tom{\'{a}}s Fern{\'{a}}ndez Pena and
                  Mamoun Alazab},
  title        = {Big Data Security Frameworks Meet the Intelligent Transportation Systems
                  Trust Challenges},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {807--813},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00117},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00117},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AwayshehCPA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AzevedoMB19,
  author       = {Rui Azevedo and
                  Ib{\'{e}}ria Medeiros and
                  Alysson Bessani},
  title        = {{PURE:} Generating Quality Threat Intelligence by Clustering and Correlating
                  {OSINT}},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {483--490},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00071},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00071},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AzevedoMB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BlackG0L19,
  author       = {Paul Black and
                  Iqbal Gondal and
                  Peter Vamplew and
                  Arun Lakhotia},
  title        = {Evolved Similarity Techniques in Malware Analysis},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {404--410},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00061},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00061},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BlackG0L19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaoXLXQ19,
  author       = {Hao Cao and
                  Xiaolong Xu and
                  Qingxiang Liu and
                  Yuan Xue and
                  Lianyong Qi},
  title        = {Uncertainty-Aware Resource Provisioning for Workflow Scheduling in
                  Edge Computing Environment},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {734--739},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00105},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00105},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaoXLXQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CastroSD19,
  author       = {Raphael Labaca Castro and
                  Corinna Schmitt and
                  Gabi Dreo},
  title        = {{AIMED:} Evolving Malware with Genetic Programming to Evade Detection},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {240--247},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00040},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00040},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/CastroSD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChaiYJ019,
  author       = {Heyan Chai and
                  Shuqiang Yang and
                  Zoe Lin Jiang and
                  Xuan Wang},
  title        = {A Robust and Reversible Watermarking Technique for Relational Dataset
                  Based on Clustering},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {411--418},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00062},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00062},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChaiYJ019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Chen0XLS19,
  author       = {Shuai Chen and
                  Wenjie Xiong and
                  Yehan Xu and
                  Bing Li and
                  Jakub Szefer},
  title        = {Thermal Covert Channels Leveraging Package-on-Package {DRAM}},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {319--326},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00050},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00050},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Chen0XLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenH0W19,
  author       = {Xin Chen and
                  Xinyi Huang and
                  Yi Mu and
                  Ding Wang},
  title        = {A Typo-Tolerant Password Authentication Scheme with Targeted Error
                  Correction},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {546--553},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00079},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00079},
  timestamp    = {Fri, 23 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenH0W19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenZZ19,
  author       = {Wenhao Chen and
                  Bohang Zeng and
                  Peijia Zheng},
  title        = {A Robust Watermarking Scheme for Encrypted {JPEG} Bitstreams with
                  Format-Compliant Encryption},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {397--403},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00060},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00060},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChengC0L019,
  author       = {Zhenyu Cheng and
                  Xunxun Chen and
                  Yongzheng Zhang and
                  Shuhao Li and
                  Jian Xu},
  title        = {MURITE-Detector: Identifying User-Role in Information Theft Events
                  of Mobile Network},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {232--239},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00039},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00039},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChengC0L019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChiYKQ19,
  author       = {Xiaoxiao Chi and
                  Chao Yan and
                  Huaizhen Kou and
                  Lianyong Qi},
  title        = {Accuracy-Aware Service Recommendation with Privacy},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {740--745},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00106},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00106},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChiYKQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChowdhuryCK0S19,
  author       = {Mohammad Jabed Morshed Chowdhury and
                  Alan Colman and
                  Muhammad Ashad Kabir and
                  Jun Han and
                  Paul Sarda},
  title        = {Continuous Authorization in Subject-Driven Data Sharing Using Wearable
                  Devices},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {327--333},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00051},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00051},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChowdhuryCK0S19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChowdhuryKK19,
  author       = {Abdullahi Chowdhury and
                  Gour C. Karmakar and
                  Joarder Kamruzzaman},
  title        = {Trusted Autonomous Vehicle: Measuring Trust using On-Board Unit Data},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {787--792},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00114},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00114},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChowdhuryKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CuiLZLZ19,
  author       = {Wenjing Cui and
                  Yang Li and
                  Yan Zhang and
                  Chang Liu and
                  Mengqi Zhan},
  title        = {An Ant Colony Algorithm Based Content Poisoning Mitigation in Named
                  Data Networking},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {176--183},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00032},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00032},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CuiLZLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DengZCZJ0019,
  author       = {Kunyuan Deng and
                  Xiaoyong Zhang and
                  Yijun Cheng and
                  Zhiyong Zheng and
                  Fu Jiang and
                  Weirong Liu and
                  Jun Peng},
  title        = {A Remaining Useful Life Prediction Method with Automatic Feature Extraction
                  for Aircraft Engines},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {686--692},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00097},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00097},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/DengZCZJ0019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DishingtonSKCMN19,
  author       = {Cole Dishington and
                  Dilli P. Sharma and
                  Dong Seong Kim and
                  Jin{-}Hee Cho and
                  Terrence J. Moore and
                  Frederica Free{-}Nelson},
  title        = {Security and Performance Assessment of {IP} Multiplexing Moving Target
                  Defence in Software Defined Networks},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {288--295},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00046},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00046},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/DishingtonSKCMN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/EomHAPK19,
  author       = {Taehoon Eom and
                  Jin Bum Hong and
                  SeongMo An and
                  Jong Sou Park and
                  Dong Seong Kim},
  title        = {Security and Performance Modeling and Optimization for Software Defined
                  Networking},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {610--617},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00087},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00087},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/EomHAPK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/EzabadiJKK19,
  author       = {Soheila Ghane Ezabadi and
                  Alireza Jolfaei and
                  Lars Kulik and
                  Ramamohanarao Kotagiri},
  title        = {Differentially Private Streaming to Untrusted Edge Servers in Intelligent
                  Transportation System},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {781--786},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00113},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00113},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/EzabadiJKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FloresJ19,
  author       = {Denys A. Flores and
                  Arshad Jhumka},
  title        = {Hybrid Logical Clocks for Database Forensics: Filling the Gap between
                  Chain of Custody and Database Auditing},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {224--231},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00038},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00038},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FloresJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FrancisSNBV19,
  author       = {Xavier Francis and
                  Hamid R. Sharifzadeh and
                  Angus Newton and
                  Nilufar Baghaei and
                  Soheil Varastehpour},
  title        = {Learning Wear Patterns on Footwear Outsoles Using Convolutional Neural
                  Networks},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {450--457},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00067},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00067},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FrancisSNBV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GomiYOTH19,
  author       = {Hidehito Gomi and
                  Shuji Yamaguchi and
                  Wataru Ogami and
                  Teruhiko Teraoka and
                  Tatsuru Higurashi},
  title        = {Context-Aware Authentication Using Co-Located Devices},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {304--311},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00048},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00048},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GomiYOTH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GondalKZ19,
  author       = {Iqbal Gondal and
                  Joarder Kamruzzaman and
                  Leo Zhang},
  title        = {One-Shot Malware Outbreak Detection using Spatio-Temporal Isomorphic
                  Dynamic Features},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {751--756},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00108},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00108},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GondalKZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GongAX19,
  author       = {Borui Gong and
                  Man Ho Au and
                  Haiyang Xue},
  title        = {Constructing Strong Designated Verifier Signatures from Key Encapsulation
                  Mechanisms},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {586--593},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00084},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00084},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GongAX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoYGZCM19,
  author       = {Yunlong Guo and
                  Aimin Yu and
                  Xiaoli Gong and
                  Lixin Zhao and
                  Lijun Cai and
                  Dan Meng},
  title        = {Building Trust in Container Environment},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00011},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00011},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoYGZCM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HamadZSN19,
  author       = {Salma Abdalla Hamad and
                  Wei Emma Zhang and
                  Quan Z. Sheng and
                  Surya Nepal},
  title        = {IoT Device Identification via Network-Flow Based Fingerprinting and
                  Learning},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {103--111},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00023},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00023},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HamadZSN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanS0IKTN19,
  author       = {Chansu Han and
                  Jumpei Shimamura and
                  Takeshi Takahashi and
                  Daisuke Inoue and
                  Masanori Kawakita and
                  Jun'ichi Takeuchi and
                  Koji Nakao},
  title        = {Real-Time Detection of Malware Activities by Analyzing Darknet Traffic
                  Using Graphical Lasso},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {144--151},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00028},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00028},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanS0IKTN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Hassan0SD19,
  author       = {Fadi Hassan and
                  David S{\'{a}}nchez and
                  Jordi Soria{-}Comas and
                  Josep Domingo{-}Ferrer},
  title        = {Automatic Anonymization of Textual Documents: Detecting Sensitive
                  Information via Word Embeddings},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {358--365},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00055},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00055},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Hassan0SD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HeK19,
  author       = {Ke He and
                  Dong Seong Kim},
  title        = {Malware Detection with Malware Images using Deep Learning Techniques},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {95--102},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00022},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00022},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HeK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HeRHCL19,
  author       = {Zecheng He and
                  Aswin Raghavan and
                  Guangyuan Hu and
                  Sek M. Chai and
                  Ruby B. Lee},
  title        = {Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep
                  Learning},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {160--167},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00030},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00030},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HeRHCL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HeiBWZZJ19,
  author       = {Xinhong Hei and
                  Binbin Bai and
                  Yichuan Wang and
                  Li Zhang and
                  Lei Zhu and
                  Wenjiang Ji},
  title        = {Feature Extraction Optimization for Bitstream Communication Protocol
                  Format Reverse Analysis},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {662--669},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00094},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00094},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HeiBWZZJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HorandnerR19,
  author       = {Felix H{\"{o}}randner and
                  Christof Rabensteiner},
  title        = {Horcruxes for Everyone - {A} Framework for Key-Loss Recovery by Splitting
                  Trust},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {50--57},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00017},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00017},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HorandnerR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuHWWZL19,
  author       = {Jianxing Hu and
                  Dongdong Huo and
                  Meilin Wang and
                  Yazhe Wang and
                  Yan Zhang and
                  Yu Li},
  title        = {A Probability Prediction Based Mutable Control-Flow Attestation Scheme
                  on Embedded Platforms},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {530--537},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00077},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00077},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuHWWZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangB19,
  author       = {Shin{-}Ying Huang and
                  Tao Ban},
  title        = {A Topic-Based Unsupervised Learning Approach for Online Underground
                  Market Exploration},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {208--215},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00036},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00036},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangQAM019,
  author       = {Jack Huang and
                  Yuan Wei Qi and
                  Muhammad Rizwan Asghar and
                  Andrew Meads and
                  Yu{-}Cheng Tu},
  title        = {MedBloc: {A} Blockchain-Based Secure {EHR} System for Sharing and
                  Accessing Medical Data},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {594--601},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00085},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00085},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangQAM019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangWYC19,
  author       = {Yujun Huang and
                  Yunpeng Weng and
                  Shuai Yu and
                  Xu Chen},
  title        = {Diffusion Convolutional Recurrent Neural Network with Rank Influence
                  Learning for Traffic Forecasting},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {678--685},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00096},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00096},
  timestamp    = {Mon, 26 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangWYC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangX0QC19,
  author       = {Na Huang and
                  Ming Xu and
                  Ning Zheng and
                  Tong Qiao and
                  Kim{-}Kwang Raymond Choo},
  title        = {Deep Android Malware Classification with API-Based Feature Graph},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {296--303},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00047},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00047},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangX0QC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangYQW19,
  author       = {Yongjie Huang and
                  Qiping Yang and
                  Jinghui Qin and
                  Wushao Wen},
  title        = {Phishing {URL} Detection via {CNN} and Attention-Based Hierarchical
                  {RNN}},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {112--119},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00024},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00024},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangYQW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/IslamKKM19,
  author       = {Mohammad Manzurul Islam and
                  Gour C. Karmakar and
                  Joarder Kamruzzaman and
                  M. Manzur Murshed},
  title        = {Measuring Trustworthiness of IoT Image Sensor Data Using Other Sensors'
                  Complementary Multimodal Data},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {775--780},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00112},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00112},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/IslamKKM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JabeenP19,
  author       = {Gul Jabeen and
                  Ping Luo},
  title        = {A Unified Measurable Software Trustworthy Model Based on Vulnerability
                  Loss Speed Index},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {18--25},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00013},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00013},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JabeenP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiZZSG19,
  author       = {Dongxu Ji and
                  Qianying Zhang and
                  Shijun Zhao and
                  Zhiping Shi and
                  Yong Guan},
  title        = {MicroTEE: Designing {TEE} {OS} Based on the Microkernel Architecture},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {26--33},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00014},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00014},
  timestamp    = {Thu, 23 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiZZSG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiaMHKB19,
  author       = {Guanbo Jia and
                  Paul Miller and
                  Xin Hong and
                  Harsha K. Kalutarage and
                  Tao Ban},
  title        = {Anomaly Detection in Network Traffic Using Dynamic Graph Mining with
                  a Sparse Autoencoder},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {458--465},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00068},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00068},
  timestamp    = {Mon, 15 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiaMHKB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JolfaeiKS19,
  author       = {Alireza Jolfaei and
                  Krishna Kant and
                  Hassan Shafei},
  title        = {Secure Data Streaming to Untrusted Road Side Units in Intelligent
                  Transportation System},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {793--798},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00115},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00115},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JolfaeiKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KhodaIKGR19,
  author       = {Mahbub E. Khoda and
                  Tasadduq Imam and
                  Joarder Kamruzzaman and
                  Iqbal Gondal and
                  Ashfaqur Rahman},
  title        = {Selective Adversarial Learning for Mobile Malware},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {272--279},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00044},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00044},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KhodaIKGR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KnightLA19,
  author       = {Edward Knight and
                  Sam Lord and
                  Budi Arief},
  title        = {Lock Picking in the Era of Internet of Things},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {835--842},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00121},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00121},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KnightLA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KuppaGAL19,
  author       = {Aditya Kuppa and
                  Slawomir Grzonkowski and
                  Muhammad Rizwan Asghar and
                  Nhien{-}An Le{-}Khac},
  title        = {Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly
                  Detection},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {442--449},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00066},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00066},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KuppaGAL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KutylowskiK19,
  author       = {Miroslaw Kutylowski and
                  Przemyslaw Kubiak},
  title        = {Privacy and Security Analysis of {PACE} {GM} Protocol},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {763--768},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00110},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00110},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KutylowskiK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LadjelAPS19,
  author       = {Riad Ladjel and
                  Nicolas Anciaux and
                  Philippe Pucheral and
                  Guillaume Scerri},
  title        = {Trustworthy Distributed Computations on Personal Data Using Trusted
                  Execution Environments},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {381--388},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00058},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00058},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LadjelAPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LatzoF19,
  author       = {Tobias Latzo and
                  Felix C. Freiling},
  title        = {Characterizing the Limitations of Forensic Event Reconstruction Based
                  on Log Files},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {466--475},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00069},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00069},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LatzoF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LauerSRN19,
  author       = {Hagen Lauer and
                  Amin Sakzad and
                  Carsten Rudolph and
                  Surya Nepal},
  title        = {A Logic for Secure Stratified Systems and its Application to Containerized
                  Systems},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {562--569},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00081},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00081},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LauerSRN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Li0TWG19,
  author       = {Dawei Li and
                  Jianwei Liu and
                  Zongxun Tang and
                  Qianhong Wu and
                  Zhenyu Guan},
  title        = {AgentChain: {A} Decentralized Cross-Chain Exchange System},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {491--498},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00072},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00072},
  timestamp    = {Tue, 27 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Li0TWG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Li0Z19,
  author       = {Zhangtan Li and
                  Liang Cheng and
                  Yang Zhang},
  title        = {Tracking Sensitive Information and Operations in Integrated Clinical
                  Environment},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {192--199},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00034},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00034},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Li0Z19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiCL0WM19,
  author       = {Bingyu Li and
                  Dawei Chu and
                  Jingqiang Lin and
                  Quanwei Cai and
                  Congli Wang and
                  Lingjia Meng},
  title        = {The Weakest Link of Certificate Transparency: Exploring the {TLS/HTTPS}
                  Configurations of Third-Party Monitors},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {216--223},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00037},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00037},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiCL0WM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiZ19,
  author       = {Shixuan Li and
                  Dongmei Zhao},
  title        = {A LSTM-Based Method for Comprehension and Evaluation of Network Security
                  Situation},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {723--728},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00103},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00103},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LinLZT19,
  author       = {Kunli Lin and
                  Wenqing Liu and
                  Kun Zhang and
                  Bibo Tu},
  title        = {HyperMI: {A} Privilege-level {VM} Protection Approach against Compromised
                  Hypervisor},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {58--65},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00018},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00018},
  timestamp    = {Mon, 16 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LinLZT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuLLLSSTG19,
  author       = {Qingyi Liu and
                  Zhen Liu and
                  Yu Long and
                  Zhiqiang Liu and
                  Zhimei Sui and
                  Shifeng Sun and
                  Shuyang Tang and
                  Dawu Gu},
  title        = {Making Monero Hard-to-Trace and More Efficient},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {514--521},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00075},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00075},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuLLLSSTG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuSLLLSTG19,
  author       = {Hongyang Liu and
                  Feng Shen and
                  Zhiqiang Liu and
                  Yu Long and
                  Zhen Liu and
                  Shifeng Sun and
                  Shuyang Tang and
                  Dawu Gu},
  title        = {A Secure and Practical Blockchain Scheme for IoT},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {538--545},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00078},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00078},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuSLLLSTG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuYZW19,
  author       = {Zhicheng Liu and
                  Xiaochun Yun and
                  Yongzheng Zhang and
                  Yipeng Wang},
  title        = {{CCGA:} Clustering and Capturing Group Activities for DGA-Based Botnets
                  Detection},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {136--143},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00027},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00027},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuYZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuAZ19,
  author       = {Xingye Lu and
                  Man Ho Au and
                  Zhenfei Zhang},
  title        = {(Linkable) Ring Signature from Hash-Then-One-Way Signature},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {578--585},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00083},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00083},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuAZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuRCLJX19,
  author       = {Liangfu Lu and
                  Xiaohan Ren and
                  Chenming Cui and
                  Yun Luo and
                  Yongheng Jia and
                  Yinong Xu},
  title        = {Mutual Information on Tensors for Measuring the Nonlinear Correlations
                  in Network Security},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {746--750},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00107},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00107},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuRCLJX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LyuJWNAF19,
  author       = {Jiazhuo Lyu and
                  Zoe Lin Jiang and
                  Xuan Wang and
                  Zhenhao Nong and
                  Man Ho Au and
                  Junbin Fang},
  title        = {A Secure Decentralized Trustless E-Voting System Based on Smart Contract},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {570--577},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00082},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00082},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LyuJWNAF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MalikNHL19,
  author       = {Nisha Malik and
                  Priyadarsi Nanda and
                  Xiangjian He and
                  Ren Ping Liu},
  title        = {Trust and Reputation in Vehicular Networks: {A} Smart Contract-Based
                  Approach},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {34--41},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00015},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00015},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MalikNHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MarsalekZ19,
  author       = {Alexander Marsalek and
                  Thomas Zefferer},
  title        = {A Correctable Public Blockchain},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {554--561},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00080},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00080},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MarsalekZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MarsalekZFZ19,
  author       = {Alexander Marsalek and
                  Thomas Zefferer and
                  Edona Fasllija and
                  Dominik Ziegler},
  title        = {Tackling Data Inefficiency: Compressing the Bitcoin Blockchain},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {626--633},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00089},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00089},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MarsalekZFZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaruatonaAW19,
  author       = {Omaru Maruatona and
                  Ahmad Azab and
                  Paul A. Watters},
  title        = {{AVOCAD:} Adaptive Terrorist Comms Surveillance and Interception using
                  Machine Learning},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {85--94},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00021},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00021},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaruatonaAW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MoLYJGZ0019,
  author       = {Ran Mo and
                  Jianfeng Liu and
                  Wentao Yu and
                  Fu Jiang and
                  Xin Gu and
                  Xiaoshuai Zhao and
                  Weirong Liu and
                  Jun Peng},
  title        = {A Differential Privacy-Based Protecting Data Preprocessing Method
                  for Big Data Mining},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {693--699},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00098},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00098},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MoLYJGZ0019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MorelCM19,
  author       = {Victor Morel and
                  Mathieu Cunche and
                  Daniel Le M{\'{e}}tayer},
  title        = {A Generic Information and Consent Framework for the IoT},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {366--373},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00056},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00056},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MorelCM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NaiduM19,
  author       = {Vijay Naidu and
                  Manoranjan Mohanty},
  title        = {Defeating Fake Food Labels Using Watermarking and Biosequence Analysis},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {435--441},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00065},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00065},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NaiduM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NinetLMTZ19,
  author       = {Tristan Ninet and
                  Axel Legay and
                  Romaric Maillard and
                  Louis{-}Marie Traonouez and
                  Olivier Zendra},
  title        = {The Deviation Attack: {A} Novel Denial-of-Service Attack Against IKEv2},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {66--74},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00019},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00019},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NinetLMTZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NisbetJ19,
  author       = {Alastair Nisbet and
                  Rijo Jacob},
  title        = {TRIM, Wear Levelling and Garbage Collection on Solid State Drives:
                  {A} Prediction Model for Forensic Investigators},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {419--426},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00063},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00063},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NisbetJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NosouhiYSG19,
  author       = {Mohammad Reza Nosouhi and
                  Shui Yu and
                  Keshav Sood and
                  Marthie Grobler},
  title        = {HSDC-Net: Secure Anonymous Messaging in Online Social Networks},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {350--357},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00054},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00054},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/NosouhiYSG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/OttM19,
  author       = {Karl Ott and
                  Rabi N. Mahapatra},
  title        = {Continuous Authentication of Embedded Software},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {128--135},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00026},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00026},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/OttM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PangCPMZJ19,
  author       = {Ying Pang and
                  Zhenxiang Chen and
                  Lizhi Peng and
                  Kun Ma and
                  Chuan Zhao and
                  Ke Ji},
  title        = {A Signature-Based Assistant Random Oversampling Method for Malware
                  Detection},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {256--263},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00042},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00042},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PangCPMZJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PorwalM19,
  author       = {Utkarsh Porwal and
                  Smruthi Mukund},
  title        = {Credit Card Fraud Detection in E-Commerce},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {280--287},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00045},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00045},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PorwalM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QiaoJJG19,
  author       = {Yanchen Qiao and
                  Qingshan Jiang and
                  Zhenchao Jiang and
                  Liang Gu},
  title        = {A Multi-channel Visualization Method for Malware Classification Based
                  on Deep Learning},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {757--762},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00109},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00109},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/QiaoJJG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Qiu0OF19,
  author       = {Yuan Qiu and
                  Xinhong Hei and
                  Tadashi Ohmori and
                  Hideyuki Fujita},
  title        = {An Object-Pair Driven Approach for Top-k mCK Query Problem by Using
                  Hilbert R-Tree},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {655--661},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00093},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00093},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Qiu0OF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Rasheed0T19,
  author       = {Shawn Rasheed and
                  Jens Dietrich and
                  Amjed Tahir},
  title        = {Laughter in the Wild: {A} Study Into DoS Vulnerabilities in {YAML}
                  Libraries},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {342--349},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00053},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00053},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Rasheed0T19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RashidP19,
  author       = {Mohammed A. Rashid and
                  Houshyar Honar Pajooh},
  title        = {A Security Framework for IoT Authentication and Authorization Based
                  on Blockchain Technology},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {264--271},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00043},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00043},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RashidP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RevadigarJLV19,
  author       = {Girish Revadigar and
                  Chitra Javali and
                  Yang Li and
                  Sreejaya Viswanathan},
  title        = {On the Effectiveness of Electric Network Frequency {(ENF)} as a Source
                  of Randomness},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {849--854},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00123},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00123},
  timestamp    = {Wed, 22 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RevadigarJLV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RobinsonB19,
  author       = {Peter Robinson and
                  John Brainard},
  title        = {Anonymous State Pinning for Private Blockchains},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {827--834},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00120},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00120},
  timestamp    = {Wed, 09 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RobinsonB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SachidanandaBGE19,
  author       = {Vinay Sachidananda and
                  Suhas Bhairav and
                  Nirnay Ghosh and
                  Yuval Elovici},
  title        = {{PIT:} {A} Probe Into Internet of Things by Comprehensive Security
                  Analysis},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {522--529},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00076},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00076},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SachidanandaBGE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SasakiMJ19,
  author       = {Takayuki Sasaki and
                  Yusuke Morita and
                  Astha Jada},
  title        = {Access Control Architecture for Smart City IoT Platform},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {717--722},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00102},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00102},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SasakiMJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SenFM19,
  author       = {Amartya Sen and
                  Kenneth K. Fletcher and
                  Sanjay Madria},
  title        = {A Secure User-Centric Framework for Dynamic Service Provisioning in
                  IoT Environments},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {334--341},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00052},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00052},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SenFM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShahrakiRG19,
  author       = {Ahmad Salehi Shahraki and
                  Carsten Rudolph and
                  Marthie Grobler},
  title        = {A Dynamic Access Control Policy Model for Sharing of Healthcare Data
                  in Multiple Domains},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {618--625},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00088},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00088},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShahrakiRG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SuYLL19,
  author       = {Liya Su and
                  Yepeng Yao and
                  Zhigang Lu and
                  Baoxu Liu},
  title        = {Understanding the Influence of Graph Kernels on Deep Learning Architecture:
                  {A} Case Study of Flow-Based Network Attack Detection},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {312--318},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00049},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00049},
  timestamp    = {Tue, 27 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SuYLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Taubmann0R19,
  author       = {Benjamin Taubmann and
                  Alexander B{\"{o}}hm and
                  Hans P. Reiser},
  title        = {TwinPorter - An Architecture For Enabling the Live Migration of VMI-Based
                  Monitored Virtual Machines},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {427--434},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00064},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00064},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Taubmann0R19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ThantilageK19,
  author       = {Ranul Deelaka Thantilage and
                  Nhien{-}An Le{-}Khac},
  title        = {Framework for the Retrieval of Social Media and Instant Messaging
                  Evidence from Volatile Memory},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {476--482},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00070},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00070},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ThantilageK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Theuermann19,
  author       = {Kevin Theuermann},
  title        = {Trustworthy Privacy-Preserving Service Compositions},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {10--17},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00012},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00012},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Theuermann19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TienLHH19,
  author       = {Yun{-}Ping Tien and
                  Wei{-}Chen Lin and
                  Jan{-}Ming Ho and
                  Wing{-}Kai Hon},
  title        = {Optimal File Dissemination Scheduling Under a General Binary Tree
                  of Trust Relationship},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {42--49},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00016},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00016},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TienLHH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangSZ19,
  author       = {Yuntao Wang and
                  Zhou Su and
                  Kuan Zhang},
  title        = {A Secure Private Charging Pile Sharing Scheme with Electric Vehicles
                  in Energy Blockchain},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {648--654},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00092},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00092},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangSZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuXLY19,
  author       = {Zhijun Wu and
                  Enzhong Xu and
                  Liang Liu and
                  Meng Yue},
  title        = {{CHTDS:} {A} {CP-ABE} Access Control Scheme Based on Hash Table and
                  Data Segmentation in {NDN}},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {843--848},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00122},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00122},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuXLY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuZLM19,
  author       = {Di Wu and
                  Dali Zhu and
                  Yinlong Liu and
                  Luping Ma},
  title        = {Joint {RSS} and {CSI} Based Access Point Authentication Scheme in
                  WiFi Networks via XGBoost},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {821--826},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00119},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00119},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuZLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Yan019,
  author       = {Dingyu Yan and
                  Feng Liu},
  title        = {A Heuristic Method for Network Modification Against Cyber Epidemic
                  Attacks},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {184--191},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00033},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00033},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Yan019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangS19,
  author       = {Yibing Yang and
                  M. Omair Shafiq},
  title        = {Identifying High Value Users in Twitter Based on Text Mining Approaches},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {634--641},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00090},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00090},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YaoSLL19,
  author       = {Yepeng Yao and
                  Liya Su and
                  Zhigang Lu and
                  Baoxu Liu},
  title        = {STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs
                  for Long-Term Network Attack Detection},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {120--127},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00025},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00025},
  timestamp    = {Tue, 27 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YaoSLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YinCCC19,
  author       = {Bo Yin and
                  Yu Cheng and
                  Lin X. Cai and
                  Xianghui Cao},
  title        = {A Cooperative Edge Computing Scheme for Reducing the Cost of Transferring
                  Big Data in 5G Networks},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {700--706},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00099},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00099},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YinCCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangCWCY19,
  author       = {Jiale Zhang and
                  Junjun Chen and
                  Di Wu and
                  Bing Chen and
                  Shui Yu},
  title        = {Poisoning Attack in Federated Learning using Generative Adversarial
                  Nets},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {374--380},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00057},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00057},
  timestamp    = {Tue, 05 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangCWCY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangGPLCC19,
  author       = {Yang Zhang and
                  Haichang Gao and
                  Ge Pei and
                  Sainan Luo and
                  Guoqin Chang and
                  Nuo Cheng},
  title        = {A Survey of Research on {CAPTCHA} Designing and Breaking Techniques},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {75--84},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00020},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00020},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangGPLCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangZL19,
  author       = {Yonghong Zhang and
                  Peijia Zheng and
                  Weiqi Luo},
  title        = {Privacy-Preserving Outsourcing Computation of {QR} Decomposition in
                  the Encrypted Domain},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {389--396},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00059},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00059},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaoY19,
  author       = {Liangrong Zhao and
                  Jiangshan Yu},
  title        = {Evaluating DAG-Based Blockchains for IoT},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {507--513},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00074},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00074},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhaoY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaoZH019,
  author       = {Hong Zhao and
                  Yuexin Zhang and
                  Xinyi Huang and
                  Yang Xiang},
  title        = {An Adaptive Physical Layer Key Extraction Scheme for Smart Homes},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {499--506},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00073},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00073},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhaoZH019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuCXCFF19,
  author       = {Shaofeng Zhu and
                  Hua Chen and
                  Wei Xi and
                  Meihui Chen and
                  Limin Fan and
                  Dengguo Feng},
  title        = {A Worst-Case Entropy Estimation of Oscillator-Based Entropy Sources:
                  When the Adversaries Have Access to the History Outputs},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {152--159},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00029},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00029},
  timestamp    = {Fri, 04 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuCXCFF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuFYZW19,
  author       = {Lipeng Zhu and
                  Xiaotong Fu and
                  Yao Yao and
                  Yuqing Zhang and
                  He Wang},
  title        = {FIoT: Detecting the Memory Corruption in Lightweight IoT Device Firmware},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {248--255},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00041},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00041},
  timestamp    = {Tue, 19 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuFYZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZobernigGR19,
  author       = {Lukas Zobernig and
                  Steven D. Galbraith and
                  Giovanni Russello},
  title        = {When are Opaque Predicates Useful?},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {168--175},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00031},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00031},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZobernigGR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustcom/2019,
  title        = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8883860/proceeding},
  isbn         = {978-1-7281-2777-4},
  timestamp    = {Thu, 14 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0001FLW18,
  author       = {Guoqiang Bai and
                  Hailiang Fu and
                  Wei Li and
                  Xingjun Wu},
  title        = {Differential Power Attack on {SM4} Block Cipher},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1494--1497},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00210},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00210},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/0001FLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0002HZ18,
  author       = {Na Huang and
                  Jingsha He and
                  Nafei Zhu},
  title        = {A Novel Method for Detecting Image Forgery Based on Convolutional
                  Neural Network},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1702--1705},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00255},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00255},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/0002HZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0004HZ18,
  author       = {Xiang Liu and
                  Jie Huang and
                  Guowen Zong},
  title        = {Public Auditing for Network Coding Based Secure Cloud Storage},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {713--720},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00104},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00104},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/0004HZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AabyAMB18,
  author       = {Peter Aaby and
                  Juanjo Mata De Acuna and
                  Richard Macfarlane and
                  William J. Buchanan},
  title        = {Privacy Parameter Variation Using {RAPPOR} on a Malware Dataset},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {938--945},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00133},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00133},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AabyAMB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AbrahamTK18,
  author       = {Andreas Abraham and
                  Kevin Theuermann and
                  Emanuel Kirchengast},
  title        = {Qualified eID Derivation Into a Distributed Ledger Based IdM System},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1406--1412},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00195},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00195},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AbrahamTK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AdamsBGVM18,
  author       = {Stephen C. Adams and
                  Peter A. Beling and
                  Steven Greenspan and
                  Maria C. Velez{-}Rojas and
                  Serge Mankovski},
  title        = {Model-Based Trust Assessment for Internet of Things Networks},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1838--1843},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00278},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00278},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AdamsBGVM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AdamsCFB18,
  author       = {Stephen C. Adams and
                  Bryan T. Carter and
                  Cody H. Fleming and
                  Peter A. Beling},
  title        = {Selecting System Specific Cybersecurity Attack Patterns Using Topic
                  Modeling},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {490--497},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00076},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00076},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AdamsCFB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AhmadSBSU18,
  author       = {Usman Ahmad and
                  Hong Song and
                  Awais Bilal and
                  Shahzad Saleem and
                  Asad Ullah},
  title        = {Securing Insulin Pump System Using Deep Learning and Gesture Recognition},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1716--1719},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00258},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00258},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AhmadSBSU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AhmedA18,
  author       = {Abu Shohel Ahmed and
                  Tuomas Aura},
  title        = {Turning Trust Around: Smart Contract-Assisted Public Key Infrastructure},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {104--111},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00026},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00026},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AhmedA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AlavizadehJK18,
  author       = {Hooman Alavizadeh and
                  Julian Jang{-}Jaccard and
                  Dong Seong Kim},
  title        = {Evaluation for Combination of Shuffle and Diversity on Moving Target
                  Defense Strategy for Cloud Computing},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {573--578},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00087},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00087},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AlavizadehJK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AlbabtainY18,
  author       = {Yazeed Albabtain and
                  Baijian Yang},
  title        = {The Process of Reverse Engineering {GPU} Malware and Provide Protection
                  to {GPUS}},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1669--1673},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00248},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00248},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AlbabtainY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AlbakriMH18,
  author       = {Ashwag Albakri and
                  Mahesh Maddumala and
                  Lein Harn},
  title        = {Hierarchical Polynomial-Based Key Management Scheme in Fog Computing},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1593--1597},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00231},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00231},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AlbakriMH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AlemanPAK18,
  author       = {Concepcion Sanchez Aleman and
                  Niki Pissinou and
                  Sheila Alemany and
                  Georges A. Kamhoua},
  title        = {A Dynamic Trust Weight Allocation Technique for Data Reconstruction
                  in Mobile Wireless Sensor Networks},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {61--67},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00020},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00020},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AlemanPAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AliWWC18,
  author       = {Saqib Ali and
                  Guojun Wang and
                  Bebo White and
                  Roger Leslie Cottrell},
  title        = {A Blockchain-Based Decentralized Data Storage and Access Framework
                  for PingER},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1303--1308},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00179},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00179},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AliWWC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AlkhonainiE18,
  author       = {Mimouna Alkhonaini and
                  Hoda El{-}Sayed},
  title        = {Migrating Data Between Physical Server and Cloud: Improving Accuracy
                  and Data Integrity},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1570--1574},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00226},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00226},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AlkhonainiE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AlsaigAO18,
  author       = {Alaa Alsaig and
                  Vangular Alagar and
                  Olga Ormandjieva},
  title        = {A Critical Analysis of the V-Model of Big Data},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1809--1813},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00273},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00273},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AlsaigAO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ApolinarioPC18,
  author       = {Filipe Apolinario and
                  Miguel L. Pardal and
                  Miguel Correia},
  title        = {S-Audit: Efficient Data Integrity Verification for Cloud Storage},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {465--474},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00073},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00073},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ApolinarioPC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ArifWP18,
  author       = {Muhammad Arif and
                  Guojun Wang and
                  Tao Peng},
  title        = {Track me if you can? Query Based Dual Location Privacy in VANETs for
                  {V2V} and {V2I}},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1091--1096},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00152},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00152},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ArifWP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AroraP18,
  author       = {Anshul Arora and
                  Sateesh Kumar Peddoju},
  title        = {NTPDroid: {A} Hybrid Android Malware Detector Using Network Traffic
                  and System Permissions},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {808--813},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00115},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00115},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AroraP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Atighehchi18,
  author       = {Kevin Atighehchi},
  title        = {On the Incremental Digital Signatures},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1605--1609},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00234},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00234},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Atighehchi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AzabHM18,
  author       = {Mohamed Azab and
                  Ahmed Hamdy and
                  Ahmed Mansour},
  title        = {Repoxy: Replication Proxy for Trustworthy {SDN} Controller Operation},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {55--60},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00019},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00019},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AzabHM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BanerjeeH18,
  author       = {Tanushree Banerjee and
                  M. Anwar Hasan},
  title        = {Energy Efficiency Analysis of Elliptic Curve Based Cryptosystems},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1579--1583},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00228},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00228},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BanerjeeH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BaoHW18,
  author       = {Judong Bao and
                  Yongqiang He and
                  Weiping Wen},
  title        = {DroidPro: An AOTC-Based Bytecode-Hiding Scheme for Packing the Android
                  Applications},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {624--632},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00093},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00093},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BaoHW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BaqaTCLG18,
  author       = {Hamza Baqa and
                  Nguyen Binh Truong and
                  No{\"{e}}l Crespi and
                  Gyu Myoung Lee and
                  Franck Le Gall},
  title        = {Quality of Information as an indicator of Trust in the Internet of
                  Things},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {204--211},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00040},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00040},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BaqaTCLG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BariS18,
  author       = {Anasse Bari and
                  Goktug Saatcioglu},
  title        = {Emotion Artificial Intelligence Derived from Ensemble Learning},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1763--1770},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00266},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00266},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BariS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Beierle18,
  author       = {Felix Beierle},
  title        = {Do You Like What {I} Like? Similarity Estimation in Proximity-Based
                  Mobile Social Networks},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1040--1047},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00146},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00146},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Beierle18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BianXW18,
  author       = {Rongzhen Bian and
                  Mingfu Xue and
                  Jian Wang},
  title        = {Building Trusted Golden Models-Free Hardware Trojan Detection Framework
                  Against Untrustworthy Testing Parties Using a Novel Clustering Ensemble
                  Technique},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1458--1463},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00203},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00203},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BianXW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BiondiGL18,
  author       = {Fabrizio Biondi and
                  Thomas Given{-}Wilson and
                  Axel Legay},
  title        = {Universal Optimality of Apollonian Cell Encoders},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {424--435},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00069},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00069},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BiondiGL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BreuerBP018,
  author       = {Peter T. Breuer and
                  Jonathan P. Bowen and
                  Esther Palomar and
                  Zhiming Liu},
  title        = {Superscalar Encrypted {RISC:} The Measure of a Secret Computer},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1336--1341},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00184},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00184},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BreuerBP018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BridgesJNGP18,
  author       = {Robert A. Bridges and
                  Jarilyn Hern{\'{a}}ndez Jim{\'{e}}nez and
                  Jeffrey Nichols and
                  Katerina Goseva{-}Popstojanova and
                  Stacy J. Prowell},
  title        = {Towards Malware Detection via {CPU} Power Consumption: Data Collection
                  Design and Analytics},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1680--1684},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00250},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00250},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BridgesJNGP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BuDLCS18,
  author       = {Aiguo Bu and
                  Wentao Dai and
                  Minyi Lu and
                  Hao Cai and
                  Weiwei Shan},
  title        = {Correlation-Based Electromagnetic Analysis Attack Using Haar Wavelet
                  Reconstruction with Low-Pass Filtering on an {FPGA} Implementaion
                  of {AES}},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1897--1900},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00288},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00288},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BuDLCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BurkhartUEE18,
  author       = {Sebastian Burkhart and
                  Andreas Unterweger and
                  G{\"{u}}nther Eibl and
                  Dominik Engel},
  title        = {Detecting Swimming Pools in 15-Minute Load Data},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1651--1655},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00244},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00244},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BurkhartUEE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CalioT18,
  author       = {Antonio Cali{\`{o}} and
                  Andrea Tagarelli},
  title        = {Trust-Based Dynamic Linear Threshold Models for Non-competitive and
                  Competitive Influence Propagation},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {156--162},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00033},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00033},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/CalioT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaoH18,
  author       = {Zechun Cao and
                  Shou{-}Hsuan Stephen Huang},
  title        = {Detecting Intruders and Preventing Hackers from Evasion by Tor Circuit
                  Selection},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {475--480},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00074},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00074},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaoH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaoLTXX18,
  author       = {Huikang Cao and
                  Ruixuan Li and
                  Wenlong Tian and
                  Zhiyong Xu and
                  Weijun Xiao},
  title        = {A Practical Accountability Scheme for Oblivious {RAM} in Cloud Storage},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {397--402},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00066},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00066},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaoLTXX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CarmanKLCA18,
  author       = {Mark J. Carman and
                  Mark Koerber and
                  Jiuyong Li and
                  Kim{-}Kwang Raymond Choo and
                  Helen Ashman},
  title        = {Manipulating Visibility of Political and Apolitical Threads on Reddit
                  via Score Boosting},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {184--190},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00037},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00037},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/CarmanKLCA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChakrabortySM18,
  author       = {Nilesh Chakraborty and
                  Shreya Singh and
                  Samrat Mondal},
  title        = {On Designing a Questionnaire Based Honeyword Generation Approach for
                  Achieving Flatness},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {444--455},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00071},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00071},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChakrabortySM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Chawathe18,
  author       = {Sudarshan S. Chawathe},
  title        = {Improving Email Security with Fuzzy Rules},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1864--1869},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00282},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00282},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Chawathe18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Chawathe18a,
  author       = {Sudarshan S. Chawathe},
  title        = {Monitoring Blockchains with Self-Organizing Maps},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1870--1875},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00283},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00283},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Chawathe18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenCT18,
  author       = {Shao{-}Chien Chen and
                  Yi{-}Ruei Chen and
                  Wen{-}Guey Tzeng},
  title        = {Effective Botnet Detection Through Neural Networks on Convolutional
                  Features},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {372--378},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00062},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00062},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenCT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenCZGZH18,
  author       = {Jian Chen and
                  Ziyang Chen and
                  Peijia Zheng and
                  Jianting Guo and
                  Wei Zhang and
                  Jiwu Huang},
  title        = {Encrypted Domain Mel-Frequency Cepstral Coefficient and Fragile Audio
                  Watermarking},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {68--73},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00021},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00021},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenCZGZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenDQ18,
  author       = {Hongbo Chen and
                  Hongjun Dai and
                  Meikang Qiu},
  title        = {A Multiple Layer Sercurity Architecture for Internet of Things into
                  {MVC} Design},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {861--866},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00124},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00124},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenDQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenFZZL18,
  author       = {Zhenyu Chen and
                  Yanyan Fu and
                  Min Zhang and
                  Zhenfeng Zhang and
                  Hao Li},
  title        = {A Flexible Mix-Zone Selection Scheme Towards Trajectory Privacy Protection},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1180--1186},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00163},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00163},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenFZZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenGYLY18,
  author       = {Shenghua Chen and
                  Wei Ge and
                  Jinjiang Yang and
                  Bo Liu and
                  Jun Yang},
  title        = {A Power Analysis Attack Countermeasure Based on Random Execution},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1474--1479},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00206},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00206},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenGYLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenLQC18,
  author       = {Xi Chen and
                  Zhaojun Lu and
                  Gang Qu and
                  Aijiao Cui},
  title        = {Partial Scan Design Against Scan-Based Side Channel Attacks},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1484--1489},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00208},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00208},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenLQC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenLYWGCYZ18,
  author       = {Zhenya Chen and
                  Weifeng Liu and
                  Ying Yang and
                  Jizhi Wang and
                  Meng Guo and
                  Lijuan Chen and
                  Guang Yang and
                  Jie Zhou},
  title        = {Electronic Evidence Service Research in Cloud Computing Environment},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {332--338},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00058},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00058},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenLYWGCYZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenZGZH18,
  author       = {Jian Chen and
                  Peijia Zheng and
                  Jianting Guo and
                  Wei Zhang and
                  Jiwu Huang},
  title        = {A Privacy-Preserving Multipurpose Watermarking Scheme for Audio Authentication
                  and Protection},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {86--91},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00023},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00023},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenZGZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenZZ18,
  author       = {Jiaqi Chen and
                  Fan Zhang and
                  Lei Zou},
  title        = {{SPARQL} Multi-Query Optimization},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1419--1425},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00197},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00197},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenZZHL18,
  author       = {Cai Chen and
                  Manyuan Zhang and
                  Huanzhi Zhang and
                  Zhenyun Huang and
                  Yong Li},
  title        = {Privacy-Preserving Sensory Data Recovery},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1646--1650},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00243},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00243},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenZZHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChoudharyK18,
  author       = {Sarika Choudhary and
                  Nishtha Kesswani},
  title        = {Detection and Prevention of Routing Attacks in Internet of Things},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1537--1540},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00219},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00219},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChoudharyK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChowdhuryCK0S18,
  author       = {Mohammad Jabed Morshed Chowdhury and
                  Alan Colman and
                  Muhammad Ashad Kabir and
                  Jun Han and
                  Paul Sarda},
  title        = {Blockchain as a Notarization Service for Data Sharing with Personal
                  Data Store},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1330--1335},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00183},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00183},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChowdhuryCK0S18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChowdhuryCK0S18a,
  author       = {Mohammad Jabed Morshed Chowdhury and
                  Alan Colman and
                  Muhammad Ashad Kabir and
                  Jun Han and
                  Paul Sarda},
  title        = {Blockchain Versus Database: {A} Critical Analysis},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1348--1353},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00186},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00186},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChowdhuryCK0S18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ClarkDG18,
  author       = {George W. Clark and
                  Michael V. Doran and
                  William Glisson},
  title        = {A Malicious Attack on the Machine Learning Policy of a Robotic System},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {516--521},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00079},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00079},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ClarkDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CloydOEGC18,
  author       = {Taylor Cloyd and
                  Trey Osborn and
                  Brian Ellingboe and
                  William Bradley Glisson and
                  Kim{-}Kwang Raymond Choo},
  title        = {Browser Analysis of Residual Facebook Data},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1440--1445},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00200},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00200},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/CloydOEGC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CostantinoMMMS18,
  author       = {Gianpiero Costantino and
                  Antonio La Marra and
                  Fabio Martinelli and
                  Paolo Mori and
                  Andrea Saracino},
  title        = {Privacy Preserving Distributed Attribute Computation for Usage Control
                  in the Internet of Things},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1844--1851},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00279},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00279},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/CostantinoMMMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CrescenzoBCRP18,
  author       = {Giovanni Di Crescenzo and
                  Lisa Bahler and
                  Brian A. Coan and
                  Kurt Rohloff and
                  Yuriy Polyakov},
  title        = {Intrusion-Resilient Classifier Approximation: From Wildcard Matching
                  to Range Membership},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1885--1890},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00286},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00286},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/CrescenzoBCRP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CuiBAAR18,
  author       = {Shujie Cui and
                  Sana Belguith and
                  Pramodya De Alwis and
                  Muhammad Rizwan Asghar and
                  Giovanni Russello},
  title        = {Malicious Entities are in Vain: Preserving Privacy in Publish and
                  Subscribe Systems},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1624--1627},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00238},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00238},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/CuiBAAR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DakuZM18,
  author       = {Hajredin Daku and
                  Pavol Zavarsky and
                  Yasir Malik},
  title        = {Behavioral-Based Classification and Identification of Ransomware Variants
                  Using Machine Learning},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1560--1564},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00224},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00224},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/DakuZM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DeCusatisL18,
  author       = {Casimer M. DeCusatis and
                  Kulvinder Lotay},
  title        = {Secure, Decentralized Energy Resource Management Using the Ethereum
                  Blockchain},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1907--1913},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00290},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00290},
  timestamp    = {Fri, 21 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DeCusatisL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DeljooEKGL18,
  author       = {Ameneh Deljoo and
                  Tom M. van Engers and
                  Ralph Koning and
                  Leon Gommans and
                  Cees de Laat},
  title        = {Towards Trustworthy Information Sharing by Creating Cyber Security
                  Alliances},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1506--1510},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00213},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00213},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/DeljooEKGL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DuLS18,
  author       = {Xiaoyu Du and
                  Paul Ledwith and
                  Mark Scanlon},
  title        = {Deduplicated Disk Image Evidence Acquisition and Forensically-Sound
                  Reconstruction},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1674--1679},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00249},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00249},
  timestamp    = {Mon, 09 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DuLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ElappilaC18,
  author       = {Manu Elappila and
                  Suchismita Chinara},
  title        = {Dynamic Survivable Path Routing for Fast Changing IoT Network Topologies},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {92--97},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00024},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00024},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ElappilaC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Ergun18,
  author       = {Salih Ergun},
  title        = {Cryptanalysis of a Chaotic Ring Oscillator Based Random Number Generator},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1498--1501},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00211},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00211},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Ergun18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FadheelSL18,
  author       = {Wesam Fadheel and
                  Raed M. Salih and
                  Leszek Lilien},
  title        = {PHeDHA: Protecting Healthcare Data in Health Information Exchanges
                  with Active Data Bundles},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1187--1195},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00164},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00164},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FadheelSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FanLTLZB18,
  author       = {Yongkai Fan and
                  Shengle Liu and
                  Gang Tan and
                  Xiaodong Lin and
                  Guanqun Zhao and
                  Jianrong Bai},
  title        = {One Secure Access Scheme Based on Trusted Execution Environment},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {16--21},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00013},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00013},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FanLTLZB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FengLCLKS18,
  author       = {Yun Feng and
                  Baoxu Liu and
                  Xiang Cui and
                  Chaoge Liu and
                  Xuebin Kang and
                  Junwei Su},
  title        = {A Systematic Method on {PDF} Privacy Leakage Issues},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1020--1029},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00144},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00144},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FengLCLKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Fischer18,
  author       = {Tilo Fischer},
  title        = {Testing Cryptographically Secure Pseudo Random Number Generators with
                  Artificial Neural Networks},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1214--1223},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00168},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00168},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Fischer18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FriebeSZ18,
  author       = {Sebastian Friebe and
                  Ingo Sobik and
                  Martina Zitterbart},
  title        = {DecentID: Decentralized and Privacy-Preserving Identity Storage System
                  Using Smart Contracts},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {37--42},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00016},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00016},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FriebeSZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FulpG18,
  author       = {Errin W. Fulp and
                  H. Donald Gage},
  title        = {Using Feature Selection to Identify Chains of Insecure Software Configuration
                  Parameters},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {825--830},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00118},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00118},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FulpG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaiWZQ18,
  author       = {Keke Gai and
                  Yulu Wu and
                  Liehuang Zhu and
                  Meikang Qiu},
  title        = {Privacy-Preserving Data Synchronization Using Tensor-Based Fully Homomorphic
                  Encryption},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1149--1156},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00159},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00159},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaiWZQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaoC0Z18,
  author       = {Yiwen Gao and
                  Wei Cheng and
                  Hailong Zhang and
                  Yongbin Zhou},
  title        = {Cache-Collision Attacks on GPU-Based {AES} Implementation with Electro-Magnetic
                  Leakages},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {300--306},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00053},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00053},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaoC0Z18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaraeKA18,
  author       = {Jeffery Garae and
                  Ryan K. L. Ko and
                  Mark D. Apperley},
  title        = {A Full-Scale Security Visualization Effectiveness Measurement and
                  Presentation Approach},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {639--650},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00095},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00095},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaraeKA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GillLZ18,
  author       = {Manmeet Singh Gill and
                  Dale Lindskog and
                  Pavol Zavarsky},
  title        = {Profiling Network Traffic Behavior for the Purpose of Anomaly-Based
                  Intrusion Detection},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {885--890},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00127},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00127},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GillLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GomiYTS18,
  author       = {Hidehito Gomi and
                  Shuji Yamaguchi and
                  Kota Tsubouchi and
                  Naomi Sasaya},
  title        = {Continuous Authentication System Using Online Activities},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {522--532},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00080},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00080},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GomiYTS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GoudbeekCL18,
  author       = {Arnoud Goudbeek and
                  Kim{-}Kwang Raymond Choo and
                  Nhien{-}An Le{-}Khac},
  title        = {A Forensic Investigation Framework for Smart Home Environment},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1446--1451},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00201},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00201},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GoudbeekCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuZYZ18,
  author       = {Ruichun Gu and
                  Xiaolong Zhang and
                  Yu Lei and
                  Junxing Zhang},
  title        = {Enhancing Security and Scalability in Software Defined {LTE} Core
                  Networks},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {837--842},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00120},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00120},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuZYZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoTCTB18,
  author       = {Cheng Guo and
                  Xinyu Tang and
                  Yuanfang Chen and
                  Pengxu Tian and
                  Md. Zakirul Alam Bhuiyan},
  title        = {An Efficient Distributed Approach on High Dimensional Data Similarity
                  Searchable Encryption},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1270--1275},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00175},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00175},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoTCTB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GurulianMFA18,
  author       = {Iakovos Gurulian and
                  Konstantinos Markantonakis and
                  Eibe Frank and
                  Raja Naeem Akram},
  title        = {Good Vibrations: Artificial Ambience-Based Relay Attack Detection},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {481--489},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00075},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00075},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GurulianMFA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuvenHOL18,
  author       = {{\c{C}}i{\c{c}}ek G{\"{u}}ven and
                  Mike Holenderski and
                  Tanir {\"{O}}z{\c{c}}elebi and
                  Johan Lukkien},
  title        = {Using Artificial Neurons in Evidence Based Trust Computation},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1879--1884},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00285},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00285},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuvenHOL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GwakCLS18,
  author       = {Bumjin Gwak and
                  Jin{-}Hee Cho and
                  Dongman Lee and
                  Heesuk Son},
  title        = {{TARAS:} Trust-Aware Role-Based Access Control System in Public Internet-of-Things},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {74--85},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00022},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00022},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GwakCLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HabibAIH0M18,
  author       = {Sheikh Mahbub Habib and
                  Nikolaos Alexopoulos and
                  Md Monirul Islam and
                  Jens Heider and
                  Stephen Marsh and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {Trust4App: Automating Trustworthiness Assessment of Mobile Applications},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {124--135},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00029},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00029},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HabibAIH0M18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HaddadAH18,
  author       = {Ghada El Haddad and
                  Esma A{\"{\i}}meur and
                  Hicham Hage},
  title        = {Understanding Trust, Privacy and Financial Fears in Online Payment},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {28--36},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00015},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00015},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HaddadAH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HalabiBA18,
  author       = {Talal Halabi and
                  Martine Bella{\"{\i}}che and
                  Adel Abusitta},
  title        = {Online Allocation of Cloud Resources Based on Security Satisfaction},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {379--384},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00063},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00063},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HalabiBA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HardwickAM18,
  author       = {Freya Sheer Hardwick and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  title        = {Fair and Transparent Blockchain Based Tendering Framework - {A} Step
                  Towards Open Governance},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1342--1347},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00185},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00185},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HardwickAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HasegawaST18,
  author       = {Kento Hasegawa and
                  Youhua Shi and
                  Nozomu Togawa},
  title        = {Hardware Trojan Detection Utilizing Machine Learning Approaches},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1891--1896},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00287},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00287},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HasegawaST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HePL18,
  author       = {Zheng He and
                  Shiran Pan and
                  Dongdai Lin},
  title        = {{PMDA:} Privacy-Preserving Multi-functional Data Aggregation Without
                  {TTP} in Smart Grid},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1107--1114},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00154},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00154},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HePL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HossainHHSR18,
  author       = {Md. Nazmul Hossain and
                  Md. Alam Hossain and
                  Md. Zobayer Hossain and
                  Md. Hasan Imam Sohag and
                  Shawon S. M. Rahman},
  title        = {OAuth-SSO: {A} Framework to Secure the OAuth-Based {SSO} Service for
                  Packaged Web Applications},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1575--1578},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00227},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00227},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HossainHHSR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Hou0KWDSH18,
  author       = {Junjie Hou and
                  Yongxin Zhu and
                  Linghe Kong and
                  Zhe Wang and
                  Sen Du and
                  Shijin Song and
                  Tian Huang},
  title        = {A Case Study of Accelerating Apache Spark with {FPGA}},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {855--860},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00123},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00123},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Hou0KWDSH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangLLXL18,
  author       = {Yin Huang and
                  Wei Liang and
                  Jing Long and
                  Jianbo Xu and
                  Kuan{-}Ching Li},
  title        = {A Novel Identity Authentication for {FPGA} Based {IP} Designs},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1531--1536},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00218},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00218},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangLLXL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangWZQW018,
  author       = {Ji Huang and
                  Pei Wang and
                  Tianning Zang and
                  Qian Qiang and
                  Yipeng Wang and
                  Miao Yu},
  title        = {Detecting Domain Generation Algorithms with Convolutional Neural Language
                  Models},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1360--1367},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00188},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00188},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangWZQW018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HussainASRR18,
  author       = {Lal Hussain and
                  Wajid Aziz and
                  Sharjil Saeed and
                  Saima Rathore and
                  Muhammad Rafique},
  title        = {Automated Breast Cancer Detection Using Machine Learning Techniques
                  by Extracting Different Feature Extracting Strategies},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {327--331},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00057},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00057},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HussainASRR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ImineKBL18,
  author       = {Youcef Imine and
                  Djamel Eddine Kouicem and
                  Abdelmadjid Bouabdallah and
                  Ahmed Lounis},
  title        = {{MASFOG:} An Efficient Mutual Authentication Scheme for Fog Computing
                  Architecture},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {608--613},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00091},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00091},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ImineKBL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/IsmailRS18,
  author       = {Hatem Ismail and
                  Stefanie Roos and
                  Neeraj Suri},
  title        = {A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {456--464},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00072},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00072},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/IsmailRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JagerNK18,
  author       = {Markus J{\"{a}}ger and
                  Stefan Nadschl{\"{a}}ger and
                  Josef K{\"{u}}ng},
  title        = {Concepts for Trust Propagation in Knowledge Processing Systems - {A}
                  Brief Introduction and Overview},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1502--1505},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00212},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00212},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JagerNK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JavedTC18,
  author       = {Ibrahim Tariq Javed and
                  Khalifa Toumi and
                  No{\"{e}}l Crespi},
  title        = {N-Combat: {A} Nuisance Call Combating Framework for Internet Telephony},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {112--117},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00027},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00027},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JavedTC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiangYYLCLLH18,
  author       = {Jianguo Jiang and
                  Qian Yu and
                  Min Yu and
                  Gang Li and
                  Jiuming Chen and
                  Kunying Liu and
                  Chao Liu and
                  Weiqing Huang},
  title        = {{ALDD:} {A} Hybrid Traffic-User Behavior Detection Method for Application
                  Layer DDoS},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1565--1569},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00225},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00225},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiangYYLCLLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JosephRS18,
  author       = {Jitto Joseph and
                  Ron Ruhl and
                  Hamman Samuel},
  title        = {Reducing Traffic Congestion for Machine to Machine Type Communication
                  Over 4G-LTE Network by Decreasing Total Bytes Transmitted},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1720--1721},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00259},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00259},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JosephRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JuniorCPRFS18,
  author       = {Marcos Antonio Simplicio Junior and
                  Eduardo Lopes Cominetti and
                  Harsh Kupwade Patil and
                  Jefferson E. Ricardini and
                  Leonardo T. D. Ferraz and
                  Marcos Vinicius Maciel da Silva},
  title        = {Privacy-Preserving Method for Temporarily Linking/Revoking Pseudonym
                  Certificates in VANETs},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1322--1329},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00182},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00182},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JuniorCPRFS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KGL18,
  author       = {K. Aditya and
                  Slawomir Grzonkowski and
                  Nhien An LeKhac},
  title        = {Enabling Trust in Deep Learning Models: {A} Digital Forensics Case
                  Study},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1250--1255},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00172},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00172},
  timestamp    = {Thu, 05 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KGL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KahlaAM18,
  author       = {Mostafa Kahla and
                  Mohamed Azab and
                  Ahmed Mansour},
  title        = {Secure, Resilient, and Self-Configuring Fog Architecture for Untrustworthy
                  IoT Environments},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {49--54},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00018},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00018},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KahlaAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KangLS18,
  author       = {Sarvjot kaur Kang and
                  Dale Lindskog and
                  Hamman Samuel},
  title        = {An Implementation of Hierarchical Intrusion Detection Systems Using
                  Snort and Federated Databases},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1521--1525},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00216},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00216},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KangLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KapustaM18,
  author       = {Katarzyna Kapusta and
                  G{\'{e}}rard Memmi},
  title        = {Enhancing Data Protection in a Distributed Storage Environment Using
                  Structure-Wise Fragmentation and Dispersal of Encrypted Data},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {385--390},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00064},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00064},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KapustaM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KayesRDC18,
  author       = {A. S. M. Kayes and
                  J. Wenny Rahayu and
                  Tharam S. Dillon and
                  Elizabeth Chang},
  title        = {Accessing Data from Multiple Sources Through Context-Aware Access
                  Control},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {551--559},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00084},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00084},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KayesRDC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KelkarKMZD18,
  author       = {Soham Kelkar and
                  Timothy Kraus and
                  Daria Morgan and
                  Junjie Zhang and
                  Rui Dai},
  title        = {Analyzing HTTP-Based Information Exfiltration of Malicious Android
                  Applications},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1642--1645},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00242},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00242},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KelkarKMZD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KevinM18,
  author       = {Kevin Atighehchi and
                  Morgan Barbier},
  title        = {Signature Renewal for Low Entropy Data},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {873--884},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00126},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00126},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KevinM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KhanDM18,
  author       = {Haibat Khan and
                  Benjamin Dowling and
                  Keith M. Martin},
  title        = {Highly Efficient Privacy-Preserving Key Agreement for Wireless Body
                  Area Networks},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1064--1069},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00149},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00149},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KhanDM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KhanWAK18,
  author       = {Muhammad Saleem Khan and
                  Saira Waris and
                  Idrees Ahmed and
                  Majid Iqbal Khan},
  title        = {A Comprehensive Analysis of Packet Loss in MANETs},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {118--123},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00028},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00028},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KhanWAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KimL18,
  author       = {KiHwan Kim and
                  HoonJae Lee},
  title        = {Proposal of Multi-channel Operation Technique Using PingPong256},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1551--1554},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00222},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00222},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KimL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KimSS18,
  author       = {Doyeon Kim and
                  Dongil Shin and
                  Dongkyoo Shin},
  title        = {Unauthorized Access Point Detection Using Machine Learning Algorithms
                  for Information Protection},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1876--1878},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00284},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00284},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KimSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KlemsaKV18,
  author       = {Jakub Klemsa and
                  Lukas Kencl and
                  Tomas Vanek},
  title        = {VeraGreg: {A} Framework for Verifiable Privacy-Preserving Data Aggregation},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1820--1825},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00275},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00275},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KlemsaKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KliemeTM18,
  author       = {Eric Klieme and
                  Christian Tietz and
                  Christoph Meinel},
  title        = {Beware of {SMOMBIES:} Verification of Users Based on Activities While
                  Walking},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {651--660},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00096},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00096},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KliemeTM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Koehl18,
  author       = {Aaron Koehl},
  title        = {Autoblog Forensics and Attribution},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1276--1286},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00176},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00176},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Koehl18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Konorski18,
  author       = {Jerzy Konorski},
  title        = {Double-Blind Reputation vs. Intelligent Fake {VIP} Attacks in Cloud-Assisted
                  Interactions},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1637--1641},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00241},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00241},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Konorski18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Kritikos18,
  author       = {Kyriakos Kritikos},
  title        = {Towards Dynamic and Optimal Big Data Placement},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1730--1737},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00262},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00262},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Kritikos18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KulUC18,
  author       = {G{\"{o}}khan Kul and
                  Shambhu J. Upadhyaya and
                  Varun Chandola},
  title        = {Detecting Data Leakage from Databases on Android Apps with Concept
                  Drift},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {905--913},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00129},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00129},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KulUC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KulkarniMCG18,
  author       = {Vaibhav Kulkarni and
                  Arielle Moro and
                  Bertil Chapuis and
                  Beno{\^{\i}}t Garbinato},
  title        = {Capstone: Mobility Modeling on Smartphones to Achieve Privacy by Design},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {964--971},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00136},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00136},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KulkarniMCG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KulykMVK18,
  author       = {Oksana Kulyk and
                  Peter Mayer and
                  Melanie Volkamer and
                  Oliver Kafer},
  title        = {A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly
                  Cookie Settings Interface},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1058--1063},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00148},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00148},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KulykMVK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KunihiroLNS18,
  author       = {Noboru Kunihiro and
                  Wenjie Lu and
                  Takashi Nishide and
                  Jun Sakuma},
  title        = {Outsourced Private Function Evaluation with Privacy Policy Enforcement},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {412--423},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00068},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00068},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KunihiroLNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LIdsterR18,
  author       = {William W. Lidster and
                  Shawon S. M. Rahman},
  title        = {Obstacles to Implementation of Information Security Governance},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1826--1831},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00276},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00276},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LIdsterR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LedbetterGMAGC18,
  author       = {William Ledbetter and
                  William Bradley Glisson and
                  Todd McDonald and
                  Todd R. Andel and
                  George Grispos and
                  Kim{-}Kwang Raymond Choo},
  title        = {Digital Blues: An Investigation Into the Use of Bluetooth Protocols},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {498--503},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00077},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00077},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LedbetterGMAGC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LenzK18,
  author       = {Thomas Lenz and
                  Vesna Krnjic},
  title        = {Towards Domain-Specific and Privacy-Preserving Qualified eID in a
                  User-Centric Identity Model},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1157--1163},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00160},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00160},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LenzK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiF18,
  author       = {Ruidan Li and
                  Errin W. Fulp},
  title        = {Using Evolutionary Approaches to Manage Surveillance Cameras in Dynamic
                  Environments},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {191--196},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00038},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00038},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiJC18,
  author       = {Xiehua Li and
                  Jie Jiang and
                  Yichen Chen},
  title        = {Fully Decentralized Authentication and Revocation Scheme in Data Sharing
                  Systems},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {680--686},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00100},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00100},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiJC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiJYLWZ18,
  author       = {Qiang Li and
                  Zhengwei Jiang and
                  Zeming Yang and
                  Baoxu Liu and
                  Xin Wang and
                  Yunan Zhang},
  title        = {A Quality Evaluation Method of Cyber Threat Intelligence in User Perspective},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {269--276},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00049},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00049},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiJYLWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiMWKL18,
  author       = {Wenjuan Li and
                  Weizhi Meng and
                  Yu Wang and
                  Lam For Kwok and
                  Rongxing Lu},
  title        = {Identifying Passive Message Fingerprint Attacks via Honey Challenge
                  in Collaborative Intrusion Detection Networks},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1208--1213},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00167},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00167},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiMWKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiW18,
  author       = {Bin Li and
                  Yijie Wang},
  title        = {{RZKPB:} {A} Privacy-Preserving Blockchain-Based Fair Transaction
                  Method for Sharing Economy},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1164--1169},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00161},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00161},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiWSCC18,
  author       = {Bin Li and
                  Yijie Wang and
                  Peichang Shi and
                  Huan Chen and
                  Li Cheng},
  title        = {{FPPB:} {A} Fast and Privacy-Preserving Method Based on the Permissioned
                  Blockchain for Fair Transactions in Sharing Economy},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1368--1373},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00189},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00189},
  timestamp    = {Mon, 29 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiWSCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiXZ18,
  author       = {Chunhua Li and
                  Weirui Xie and
                  Ke Zhou},
  title        = {Efficient Binary-Encoding Access Control Policy Combination for Large-Scale
                  Collaborative Scenarios},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {560--566},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00085},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00085},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiXZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuCD0Z18,
  author       = {Ximeng Liu and
                  Kim{-}Kwang Raymond Choo and
                  Robert H. Deng and
                  Yang Yang and
                  Yinghui Zhang},
  title        = {{PUSC:} Privacy-Preserving User-Centric Skyline Computation Over Multiple
                  Encrypted Domains},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {958--963},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00135},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00135},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuCD0Z18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuJWYZW18,
  author       = {Zechao Liu and
                  Zoe Lin Jiang and
                  Xuan Wang and
                  Siu{-}Ming Yiu and
                  Ruoqing Zhang and
                  Yulin Wu},
  title        = {A Temporal and Spatial Constrained Attribute-Based Access Control
                  Scheme for Cloud Storage},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {614--623},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00092},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00092},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuJWYZW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuKLW18,
  author       = {Kai{-}Cheng Liu and
                  Chuan{-}Wei Kuo and
                  Wen{-}Chiuan Liao and
                  Pang{-}Chieh Wang},
  title        = {Optimized Data de-Identification Using Multidimensional k-Anonymity},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1610--1614},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00235},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00235},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuKLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuLL018,
  author       = {Xinbo Liu and
                  Yaping Lin and
                  Qin Liu and
                  Xin Yao},
  title        = {A Privacy-Preserving Principal Component Analysis Outsourcing Framework},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1354--1359},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00187},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00187},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuLL018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuLTWX18,
  author       = {Danjun Liu and
                  Yao Li and
                  Yong Tang and
                  Baosheng Wang and
                  Wei Xie},
  title        = {{VMPBL:} Identifying Vulnerable Functions Based on Machine Learning
                  Combining Patched Information and Binary Comparison Technique by {LCS}},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {800--807},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00114},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00114},
  timestamp    = {Thu, 25 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuLTWX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuNZYYL18,
  author       = {Meng Liu and
                  Priyadarsi Nanda and
                  Xuyun Zhang and
                  Chi Yang and
                  Shui Yu and
                  Jianxin Li},
  title        = {Asymmetric Commutative Encryption Scheme Based Efficient Solution
                  to the Millionaires' Problem},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {990--995},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00139},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00139},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuNZYYL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuPXWPW18,
  author       = {Qin Liu and
                  Shuyu Pei and
                  Kang Xie and
                  Jie Wu and
                  Tao Peng and
                  Guojun Wang},
  title        = {Achieving Secure and Effective Search Services in Cloud Computing},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1386--1391},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00192},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00192},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuPXWPW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuPZ18,
  author       = {Fuwen Liu and
                  Jin Peng and
                  Min Zuo},
  title        = {Toward a Secure Access to 5G Network},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1121--1128},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00156},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00156},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuPZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuSCZYZ18,
  author       = {Tong Liu and
                  Gang Shi and
                  Liwei Chen and
                  Fei Zhang and
                  Yaxuan Yang and
                  Jihu Zhang},
  title        = {{TMDFI:} Tagged Memory Assisted for Fine-Grained Data-Flow Integrity
                  Towards Embedded Systems Against Software Exploitation},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {545--550},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00083},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00083},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuSCZYZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuWLHF18,
  author       = {Gaosheng Liu and
                  Xin Wang and
                  Xiaohong Li and
                  Jianye Hao and
                  Zhiyong Feng},
  title        = {{ESRQ:} An Efficient Secure Routing Method in Wireless Sensor Networks
                  Based on Q-Learning},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {149--155},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00032},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00032},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuWLHF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuWRMGTW18,
  author       = {Danjun Liu and
                  Jingyuan Wang and
                  Zelin Rong and
                  Xianya Mi and
                  Fangyu Gai and
                  Yong Tang and
                  Baosheng Wang},
  title        = {Pangr: {A} Behavior-Based Automatic Vulnerability Detection and Exploitation
                  Framework},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {705--712},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00103},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00103},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuWRMGTW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuXW0CB18,
  author       = {Hongbin Liu and
                  Ming Xu and
                  Yiming Wu and
                  Ning Zheng and
                  Yuangfang Chen and
                  Md. Zakirul Alam Bhuiyan},
  title        = {Resilient Bipartite Consensus for Multi-agent Networks with Antagonistic
                  Interactions},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1262--1269},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00174},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00174},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuXW0CB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuYL18,
  author       = {Xiaoning Liu and
                  Xingliang Yuan and
                  Joseph K. Liu},
  title        = {Towards Privacy-Preserving Forensic Analysis for Time-Series Medical
                  Data},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1664--1668},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00247},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00247},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuYL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuFXS18,
  author       = {Minyi Lu and
                  Ao Fan and
                  Jiaming Xu and
                  Weiwei Shan},
  title        = {A Compact, Lightweight and Low-Cost 8-Bit Datapath {AES} Circuit for
                  IoT Applications in 28nm {CMOS}},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1464--1469},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00204},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00204},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuFXS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuSV18,
  author       = {Yang Lu and
                  Richard O. Sinnott and
                  Karin Verspoor},
  title        = {Semantic-Based Policy Composition for Privacy-Demanding Data Linkage},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {348--359},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00060},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00060},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuSVP18,
  author       = {Yang Lu and
                  Richard O. Sinnott and
                  Karin Verspoor and
                  Udaya Parampalli},
  title        = {Privacy-Preserving Access Control in Electronic Health Record Linkage},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1079--1090},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00151},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00151},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuSVP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuWQL18,
  author       = {Zhaojun Lu and
                  Qian Wang and
                  Gang Qu and
                  Zhenglin Liu},
  title        = {{BARS:} {A} Blockchain-Based Anonymous Reputation System for Trust
                  Management in VANETs},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {98--103},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00025},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00025},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuWQL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuZZLBC18,
  author       = {Liangfu Lu and
                  Xinhe Zhu and
                  Xuyun Zhang and
                  Junhan Liu and
                  Md. Zakirul Alam Bhuiyan and
                  Guangtai Cui},
  title        = {One Intrusion Detection Method Based On Uniformed Conditional Dynamic
                  Mutual Information},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1236--1241},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00170},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00170},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuZZLBC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Ma0WEGD18,
  author       = {Tianao Ma and
                  Wei Hu and
                  Yonghao Wang and
                  Dalia El{-}Banna and
                  John Grant and
                  Hongjun Dai},
  title        = {Evaluation of Flexilink as Deterministic Unified Real-Time Protocol
                  for Industrial Networks},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {22--27},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00014},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00014},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Ma0WEGD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Ma18,
  author       = {Sha Ma},
  title        = {Authorized Equality Test of Encrypted Data for Secure Cloud Databases},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {223--230},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00043},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00043},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Ma18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaHW18,
  author       = {Rongxuan Ma and
                  Wei Hu and
                  Yonghao Wang},
  title        = {Low Delay and Low Cost Audio Surveillance System via a New Optimum
                  {FIR} Digtal Filter},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1541--1546},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00220},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00220},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaHW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaSZQ18,
  author       = {Shunan Ma and
                  Xunbo Shuai and
                  Zhaohua Zhou and
                  Kechun Qiao},
  title        = {Bionic Mechanism Based Dynamic Trust Evaluation Method in Cloud Environment},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {136--141},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00030},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00030},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaSZQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaWGL18,
  author       = {Yuxiang Ma and
                  Yulei Wu and
                  Jingguo Ge and
                  Jun Li},
  title        = {A Flow-Level Architecture for Balancing Accountability and Privacy},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {984--989},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00138},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00138},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaWGL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MadhounBP18,
  author       = {Nour El Madhoun and
                  Emmanuel Bertin and
                  Guy Pujolle},
  title        = {For Small Merchants: {A} Secure Smartphone-Based Architecture to Process
                  and Accept {NFC} Payments},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {403--411},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00067},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00067},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MadhounBP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MalikNAHP18,
  author       = {Nisha Malik and
                  Priyadarsi Nanda and
                  Arushi Arora and
                  Xiangjian He and
                  Deepak Puthal},
  title        = {Blockchain Based Secured Identity Authentication and Expeditious Revocation
                  Framework for Vehicular Networks},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {674--679},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00099},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00099},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MalikNAHP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaoDS18,
  author       = {Jiewen Mao and
                  Weijun Deng and
                  Fuke Shen},
  title        = {DDoS Flooding Attack Detection Based on Joint-Entropy with Multiple
                  Traffic Features},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {237--243},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00045},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00045},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaoDS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Marbukh18,
  author       = {Vladimir Marbukh},
  title        = {On Mitigation Inefficiency of Selfish Investment in Network Recovery
                  from High Loss {SIS} Infection},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1928--1933},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00293},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00293},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Marbukh18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MataBC18,
  author       = {Nicholas Mata and
                  Nicole Beebe and
                  Kim{-}Kwang Raymond Choo},
  title        = {Are Your Neighbors Swingers or Kinksters? Feeld App Forensic Analysis},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1433--1439},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00199},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00199},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MataBC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MatosTAH18,
  author       = {Everton de Matos and
                  Ram{\~{a}}o Tiago Tiburski and
                  Leonardo Albernaz Amaral and
                  Fabiano Hessel},
  title        = {Providing Context-Aware Security for IoT Environments Through Context
                  Sharing Feature},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1711--1715},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00257},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00257},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MatosTAH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Mell18,
  author       = {Peter Mell},
  title        = {Managed Blockchain Based Cryptocurrencies with Consensus Enforced
                  Rules and Transparency},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1287--1296},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00177},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00177},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Mell18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MellGS18,
  author       = {Peter Mell and
                  Assane Gueye and
                  Christopher Schanzle},
  title        = {Quantifying Information Exposure in Internet Routing},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1619--1623},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00237},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00237},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MellGS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MengMYL18,
  author       = {Keju Meng and
                  Fuyou Miao and
                  Yue Yu and
                  Changbin Lu},
  title        = {A Universal Secret Sharing Scheme with General Access Structure Based
                  on {CRT}},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {142--148},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00031},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00031},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MengMYL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MichelCCE18,
  author       = {Mary C. Michel and
                  Marco Carvalho and
                  Heather Crawford and
                  Albert C. Esterline},
  title        = {Cyber Identity: Salient Trait Ontology and Computational Framework
                  to Aid in Solving Cybercrime},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1242--1249},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00171},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00171},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MichelCCE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MitraQMLP18,
  author       = {Saptashwa Mitra and
                  Yu Qiu and
                  Haley Moss and
                  Kaigang Li and
                  Sangmi Lee Pallickara},
  title        = {Effective Integration of Geotagged, Ancilliary Longitudinal Survey
                  Datasets to Improve Adulthood Obesity Predictive Models},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1738--1746},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00263},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00263},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MitraQMLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Mohammad18,
  author       = {Rashid Mohammad},
  title        = {{AMI} Smart Meter Big Data Analytics for Time Series of Electricity
                  Consumption},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1771--1776},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00267},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00267},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Mohammad18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MohantyZAR18,
  author       = {Manoranjan Mohanty and
                  Ming Zhang and
                  Muhammad Rizwan Asghar and
                  Giovanni Russello},
  title        = {{PANDORA:} Preserving Privacy in PRNU-Based Source Camera Attribution},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1202--1207},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00166},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00166},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MohantyZAR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MohsenABJS18,
  author       = {Fadi Mohsen and
                  Hamed Abdelhaq and
                  Halil Bisgin and
                  Andrew Jolly and
                  Michael Szczepanski},
  title        = {Countering Intrusiveness Using New Security-Centric Ranking Algorithm
                  Built on Top of Elasticsearch},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1048--1057},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00147},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00147},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MohsenABJS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MostafaBH18,
  author       = {Mohannad Mostafa and
                  Tanushree Banerjee and
                  M. Anwar Hasan},
  title        = {Energy Exhaustion Attack on Barrett's Reduction},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {814--818},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00116},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00116},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MostafaBH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NakanishiK18,
  author       = {Toru Nakanishi and
                  Takeshi Kanatani},
  title        = {An Efficient Blacklistable Anonymous Credential System with Reputation
                  Using Pairing-Based Accumulator},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1140--1148},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00158},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00158},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NakanishiK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NeyazSK18,
  author       = {Ashar Neyaz and
                  Narasimha K. Shashidhar and
                  Umit Karabiyik},
  title        = {Forensic Analysis of Wear Leveling on Solid-State Media},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1706--1710},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00256},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00256},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NeyazSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NobakhtSSH18,
  author       = {Mehdi Nobakht and
                  Yulei Sui and
                  Aruna Seneviratne and
                  Wen Hu},
  title        = {Permission Analysis of Health and Fitness Apps in IoT Programming
                  Frameworks},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {533--538},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00081},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00081},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NobakhtSSH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NoguchiH18,
  author       = {Taku Noguchi and
                  Mayuko Hayakawa},
  title        = {Black Hole Attack Prevention Method Using Multiple RREPs in Mobile
                  Ad Hoc Networks},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {539--544},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00082},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00082},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NoguchiH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ObertCJ18,
  author       = {James Obert and
                  Adrian R. Chavez and
                  Jay Johnson},
  title        = {Behavioral Based Trust Metrics and the Smart Grid},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1490--1493},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00209},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00209},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ObertCJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/OhataMM18,
  author       = {Satsuya Ohata and
                  Takahiro Matsuda and
                  Kanta Matsuura},
  title        = {Provably Secure Password Reset Protocol: Model, Definition, and Construction},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {774--782},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00111},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00111},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/OhataMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/OkonofuaR18,
  author       = {Henry Okonofua and
                  Shawon Rahman},
  title        = {Evaluating the Risk Management Plan and Addressing Factors for Successes
                  in Government Agencies},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1589--1592},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00230},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00230},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/OkonofuaR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/OkonofuaR18a,
  author       = {Henry Okonofua and
                  Shawon S. M. Rahman},
  title        = {Cybersecurity: An Analysis of the Protection Mechanisms in a Cloud-centered
                  Environment},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1955--1962},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00299},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00299},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/OkonofuaR18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Oualha18,
  author       = {Nouha Oualha},
  title        = {Reinforcing IoT-Enforced Security Policies},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {831--836},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00119},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00119},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Oualha18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PanYWH18,
  author       = {Lanlan Pan and
                  Xuebiao Yuchi and
                  Jian Wang and
                  Anlei Hu},
  title        = {A Public Key Based {EDNS} Privacy Tunnel for {DNS}},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1722--1724},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00260},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00260},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PanYWH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PariziDC18,
  author       = {Reza M. Parizi and
                  Ali Dehghantanha and
                  Kim{-}Kwang Raymond Choo},
  title        = {Towards Better Ocular Recognition for Secure Real-World Applications},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {277--282},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00050},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00050},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PariziDC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PengHJI18,
  author       = {Wuxu Peng and
                  Linda Huang and
                  Julia Jia and
                  Emma Ingram},
  title        = {Enhancing the Naive Bayes Spam Filter Through Intelligent Text Modification
                  Detection},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {849--854},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00122},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00122},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PengHJI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PerezAS018,
  author       = {Rocio Lopez Perez and
                  Florian Adamsky and
                  Ridha Soua and
                  Thomas Engel},
  title        = {Machine Learning for Reliable Network Attack Detection in {SCADA}
                  Systems},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {633--638},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00094},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00094},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PerezAS018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PouryousefRC18,
  author       = {Shahrooz Pouryousef and
                  Mariam Rezaiee and
                  Ata Chizari},
  title        = {Let me Join Two Worlds! Analyzing the Integration of Web and Native
                  Technologies in Hybrid Mobile Apps},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1814--1819},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00274},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00274},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PouryousefRC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QiHWW18,
  author       = {Lingtao Qi and
                  Haiping Huang and
                  Peng Wang and
                  Ru Chuan Wang},
  title        = {Abnormal Item Detection Based on Time Window Merging for Recommender
                  Systems},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {252--259},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00047},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00047},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/QiHWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QiJSMW18,
  author       = {Biao Qi and
                  Jianguo Jiang and
                  Zhixin Shi and
                  Rui Mao and
                  Qiwen Wang},
  title        = {BotCensor: Detecting DGA-Based Botnet Using Two-Stage Anomaly Detection},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {754--762},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00109},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00109},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/QiJSMW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Qian0SC18,
  author       = {Yuyin Qian and
                  Peng Zeng and
                  Zuming Shen and
                  Kim{-}Kwang Raymond Choo},
  title        = {A Lightweight Path Authentication Protocol for RFID-Based Supply Chains},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1297--1302},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00178},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00178},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Qian0SC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QinY18,
  author       = {Yi Qin and
                  Chuan Yue},
  title        = {Website Fingerprinting by Power Estimation Based Side-Channel Attacks
                  on Android 7},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1030--1039},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00145},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00145},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/QinY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QuLWLX018,
  author       = {Dapeng Qu and
                  Dengyu Liang and
                  Songlin Wu and
                  Jie Li and
                  Weihong Xuan and
                  Xingwei Wang},
  title        = {A Trust Energy-Efficient QoS Routing Scheme for Mobile Peer-to-Peer
                  Networks},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {169--176},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00035},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00035},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/QuLWLX018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RakoczyBGW18,
  author       = {Monika Ewa Rakoczy and
                  Amel Bouzeghoub and
                  Alda Lopes Gan{\c{c}}arski and
                  Katarzyna Wegrzyn{-}Wolska},
  title        = {Reputation Prediction Using Influence Conversion},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {43--48},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00017},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00017},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RakoczyBGW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RenGSH18,
  author       = {Hengyi Ren and
                  Jian Guo and
                  Lijuan Sun and
                  Chong Han},
  title        = {Prediction Algorithm Based on Weather Forecast for Energy-Harvesting
                  Wireless Sensor Networks},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1785--1790},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00269},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00269},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RenGSH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RenJYWWLC18,
  author       = {Yizhi Ren and
                  Mengjin Jiang and
                  Ye Yao and
                  Ting Wu and
                  Zhen Wang and
                  Mengkun Li and
                  Kim{-}Kwang Raymond Choo},
  title        = {Node Immunization in Networks with Uncertainty},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1392--1397},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00193},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00193},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RenJYWWLC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RizviGR18,
  author       = {Syed Rizvi and
                  Joseph Gualdoni and
                  Abdul Razaque},
  title        = {Securing Wireless Networks from Sinkhole and Sybil Attacks Using Secure
                  Data Aggregation Protocol},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {721--726},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00105},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00105},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RizviGR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RizviKPR18,
  author       = {Syed Rizvi and
                  Andrew Kurtz and
                  Joseph R. Pfeffer III and
                  Mohammad Rizvi},
  title        = {Securing the Internet of Things (IoT): {A} Security Taxonomy for IoT},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {163--168},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00034},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00034},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RizviKPR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RudrapatnaKTV18,
  author       = {Rudrapatna K. Shyamasundar and
                  N. V. Narendra Kumar and
                  Abhijit Taware and
                  Parjanya Vyas},
  title        = {An Experimental Flow Secure File System},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {790--799},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00113},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00113},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RudrapatnaKTV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SacramentoMB018,
  author       = {Luis Sacramento and
                  Iberia Medeiros and
                  Joao Bota and
                  Miguel Correia},
  title        = {FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data
                  Using Network Flows},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {567--572},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00086},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00086},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SacramentoMB018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SaidiTG18,
  author       = {Firas Saidi and
                  Zouheir Trabelsi and
                  Henda Ben Gh{\'{e}}zala},
  title        = {An Evidential Clustering Based Framework for Cyber Terrorist Cells
                  Topology Identification},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {436--443},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00070},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00070},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SaidiTG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SajjadY18,
  author       = {Syed Muhammad Sajjad and
                  Muhammad Yousaf},
  title        = {{UCAM:} Usage, Communication and Access Monitoring Based Detection
                  System for IoT Botnets},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1547--1550},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00221},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00221},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SajjadY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SalviaFSC18,
  author       = {Rocco Salvia and
                  Pietro Ferrara and
                  Fausto Spoto and
                  Agostino Cortesi},
  title        = {{SDLI:} Static Detection of Leaks Across Intents},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1002--1007},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00141},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00141},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SalviaFSC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SaracinoRM18,
  author       = {Andrea Saracino and
                  Francesco Restuccia and
                  Fabio Martinelli},
  title        = {Practical Location Validation in Participatory Sensing Through Mobile
                  WiFi Hotspots},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {596--607},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00090},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00090},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SaracinoRM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SardaCCK018,
  author       = {Paul Sarda and
                  Mohammad Jabed Morshed Chowdhury and
                  Alan Colman and
                  Muhammad Ashad Kabir and
                  Jun Han},
  title        = {Blockchain for Fraud Prevention: {A} Work-History Fraud Prevention
                  System},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1858--1863},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00281},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00281},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SardaCCK018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SarwarYY18,
  author       = {Kinza Sarwar and
                  Sira Yongchareon and
                  Jian Yu},
  title        = {Lightweight {ECC} with Fragile Zero-Watermarking for Internet of Things
                  Security},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {867--872},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00125},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00125},
  timestamp    = {Thu, 07 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SarwarYY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SayadiMRDRH18,
  author       = {Hossein Sayadi and
                  Hosein Mohammadi Makrani and
                  Onkar Randive and
                  Sai Manoj Pudukotai Dinakarrao and
                  Setareh Rafatirad and
                  Houman Homayoun},
  title        = {Customized Machine Learning-Based Hardware-Assisted Malware Detection
                  in Embedded Devices},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1685--1688},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00251},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00251},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SayadiMRDRH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SayedS18,
  author       = {Samir G. Sayed and
                  Mohmed Shawkey},
  title        = {Data Mining Based Strategy for Detecting Malicious {PDF} Files},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {661--667},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00097},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00097},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SayedS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SchanzenbachBS18,
  author       = {Martin Schanzenbach and
                  Christian Banse and
                  Julian Sch{\"{u}}tte},
  title        = {Practical Decentralized Attribute-Based Delegation Using Secure Name
                  Systems},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {244--251},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00046},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00046},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SchanzenbachBS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SchanzenbachBS18a,
  author       = {Martin Schanzenbach and
                  Georg Bramm and
                  Julian Sch{\"{u}}tte},
  title        = {reclaimID: Secure, Self-Sovereign Identities Using Name Systems and
                  Attribute-Based Encryption},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {946--957},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00134},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00134},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SchanzenbachBS18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SchutteB18,
  author       = {Julian Sch{\"{u}}tte and
                  Gerd Stefan Brost},
  title        = {{LUCON:} Data Flow Control for Message-Based IoT Systems},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {289--299},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00052},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00052},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SchutteB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SerhaniKAN18,
  author       = {Mohamed Adel Serhani and
                  Hadeel T. El Kassabi and
                  Nabeel A. Y. Al{-}Qirim and
                  Alramzana Nujum Navaz},
  title        = {Towards a Multi-model Cloud Workflow Resource Monitoring, Adaptation,
                  and Prediction},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1755--1762},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00265},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00265},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SerhaniKAN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SezariMD18,
  author       = {Behrooz Sezari and
                  Dietmar P. F. M{\"{o}}ller and
                  Andreas Deutschmann},
  title        = {Anomaly-Based Network Intrusion Detection Model Using Deep Learning
                  in Airports},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1725--1729},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00261},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00261},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SezariMD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShahV18,
  author       = {Trusit Shah and
                  Subbarayan Venkatesan},
  title        = {Authentication of IoT Device and IoT Server Using Secure Vaults},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {819--824},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00117},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00117},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShahV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShahidPIM18,
  author       = {Abdur R. Shahid and
                  Niki Pissinou and
                  S. S. Iyengar and
                  Kia Makki},
  title        = {Check-ins and Photos: Spatiotemporal Correlation-Based Location Inference
                  Attack and Defense in Location-Based Social Networks},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1852--1857},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00280},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00280},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShahidPIM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShangCSZZ18,
  author       = {Wenli Shang and
                  Junrong Cui and
                  Chunhe Song and
                  Jianming Zhao and
                  Peng Zeng},
  title        = {Research on Industrial Control Anomaly Detection Based on {FCM} and
                  {SVM}},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {218--222},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00042},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00042},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShangCSZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SharmaK0LCM18,
  author       = {Dilli Prasad Sharma and
                  Dong Seong Kim and
                  Seunghyun Yoon and
                  Hyuk Lim and
                  Jin{-}Hee Cho and
                  Terrence J. Moore},
  title        = {{FRVM:} Flexible Random Virtual {IP} Multiplexing in Software-Defined
                  Networks},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {579--587},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00088},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00088},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SharmaK0LCM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Sheppard18,
  author       = {John Sheppard},
  title        = {Cloud Investigations of Illegal {IPTV} Networks},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1942--1947},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00295},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00295},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Sheppard18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShiLLJWL18,
  author       = {Jun Shi and
                  Bo Lv and
                  Yangyang Li and
                  Yue Jia and
                  Rui Wang and
                  Yong Liao},
  title        = {A New Wavelet Thresholding Method Based on Cyclostationarity for Enhancing
                  the Interception of Computer Video Leakage Signals},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1901--1906},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00289},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00289},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShiLLJWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShilaE18,
  author       = {Devu Manikantan Shila and
                  Emeka Eyisi},
  title        = {Adversarial Gait Detection on Mobile Devices Using Recurrent Neural
                  Networks},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {316--321},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00055},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00055},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShilaE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShufordKRCW18,
  author       = {Erica Shuford and
                  Tara Kavanaugh and
                  Brian Ralph and
                  Ebrima N. Ceesay and
                  Paul A. Watters},
  title        = {Measuring Personal Privacy Breaches Using Third-Party Trackers},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1615--1618},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00236},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00236},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShufordKRCW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SridharMYTH18,
  author       = {Meera Sridhar and
                  Abhinav Mohanty and
                  Fadi Yilmaz and
                  Vasant Tendulkar and
                  Kevin W. Hamlen},
  title        = {Inscription: Thwarting ActionScript Web Attacks From Within},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {504--515},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00078},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00078},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SridharMYTH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SuYLLLL18,
  author       = {Liya Su and
                  Yepeng Yao and
                  Ning Li and
                  Junrong Liu and
                  Zhigang Lu and
                  Baoxu Liu},
  title        = {Hierarchical Clustering Based Network Traffic Data Reduction for Improving
                  Suspicious Flow Detection},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {744--753},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00108},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00108},
  timestamp    = {Tue, 27 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SuYLLLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunGZ18,
  author       = {Tao Sun and
                  Xin Guo and
                  Ting Zhang},
  title        = {Testing Sequence Generation Method Based on Unrelated Behaviors Serializing},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {177--183},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00036},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00036},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunGZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Syynimaa18,
  author       = {Nestori Syynimaa},
  title        = {Who Would you Like to be Today?: Impersonation by Fake Azure Active
                  Directory Identity Federation},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1598--1604},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00232},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00232},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Syynimaa18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TanHSGZ18,
  author       = {Qingqing Tan and
                  Chong Han and
                  Lijuan Sun and
                  Jian Guo and
                  Hai Zhu},
  title        = {A {CSI} Frequency Domain Fingerprint-Based Method for Passive Indoor
                  Human Detection},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1832--1837},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00277},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00277},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TanHSGZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TanZLLZD18,
  author       = {Guolin Tan and
                  Peng Zhang and
                  Qingyun Liu and
                  Xinran Liu and
                  Chunge Zhu and
                  Fenghu Dou},
  title        = {Adaptive Malicious {URL} Detection: Learning in the Presence of Concept
                  Drifts},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {737--743},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00107},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00107},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TanZLLZD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TangZHC18,
  author       = {Xin Tang and
                  Linna Zhou and
                  Yongfeng Huang and
                  Chin{-}Chen Chang},
  title        = {Efficient Cross-User Deduplication of Encrypted Data Through Re-Encryption},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {897--904},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00128},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00128},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TangZHC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TapsellAM18,
  author       = {James Tapsell and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  title        = {Consumer Centric Data Control, Tracking and Transparency - {A} Position
                  Paper},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1380--1385},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00191},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00191},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TapsellAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TetaraveTKJ18,
  author       = {Sumit Kumar Tetarave and
                  Somanath Tripathy and
                  Ezhil Kalaimannan and
                  Caroline John},
  title        = {eBot: Approach Towards Modeling an Advanced {P2P} Botnet},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {391--396},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00065},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00065},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TetaraveTKJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TheodouliAMVT18,
  author       = {Anastasia Theodouli and
                  Stelios Arakliotis and
                  Konstantinos Moschou and
                  Konstantinos Votis and
                  Dimitrios Tzovaras},
  title        = {On the Design of a Blockchain-Based System to Facilitate Healthcare
                  Data Sharing},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1374--1379},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00190},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00190},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TheodouliAMVT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TianZLZSL18,
  author       = {Xiang Tian and
                  Yujia Zhu and
                  Zhao Li and
                  Chao Zheng and
                  Yong Sun and
                  Qingyun Liu},
  title        = {VegaStar: An Illegal Domain Detection System on Large-Scale Video
                  Traffic},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {783--789},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00112},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00112},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TianZLZSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TolbaBTB18,
  author       = {Mouslim Tolba and
                  Salem Benferhat and
                  Karim Tabia and
                  Abdelkader Belkhir},
  title        = {Handling Capabilities in Security Policies},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1922--1927},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00292},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00292},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TolbaBTB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TroegelerW18,
  author       = {Bernd Troegeler and
                  Paul A. Watters},
  title        = {Steganographic Transports: {A} Vector for Hidden Secret Internets?},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {891--896},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00233},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00233},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TroegelerW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TseCLTT18,
  author       = {Daniel Tse and
                  Chung{-}kin Chow and
                  Ting{-}pong Ly and
                  Chung{-}yan Tong and
                  Kwok{-}wah Tam},
  title        = {The Challenges of Big Data Governance in Healthcare},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1632--1636},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00240},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00240},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TseCLTT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TseWWYZ18,
  author       = {Daniel Tse and
                  Xuan Weng and
                  Xin Wan and
                  Lan Yao and
                  Wensong Zhang},
  title        = {Research on Information Security Perception of Sina Weibo Users Based
                  on {KISCAP} Model},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1584--1588},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00229},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00229},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TseWWYZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Tucker18,
  author       = {Scot Tucker},
  title        = {Engineering Trust: {A} Graph-Based Algorithm for Modeling, Validating,
                  and Evaluating Trust},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00011},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00011},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Tucker18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TufailZB18,
  author       = {Hina Tufail and
                  Kashif Zafar and
                  Abdul Rauf Baig},
  title        = {Digital Watermarking for Relational Database Security Using mRMR Based
                  Binary Bat Algorithm},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1948--1954},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00298},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00298},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TufailZB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/UphoffWWW18,
  author       = {Maximilian Uphoff and
                  Matth{\"{a}}us Wander and
                  Torben Weis and
                  Marian Waltereit},
  title        = {SecureCloud: An Encrypted, Scalable Storage for Cloud Forensics},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1934--1941},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00294},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00294},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/UphoffWWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/VempatiDT18,
  author       = {Jagannadh Vempati and
                  Ram Dantu and
                  Mark A. Thompson},
  title        = {Uninterrupted Video Surveillance in the Face of an Attack},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {843--848},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00121},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00121},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/VempatiDT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/VerzelettiMW18,
  author       = {Glaidson Menegazzo Verzeletti and
                  Emerson Ribeiro de Mello and
                  Michelle Silva Wangham},
  title        = {A National Mobile Identity Management Strategy for Electronic Government
                  Services},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {668--673},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00098},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00098},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/VerzelettiMW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/VolodinaARH18,
  author       = {Ekaterina Volodina and
                  Adnan Aziz and
                  Erwin P. Rathgeb and
                  Tobias Ho{\ss}feld},
  title        = {Application of Visual Analysis to Detect and Analyze Patterns in VoIP
                  Attack Traffic},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {260--268},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00048},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00048},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/VolodinaARH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Wang18,
  author       = {Zheng Wang},
  title        = {Understanding the Performance and Challenges of {DNS} Query Name Minimization},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1115--1120},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00155},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00155},
  timestamp    = {Tue, 11 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Wang18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangABGRVMBB18,
  author       = {Yang Wang and
                  Stephen C. Adams and
                  Peter A. Beling and
                  Steven Greenspan and
                  Sridhar Rajagopalan and
                  Maria C. Velez{-}Rojas and
                  Serge Mankovski and
                  Steven M. Boker and
                  Donald E. Brown},
  title        = {Privacy Preserving Distributed Deep Learning and Its Application in
                  Credit Card Fraud Detection},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1070--1078},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00150},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00150},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangABGRVMBB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangCYZM18,
  author       = {Jiarong Wang and
                  Lijun Cai and
                  Aimin Yu and
                  Min Zhu and
                  Dan Meng},
  title        = {TempatMDS: {A} Masquerade Detection System Based on Temporal and Spatial
                  Analysis of File Access Records},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {360--371},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00061},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00061},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangCYZM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangF18,
  author       = {Boyang Wang and
                  Xinxin Fan},
  title        = {Lightweight Verification for Searchable Encryption},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {932--937},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00132},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00132},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangJSWLQY18,
  author       = {Qiwen Wang and
                  Jianguo Jiang and
                  Zhixin Shi and
                  Wen Wang and
                  Bin Lv and
                  Biao Qi and
                  Qilei Yin},
  title        = {A Novel Multi-source Fusion Model for Known and Unknown Attack Scenarios},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {727--736},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00106},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00106},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangJSWLQY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangSN18,
  author       = {Shuo Wang and
                  Richard O. Sinnott and
                  Surya Nepal},
  title        = {{PAIRS:} Privacy-Aware Identification and Recommendation of Spatio-Friends},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {920--931},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00131},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00131},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangSN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangSN18a,
  author       = {Shuo Wang and
                  Richard O. Sinnott and
                  Surya Nepal},
  title        = {{P-GENT:} Privacy-Preserving Geocoding of Non-Geotagged Tweets},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {972--983},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00137},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00137},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangSN18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangWCLWH18,
  author       = {Meng Wang and
                  Chase Q. Wu and
                  Huiyan Cao and
                  Yang Liu and
                  Yongqiang Wang and
                  Aiqin Hou},
  title        = {On MapReduce Scheduling in Hadoop Yarn on Heterogeneous Clusters},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1747--1754},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00264},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00264},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangWCLWH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangWLC18,
  author       = {Pengfei Wang and
                  Fengyu Wang and
                  Fengbo Lin and
                  Zhenzhong Cao},
  title        = {Identifying Peer-to-Peer Botnets Through Periodicity Behavior Analysis},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {283--288},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00051},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00051},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangWLC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangWZL18,
  author       = {Yubiao Wang and
                  Junhao Wen and
                  Wei Zhou and
                  Fengji Luo},
  title        = {A Novel Dynamic Cloud Service Trust Evaluation Model in Cloud Computing},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {10--15},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00012},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00012},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangWZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WeiBX18,
  author       = {Yang Wei and
                  Xiu{-}Li Bi and
                  Bin Xiao},
  title        = {{C2R} Net: The Coarse to Refined Network for Image Forgery Detection},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1656--1659},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00245},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00245},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WeiBX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WeiDWH18,
  author       = {Shuang Wei and
                  Shuaifu Dai and
                  Xinfeng Wu and
                  Xinhui Han},
  title        = {{STDC:} {A} SDN-Oriented Two-Stage DDoS Detection and Defence System
                  Based on Clustering},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {339--347},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00059},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00059},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WeiDWH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WijayaLSL18,
  author       = {Dimaz Ankaa Wijaya and
                  Joseph K. Liu and
                  Ron Steinfeld and
                  Dongxi Liu},
  title        = {Monero Ring Attack: Recreating Zero Mixin Transaction Effect},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1196--1201},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00165},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00165},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WijayaLSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuM18,
  author       = {Tina Wu and
                  Andrew Martin},
  title        = {Bluetooth Low Energy Used for Memory Acquisition from Smart Health
                  Care Devices},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1256--1261},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00173},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00173},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuPYM18,
  author       = {Zhijun Wu and
                  Qingbo Pan and
                  Meng Yue and
                  Shaopu Ma},
  title        = {An Approach of Security Protection for {VSAT} Network},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1511--1516},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00214},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00214},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuPYM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuZGZH18,
  author       = {Yangxin Wu and
                  Peijia Zheng and
                  Jianting Guo and
                  Wei Zhang and
                  Jiwu Huang},
  title        = {A Controllable Efficient Content Distribution Framework Based on Blockchain
                  and {ISODATA}},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1698--1701},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00254},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00254},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuZGZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XieLH18,
  author       = {Hui Xie and
                  Kun Lv and
                  Changzhen Hu},
  title        = {An Improved Monte Carlo Graph Search Algorithm for Optimal Attack
                  Path Analysis},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {307--315},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00054},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00054},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XieLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XieLH18a,
  author       = {Huihui Xie and
                  Kun Lv and
                  Changzhen Hu},
  title        = {An Effective Method to Generate Simulated Attack Data Based on Generative
                  Adversarial Nets},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1777--1784},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00268},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00268},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XieLH18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiongHWZL18,
  author       = {Anping Xiong and
                  Yi Huang and
                  Yunsong Wu and
                  Jun Zhang and
                  Linbo Long},
  title        = {An Adaptive Sliding Window Algorithm for Mining Frequent Itemsets
                  in Computer Forensics},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1660--1663},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00246},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00246},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiongHWZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuFLS18,
  author       = {Jiaming Xu and
                  Ao Fan and
                  Minyi Lu and
                  Weiwei Shan},
  title        = {Differential Power Analysis of 8-Bit Datapath {AES} for IoT Applications},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1470--1473},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00205},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00205},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuFLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuJH18,
  author       = {Weitao Xu and
                  Sanjay Jha and
                  Wen Hu},
  title        = {Exploring the Feasibility of Physical Layer Key Generation for LoRaWAN},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {231--236},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00044},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00044},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuJH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuPJ18,
  author       = {Runhua Xu and
                  Balaji Palanisamy and
                  James Joshi},
  title        = {QueryGuard: Privacy-Preserving Latency-Aware Query Optimization for
                  Edge Computing},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1097--1106},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00153},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00153},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuPJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XueBWL18,
  author       = {Mingfu Xue and
                  Rongzhen Bian and
                  Jian Wang and
                  Weiqiang Liu},
  title        = {A Co-training Based Hardware Trojan Detection Technique by Exploiting
                  Unlabeled ICs and Inaccurate Simulation Models},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1452--1457},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00202},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00202},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XueBWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XueSLHS18,
  author       = {Wanli Xue and
                  Yiran Shen and
                  Chengwen Luo and
                  Wen Hu and
                  Aruna Seneviratne},
  title        = {Acies: {A} Privacy-Preserving System for Edge-Based Classification},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {914--919},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00130},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00130},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XueSLHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YadavO18,
  author       = {Gyan Singh Yadav and
                  Aparajita Ojha},
  title        = {A Reversible Data Hiding Scheme with High Security and Improved Embedding
                  Capacity},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1555--1559},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00223},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00223},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YadavO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YanQRQ18,
  author       = {Jinpei Yan and
                  Yong Qi and
                  Qifan Rao and
                  Saiyu Qi},
  title        = {Towards a User-Friendly and Secure Hand Shaking Authentication for
                  Smartphones},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1170--1179},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00162},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00162},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YanQRQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YanXQWYZC18,
  author       = {Feipeng Yan and
                  Ming Xu and
                  Tong Qiao and
                  Ting Wu and
                  Xue Yang and
                  Ning Zheng and
                  Kim{-}Kwang Raymond Choo},
  title        = {Identifying WeChat Red Packets and Fund Transfers Via Analyzing Encrypted
                  Network Traffic},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1426--1432},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00198},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00198},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YanXQWYZC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Yang0Y18,
  author       = {Zhiju Yang and
                  Rui Zhao and
                  Chuan Yue},
  title        = {Effective Mobile Web User Fingerprinting via Motion Sensors},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1398--1405},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00194},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00194},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Yang0Y18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangCSJL18,
  author       = {Chao Yang and
                  Xinghe Chen and
                  Tingting Song and
                  Bin Jiang and
                  Qin Liu},
  title        = {A Hybrid Recommendation Algorithm Based on Heuristic Similarity and
                  Trust Measure},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1413--1418},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00196},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00196},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangCSJL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangCYM18,
  author       = {Guang Yang and
                  Lijun Cai and
                  Aimin Yu and
                  Dan Meng},
  title        = {A General and Expandable Insider Threat Detection System Using Baseline
                  Anomaly Detection and Scenario-Driven Alarm Filters},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {763--773},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00110},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00110},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangCYM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangL18,
  author       = {Jinfeng Yang and
                  David J. Lilja},
  title        = {Reducing Relational Database Performance Bottlenecks Using 3D XPoint
                  Storage Technology},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1804--1808},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00272},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00272},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangLW18,
  author       = {Hongyang Yang and
                  Xiao{-}Yang Liu and
                  Qingwei Wu},
  title        = {A Practical Machine Learning Approach for Dynamic Stock Recommendation},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1693--1697},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00253},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00253},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangLY18,
  author       = {Chaoqun Yang and
                  Xiangyu Li and
                  Shujuan Yin},
  title        = {Low-Cost Energy-Efficient Side-Channel Attacks Resistant {AES} S-Box
                  with Power-Aware Hiding Inverter in {GF(24)}},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1526--1530},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00217},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00217},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangS18,
  author       = {Yibing Yang and
                  M. Omair Shafiq},
  title        = {Large Scale and Parallel Sentiment Analysis Based on Label Propagation
                  in Twitter Data},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1791--1798},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00270},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00270},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YaoZYL18,
  author       = {Yi Yao and
                  Jun Zhou and
                  Bo Yan and
                  Yuqian Li},
  title        = {RNS-Based Embedding Scheme for Data Hiding in Digital Images},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1480--1483},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00207},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00207},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YaoZYL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YooYK18,
  author       = {HyunKyung Yoo and
                  Jongchoul Yim and
                  Sunme Kim},
  title        = {The Blockchain for Domain Based Static Sharding},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1689--1692},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00252},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00252},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YooYK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YousefiMZT18,
  author       = {Mehdi Yousefi and
                  Nhamo Mtetwa and
                  Yan Zhang and
                  Huaglory Tianfield},
  title        = {A Reinforcement Learning Approach for Attack Graph Analysis},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {212--217},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00041},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00041},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YousefiMZT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuSMHX18,
  author       = {Zijun Yu and
                  Chun Shan and
                  Limin Mao and
                  Changzhen Hu and
                  Wenjie Xiong},
  title        = {Software System Representation Methods Based on Algebraic Component},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1008--1013},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00142},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00142},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuSMHX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuZWXSW18,
  author       = {Liting Yu and
                  Dongrong Zhang and
                  Liang Wu and
                  Shuguo Xie and
                  Donglin Su and
                  Xiaoxiao Wang},
  title        = {{AES} Design Improvements Towards Information Security Considering
                  Scan Attack},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {322--326},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00056},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00056},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuZWXSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YusufHK18,
  author       = {Simon Yusuf Enoch and
                  Jin B. Hong and
                  Dong Seong Kim},
  title        = {Time Independent Security Analysis for Dynamic Networks Using Graphical
                  Security Models},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {588--595},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00089},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00089},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YusufHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZeidlerA18,
  author       = {Clemens Zeidler and
                  Muhammad Rizwan Asghar},
  title        = {AuthStore: Password-Based Authentication and Encrypted Data Storage
                  in Untrusted Environments},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {996--1001},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00140},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00140},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZeidlerA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangBBL18,
  author       = {Menghao Zhang and
                  Jun Bi and
                  Jiasong Bai and
                  Guanyu Li},
  title        = {FloodShield: Securing the {SDN} Infrastructure Against Denial-of-Service
                  Attacks},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {687--698},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00101},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00101},
  timestamp    = {Mon, 11 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangBBL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLZZG18,
  author       = {Wei Zhang and
                  Dongdai Lin and
                  Hailong Zhang and
                  Xiaojun Zhou and
                  Yiwen Gao},
  title        = {A Lightweight FourQ Primitive on {ARM} Cortex-M0},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {699--704},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00102},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00102},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLZZG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLZZGC18,
  author       = {Wei Zhang and
                  Dongdai Lin and
                  Hailong Zhang and
                  Xiaojun Zhou and
                  Yiwen Gao and
                  Cong Chen},
  title        = {A Lightweight Multi-precision Squaring on Embedded Processors for
                  {ECC}},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1014--1019},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00143},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00143},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLZZGC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangYWCW18,
  author       = {Chunkai Zhang and
                  Ao Yin and
                  Yulin Wu and
                  Yingyang Chen and
                  Xuan Wang},
  title        = {Fast Time Series Discords Detection with Privacy Preserving},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1129--1139},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00157},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00157},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangYWCW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaoZLC18,
  author       = {Xiaolin Zhao and
                  Yiman Zhang and
                  Xuhui Li and
                  Quanbao Chen},
  title        = {Research on Malicious Code Homology Analysis Method Based on Texture
                  Fingerprint Clustering},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1914--1921},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00291},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00291},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhaoZLC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Zheng0SXCH18,
  author       = {Yu Zheng and
                  Yongxin Zhu and
                  Shijin Song and
                  Peng Xiong and
                  Zihao Cao and
                  Junjie Hou},
  title        = {Improved Weighted Label Propagation Algorithm in Social Network Computing},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1799--1803},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00271},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00271},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Zheng0SXCH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhengWHLHL18,
  author       = {Huangjie Zheng and
                  Yuchen Wang and
                  Chen Han and
                  Fangjie Le and
                  Ruan He and
                  Jialiang Lu},
  title        = {Learning and Applying Ontology for Machine Learning in Cyber Attack
                  Detection},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1309--1315},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00180},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00180},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhengWHLHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouLFSC18,
  author       = {Haotian Zhou and
                  Xiao{-}Yang Liu and
                  Cai Fu and
                  Chen Shang and
                  Xinyi Chang},
  title        = {Differentially Private Matrix Completion via Distributed Matrix Factorization},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1628--1631},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00239},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00239},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouLFSC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouT18,
  author       = {Jie Zhou and
                  Min Tian},
  title        = {An Elite Clone Parallel Genetic Algorithm for Trust Monitoring Assignment
                  Problem in Adaptive Wireless Sensor Networks},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {197--203},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00039},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00039},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouWJT18,
  author       = {Changli Zhou and
                  Tian Wang and
                  Wenxian Jiang and
                  Hui Tian},
  title        = {Practical {K} Nearest Neighbor Query Scheme with Two-Party Guarantees
                  in Road Networks},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1316--1321},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00181},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00181},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouWJT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuYRZD18,
  author       = {Xulyu Zhu and
                  Zheng Yan and
                  Jianfei Ruan and
                  Qinghua Zheng and
                  Bo Dong},
  title        = {{IRTED-TL:} An Inter-Region Tax Evasion Detection Method Based on
                  Transfer Learning},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1224--1235},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00169},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00169},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuYRZD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZrelliE18,
  author       = {Amira Zrelli and
                  Tahar Ezzedine},
  title        = {Monitoring of Temperature and Pressure Through Brillouin Optical Sensors
                  for Disasters Systems},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1517--1520},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00215},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00215},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZrelliE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustcom/2018,
  title        = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8454845/proceeding},
  isbn         = {978-1-5386-4388-4},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0004ZL17,
  author       = {Di Wu and
                  Yu Zhang and
                  Yinlong Liu},
  title        = {Dummy Location Selection Scheme for K-Anonymity in Location Based
                  Services},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {441--448},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.269},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.269},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/0004ZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0029BK17,
  author       = {Li Li and
                  Tegawend{\'{e}} F. Bissyand{\'{e}} and
                  Jacques Klein},
  title        = {SimiDroid: Identifying and Explaining Similarities in Android Apps},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {136--143},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.230},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.230},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/0029BK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AhadipourS17,
  author       = {Ava Ahadipour and
                  Martin Schanzenbach},
  title        = {A Survey on Authorization in Distributed Systems: Information Storage,
                  Data Retrieval and Trust Evaluation},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1016--1023},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.346},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.346},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AhadipourS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AhmedSFA17,
  author       = {Nadeem Ahmed and
                  Adeel Sadiq and
                  Anum Farooq and
                  Rabia Akram},
  title        = {Securing the Neighbour Discovery Protocol in IPv6 State-ful Address
                  Auto-Configuration},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {96--103},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.225},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.225},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AhmedSFA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Al-ZobbiSR17,
  author       = {Mohammed Al{-}Zobbi and
                  Seyed A. Shahrestani and
                  Chun Ruan},
  title        = {Implementing {A} Framework for Big Data Anonymity and Analytics Access
                  Control},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {873--880},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.325},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.325},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Al-ZobbiSR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AldebeiFJNH17,
  author       = {Khaled Aldebei and
                  Helia Farhood and
                  Wenjing Jia and
                  Priyadarsi Nanda and
                  Xiangjian He},
  title        = {Sequential and Unsupervised Document Authorial Clustering Based on
                  Hidden Markov Model},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {379--385},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.261},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.261},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AldebeiFJNH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AlexopoulosDMH17,
  author       = {Nikolaos Alexopoulos and
                  J{\"{o}}rg Daubert and
                  Max M{\"{u}}hlh{\"{a}}user and
                  Sheikh Mahbub Habib},
  title        = {Beyond the Hype: On Using Blockchains in Trust Management for Authentication},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {546--553},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.283},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.283},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AlexopoulosDMH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AnkeleS17,
  author       = {Robin Ankele and
                  Andrew Simpson},
  title        = {On the Performance of a Trustworthy Remote Entity in Comparison to
                  Secure Multi-party Computation},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1115--1122},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.361},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.361},
  timestamp    = {Thu, 20 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AnkeleS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ArfaouiSW17,
  author       = {Ghada Arfaoui and
                  Jos{\'{e}} Manuel S{\'{a}}nchez{-}V{\'{\i}}lchez and
                  Jean{-}Philippe Wary},
  title        = {Security and Resilience in 5G: Current Challenges and Future Directions},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1010--1015},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.345},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.345},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ArfaouiSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BewongL0LC17,
  author       = {Michael Bewong and
                  Jixue Liu and
                  Lin Liu and
                  Jiuyong Li and
                  Kim{-}Kwang Raymond Choo},
  title        = {A Relative Privacy Model for Effective Privacy Preservation in Transactional
                  Data},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {394--401},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.263},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.263},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BewongL0LC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BhandariHLZRG17,
  author       = {Shweta Bhandari and
                  Fr{\'{e}}d{\'{e}}ric Herbreteau and
                  Vijay Laxmi and
                  Akka Zemmari and
                  Partha S. Roop and
                  Manoj Singh Gaur},
  title        = {SneakLeak: Detecting Multipartite Leakage Paths in Android Apps},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {285--292},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.249},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.249},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BhandariHLZRG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BradburyJ17,
  author       = {Matthew Bradbury and
                  Arshad Jhumka},
  title        = {A Near-Optimal Source Location Privacy Scheme for Wireless Sensor
                  Networks},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {409--416},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.265},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.265},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BradburyJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenQZNX17,
  author       = {Weiwen Chen and
                  Keni Qiu and
                  Jiqin Zhou and
                  Yuanhui Ni and
                  Yuanchao Xu},
  title        = {Queuing Theory-Guided Performance Evaluation for a Reconfigurable
                  High-Speed Device Interconnected Bus},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {839--843},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.320},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.320},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenQZNX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChengHCHK17,
  author       = {Long Cheng and
                  Kai Huang and
                  Gang Chen and
                  Biao Hu and
                  Alois C. Knoll},
  title        = {Mixed-Criticality Control System with Performance and Robustness Guarantees},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {767--775},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.311},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.311},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChengHCHK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChengZHCK17,
  author       = {Long Cheng and
                  Zhihao Zhao and
                  Kai Huang and
                  Gang Chen and
                  Alois C. Knoll},
  title        = {McFTP: {A} Framework to Explore and Prototype Multi-core Thermal Managements
                  on Real Processors},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {806--814},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.316},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.316},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChengZHCK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Cho17,
  author       = {Hyuntae Cho},
  title        = {Design and Implementation of a Lightweight Smart Insole for Gait Analysis},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {792--797},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.314},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.314},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Cho17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DierckensHLP17,
  author       = {Karl E. Dierckens and
                  Adrian B. Harrison and
                  Carson K. Leung and
                  Adrienne V. Pind},
  title        = {A Data Science and Engineering Solution for Fast K-Means Clustering
                  of Big Data},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {925--932},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.332},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.332},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/DierckensHLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DingL17,
  author       = {Jinnan Ding and
                  Shuguo Li},
  title        = {A Reconfigurable High-Speed {ECC} Processor Over {NIST} Primes},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1064--1069},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.353},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.353},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/DingL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DingWXZ17,
  author       = {Shan Ding and
                  Jinhui Wu and
                  Guoqi Xie and
                  Gang Zeng},
  title        = {A Hybrid Heuristic-Genetic Algorithm with Adaptive Parameters for
                  Static Task Scheduling in Heterogeneous Computing System},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {761--766},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.310},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.310},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/DingWXZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FarahbakhshMHCC17,
  author       = {Reza Farahbakhsh and
                  Samin Mohammadi and
                  Xiao Han and
                  {\'{A}}ngel Cuevas and
                  No{\"{e}}l Crespi},
  title        = {Evolution of Publicly Disclosed Information in Facebook Profiles},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {9--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.214},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.214},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FarahbakhshMHCC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FengL17,
  author       = {Xiang Feng and
                  Shuguo Li},
  title        = {A High-Speed and SPA-Resistant Implementation of {ECC} Point Multiplication
                  Over GF(p)},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {255--260},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.245},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.245},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FengL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FleurbaaijSL17,
  author       = {Dominique Fleurbaaij and
                  Mark Scanlon and
                  Nhien{-}An Le{-}Khac},
  title        = {Privileged Data Within Digital Evidence},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {737--744},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.307},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.307},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FleurbaaijSL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FloresJ17,
  author       = {Denys A. Flores and
                  Arshad Jhumka},
  title        = {Implementing Chain of Custody Requirements in Database Audit Records
                  for Forensic Purposes},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {675--682},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.299},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.299},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FloresJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ForuhandehG17,
  author       = {Mahsa Foruhandeh and
                  Ryan M. Gerdes},
  title        = {Analysis of Authentication Parameters in Uplink Scenario of Heterogeneous
                  Networks},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {833--838},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.319},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.319},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ForuhandehG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FukushimaXKH17,
  author       = {Kazuhide Fukushima and
                  Rui Xu and
                  Shinsaku Kiyomoto and
                  Naofumi Homma},
  title        = {Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1032--1037},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.348},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.348},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FukushimaXKH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GamachchiB17,
  author       = {Anagi Gamachchi and
                  Serdar Boztas},
  title        = {Insider Threat Detection Through Attributed Graph Clustering},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {112--119},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.227},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.227},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GamachchiB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaraeKKSWA17,
  author       = {Jeffery Garae and
                  Ryan K. L. Ko and
                  Janice Kho and
                  Saidah Suwadi and
                  Mark A. Will and
                  Mark D. Apperley},
  title        = {Visualizing the New Zealand Cyber Security Challenge for Attack Behaviors},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1123--1130},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.362},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.362},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaraeKKSWA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GeHAK17,
  author       = {Mengmeng Ge and
                  Jin B. Hong and
                  Hani Alzaid and
                  Dong Seong Kim},
  title        = {Security Modeling and Analysis of Cross-Protocol IoT Devices},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1043--1048},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.350},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.350},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GeHAK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Given-WilsonJLL17,
  author       = {Thomas Given{-}Wilson and
                  Nisrine Jafri and
                  Jean{-}Louis Lanet and
                  Axel Legay},
  title        = {An Automated Formal Process for Detecting Fault Injection Vulnerabilities
                  in Binaries and Case Study on {PRESENT}},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {293--300},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.250},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.250},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Given-WilsonJLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GongQCNXY17,
  author       = {Zhiyao Gong and
                  Keni Qiu and
                  Weiwen Chen and
                  Yuanhui Ni and
                  Yuanchao Xu and
                  Jianlei Yang},
  title        = {Pipeline Optimizations of Architecting {STT-RAM} as Registers in Rad-Hard
                  Environment},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {844--852},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.321},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.321},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GongQCNXY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Gonzalez-LopezC17,
  author       = {Jorge Gonzalez{-}Lopez and
                  Alberto Cano and
                  Sebasti{\'{a}}n Ventura},
  title        = {Large-Scale Multi-label Ensemble Learning on Spark},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {893--900},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.328},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.328},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Gonzalez-LopezC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GriningKS17,
  author       = {Krzysztof Grining and
                  Marek Klonowski and
                  Malgorzata Sulkowska},
  title        = {How to Cooperate Locally to Improve Global Privacy in Social Networks?
                  On Amplification of Privacy Preserving Data Aggregation},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {464--471},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.272},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.272},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GriningKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GurulianSFMAM17,
  author       = {Iakovos Gurulian and
                  Carlton Shepherd and
                  Eibe Frank and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  Keith Mayes},
  title        = {On the Effectiveness of Ambient Sensing for Detecting {NFC} Relay
                  Attacks},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {41--49},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.218},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.218},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GurulianSFMAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GwakSKL17,
  author       = {Bumjin Gwak and
                  Heesuk Son and
                  Jiyoon Kang and
                  Dongman Lee},
  title        = {IoT Trust Estimation in an Unknown Place Using the Opinions of I-Sharing
                  Friends},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {602--609},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.290},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.290},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GwakSKL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HamdiGBY17,
  author       = {Sana Hamdi and
                  Alda Lopes Gan{\c{c}}arski and
                  Amel Bouzeghoub and
                  Sadok Ben Yahia},
  title        = {A New Fuzzy Clustering Approach for Reputation Management in OSNs},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {586--593},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.288},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.288},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HamdiGBY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanHJSF17,
  author       = {Lansheng Han and
                  Shuxia Han and
                  Wenjing Jia and
                  Changhua Sun and
                  Cai Fu},
  title        = {Malware Discrimination Based on Reversed Association Task},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {120--127},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.228},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.228},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanHJSF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HenzeWMZW17,
  author       = {Martin Henze and
                  Benedikt Wolters and
                  Roman Matzutt and
                  Torsten Zimmermann and
                  Klaus Wehrle},
  title        = {Distributed Configuration, Authorization and Management in the Cloud-Based
                  Internet of Things},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {185--192},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.236},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.236},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HenzeWMZW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HoangD17,
  author       = {Doan Hoang and
                  Thanh Dat Dang},
  title        = {{FBRC:} Optimization of task Scheduling in Fog-Based Region and Cloud},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1109--1114},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.360},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.360},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HoangD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Horsch0W17,
  author       = {Julian Horsch and
                  Manuel Huber and
                  Sascha Wessel},
  title        = {TransCrypt: Transparent Main Memory Encryption Using a Minimal {ARM}
                  Hypervisor},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {152--161},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.232},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.232},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Horsch0W17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuMSSCL17,
  author       = {Chen Hu and
                  Jiaxin Miao and
                  Zhuo Su and
                  Xiaohong Shi and
                  Qiang Chen and
                  Xiaonan Luo},
  title        = {Precision-Enhanced Image Attribute Prediction Model},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {866--872},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.324},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.324},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuMSSCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ImineLB17,
  author       = {Youcef Imine and
                  Ahmed Lounis and
                  Abdelmadjid Bouabdallah},
  title        = {Immediate Attribute Revocation in Decentralized Attribute-Based Encryption
                  Access Control},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {33--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.217},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.217},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ImineLB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/IshibashiYY17,
  author       = {Kota Ishibashi and
                  Myungryun Yoo and
                  Takanori Yokoyama},
  title        = {A Real-Time Operating System with CAN-Based Inter-Node Shared Resource
                  Management and Distributed Shared Memory},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {798--805},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.315},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.315},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/IshibashiYY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JacobsCKL17,
  author       = {Daniel Jacobs and
                  Kim{-}Kwang Raymond Choo and
                  M. Tahar Kechadi and
                  Nhien{-}An Le{-}Khac},
  title        = {Volkswagen Car Entertainment System Forensics},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {699--705},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.302},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.302},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JacobsCKL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Jahan0SSJ17,
  author       = {Mosarrat Jahan and
                  Partha Sarathi Roy and
                  Kouichi Sakurai and
                  Aruna Seneviratne and
                  Sanjay Jha},
  title        = {Secure and Light Weight Fine-grained Access Mechanism for Outsourced
                  Data},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {201--209},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.238},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.238},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Jahan0SSJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JainBLGM17,
  author       = {Vineeta Jain and
                  Shweta Bhandari and
                  Vijay Laxmi and
                  Manoj Singh Gaur and
                  Mohamed Mosbah},
  title        = {SniffDroid: Detection of Inter-App Privacy Leaks in Android},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {331--338},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.255},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.255},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JainBLGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JavedTC17,
  author       = {Ibrahim Tariq Javed and
                  Khalifa Toumi and
                  No{\"{e}}l Crespi},
  title        = {ProtectCall: Call Protection Based on User Reputation},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {660--667},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.297},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.297},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JavedTC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiC17,
  author       = {Shiyu Ji and
                  Tingting Chen},
  title        = {On Designing Collusion-Resistant Incentive Mechanisms for Mobile Crowdsensing
                  Systems},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {162--169},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.233},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.233},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiangLZZ17,
  author       = {Liying Jiang and
                  Jiafeng Li and
                  Li Zhuo and
                  Ziqi Zhu},
  title        = {Robust Vehicle Classification Based on the Combination of Deep Features
                  and Handcrafted Features},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {859--865},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.323},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.323},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiangLZZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JinVT17,
  author       = {Fan Jin and
                  Vijay Varadharajan and
                  Udaya Kiran Tupakula},
  title        = {An Eclat Algorithm Based Energy Detection for Cognitive Radio Networks},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1096--1102},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.358},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.358},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JinVT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KarapetyanAA17,
  author       = {Areg Karapetyan and
                  Syafiq Kamarul Azman and
                  Zeyar Aung},
  title        = {Assessing the Privacy Cost in Centralized Event-Based Demand Response
                  for Microgrids},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {494--501},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.276},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.276},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KarapetyanAA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KulykRGVVM17,
  author       = {Oksana Kulyk and
                  Benjamin Maximilian Reinheimer and
                  Paul Gerber and
                  Florian Volk and
                  Melanie Volkamer and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {Advancing Trust Visualisations for Wider Applicability and User Acceptance},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {562--569},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.285},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.285},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KulykRGVVM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LeemaqzLM17,
  author       = {Kaleb L. Leemaqz and
                  Sharon X. Lee and
                  Geoffrey J. McLachlan},
  title        = {Corruption-Resistant Privacy Preserving Distributed {EM} Algorithm
                  for Model-Based Clustering},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1082--1089},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.356},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.356},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LeemaqzLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LengZ17,
  author       = {Lihua Leng and
                  Jeffery Zheng},
  title        = {Mapping {ECG} Signal Sequences on Variant Maps},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {881--884},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.326},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.326},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LengZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LenzA17,
  author       = {Thomas Lenz and
                  Lukas Alber},
  title        = {Towards Cross-Domain eID by Using Agile Mobile Authentication},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {570--577},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.286},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.286},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LenzA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiCHZZX17,
  author       = {Jin Li and
                  Jinfu Chen and
                  Minhuan Huang and
                  Minmin Zhou and
                  Lin Zhang and
                  Wanggen Xie},
  title        = {An Integration Testing Platform for Software Vulnerability Detection
                  Method},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {984--989},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.341},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.341},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiCHZZX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiJWYZ17,
  author       = {Ye Li and
                  Zoe Lin Jiang and
                  Xuan Wang and
                  Siu{-}Ming Yiu and
                  Peng Zhang},
  title        = {Outsourcing Privacy Preserving {ID3} Decision Tree Algorithm over
                  Encrypted Data-sets for Two-Parties},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1070--1075},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.354},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.354},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiJWYZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiLYLWL17,
  author       = {Min Li and
                  Yunzheng Liu and
                  Min Yu and
                  Gang Li and
                  Yongjian Wang and
                  Chao Liu},
  title        = {{FEPDF:} {A} Robust Feature Extractor for Malicious {PDF} Detection},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {218--224},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.240},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.240},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiLYLWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiMWZZZ17,
  author       = {Zengpeng Li and
                  Chunguang Ma and
                  Ding Wang and
                  Minghao Zhao and
                  Qian Zhao and
                  Lu Zhou},
  title        = {Toward Proxy Re-encryption From Learning with Errors in the Exponent},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {683--690},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.300},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.300},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiMWZZZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiTJNHH17,
  author       = {Qingru Li and
                  Zhiyuan Tan and
                  Aruna Jamdagni and
                  Priyadarsi Nanda and
                  Xiangjian He and
                  Wei Han},
  title        = {An Intrusion Detection System Based on Polynomial Feature Correlation
                  Analysis},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {978--983},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.340},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.340},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiTJNHH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiZ17,
  author       = {Ming Li and
                  Qin Zhou},
  title        = {Industrial Big Data Visualization: {A} Case Study Using Flight Data
                  Recordings to Discover the Factors Affecting the Airplane Fuel Efficiency},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {853--858},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.322},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.322},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuLZXCP17,
  author       = {Jingkun Liu and
                  Shuhao Li and
                  Yongzheng Zhang and
                  Jun Xiao and
                  Peng Chang and
                  Chengwei Peng},
  title        = {Detecting {DNS} Tunnel through Binary-Classification Based on Behavior
                  Features},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {339--346},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.256},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.256},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuLZXCP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuZY17,
  author       = {Yao Liu and
                  Qingkai Zeng and
                  Pinghai Yuan},
  title        = {NodeLeaper: Lower Overhead Oblivious {AVL} Tree},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {487--493},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.275},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.275},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuZY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuZYPPR17,
  author       = {Meng Liu and
                  Xuyun Zhang and
                  Chi Yang and
                  Shaoning Pang and
                  Deepak Puthal and
                  Kaijun Ren},
  title        = {Privacy-Preserving Detection of Statically Mutually Exclusive Roles
                  Constraints Violation in Interoperable Role-Based Access Control},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {502--509},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.277},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.277},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuZYPPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuQZLZL17,
  author       = {Qian Lu and
                  Haipeng Qu and
                  Yuan Zhuang and
                  Xi Jun Lin and
                  Yanyong Zhu and
                  Yunzheng Liu},
  title        = {A Passive Client-based Approach to Detect Evil Twin Attacks},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {233--239},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.242},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.242},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuQZLZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuoWL17,
  author       = {Entao Luo and
                  Guojun Wang and
                  Qin Liu},
  title        = {Pseudo Anonymous and Hidden Attribute Comparison Based on Quick Friend
                  Matching in Mobile Social Networks},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {58--64},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.220},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.220},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuoWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuoZS017,
  author       = {Changqing Luo and
                  Kaijin Zhang and
                  Sergio Salinas and
                  Pan Li},
  title        = {Efficient Privacy-Preserving Outsourcing of Large-Scale {QR} Factorization},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {917--924},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.331},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.331},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuoZS017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LyuLJP17,
  author       = {Lingjuan Lyu and
                  Yee Wei Law and
                  Jiong Jin and
                  Marimuthu Palaniswami},
  title        = {Privacy-Preserving Aggregation of Smart Metering via Transformation
                  and Encryption},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {472--479},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.273},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.273},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LyuLJP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaXLYLY17,
  author       = {Rong Ma and
                  Jinbo Xiong and
                  Mingwei Lin and
                  Zhiqiang Yao and
                  Hui Lin and
                  Ayong Ye},
  title        = {Privacy Protection-Oriented Mobile Crowdsensing Analysis Based on
                  Game Theory},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {990--995},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.342},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.342},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaXLYLY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MahajanP17,
  author       = {Varun Mahajan and
                  Sateesh K. Peddoju},
  title        = {Deployment of Intrusion Detection System in Cloud: {A} Performance-Based
                  Study},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1103--1108},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.359},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.359},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MahajanP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MahriSBDW17,
  author       = {Hassan Qahur Al Mahri and
                  Leonie Simpson and
                  Harry Bartlett and
                  Ed Dawson and
                  Kenneth Koon{-}Ho Wong},
  title        = {A Fault-based Attack on {AEZ} v4.2},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {634--641},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.294},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.294},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MahriSBDW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MarraMMS17,
  author       = {Antonio La Marra and
                  Fabio Martinelli and
                  Paolo Mori and
                  Andrea Saracino},
  title        = {Implementing Usage Control in Internet of Things: {A} Smart Home Use
                  Case},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1056--1063},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.352},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.352},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MarraMMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaurerNF17,
  author       = {Felix Konstantin Maurer and
                  Till Neudecker and
                  Martin Florian},
  title        = {Anonymous CoinJoin Transactions with Arbitrary Values},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {522--529},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.280},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.280},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaurerNF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/McDonaldMGAG17,
  author       = {Jeffrey Todd McDonald and
                  Ramya Manikyam and
                  William Bradley Glisson and
                  Todd R. Andel and
                  Yuan Xiang Gu},
  title        = {Enhanced Operating System Protection to Support Digital Forensic Investigations},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {650--659},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.296},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.296},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/McDonaldMGAG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MedjekTRD17,
  author       = {Faiza Medjek and
                  Djamel Tandjaoui and
                  Imed Romdhani and
                  Nabil Djedjig},
  title        = {Performance Evaluation of {RPL} Protocol under Mobile Sybil Attacks},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1049--1055},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.351},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.351},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MedjekTRD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MeerCKL17,
  author       = {Wybren van der Meer and
                  Kim{-}Kwang Raymond Choo and
                  M. Tahar Kechadi and
                  Nhien{-}An Le{-}Khac},
  title        = {Investigation and Automating Extraction of Thumbnails Produced by
                  Image Viewers},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1076--1081},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.355},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.355},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MeerCKL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MessaiS17,
  author       = {Mohamed{-}Lamine Messai and
                  Hamida Seba},
  title        = {A Self-healing Key Pre-distribution Scheme for Multi-phase Wireless
                  Sensor Networks},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {144--151},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.231},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.231},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MessaiS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MimotoKTM17,
  author       = {Tomoaki Mimoto and
                  Shinsaku Kiyomoto and
                  Katsuya Tanaka and
                  Atsuko Miyaji},
  title        = {(p, N)-identifiability: Anonymity under Practical Adversaries},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {996--1003},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.343},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.343},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MimotoKTM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MiquiliniRQMB17,
  author       = {Patricia Miquilini and
                  Rafael Geraldeli Rossi and
                  Marcos G. Quiles and
                  Vin{\'{\i}}cius Veloso de Melo and
                  M{\'{a}}rcio P. Basgalupp},
  title        = {Automatically Design Distance Functions for Graph-Based Semi-Supervised
                  Learning},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {933--940},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.333},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.333},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MiquiliniRQMB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MoL17,
  author       = {Yifeng Mo and
                  Shuguo Li},
  title        = {Base Extent Optimization for {RNS} Montgomery Algorithm},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1004--1009},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.344},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.344},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MoL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ModiLNG17,
  author       = {Garima Modi and
                  Vijay Laxmi and
                  Smita Naval and
                  Manoj Singh Gaur},
  title        = {Improving Leakage Path Coverage in Android Apps},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {355--362},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.258},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.258},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ModiLNG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MrabetSS17,
  author       = {Manel Mrabet and
                  Yosra Ben Saied and
                  Le{\"{\i}}la Azouz Sa{\"{\i}}dane},
  title        = {Feedback Entropy: {A} New Metric to Detect Unfair Rating Attacks for
                  Trust Computing in Cloud Environments},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {538--545},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.282},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.282},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MrabetSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NS17,
  author       = {N. Karthik and
                  Ananthanarayana V. S.},
  title        = {Sensor Data Modeling for Data Trustworthiness},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {909--916},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.330},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.330},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NandaNHJP17,
  author       = {Ashish Nanda and
                  Priyadarsi Nanda and
                  Xiangjian He and
                  Aruna Jamdagni and
                  Deepak Puthal},
  title        = {Secure-GLOR: An Adaptive Secure Routing Protocol for Dynamic Wireless
                  Mesh Networks},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {269--276},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.247},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.247},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NandaNHJP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NguyenH17,
  author       = {Th{\^{o}}ng T. Nguy{\^{e}}n and
                  Siu Cheung Hui},
  title        = {Privacy-Preserving Mechanisms for Parametric Survival Analysis with
                  Weibull Distribution},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {456--463},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.271},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.271},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NguyenH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NietoRL17,
  author       = {Ana Nieto and
                  Ruben Rios and
                  Javier L{\'{o}}pez},
  title        = {A Methodology for Privacy-Aware IoT-Forensics},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {626--633},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.293},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.293},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NietoRL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NietoRL17a,
  author       = {Ana Nieto and
                  Ruben Rios and
                  Javier L{\'{o}}pez},
  title        = {Digital Witness and Privacy in IoT: Anonymous Witnessing Approach},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {642--649},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.295},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.295},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NietoRL17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NomaguchiMS17,
  author       = {Hiroshi Nomaguchi and
                  Atsuko Miyaji and
                  Chunhua Su},
  title        = {Evaluation and Improvement of Pseudo-Random Number Generator for {EPC}
                  Gen2},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {721--728},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.305},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.305},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/NomaguchiMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PanCT17,
  author       = {Wubin Pan and
                  Guang Cheng and
                  Yongning Tang},
  title        = {{WENC:} {HTTPS} Encrypted Traffic Classification Using Weighted Ensemble
                  Learning and Markov Chain},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {50--57},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.219},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.219},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PanCT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PengY0LX17,
  author       = {Chengwei Peng and
                  Xiaochun Yun and
                  Yongzheng Zhang and
                  Shuhao Li and
                  Jun Xiao},
  title        = {Discovering Malicious Domains through Alias-Canonical Graph},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {225--232},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.241},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.241},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PengY0LX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QiangXSZJ17,
  author       = {Weizhong Qiang and
                  Gongping Xu and
                  Guozhong Sun and
                  Tianqing Zhu and
                  Hai Jin},
  title        = {CloudController: {A} Writable and Heterogeneous-Adaptive Virtual Machine
                  Introspection for Cloud Management},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {177--184},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.235},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.235},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/QiangXSZJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QiuSLLW17,
  author       = {Yuqin Qiu and
                  Qingni Shen and
                  Yang Luo and
                  Cong Li and
                  Zhonghai Wu},
  title        = {A Secure Virtual Machine Deployment Strategy to Reduce Co-residency
                  in Cloud},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {347--354},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.257},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.257},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/QiuSLLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RafiqueLRJ17,
  author       = {Ansar Rafique and
                  Dimitri Van Landuyt and
                  Vincent Reniers and
                  Wouter Joosen},
  title        = {Leveraging NoSQL for Scalable and Dynamic Data Encryption in Multi-tenant
                  SaaS},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {885--892},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.327},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.327},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RafiqueLRJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RaniKH17,
  author       = {Sapana Rani and
                  Dileep Kumar Koshley and
                  Raju Halder},
  title        = {Adapting MapReduce for Efficient Watermarking of Large Relational
                  Dataset},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {729--736},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.306},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.306},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RaniKH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RathnayakaJ17,
  author       = {Chathuranga Rathnayaka and
                  Aruna Jamdagni},
  title        = {An Efficient Approach for Advanced Malware Analysis Using Memory Forensic
                  Technique},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1145--1150},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.365},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.365},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RathnayakaJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RayR17,
  author       = {Indranil Ghosh Ray and
                  Muttukrishnan Rajarajan},
  title        = {A Public Key Encryption Scheme for String Identification},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {104--111},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.226},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.226},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RayR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RezaeibaghaM17,
  author       = {Fatemeh Rezaeibagha and
                  Yi Mu},
  title        = {Access Control Policy Combination from Similarity Analysis for Secure
                  Privacy-Preserved {EHR} Systems},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {386--393},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.262},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.262},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RezaeibaghaM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RoohiT17,
  author       = {Leyla Roohi and
                  Vanessa Teague},
  title        = {Privacy-Preserving Queries over Secret-Shared Graph-Structured Data},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {955--960},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.336},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.336},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RoohiT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RoselinNN17,
  author       = {Annie Gilda Roselin and
                  Priyadarsi Nanda and
                  Surya Nepal},
  title        = {Lightweight Authentication Protocol {(LAUP)} for 6LoWPAN Wireless
                  Sensor Networks},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {371--378},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.260},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.260},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RoselinNN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SalamSBDPW17,
  author       = {Md. Iftekhar Salam and
                  Leonie Simpson and
                  Harry Bartlett and
                  Ed Dawson and
                  Josef Pieprzyk and
                  Kenneth Koon{-}Ho Wong},
  title        = {Investigating Cube Attacks on the Authenticated Encryption Stream
                  Cipher {MORUS}},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {961--966},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.337},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.337},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SalamSBDPW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SantraPB017,
  author       = {Monika Santra and
                  Sateesh K. Peddoju and
                  A. K. Bhattacharjee and
                  Arindam Khan},
  title        = {Design and Analysis of a Modified Remote Attestation Protocol},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {578--585},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.287},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.287},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SantraPB017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SchutteKT17,
  author       = {Julian Sch{\"{u}}tte and
                  Alexander K{\"{u}}chler and
                  Dennis Titze},
  title        = {Practical Application-Level Dynamic Taint Analysis of Android Apps},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {17--24},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.215},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.215},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SchutteKT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShalaWTLGS17,
  author       = {Besfort Shala and
                  Patrick Wacht and
                  Ulrich Trick and
                  Armin Lehmann and
                  Bogdan V. Ghita and
                  Stavros Shiaeles},
  title        = {Trust Integration for Security Optimisation in P2P-Based {M2M} Applications},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {949--954},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.335},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.335},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShalaWTLGS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShaoL17,
  author       = {Cuiping Shao and
                  Huiyun Li},
  title        = {Detection of Single Event Transients Based on Compressed Sensing},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {83--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.223},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.223},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShaoL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShawA17,
  author       = {Adrian L. Shaw and
                  Hamza Attak},
  title        = {Exploring Granular flow Integrity for Interconnected Trusted Platforms},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {594--601},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.289},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.289},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShawA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShuteKC17,
  author       = {Sam Shute and
                  Ryan K. L. Ko and
                  Sivadon Chaisiri},
  title        = {Attribution Using Keyboard Row Based Behavioural Biometrics for Handedness
                  Recognition},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1131--1138},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.363},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.363},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShuteKC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Smith-CreaseyR17,
  author       = {Max Smith{-}Creasey and
                  Muttukrishnan Rajarajan},
  title        = {Adaptive Threshold Scheme for Touchscreen Gesture Continuous Authentication
                  Using Sensor Trust},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {554--561},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.284},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.284},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Smith-CreaseyR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SousaLB17,
  author       = {Arua De M. Sousa and
                  Ana Carolina Lorena and
                  M{\'{a}}rcio P. Basgalupp},
  title        = {{GEEK:} Grammatical Evolution for Automatically Evolving Kernel Functions},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {941--948},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.334},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.334},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SousaLB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunX17,
  author       = {Da{-}Zhi Sun and
                  Guangquan Xu},
  title        = {One-Round Provably Secure Yoking-Proof for {RFID} Applications},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {315--322},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.253},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.253},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunYSW17,
  author       = {Degang Sun and
                  Kun Yang and
                  Zhixin Shi and
                  Yan Wang},
  title        = {A Distinction Method of Flooding DDoS and Flash Crowds Based on User
                  Traffic Behavior},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {65--72},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.221},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.221},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunYSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TahirRR17,
  author       = {Shahzaib Tahir and
                  Sushmita Ruj and
                  Muttukrishnan Rajarajan},
  title        = {An Efficient Disjunctive Query Enabled Ranked Searchable Encryption
                  Scheme},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {425--432},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.267},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.267},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TahirRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TangHG17,
  author       = {Haina Tang and
                  Chunjing Han and
                  Jingguo Ge},
  title        = {Applications of Visualization Technology for Network Security},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1038--1042},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.349},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.349},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TangHG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TangKWXGCFLW17,
  author       = {Zhanyong Tang and
                  Kaiyuan Kuang and
                  Lei Wang and
                  Chao Xue and
                  Xiaoqing Gong and
                  Xiaojiang Chen and
                  Dingyi Fang and
                  Jie Liu and
                  Zheng Wang},
  title        = {{SEEAD:} {A} Semantic-Based Approach for Automatic Binary Code De-obfuscation},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {261--268},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.246},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.246},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TangKWXGCFLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TangLHZG17,
  author       = {Junwei Tang and
                  Ruixuan Li and
                  Hongmu Han and
                  Heng Zhang and
                  Xiwu Gu},
  title        = {Detecting Permission Over-claim of Android Applications with Static
                  and Semantic Analysis Approach},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {706--713},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.303},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.303},
  timestamp    = {Tue, 06 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TangLHZG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ThaoYMUSK17,
  author       = {Tran Phuong Thao and
                  Akira Yamada and
                  Kosuke Murakami and
                  Jumpei Urakawa and
                  Yukiko Sawaya and
                  Ayumu Kubota},
  title        = {Classification of Landing and Distribution Domains Using Whois' Text
                  Mining},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.213},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.213},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ThaoYMUSK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TithiWG17,
  author       = {Tasnuva Tithi and
                  Chris Winstead and
                  Ryan M. Gerdes},
  title        = {Viability of Using Shadows Cast by Vehicles for Position Verification
                  in Vehicle Platooning},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {210--217},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.239},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.239},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TithiWG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TitzeLS17,
  author       = {Dennis Titze and
                  Michael Lux and
                  Julian Sch{\"{u}}tte},
  title        = {Ordol: Obfuscation-Resilient Detection of Libraries in Android Applications},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {618--625},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.292},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.292},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TitzeLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Touati17,
  author       = {Lyes Touati},
  title        = {Grouping-Proofs Based Access Control Using {KP-ABE} for IoT Applications},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {301--308},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.251},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.251},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Touati17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TouatiC17,
  author       = {Lyes Touati and
                  Yacine Challal},
  title        = {Mediator-Based Immediate Attribute Revocation Mechanism for {CP-ABE}
                  in Multicast Group Communications},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {309--314},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.252},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.252},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TouatiC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TrigueroFMGJ17,
  author       = {Isaac Triguero and
                  Grazziela P. Figueredo and
                  Mohammad Mesgarpour and
                  Jonathan M. Garibaldi and
                  Robert I. John},
  title        = {Vehicle Incident Hot Spots Identification: An Approach for Big Data},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {901--908},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.329},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.329},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TrigueroFMGJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/UmairNH17,
  author       = {Amber Umair and
                  Priyadarsi Nanda and
                  Xiangjian He},
  title        = {Online Social Network Information Forensics: {A} Survey on Use of
                  Various Tools and Determining How Cautious Facebook Users are?},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1139--1144},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.364},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.364},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/UmairNH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangCWW17,
  author       = {Lei Wang and
                  Shoufeng Cao and
                  Lin Wan and
                  Fengyu Wang},
  title        = {Web Anomaly Detection Based on Frequent Closed Episode Rules},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {967--972},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.338},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.338},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangCWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangZ17,
  author       = {Xin Wang and
                  Wei Zhang},
  title        = {{GPU} Register Packing: Dynamically Exploiting Narrow-Width Operands
                  to Improve Performance},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {745--752},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.308},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.308},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangZ17a,
  author       = {Xin Wang and
                  Wei Zhang},
  title        = {A Sample-Based Dynamic {CPU} and {GPU} {LLC} Bypassing Method for
                  Heterogeneous {CPU-GPU} Architectures},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {753--760},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.309},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.309},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangZ17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangZLZD17,
  author       = {Taochun Wang and
                  Ji Zhang and
                  Yonglong Luo and
                  Kaizhong Zuo and
                  Xintao Ding},
  title        = {An Efficient and Secure Itinerary-Based Data Aggregation Algorithm
                  for WSNs},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {433--440},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.268},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.268},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangZLZD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WeidlerBMAWCKWW17,
  author       = {Nathanael R. Weidler and
                  Dane Brown and
                  Samuel A. Mitchell and
                  Joel Anderson and
                  Jonathan R. Williams and
                  Austin Costley and
                  Chase Kunz and
                  Christopher Wilkinson and
                  Remy Wehbe and
                  Ryan M. Gerdes},
  title        = {Return-Oriented Programming on a Cortex-M Processor},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {823--832},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.318},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.318},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WeidlerBMAWCKWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WillK17,
  author       = {Mark A. Will and
                  Ryan K. L. Ko},
  title        = {Secure {FPGA} as a Service - Towards Secure Data Processing by Physicalizing
                  the Cloud},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {449--455},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.270},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.270},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WillK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WillKS17,
  author       = {Mark A. Will and
                  Ryan K. L. Ko and
                  Silvino J. Schlickmann},
  title        = {Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1024--1031},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.347},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.347},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WillKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaZZ0LH17,
  author       = {Haiying Xia and
                  Wenxian Zhao and
                  Zheng Zhou and
                  Frank Jiang and
                  Hai{-}Sheng Li and
                  Xiangjian He},
  title        = {Deformable Template Matching Using Proposal-Based Best-Buddies Similarity},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {517--521},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.279},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.279},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaZZ0LH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiangLLZLRL17,
  author       = {Chaoneng Xiang and
                  Duo Liu and
                  Shiming Li and
                  Xiao Zhu and
                  Yang Li and
                  Jinting Ren and
                  Liang Liang},
  title        = {HiNextApp: {A} Context-Aware and Adaptive Framework for App Prediction
                  in Mobile Systems},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {776--783},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.312},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.312},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiangLLZLRL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XingWWTL17,
  author       = {Qianqian Xing and
                  Baosheng Wang and
                  Xiaofeng Wang and
                  Jing Tao and
                  Liu Liu},
  title        = {A Practical Anti-Collusion Hierarchical Identity-Based Non-interactive
                  Key Agreement for Wireless Networks},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {89--95},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.224},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.224},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XingWWTL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuY0SC17,
  author       = {Jian Xu and
                  Xiaochun Yun and
                  Yongzheng Zhang and
                  Yafei Sang and
                  Zhenyu Cheng},
  title        = {NetworkTrace: Probabilistic Relevant Pattern Recognition Approach
                  to Attribution Trace Analysis},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {691--698},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.301},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.301},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuY0SC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YalewMHC17,
  author       = {Sileshi Demesie Yalew and
                  Gerald Q. Maguire Jr. and
                  Seif Haridi and
                  Miguel Correia},
  title        = {T2Droid: {A} TrustZone-Based Dynamic Analyser for Android Applications},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {240--247},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.243},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.243},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YalewMHC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YamamotoHIOTA17,
  author       = {Takuro Yamamoto and
                  Takuma Hara and
                  Takuya Ishikawa and
                  Hiroshi Oyama and
                  Hiroaki Takada and
                  Takuya Azumi},
  title        = {{TINET+TECS:} Component-Based {TCP/IP} Protocol Stack for Embedded
                  Systems},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {784--791},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.313},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.313},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YamamotoHIOTA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangZMXZ17,
  author       = {Mengmeng Yang and
                  Tianqing Zhu and
                  Lichuan Ma and
                  Yang Xiang and
                  Wanlei Zhou},
  title        = {Privacy Preserving Collaborative Filtering via the Johnson-Lindenstrauss
                  Transform},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {417--424},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.266},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.266},
  timestamp    = {Mon, 26 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangZMXZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YeLXLL17,
  author       = {Ayong Ye and
                  Yacheng Li and
                  Li Xu and
                  Qing Li and
                  Hui Lin},
  title        = {A Trajectory Privacy-Preserving Algorithm Based on Road Networks in
                  Continuous Location-Based Services},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {510--516},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.278},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.278},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YeLXLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuRC17,
  author       = {Jiangshan Yu and
                  Mark Ryan and
                  Liqun Chen},
  title        = {Authenticating Compromisable Storage Systems},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {25--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.216},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.216},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuRC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YusufGHAK17,
  author       = {Simon Yusuf Enoch and
                  Mengmeng Ge and
                  Jin B. Hong and
                  Hani Alzaid and
                  Dong Seong Kim},
  title        = {Evaluating the Effectiveness of Security Metrics for Dynamic Networks},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {277--284},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.248},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.248},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YusufGHAK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZengCLLLW17,
  author       = {Juru Zeng and
                  Hong Chen and
                  Weiling Lai and
                  Ying Liu and
                  Cuiping Li and
                  Shan Wang},
  title        = {Privacy-Preserving and Collusion-aware k-NN Query Processing in Two-tiered
                  Sensor Networks},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {480--486},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.274},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.274},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZengCLLLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhanZGMZ17,
  author       = {Yantong Zhan and
                  Guoying Zhang and
                  Yu Guo and
                  Hang Meng and
                  Xuejun Zhao},
  title        = {Particle Size Measurement Based on Image Multivariate Multiscale Entropy},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {973--977},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.339},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.339},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhanZGMZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangGWXZ17,
  author       = {Ying Zhang and
                  Zhishan Guo and
                  Lingxiang Wang and
                  Haoyi Xiong and
                  Zhenkai Zhang},
  title        = {Integrating Cache-Related Preemption Delay into {GEDF} Analysis for
                  Multiprocessor Scheduling with On-chip Cache},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {815--822},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.317},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.317},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangGWXZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangHYYLJ17,
  author       = {Ruoqing Zhang and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Xiaoqi Yu and
                  Zechao Liu and
                  Zoe Lin Jiang},
  title        = {A Traceable Outsourcing {CP-ABE} Scheme with Attribute Revocation},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {363--370},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.259},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.259},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangHYYLJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangHZSQL17,
  author       = {Minjian Zhang and
                  Jianwei Hou and
                  Ziqi Zhang and
                  Wenchang Shi and
                  Bo Qin and
                  Bin Liang},
  title        = {Fine-Grained Fingerprinting Threats to Software-Defined Networks},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {128--135},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.229},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.229},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangHZSQL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLXS17,
  author       = {Yan Zhang and
                  Lejian Liao and
                  Chang Xu and
                  Licheng Shi},
  title        = {Situation Semantics Aggregator for Realtime Simulation on Organizational
                  Behaviors},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {714--720},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.304},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.304},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLXS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLZCZ17,
  author       = {Wei Zhang and
                  Dongdai Lin and
                  Hailong Zhang and
                  Cong Chen and
                  Xiaojun Zhou},
  title        = {A Lightweight Anonymous Mutual Authentication with Key Agreement Protocol
                  on {ECC}},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {170--176},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.234},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.234},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLZCZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangRHWYJ17,
  author       = {Yunan Zhang and
                  Chenghao Rong and
                  Qingjia Huang and
                  Yang Wu and
                  Zeming Yang and
                  Jianguo Jiang},
  title        = {Based on Multi-features and Clustering Ensemble Method for Automatic
                  Malware Categorization},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {73--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.222},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.222},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangRHWYJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangWL17,
  author       = {Shaobo Zhang and
                  Guojun Wang and
                  Qin Liu},
  title        = {A Dual Privacy Preserving Scheme in Continuous Location-Based Services},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {402--408},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.264},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.264},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangX17,
  author       = {Shaofeng Zhang and
                  Xi Xiao},
  title        = {CSCdroid: Accurately Detect Android Malware via Contribution-Level-Based
                  System Call Categorization},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {193--200},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.237},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.237},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangZSLYJ17,
  author       = {Peng Zhang and
                  Xiafei Zhang and
                  Xiaoqiang Sun and
                  Joseph K. Liu and
                  Jianping Yu and
                  Zoe Lin Jiang},
  title        = {Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks
                  Analytics},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {668--674},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.298},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.298},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangZSLYJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Zhao0C17,
  author       = {Shuyuan Zhao and
                  Yongzheng Zhang and
                  Peng Chang},
  title        = {Network Traffic Classification Using Tri-training Based on Statistical
                  Flow Characteristics},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {323--330},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.254},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.254},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Zhao0C17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaoMZJRX17,
  author       = {Rui Zhao and
                  Zhao{-}Peng Meng and
                  Yan Zheng and
                  Qiangguo Jin and
                  Anbang Ruan and
                  Hanglun Xie},
  title        = {{SOMR:} Towards a Security-Oriented MapReduce Infrastructure},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {530--537},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.281},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.281},
  timestamp    = {Mon, 03 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhaoMZJRX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhengPCPB17,
  author       = {Xi Zheng and
                  Lei Pan and
                  Hongxu Chen and
                  Rick Di Pietro and
                  Lynn Batten},
  title        = {A Testbed for Security Analysis of Modern Vehicle Systems},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1090--1095},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.357},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.357},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhengPCPB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZicariITG17,
  author       = {Paolo Zicari and
                  Roberto Interdonato and
                  Andrea Tagarelli and
                  Sergio Greco},
  title        = {Controversy-Aware Hybrid Trust Inference in Online Social Networks},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {610--617},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.291},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.291},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZicariITG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZuoSLLW17,
  author       = {Cong Zuo and
                  Jun Shao and
                  Zhe Liu and
                  Yun Ling and
                  Guiyi Wei},
  title        = {Hidden-Token Searchable Public-Key Encryption},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {248--254},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.244},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.244},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZuoSLLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustcom/2017,
  title        = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8027145/proceeding},
  isbn         = {978-1-5090-4906-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0007YB16,
  author       = {Guoqiang Li and
                  Bian Yang and
                  Christoph Busch},
  title        = {A Fingerprint Indexing Algorithm on Encrypted Domain},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1030--1037},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0172},
  doi          = {10.1109/TRUSTCOM.2016.0172},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/0007YB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AbduljabbarJIHH16,
  author       = {Zaid Ameen Abduljabbar and
                  Hai Jin and
                  Ayad Ibrahim and
                  Zaid Alaa Hussien and
                  Mohammed Abdulridha Hussain and
                  Salah H. Abbdal and
                  Deqing Zou},
  title        = {Privacy-Preserving Image Retrieval in IoT-Cloud},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {799--806},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0141},
  doi          = {10.1109/TRUSTCOM.2016.0141},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AbduljabbarJIHH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AbegundeXS16,
  author       = {Jacob Abegunde and
                  Hannan Xiao and
                  Joseph Spring},
  title        = {A Dynamic Game with Adaptive Strategies for {IEEE} 802.15.4 and IoT},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {473--480},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0099},
  doi          = {10.1109/TRUSTCOM.2016.0099},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AbegundeXS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AhamedSJ16,
  author       = {Farhad Ahamed and
                  Seyed A. Shahrestani and
                  Bahman Javadi},
  title        = {Security Aware and Energy-Efficient Virtual Machine Consolidation
                  in Cloud Computing Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1516--1523},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0236},
  doi          = {10.1109/TRUSTCOM.2016.0236},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AhamedSJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AhmedKKA16,
  author       = {Idrees Ahmed and
                  Abid Khan and
                  Muhammad Saleem Khan and
                  Mansoor Ahmed},
  title        = {Aggregated Signatures for Chaining: {A} Secure Provenance Scheme},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2012--2017},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0307},
  doi          = {10.1109/TRUSTCOM.2016.0307},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AhmedKKA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AkramBCMS16,
  author       = {Raja Naeem Akram and
                  Pierre{-}Fran{\c{c}}ois Bonnefoi and
                  Serge Chaumette and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure
                  Elements},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {606--614},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0116},
  doi          = {10.1109/TRUSTCOM.2016.0116},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AkramBCMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Atoofian16,
  author       = {Ehsan Atoofian},
  title        = {Temperature-Aware Register Mapping in GPGPUs},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1636--1643},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0252},
  doi          = {10.1109/TRUSTCOM.2016.0252},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Atoofian16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AzabAA16,
  author       = {Ahmad Azab and
                  Mamoun Alazab and
                  Mahdi Aiash},
  title        = {Machine Learning Based Botnet Identification Traffic},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1788--1794},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0275},
  doi          = {10.1109/TRUSTCOM.2016.0275},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AzabAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BasuKV016,
  author       = {Anirban Basu and
                  Shinsaku Kiyomoto and
                  Jaideep Vaidya and
                  Stephen Marsh},
  title        = {PrefRank: Quantification and Aggregation of Subjective User Preferences},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {7--13},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0039},
  doi          = {10.1109/TRUSTCOM.2016.0039},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BasuKV016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BiPY16,
  author       = {Xiu{-}Li Bi and
                  Chi{-}Man Pun and
                  Xiaochen Yuan},
  title        = {Adaptive Polar Based Filtering Method for Image Copy-Move Forgery
                  Detection},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {952--956},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0161},
  doi          = {10.1109/TRUSTCOM.2016.0161},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BiPY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BlakemoreRC16,
  author       = {Christine Blakemore and
                  Jo{\~{a}}o Redol and
                  Miguel Correia},
  title        = {Fingerprinting for Web Applications: From Devices to Related Groups},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {144--151},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0057},
  doi          = {10.1109/TRUSTCOM.2016.0057},
  timestamp    = {Wed, 13 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BlakemoreRC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaoCZ16,
  author       = {Xiaoxiao Cao and
                  Bing Chen and
                  Yanchao Zhao},
  title        = {Wi-Wri: Fine-Grained Writing Recognition Using Wi-Fi Signals},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1366--1373},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0216},
  doi          = {10.1109/TRUSTCOM.2016.0216},
  timestamp    = {Tue, 05 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaoCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaoLW16,
  author       = {Zhenhai Cao and
                  Bo Lang and
                  Jinmiao Wang},
  title        = {An Efficient and Fine-Grained Access Control Scheme for Multidimensional
                  Data Aggregation in Smart Grid},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {362--369},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0085},
  doi          = {10.1109/TRUSTCOM.2016.0085},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaoLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaoQLS16,
  author       = {Yuan Cao and
                  Heng Qi and
                  Keqiu Li and
                  Milos Stojmenovic},
  title        = {Multiple Query-Independent Values Based Asymmetric Ranking for Approximate
                  Nearest Neighbor Search},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1628--1635},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0251},
  doi          = {10.1109/TRUSTCOM.2016.0251},
  timestamp    = {Tue, 04 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaoQLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaoSWL16,
  author       = {Liu Cao and
                  Yuqing Sun and
                  Shaoqing Wang and
                  Mingzhu Li},
  title        = {Detecting Malicious Behavior and Collusion for Online Rating System},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1046--1053},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0174},
  doi          = {10.1109/TRUSTCOM.2016.0174},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaoSWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaoWLCYPY16,
  author       = {Dong Cao and
                  Shanshan Wang and
                  Qun Li and
                  Zhenxiang Chen and
                  Qiben Yan and
                  Lizhi Peng and
                  Bo Yang},
  title        = {DroidCollector: {A} High Performance Framework for High Quality Android
                  Traffic Collection},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1753--1758},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0269},
  doi          = {10.1109/TRUSTCOM.2016.0269},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaoWLCYPY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChaisiriK16,
  author       = {Sivadon Chaisiri and
                  Ryan K. L. Ko},
  title        = {From Reactionary to Proactive Security: Context-Aware Security Policy
                  Management and Optimization under Uncertainty},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {535--543},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0107},
  doi          = {10.1109/TRUSTCOM.2016.0107},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChaisiriK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChakrabortyARM16,
  author       = {Nilesh Chakraborty and
                  S. Vijay Anand and
                  Gurpinder Singh Randhawa and
                  Samrat Mondal},
  title        = {On Designing Leakage-Resilient Vibration Based Authentication Techniques},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1875--1881},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0287},
  doi          = {10.1109/TRUSTCOM.2016.0287},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChakrabortyARM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChangZDL16,
  author       = {Xiaoshan Chang and
                  Zenghua Zhao and
                  Bingxue Diao and
                  Tao Li},
  title        = {Experimental Study of Disruption-Tolerant Transport Protocol for Mobile
                  Ad-Hoc Networks with Connection Diversity},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1613--1620},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0249},
  doi          = {10.1109/TRUSTCOM.2016.0249},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChangZDL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenCYSTG16,
  author       = {Yong Chen and
                  Chao Chen and
                  Yanlong Yin and
                  Xian{-}He Sun and
                  Rajeev Thakur and
                  William Gropp},
  title        = {Rethinking High Performance Computing System Architecture for Scientific
                  Big Data Applications},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1605--1612},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0248},
  doi          = {10.1109/TRUSTCOM.2016.0248},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenCYSTG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenCZZX16,
  author       = {Zhengyang Chen and
                  Renjie Chen and
                  Yu Zhang and
                  Jianzhong Zhang and
                  Jingdong Xu},
  title        = {A Statistical-Feature {ML} Approach to {IP} Traffic Classification
                  Based on {CUDA}},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2235--2239},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0344},
  doi          = {10.1109/TRUSTCOM.2016.0344},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenCZZX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenDYWL16,
  author       = {Changyuan Chen and
                  Ran Dai and
                  Tingting Yang and
                  Zuxin Wu and
                  Quan Li},
  title        = {The Design and Application of an Intelligentialized Monitoring System
                  for Mooring Safety},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2031--2034},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0310},
  doi          = {10.1109/TRUSTCOM.2016.0310},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenDYWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenLWH16,
  author       = {Chao Chen and
                  Kun{-}Yu Lin and
                  Chang{-}Dong Wang and
                  Dong Huang},
  title        = {{CSBD:} {A} Nonlinear Clustering Method Based on Cluster Shrinking
                  and Border Detection},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2240--2245},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0345},
  doi          = {10.1109/TRUSTCOM.2016.0345},
  timestamp    = {Tue, 07 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenLWH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenLZLZ16,
  author       = {Pei Chen and
                  Yaping Lin and
                  Wei Zhang and
                  Xiaoying Li and
                  Shiwen Zhang},
  title        = {Preserving Location and Content Privacy for Secure Ranked Queries
                  in Location Based Services},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {892--899},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0153},
  doi          = {10.1109/TRUSTCOM.2016.0153},
  timestamp    = {Tue, 19 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenLZLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenM16,
  author       = {Long Chen and
                  Yue Mao},
  title        = {Forensic Analysis of Email on Android Volatile Memory},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {945--951},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0160},
  doi          = {10.1109/TRUSTCOM.2016.0160},
  timestamp    = {Tue, 28 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenS16,
  author       = {Shu Chen and
                  Hong Shen},
  title        = {Semantic-Aware Dummy Selection for Location Privacy Preservation},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {752--759},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0135},
  doi          = {10.1109/TRUSTCOM.2016.0135},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenS16a,
  author       = {Houwu Chen and
                  Jiwu Shu},
  title        = {Sznajd2: {A} Community-Aware Opinion Dynamics Model},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1477--1484},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0231},
  doi          = {10.1109/TRUSTCOM.2016.0231},
  timestamp    = {Sat, 17 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenSC16,
  author       = {Yu Chen and
                  Yuliang Shi and
                  Li{-}zhen Cui},
  title        = {Model for Hiding Data Relationships Based on Chunk-Confusion in Cloud
                  Computing},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {837--844},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0146},
  doi          = {10.1109/TRUSTCOM.2016.0146},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenTWZG16,
  author       = {Shanshan Chen and
                  Xiaoxin Tang and
                  Hongwei Wang and
                  Han Zhao and
                  Minyi Guo},
  title        = {Towards Scalable and Reliable In-Memory Storage System: {A} Case Study
                  with Redis},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1660--1667},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0255},
  doi          = {10.1109/TRUSTCOM.2016.0255},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenTWZG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenYZZX16,
  author       = {Zhengyang Chen and
                  Bowen Yu and
                  Yu Zhang and
                  Jianzhong Zhang and
                  Jingdong Xu},
  title        = {Automatic Mobile Application Traffic Identification by Convolutional
                  Neural Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {301--307},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0077},
  doi          = {10.1109/TRUSTCOM.2016.0077},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenYZZX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenZXW16,
  author       = {Haibin Chen and
                  Lei Zhang and
                  Junyuan Xie and
                  Chongjun Wang},
  title        = {New Efficient Certificateless Blind Signature Scheme},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {349--353},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0083},
  doi          = {10.1109/TRUSTCOM.2016.0083},
  timestamp    = {Thu, 16 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenZXW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChengLMZZW16,
  author       = {Longwang Cheng and
                  Wei Li and
                  Dongtang Ma and
                  Li Zhou and
                  Chunsheng Zhu and
                  Jibo Wei},
  title        = {Towards an Effective Secret Key Generation Scheme for Imperfect Channel
                  State Information},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {915--920},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0156},
  doi          = {10.1109/TRUSTCOM.2016.0156},
  timestamp    = {Sat, 01 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChengLMZZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChengWMW16,
  author       = {Li Cheng and
                  Yijie Wang and
                  Xingkong Ma and
                  Yongjun Wang},
  title        = {{GSLAC:} {A} General Scalable and Low-Overhead Alert Correlation Method},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {316--323},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0079},
  doi          = {10.1109/TRUSTCOM.2016.0079},
  timestamp    = {Thu, 01 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChengWMW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChomsiriHNT16,
  author       = {Thawatchai Chomsiri and
                  Xiangjian He and
                  Priyadarsi Nanda and
                  Zhiyuan Tan},
  title        = {An Improvement of Tree-Rule Firewall for a Large Network: Supporting
                  Large Rule Size and Low Delay},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {178--184},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0061},
  doi          = {10.1109/TRUSTCOM.2016.0061},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChomsiriHNT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CuiLLY16,
  author       = {Haoyi Cui and
                  Qingzhong Li and
                  Hui Li and
                  Zhongmin Yan},
  title        = {Healthcare Fraud Detection Based on Trustworthiness of Doctors},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {74--81},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0048},
  doi          = {10.1109/TRUSTCOM.2016.0048},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CuiLLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DaiYTZG16,
  author       = {You Dai and
                  Jin Yan and
                  Xiaoxin Tang and
                  Han Zhao and
                  Minyi Guo},
  title        = {Online Credit Card Fraud Detection: {A} Hybrid Framework with Big
                  Data Technologies},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1644--1651},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0253},
  doi          = {10.1109/TRUSTCOM.2016.0253},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/DaiYTZG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DangHN16,
  author       = {Thanh Dat Dang and
                  Doan B. Hoang and
                  Priyadarsi Nanda},
  title        = {A Novel Hash-Based File Clustering Scheme for Efficient Distributing,
                  Storing, and Retrieving of Large Scale Health Records},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1485--1491},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0232},
  doi          = {10.1109/TRUSTCOM.2016.0232},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DangHN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DangI16,
  author       = {Quang{-}Vinh Dang and
                  Claudia{-}Lavinia Ignat},
  title        = {Computational Trust Model for Repeated Trust Games},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {34--41},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0043},
  doi          = {10.1109/TRUSTCOM.2016.0043},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/DangI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DengBZW16,
  author       = {Liang Deng and
                  Hanli Bai and
                  Dan Zhao and
                  Fang Wang},
  title        = {Evaluating Multi-core and Many-Core Architectures through Parallelizing
                  a High-Order {WENO} Solver},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2167--2174},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0333},
  doi          = {10.1109/TRUSTCOM.2016.0333},
  timestamp    = {Tue, 20 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DengBZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DengGWP16,
  author       = {Changyi Deng and
                  Ruifeng Guo and
                  Hongliang Wang and
                  Azhen Peng},
  title        = {A Dynamic Power Management Algorithm for Sporadic Tasks in Real-Time
                  Embedded Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2073--2078},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0318},
  doi          = {10.1109/TRUSTCOM.2016.0318},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DengGWP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DillonC16,
  author       = {Tharam S. Dillon and
                  Elizabeth Chang},
  title        = {Trust and Risk Semantics and Prediction through Big Data Analytics
                  to Encompass Cloud Services, Cyber-Physical Systems, and Social Media:
                  Issues and Challenges},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {185--193},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0062},
  doi          = {10.1109/TRUSTCOM.2016.0062},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DillonC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DingWWZZ16,
  author       = {Weiwei Ding and
                  Jin Wang and
                  Xiumin Wang and
                  Ruimin Zhao and
                  Yanqin Zhu},
  title        = {Optimal Flow Allocation and Linear Network Coding Design for Multiple
                  Multicasts under the Requirements of Information Theoretical Security},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {576--583},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0112},
  doi          = {10.1109/TRUSTCOM.2016.0112},
  timestamp    = {Wed, 18 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DingWWZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DongW16,
  author       = {Wei Dong and
                  Jianjun Wang},
  title        = {{JPEG} Compression Forensics against Resizing},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1001--1007},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0168},
  doi          = {10.1109/TRUSTCOM.2016.0168},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DongW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DuCLY16,
  author       = {Haizhou Du and
                  Zhengbo Chen and
                  Qifen Li and
                  Yongwen Yang},
  title        = {A Novel Text Feature Weight Calculation Method Applied to Power Field},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1700--1705},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0260},
  doi          = {10.1109/TRUSTCOM.2016.0260},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DuCLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FanYXS16,
  author       = {Xiaochen Fan and
                  Panlong Yang and
                  Chaocan Xiang and
                  Lei Shi},
  title        = {iMap: {A} Crowdsensing Based System for Outdoor Radio Signal Strength
                  Map},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1442--1447},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0226},
  doi          = {10.1109/TRUSTCOM.2016.0226},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FanYXS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FangLHF16,
  author       = {Kunding Fang and
                  Xiaohong Li and
                  Jianye Hao and
                  Zhiyong Feng},
  title        = {Formal Modeling and Verification of Security Protocols on Cloud Computing
                  Systems Based on {UML} 2.3},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {852--859},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0148},
  doi          = {10.1109/TRUSTCOM.2016.0148},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FangLHF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FattahiMP16,
  author       = {Jaouhar Fattahi and
                  Mohamed Mejri and
                  Emil Pricop},
  title        = {Authentication by Witness Functions},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1990--1997},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0304},
  doi          = {10.1109/TRUSTCOM.2016.0304},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FattahiMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FengWL16,
  author       = {Bo Feng and
                  Chentao Wu and
                  Jie Li},
  title        = {{MLC:} An Efficient Multi-level Log Compression Method for Cloud Backup
                  Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1358--1365},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0215},
  doi          = {10.1109/TRUSTCOM.2016.0215},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FengWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FloresQJ16,
  author       = {Denys A. Flores and
                  Farrukh Qazi and
                  Arshad Jhumka},
  title        = {Bring Your Own Disclosure: Analysing {BYOD} Threats to Corporate Information},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1008--1015},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0169},
  doi          = {10.1109/TRUSTCOM.2016.0169},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FloresQJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FuLLD16,
  author       = {Jianming Fu and
                  Pengwei Li and
                  Yan Lin and
                  Shuang Ding},
  title        = {Android App Malicious Behavior Detection Based on User Intention},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {560--567},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0110},
  doi          = {10.1109/TRUSTCOM.2016.0110},
  timestamp    = {Wed, 23 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FuLLD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FuLZ16,
  author       = {Jianming Fu and
                  Yan Lin and
                  Xu Zhang},
  title        = {Code Reuse Attack Mitigation Based on Function Randomization without
                  Symbol Table},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {394--401},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0089},
  doi          = {10.1109/TRUSTCOM.2016.0089},
  timestamp    = {Thu, 17 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FuLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FukushimaSHNDGN16,
  author       = {Kazuhide Fukushima and
                  Youssef Souissi and
                  Seira Hidano and
                  Robert Nguyen and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Yuto Nakano and
                  Shinsaku Kiyomoto and
                  Laurent Sauvage},
  title        = {Delay {PUF} Assessment Method Based on Side-Channel and Modeling Analyzes:
                  The Final Piece of All-in-One Assessment Methodology},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {201--207},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0064},
  doi          = {10.1109/TRUSTCOM.2016.0064},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FukushimaSHNDGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaoLSS16,
  author       = {Hongyun Gao and
                  Fujun Liu and
                  Shengjuan Sun and
                  Gaotao Shi},
  title        = {A New Model Based on {GEP-SWPM} for Predicting Heavy Metals Speciation},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2122--2126},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0326},
  doi          = {10.1109/TRUSTCOM.2016.0326},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaoLSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaoX16,
  author       = {Shengli Gao and
                  Ruini Xue},
  title        = {{BOLAS+:} Scalable Lightweight Locality-Aware Scheduling for Hadoop},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1077--1084},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0178},
  doi          = {10.1109/TRUSTCOM.2016.0178},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaoX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaraeKC16,
  author       = {Jeffery Garae and
                  Ryan K. L. Ko and
                  Sivadon Chaisiri},
  title        = {UVisP: User-centric Visualization of Data Provenance with Gestalt
                  Principles},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1923--1930},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0294},
  doi          = {10.1109/TRUSTCOM.2016.0294},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaraeKC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GheidC16,
  author       = {Zakaria Gheid and
                  Yacine Challal},
  title        = {Efficient and Privacy-Preserving k-Means Clustering for Big Data Mining},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {791--798},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0140},
  doi          = {10.1109/TRUSTCOM.2016.0140},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GheidC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GongWZL16,
  author       = {Lirui Gong and
                  Jiawei Wang and
                  Xiang Zhang and
                  Kai Lei},
  title        = {Intelligent Forwarding Strategy Based on Online Machine Learning in
                  Named Data Networking},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1288--1294},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0206},
  doi          = {10.1109/TRUSTCOM.2016.0206},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GongWZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GongYXMYY16,
  author       = {Liangyi Gong and
                  Wu Yang and
                  Chaocan Xiang and
                  Dapeng Man and
                  Miao Yu and
                  Zuwei Yin},
  title        = {WiSal: Ubiquitous WiFi-Based Device-Free Passive Subarea Localization
                  without Intensive Site-Survey},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1129--1136},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0185},
  doi          = {10.1109/TRUSTCOM.2016.0185},
  timestamp    = {Thu, 24 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GongYXMYY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GottwaltWL16,
  author       = {Florian Gottwalt and
                  Adrian Waller and
                  Weiru Liu},
  title        = {Natural Laws as a Baseline for Network Anomaly Detection},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {370--377},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0086},
  doi          = {10.1109/TRUSTCOM.2016.0086},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GottwaltWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GranadilloRGD16,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Jose Rubio{-}Hernan and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Herv{\'{e}} Debar},
  title        = {Considering Internal Vulnerabilities and the Attacker's Knowledge
                  to Model the Impact of Cyber Events as Geometrical Prisms},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {340--348},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0082},
  doi          = {10.1109/TRUSTCOM.2016.0082},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GranadilloRGD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuHLYHJ16,
  author       = {Chonglin Gu and
                  Ke Hu and
                  Zhenlong Li and
                  Qiang Yuan and
                  Hejiao Huang and
                  Xiaohua Jia},
  title        = {Lowering Down the Cost for Green Cloud Data Centers by Using ESDs
                  and Energy Trading},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1508--1515},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0235},
  doi          = {10.1109/TRUSTCOM.2016.0235},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuHLYHJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuanL16,
  author       = {Lei Guan and
                  Yutong Lu},
  title        = {Using Dynamic Granularity Strategy to Accelerate Unbalanced Tree Search},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1302--1310},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0208},
  doi          = {10.1109/TRUSTCOM.2016.0208},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuanL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoCHD16,
  author       = {Xiaojun Guo and
                  Guang Cheng and
                  Yifei Hu and
                  Mian Dai},
  title        = {Progress in Command and Control Server Finding Schemes of Botnet},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1723--1727},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0264},
  doi          = {10.1109/TRUSTCOM.2016.0264},
  timestamp    = {Tue, 26 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoCHD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoLLHL16,
  author       = {Ping Guo and
                  Bin Lin and
                  Xin Li and
                  Rongxi He and
                  Sen Li},
  title        = {Optimal Deployment and Dimensioning of Fog Computing Supported Vehicular
                  Network},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2058--2062},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0315},
  doi          = {10.1109/TRUSTCOM.2016.0315},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoLLHL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoS16,
  author       = {Longkun Guo and
                  Hong Shen},
  title        = {Privacy-Preserving Internet Traffic Publication},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {884--891},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0152},
  doi          = {10.1109/TRUSTCOM.2016.0152},
  timestamp    = {Wed, 20 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoWYHW16,
  author       = {Zonghao Guo and
                  Ou Wei and
                  Peng Yu and
                  Lansheng Han and
                  Weiming Wu},
  title        = {Model Checking Probabilistic Network Propagation Protection Strategies},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {354--361},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0084},
  doi          = {10.1109/TRUSTCOM.2016.0084},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoWYHW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoWZC16,
  author       = {Jian Guo and
                  Lirong Wang and
                  Wenliang Zhu and
                  Xiaohe Chen},
  title        = {The Analysis of Crosstalk Noise Component in Wearable Device},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2202--2205},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0339},
  doi          = {10.1109/TRUSTCOM.2016.0339},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoWZC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoZZ16,
  author       = {Yanbin Guo and
                  Jianzhong Zhang and
                  Yu Zhang},
  title        = {An Algorithm for Analyzing the City Residents' Activity Information
                  through Mobile Big Data Mining},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2133--2138},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0328},
  doi          = {10.1109/TRUSTCOM.2016.0328},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanGRMX16,
  author       = {Hongfang Han and
                  Ang Gao and
                  Jianji Ren and
                  Yongqiang Ma and
                  Xiao Xue},
  title        = {An {O2O} Service Recommendation Algorithm Based on User Context and
                  Trust Service},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1904--1909},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0291},
  doi          = {10.1109/TRUSTCOM.2016.0291},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanGRMX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanHCWS16,
  author       = {Yandong Han and
                  Zhiyu Hao and
                  Lei Cui and
                  Chonghua Wang and
                  Yafei Sang},
  title        = {A Hybrid Monitoring Mechanism in Virtualized Environments},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1038--1045},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0173},
  doi          = {10.1109/TRUSTCOM.2016.0173},
  timestamp    = {Mon, 01 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanHCWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanLLDQ16,
  author       = {Lin Han and
                  Zhiyang Li and
                  Weijiang Liu and
                  Ke Dai and
                  Wenyu Qu},
  title        = {Minimum Control Latency of {SDN} Controller Placement},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2175--2180},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0334},
  doi          = {10.1109/TRUSTCOM.2016.0334},
  timestamp    = {Tue, 10 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanLLDQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanQBD16,
  author       = {Zijun Han and
                  Guangzhi Qu and
                  Dona Burkard and
                  Kelvin Dobbins},
  title        = {A Memory Access Pattern-Based Program Profiling System for Dynamic
                  Parallelism Prediction},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1448--1454},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0227},
  doi          = {10.1109/TRUSTCOM.2016.0227},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanQBD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanzlikKKD16,
  author       = {Lucjan Hanzlik and
                  Kamil Kluczniak and
                  Miroslaw Kutylowski and
                  Shlomi Dolev},
  title        = {Local Self-Organization with Strong Privacy Protection},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {775--782},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0138},
  doi          = {10.1109/TRUSTCOM.2016.0138},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanzlikKKD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HaoGWS16,
  author       = {Zhongyuan Hao and
                  Wei Guo and
                  Jizeng Wei and
                  Dazhi Sun},
  title        = {Dual Processing Engine Architecture to Speed Up Optimal Ate Pairing
                  on {FPGA} Platform},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {584--589},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0113},
  doi          = {10.1109/TRUSTCOM.2016.0113},
  timestamp    = {Sun, 27 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HaoGWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HeL016,
  author       = {Xinglu He and
                  Kai Lu and
                  Gen Li},
  title        = {Taint Reverse Propagation for Analysis of Privacy Leak},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1718--1722},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0263},
  doi          = {10.1109/TRUSTCOM.2016.0263},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HeL016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HeXXLX16,
  author       = {Shiming He and
                  Kun Xie and
                  Kexin Xie and
                  Zhetao Li and
                  Chuan Xu},
  title        = {Interference-Aware Multi-source Transmission},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1233--1240},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0199},
  doi          = {10.1109/TRUSTCOM.2016.0199},
  timestamp    = {Wed, 17 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HeXXLX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HouZWCWL16,
  author       = {Gang Hou and
                  Kuanjiu Zhou and
                  Yanran Wu and
                  Zongzheng Chi and
                  Jie Wang and
                  Mingchu Li},
  title        = {{ETSTM:} {A} New Green Software Model},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1825--1830},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0280},
  doi          = {10.1109/TRUSTCOM.2016.0280},
  timestamp    = {Wed, 14 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HouZWCWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuC0S16,
  author       = {Feng Hu and
                  Bing Chen and
                  Xiaojun Zhu and
                  Hong Shen},
  title        = {SDN-Based Efficient Bandwidth Allocation for Caching Enabled Cognitive
                  Radio Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1382--1389},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0218},
  doi          = {10.1109/TRUSTCOM.2016.0218},
  timestamp    = {Sat, 26 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuC0S16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuWWCZ16,
  author       = {Shengshan Hu and
                  Qian Wang and
                  Jingjun Wang and
                  Sherman S. M. Chow and
                  Qin Zou},
  title        = {Securing Fast Learning! Ridge Regression over Encrypted Big Data},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {19--26},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0041},
  doi          = {10.1109/TRUSTCOM.2016.0041},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuWWCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuWZF16,
  author       = {Zongshuai Hu and
                  Yong Wang and
                  Lipeng Zhang and
                  Rusen Fan},
  title        = {Bad Data Injection Attacks Identification in Power System on Fast
                  Decoupled Load Flow},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1970--1975},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0301},
  doi          = {10.1109/TRUSTCOM.2016.0301},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuWZF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangDWW16,
  author       = {Haiping Huang and
                  Jianpeng Du and
                  Hui Wang and
                  Ruchuan Wang},
  title        = {A Multi-keyword Multi-user Searchable Encryption Scheme Based on Cloud
                  Storage},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1937--1943},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0296},
  doi          = {10.1109/TRUSTCOM.2016.0296},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangDWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangLWS16,
  author       = {Xi Huang and
                  Xiaoguang Liu and
                  Gang Wang and
                  Ming Su},
  title        = {A Robust Image Hashing with Enhanced Randomness by Using Random Walk
                  on Zigzag Blocking},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {14--18},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0040},
  doi          = {10.1109/TRUSTCOM.2016.0040},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangLWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangZQ16,
  author       = {Xingyuan Huang and
                  Jiandong Zhang and
                  Kun Qian},
  title        = {Big Data Analysis on the Relationship between the Organizational Career
                  Management and Knowledge Workers' Work Involved - Take the High-Tech
                  Enterprise as an Example},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2251--2256},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0347},
  doi          = {10.1109/TRUSTCOM.2016.0347},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangZQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HussainSP16,
  author       = {Sardar Hussain and
                  Richard O. Sinnott and
                  Ron Poet},
  title        = {A Security-Oriented Workflow Framework for Collaborative Environments},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {707--714},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0129},
  doi          = {10.1109/TRUSTCOM.2016.0129},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HussainSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JayarathnaVT16,
  author       = {Dilshan Jayarathna and
                  Vijay Varadharajan and
                  Udaya Kiran Tupakula},
  title        = {Integrated Security for Services Hosted in Virtual Environments},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {82--89},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0049},
  doi          = {10.1109/TRUSTCOM.2016.0049},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JayarathnaVT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JayasingheMGAM16,
  author       = {Danushka Jayasinghe and
                  Konstantinos Markantonakis and
                  Iakovos Gurulian and
                  Raja Naeem Akram and
                  Keith Mayes},
  title        = {Extending {EMV} Tokenised Payments to Offline-Environments},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {443--450},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0095},
  doi          = {10.1109/TRUSTCOM.2016.0095},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JayasingheMGAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiWTWWTZZ16,
  author       = {Changqing Ji and
                  Baofeng Wang and
                  Shuai Tao and
                  Junfeng Wu and
                  Zumin Wang and
                  Long Tang and
                  Tiange Zu and
                  Gui Zhao},
  title        = {Inverted Voronoi-Based kNN Query Processing with MapReduce},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2263--2268},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0349},
  doi          = {10.1109/TRUSTCOM.2016.0349},
  timestamp    = {Mon, 28 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiWTWWTZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiaWZWJ16,
  author       = {Chengjin Jia and
                  Jin Wang and
                  Yanqin Zhu and
                  Zhengqing Wen and
                  Juncheng Jia},
  title        = {Joint Selection of Providers and the New Comer for Optimal Repair
                  in Distributed Storage Network with Network Coding},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1567--1574},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0243},
  doi          = {10.1109/TRUSTCOM.2016.0243},
  timestamp    = {Wed, 18 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiaWZWJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiaYKXCS16,
  author       = {Minglei Jia and
                  Yanqin Yang and
                  Lei Kuang and
                  Wenchao Xu and
                  Tianxing Chu and
                  Hongzhi Song},
  title        = {An Indoor and Outdoor Seamless Positioning System Based on Android
                  Platform},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1114--1120},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0183},
  doi          = {10.1109/TRUSTCOM.2016.0183},
  timestamp    = {Tue, 24 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiaYKXCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiangLXTYK16,
  author       = {Meng Jiang and
                  Yanbo Liu and
                  Wenchao Xu and
                  Feilong Tang and
                  Yanqin Yang and
                  Lei Kuang},
  title        = {An Optimized Layered Routing Algorithm for {GEO/LEO} Hybrid Satellite
                  Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1153--1158},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0188},
  doi          = {10.1109/TRUSTCOM.2016.0188},
  timestamp    = {Tue, 24 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiangLXTYK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiangQSWL16,
  author       = {Jianguo Jiang and
                  Biao Qi and
                  Zhixin Shi and
                  Yan Wang and
                  Bin Lv},
  title        = {Botnet Detection Method Analysis on the Effect of Feature Extraction},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1882--1888},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0288},
  doi          = {10.1109/TRUSTCOM.2016.0288},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiangQSWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Jianyong16,
  author       = {Fang Jianyong},
  title        = {Research on the Nonintrusive Resource Level Fault Injection Technology
                  for Windows System},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1856--1860},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0284},
  doi          = {10.1109/TRUSTCOM.2016.0284},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Jianyong16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JinGQZPL16,
  author       = {Yibo Jin and
                  Yuan Gao and
                  Zhuzhong Qian and
                  Mingyu Zhai and
                  Hui Peng and
                  Sanglu Lu},
  title        = {Workload-Aware Scheduling Across Geo-distributed Data Centers},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1455--1462},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0228},
  doi          = {10.1109/TRUSTCOM.2016.0228},
  timestamp    = {Thu, 04 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JinGQZPL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JinW16,
  author       = {Hua Jin and
                  Changda Wang},
  title        = {Robustness of the Packet Delay Channels},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {260--267},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0072},
  doi          = {10.1109/TRUSTCOM.2016.0072},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JinW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JinZTF16,
  author       = {Jiangming Jin and
                  Yang Zhang and
                  Shanjiang Tang and
                  Hongfei Fan},
  title        = {Performance Modeling and Analysis for Critical Section Contention
                  in Parallel Codes},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2139--2146},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0329},
  doi          = {10.1109/TRUSTCOM.2016.0329},
  timestamp    = {Tue, 22 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JinZTF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JingZDXL16,
  author       = {Jing Wang and
                  Xianfeng Zhao and
                  Yanjie Deng and
                  Shibo Xu and
                  Jichun Li},
  title        = {Research on Key Technologies and Standard Framework of Secure and
                  Smart Container},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2063--2067},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0316},
  doi          = {10.1109/TRUSTCOM.2016.0316},
  timestamp    = {Mon, 12 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JingZDXL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KacemWCB16,
  author       = {Thabet Kacem and
                  Duminda Wijesekera and
                  Paulo Cesar G. da Costa and
                  Alexandre Barreto},
  title        = {An {ADS-B} Intrusion Detection System},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {544--551},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0108},
  doi          = {10.1109/TRUSTCOM.2016.0108},
  timestamp    = {Thu, 10 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KacemWCB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KarthikS16,
  author       = {N. Karthik and
                  Ananthanarayana V. S.},
  title        = {Data Trustworthiness in Wireless Sensor Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2181--2186},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0335},
  doi          = {10.1109/TRUSTCOM.2016.0335},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KarthikS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KejariwalO16,
  author       = {Arun Kejariwal and
                  Francois Orsini},
  title        = {On the Definition of Real-Time: Applications and Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2213--2220},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0341},
  doi          = {10.1109/TRUSTCOM.2016.0341},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KejariwalO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KenazaALLW16,
  author       = {Tayeb Kenaza and
                  Mahdi Aiash and
                  Jonathan Loo and
                  Aboubaker Lasebae and
                  Gill Whitney},
  title        = {A Progressive Approach to Design Authentication Protocols for Mobile
                  Heterogeneous Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1776--1781},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0273},
  doi          = {10.1109/TRUSTCOM.2016.0273},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KenazaALLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KenazaBLA16,
  author       = {Tayeb Kenaza and
                  Khadidja Bennaceur and
                  Abdenour Labed and
                  Mahdi Aiash},
  title        = {Enhancing the {SVDD} Accuracy in Intrusion Detection Systems by Removing
                  External Voids},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1765--1770},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0271},
  doi          = {10.1109/TRUSTCOM.2016.0271},
  timestamp    = {Tue, 28 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KenazaBLA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KhanAKK16,
  author       = {Muhammad Saleem Khan and
                  Idrees Ahmed and
                  Abid Khan and
                  Majid Iqbal Khan},
  title        = {Adaptive Reputation Weights Assignment Scheme for MANETs},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {160--167},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0059},
  doi          = {10.1109/TRUSTCOM.2016.0059},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KhanAKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KuangTGFCXYZW16,
  author       = {Kaiyuan Kuang and
                  Zhanyong Tang and
                  Xiaoqing Gong and
                  Dingyi Fang and
                  Xiaojiang Chen and
                  Tianzhang Xing and
                  Guixin Ye and
                  Jie Zhang and
                  Zheng Wang},
  title        = {Exploiting Dynamic Scheduling for VM-Based Code Obfuscation},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {489--496},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0101},
  doi          = {10.1109/TRUSTCOM.2016.0101},
  timestamp    = {Tue, 12 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KuangTGFCXYZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LaiWSLQZ16,
  author       = {Meng Lai and
                  Jiajun Wang and
                  Tao Song and
                  Ning Liu and
                  Zhengwei Qi and
                  Weijia Zhou},
  title        = {{VSP:} {A} Virtual Smartphone Platform to Enhance the Capability of
                  Physical Smartphone},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1434--1441},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0225},
  doi          = {10.1109/TRUSTCOM.2016.0225},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LaiWSLQZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Lei0FLZ16,
  author       = {Shiming Lei and
                  Chao Wang and
                  Haijie Fang and
                  Xi Li and
                  Xuehai Zhou},
  title        = {{SCADIS:} {A} Scalable Accelerator for Data-Intensive String Set Matching
                  on FPGAs},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1190--1197},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0193},
  doi          = {10.1109/TRUSTCOM.2016.0193},
  timestamp    = {Thu, 19 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Lei0FLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LenzZ16,
  author       = {Thomas Lenz and
                  Bernd Zwattendorfer},
  title        = {Towards Cross-Border Authorization in European eID Federations},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {426--434},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0093},
  doi          = {10.1109/TRUSTCOM.2016.0093},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LenzZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiC16,
  author       = {Yamin Li and
                  Wanming Chu},
  title        = {Adjusting Parameters of k-Ary n-Cube to Achieve Better Cost Performance},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1218--1225},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0197},
  doi          = {10.1109/TRUSTCOM.2016.0197},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiCLSCL16,
  author       = {Xiaochao Li and
                  Chunhui Cao and
                  Pengtao Li and
                  Shuli Shen and
                  Yihui Chen and
                  Lin Li},
  title        = {Energy-Efficient Hardware Implementation of {LUKS} {PBKDF2} with {AES}
                  on {FPGA}},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {402--409},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0090},
  doi          = {10.1109/TRUSTCOM.2016.0090},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiCLSCL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiJSWLLR16,
  author       = {Peng Li and
                  Xingtong Jin and
                  Rebecca J. Stones and
                  Gang Wang and
                  Zhongwei Li and
                  Xiaoguang Liu and
                  Mingming Ren},
  title        = {Parallelizing Degraded Read for Erasure Coded Cloud Storage Systems
                  Using Collective Communications},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1272--1279},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0204},
  doi          = {10.1109/TRUSTCOM.2016.0204},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiJSWLLR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiLC16,
  author       = {Lulu Li and
                  Zhuo Li and
                  Xin Chen},
  title        = {Capacity Analysis and Link Scheduling Design in Double-Channel Full-Duplex
                  Wireless Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1581--1588},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0245},
  doi          = {10.1109/TRUSTCOM.2016.0245},
  timestamp    = {Thu, 24 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiLC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiLD16,
  author       = {Minghui Li and
                  Zhaobin Liu and
                  Kang Dong},
  title        = {Privacy Preservation in Social Network against Public Neighborhood
                  Attacks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1575--1580},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0244},
  doi          = {10.1109/TRUSTCOM.2016.0244},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiLD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiLGLH16,
  author       = {Xin Li and
                  Bin Lin and
                  Ping Guo and
                  Sen Li and
                  Rongxi He},
  title        = {Design and Planning of Heterogeneous Marine Sensor Networks for Marine
                  Intelligent Transportation},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2052--2057},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0314},
  doi          = {10.1109/TRUSTCOM.2016.0314},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiLGLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiLWL16,
  author       = {Juan{-}Hui Li and
                  Pei{-}Zhen Li and
                  Chang{-}Dong Wang and
                  Jian{-}Huang Lai},
  title        = {Community Detection in Complicated Network Based on the Multi-view
                  Weighted Signed Permanence},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1589--1596},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0246},
  doi          = {10.1109/TRUSTCOM.2016.0246},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiLWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiLZWCD16,
  author       = {Jian Li and
                  Wenhuan Lu and
                  Chen Zhang and
                  Jianguo Wei and
                  Xiaochun Cao and
                  Jianwu Dang},
  title        = {A Study on Detection and Recovery of Speech Signal Tampering},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {678--682},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0125},
  doi          = {10.1109/TRUSTCOM.2016.0125},
  timestamp    = {Thu, 06 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiLZWCD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiWHSF16,
  author       = {Qian Li and
                  Weiguo Wu and
                  Jianhang Huang and
                  Zeyu Sun and
                  Mingxia Feng},
  title        = {A Novel Trustworthy Framework for Cloud Based Rendering Application},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1951--1956},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0298},
  doi          = {10.1109/TRUSTCOM.2016.0298},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiWHSF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiXG16,
  author       = {Dali Li and
                  Chuanfu Xu and
                  Ningbo Guo},
  title        = {Evaluating and Optimizing Parallel {LU-SGS} for High-Order {CFD} Simulations
                  on the Tianhe-2 Supercomputer},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1182--1189},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0192},
  doi          = {10.1109/TRUSTCOM.2016.0192},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiXG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiYLZWL16,
  author       = {Hui Li and
                  Guoqiao Ye and
                  Xuezheng Liu and
                  Fei Zhao and
                  Di Wu and
                  Xiaola Lin},
  title        = {URLSight: Profiling Mobile Users via Large-Scale Internet Metadata
                  Analytics},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1728--1733},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0265},
  doi          = {10.1109/TRUSTCOM.2016.0265},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiYLZWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiZDLYM16,
  author       = {Tao Li and
                  Kezhao Zhao and
                  Qiankun Dong and
                  Jiabing Ling and
                  Yulu Yang and
                  Wenjing Ma},
  title        = {Data-Oriented Runtime Scheduling Framework on Multi-GPUs},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1311--1318},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0209},
  doi          = {10.1109/TRUSTCOM.2016.0209},
  timestamp    = {Fri, 12 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiZDLYM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiangFWG16,
  author       = {Kaiyuan Liang and
                  Yanzhao Feng and
                  Jizeng Wei and
                  Wei Guo},
  title        = {SecPage - {A} Lightweight Memory Protection Architecture},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1917--1922},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0293},
  doi          = {10.1109/TRUSTCOM.2016.0293},
  timestamp    = {Sun, 27 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiangFWG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LinWJYZW16,
  author       = {Zimin Lin and
                  Rui Wang and
                  Xiaoqi Jia and
                  Jingyu Yang and
                  Daojuan Zhang and
                  Chuankun Wu},
  title        = {ForceDROID: Extracting Hidden Information in Android Apps by Forced
                  Execution Technique},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {386--393},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0088},
  doi          = {10.1109/TRUSTCOM.2016.0088},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LinWJYZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LinWJZW16,
  author       = {Zimin Lin and
                  Rui Wang and
                  Xiaoqi Jia and
                  Shengzhi Zhang and
                  Chuankun Wu},
  title        = {Classifying Android Malware with Dynamic Behavior Dependency Graphs},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {378--385},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0087},
  doi          = {10.1109/TRUSTCOM.2016.0087},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LinWJZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LingGL16,
  author       = {Cheng Ling and
                  Jing{-}Yang Gao and
                  Gang Lu},
  title        = {Phylogenetic Likelihood Estimation on GPUs Using Vertical Partitioning
                  Scheme},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1210--1217},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0196},
  doi          = {10.1109/TRUSTCOM.2016.0196},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LingGL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuBW16,
  author       = {Juhua Liu and
                  Guoqiang Bai and
                  Xingjun Wu},
  title        = {Efficient Hardware Implementation of Roadrunner for Lightweight Application},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {224--227},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0067},
  doi          = {10.1109/TRUSTCOM.2016.0067},
  timestamp    = {Sat, 03 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuBW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuDCZW16,
  author       = {Qiang Liu and
                  Xiaoshe Dong and
                  Heng Chen and
                  Zhengdong Zhu and
                  Yinfeng Wang},
  title        = {An Efficient Framework for Incremental Graph Computation},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1420--1426},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0223},
  doi          = {10.1109/TRUSTCOM.2016.0223},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuDCZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuJWYZZ16,
  author       = {Zechao Liu and
                  Zoe Lin Jiang and
                  Xuan Wang and
                  Siu{-}Ming Yiu and
                  Chunkai Zhang and
                  Xiaomeng Zhao},
  title        = {Dynamic Attribute-Based Access Control in Cloud Storage Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {129--137},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0055},
  doi          = {10.1109/TRUSTCOM.2016.0055},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuJWYZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuLLQTC16,
  author       = {Yang Liu and
                  Wenxin Li and
                  Keqiu Li and
                  Heng Qi and
                  Xiaoyi Tao and
                  Sheng Chen},
  title        = {Scheduling Dependent Coflows with Guaranteed Job Completion Time},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2109--2115},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0324},
  doi          = {10.1109/TRUSTCOM.2016.0324},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuLLQTC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuLMZZZ16,
  author       = {Feng Liu and
                  Pengpeng Luo and
                  Zhujuan Ma and
                  Cheng Zhang and
                  Yiwen Zhang and
                  Erzhou Zhu},
  title        = {Security Secret Information Hiding Based on Hash Function and Invisible
                  {ASCII} Characters Replacement},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1963--1969},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0300},
  doi          = {10.1109/TRUSTCOM.2016.0300},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuLMZZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuLSZ16,
  author       = {Peng Liu and
                  Yidong Li and
                  Yingpeng Sang and
                  Ji Zhang},
  title        = {Anonymity-Based Privacy Preserving Network Data Publication},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {823--828},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0144},
  doi          = {10.1109/TRUSTCOM.2016.0144},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuLSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuTXCZF16,
  author       = {Cang Liu and
                  Chuan Tang and
                  Zuocheng Xing and
                  Lirui Chen and
                  Yang Zhang and
                  Guitao Fu},
  title        = {An Architecture of Parallel Tiled {QRD} Algorithm for {MIMO-OFDM}
                  Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2092--2096},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0321},
  doi          = {10.1109/TRUSTCOM.2016.0321},
  timestamp    = {Wed, 16 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuTXCZF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuXLTWL16,
  author       = {Na Liu and
                  Peng Xiao and
                  Ying Lu and
                  Xiao{-}Jun Tang and
                  Hai{-}Wen Wang and
                  Ming{-}Xia Li},
  title        = {A Topic Approach to Sentence Ordering for Multi-document Summarization},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1390--1395},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0219},
  doi          = {10.1109/TRUSTCOM.2016.0219},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuXLTWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuXTKY16,
  author       = {Yanbo Liu and
                  Wenchao Xu and
                  Feilong Tang and
                  Lei Kuang and
                  Yanqin Yang},
  title        = {An Improved Multi-path Routing Algorithm for Hybrid {LEO-MEO} Satellite
                  Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1101--1105},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0181},
  doi          = {10.1109/TRUSTCOM.2016.0181},
  timestamp    = {Tue, 24 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuXTKY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuS16,
  author       = {Yang Lu and
                  Richard O. Sinnott},
  title        = {Semantic-Based Privacy Protection of Electronic Health Records for
                  Collaborative Research},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {519--526},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0105},
  doi          = {10.1109/TRUSTCOM.2016.0105},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuoFHWX16,
  author       = {Yuchuan Luo and
                  Shaojing Fu and
                  Kai Huang and
                  Dongsheng Wang and
                  Ming Xu},
  title        = {Securely Outsourcing of Bilinear Pairings with Untrusted Servers for
                  Cloud Storage},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {623--629},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0118},
  doi          = {10.1109/TRUSTCOM.2016.0118},
  timestamp    = {Thu, 25 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuoFHWX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuoLLRSW16,
  author       = {Wu Luo and
                  Wei Liu and
                  Yang Luo and
                  Anbang Ruan and
                  Qingni Shen and
                  Zhonghai Wu},
  title        = {Partial Attestation: Towards Cost-Effective and Privacy-Preserving
                  Remote Attestations},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {152--159},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0058},
  doi          = {10.1109/TRUSTCOM.2016.0058},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuoLLRSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuoLSSRW16,
  author       = {Yang Luo and
                  Wu Luo and
                  Xiaoning Sun and
                  Qingni Shen and
                  Anbang Ruan and
                  Zhonghai Wu},
  title        = {Whispers between the Containers: High-Capacity Covert Channel Attacks
                  in Docker},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {630--637},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0119},
  doi          = {10.1109/TRUSTCOM.2016.0119},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuoLSSRW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LvLF16,
  author       = {Yali Lv and
                  Cheng{-}Kuan Lin and
                  Jianxi Fan},
  title        = {Hamiltonian Cycle and Path Embeddings in 3-Ary n-Cubes Based on K1,
                  2-Structure Faults},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1226--1232},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0198},
  doi          = {10.1109/TRUSTCOM.2016.0198},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LvLF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LyuLYZ16,
  author       = {Fang Lyu and
                  Yapin Lin and
                  Junfeng Yang and
                  Junhai Zhou},
  title        = {SUIDroid: An Efficient Hardening-Resilient Approach to Android App
                  Clone Detection},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {511--518},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0104},
  doi          = {10.1109/TRUSTCOM.2016.0104},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LyuLYZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaWL16,
  author       = {Jingwei Ma and
                  Gang Wang and
                  Xiaoguang Liu},
  title        = {DedupeSwift: Object-Oriented Storage System Based on Data Deduplication},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1069--1076},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0177},
  doi          = {10.1109/TRUSTCOM.2016.0177},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaYKMCWWL16,
  author       = {Jingwei Ma and
                  Boxue Yin and
                  Zhi Kong and
                  Yuxiang Ma and
                  Chang Chen and
                  Long Wang and
                  Gang Wang and
                  Xiaoguang Liu},
  title        = {Leveraging Page-Level Compression in MySQL - {A} Practice at Baidu},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1085--1092},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0179},
  doi          = {10.1109/TRUSTCOM.2016.0179},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaYKMCWWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MadhounP16,
  author       = {Nour El Madhoun and
                  Guy Pujolle},
  title        = {Security Enhancements in {EMV} Protocol for {NFC} Mobile Payment},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1889--1895},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0289},
  doi          = {10.1109/TRUSTCOM.2016.0289},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MadhounP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MansorMAMG16,
  author       = {Hafizah Mansor and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  Keith Mayes and
                  Iakovos Gurulian},
  title        = {Log Your Car: The Non-invasive Vehicle Forensics},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {974--982},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0164},
  doi          = {10.1109/TRUSTCOM.2016.0164},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MansorMAMG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ManzoorTS16,
  author       = {Salman Manzoor and
                  Ahmed Taha and
                  Neeraj Suri},
  title        = {Trust Validation of Cloud IaaS: {A} Customer-centric Approach},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {97--104},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0051},
  doi          = {10.1109/TRUSTCOM.2016.0051},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ManzoorTS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaoGYL16,
  author       = {KunPeng Mao and
                  Songtao Guo and
                  Yuanyuan Yang and
                  Guiyan Liu},
  title        = {{MRDC:} Multicast Data Restoration in Fat-Tree Data Center Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1500--1507},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0234},
  doi          = {10.1109/TRUSTCOM.2016.0234},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaoGYL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MarraMSA16,
  author       = {Antonio La Marra and
                  Fabio Martinelli and
                  Andrea Saracino and
                  Alessandro Aldini},
  title        = {On Probabilistic Application Compliance},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1848--1855},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0283},
  doi          = {10.1109/TRUSTCOM.2016.0283},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MarraMSA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MartinelliSS16,
  author       = {Fabio Martinelli and
                  Andrea Saracino and
                  Mina Sheikhalishahi},
  title        = {Modeling Privacy Aware Information Sharing Systems: {A} Formal and
                  General Approach},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {767--774},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0137},
  doi          = {10.1109/TRUSTCOM.2016.0137},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MartinelliSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MengLLL16,
  author       = {Weizhi Meng and
                  Xiapu Luo and
                  Wenjuan Li and
                  Yan Li},
  title        = {Design and Evaluation of Advanced Collusion Attacks on Collaborative
                  Intrusion Detection Networks in Practice},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1061--1068},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0176},
  doi          = {10.1109/TRUSTCOM.2016.0176},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MengLLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MengXCZ16,
  author       = {Xuying Meng and
                  Zhiwei Xu and
                  Bo Chen and
                  Yujun Zhang},
  title        = {Privacy-Preserving Query Log Sharing Based on Prior N-Word Aggregation},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {722--729},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0131},
  doi          = {10.1109/TRUSTCOM.2016.0131},
  timestamp    = {Fri, 15 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MengXCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MinLLC16,
  author       = {Xinping Min and
                  Qingzhong Li and
                  Lei Liu and
                  Lizhen Cui},
  title        = {A Permissioned Blockchain Framework for Supporting Instant Transaction
                  and Dynamic Block Size},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {90--96},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0050},
  doi          = {10.1109/TRUSTCOM.2016.0050},
  timestamp    = {Wed, 08 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MinLLC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MisraSB16,
  author       = {Gaurav Misra and
                  Jose M. Such and
                  Hamed Balogun},
  title        = {{IMPROVE} - Identifying Minimal PROfile VEctors for Similarity Based
                  Access Control},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {868--875},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0150},
  doi          = {10.1109/TRUSTCOM.2016.0150},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MisraSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NayakT16,
  author       = {Sanjeet Kumar Nayak and
                  Somanath Tripathy},
  title        = {Privacy Preserving Provable Data Possession for Cloud Based Electronic
                  Health Record System},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {860--867},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0149},
  doi          = {10.1109/TRUSTCOM.2016.0149},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NayakT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NieLQ16,
  author       = {Lihai Nie and
                  Zhiyang Li and
                  Wenyu Qu},
  title        = {Association Rules Discovery via Approximate Method from Probabilistic
                  Database},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {909--914},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0155},
  doi          = {10.1109/TRUSTCOM.2016.0155},
  timestamp    = {Tue, 10 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NieLQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NingZYSM16,
  author       = {Fangxiao Ning and
                  Min Zhu and
                  Ruibang You and
                  Gang Shi and
                  Dan Meng},
  title        = {Group-Based Memory Deduplication against Covert Channel Attacks in
                  Virtualized Environments},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {194--200},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0063},
  doi          = {10.1109/TRUSTCOM.2016.0063},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/NingZYSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/OuWSZA16,
  author       = {Changhai Ou and
                  Zhu Wang and
                  Degang Sun and
                  Xinping Zhou and
                  Juan Ai},
  title        = {Power Traces Clipping and Splicing Enhanced Correlation Collision
                  Analysis},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {989--995},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0166},
  doi          = {10.1109/TRUSTCOM.2016.0166},
  timestamp    = {Fri, 18 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/OuWSZA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PadilloLV16,
  author       = {Francisco Padillo and
                  Jos{\'{e}} Mar{\'{\i}}a Luna and
                  Sebasti{\'{a}}n Ventura},
  title        = {Subgroup Discovery on Big Data: Exhaustive Methodologies Using Map-Reduce},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1684--1691},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0258},
  doi          = {10.1109/TRUSTCOM.2016.0258},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PadilloLV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PanM16,
  author       = {Jinkun Pan and
                  Xiaoguang Mao},
  title        = {DomXssMicro: {A} Micro Benchmark for Evaluating DOM-Based Cross-Site
                  Scripting Detection},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {208--215},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0065},
  doi          = {10.1109/TRUSTCOM.2016.0065},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PanM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PantangiXM16,
  author       = {Ajay Pantangi and
                  Kaiqi Xiong and
                  Mufaddal Makati},
  title        = {SECUPerf: End-to-End Security and Performance Assessment of Cloud
                  Services},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1747--1752},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0268},
  doi          = {10.1109/TRUSTCOM.2016.0268},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PantangiXM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Pattaranantakul16,
  author       = {Montida Pattaranantakul and
                  Ruan He and
                  Ahmed Meddahi and
                  Zonghua Zhang},
  title        = {SecMANO: Towards Network Functions Virtualization {(NFV)} Based Security
                  MANagement and Orchestration},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {598--605},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0115},
  doi          = {10.1109/TRUSTCOM.2016.0115},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Pattaranantakul16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PeiWCJGGZ16,
  author       = {Songwen Pei and
                  Jinkai Wang and
                  Wenyang Cui and
                  Linhua Jiang and
                  Tongsheng Geng and
                  Jean{-}Luc Gaudiot and
                  St{\'{e}}phane Zuckerman},
  title        = {Codelet Scheduling by Genetic Algorithm},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1492--1499},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0233},
  doi          = {10.1109/TRUSTCOM.2016.0233},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PeiWCJGGZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PeiWMX16,
  author       = {Xiaoqiang Pei and
                  Yijie Wang and
                  Xingkong Ma and
                  Fangliang Xu},
  title        = {Pipelined Online Data Insertion for Erasure Codes in Distributed Storage
                  Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1159--1166},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0189},
  doi          = {10.1109/TRUSTCOM.2016.0189},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PeiWMX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PeiWYLP16,
  author       = {Xin Pei and
                  Yongjian Wang and
                  Wei Yao and
                  Jiuchuan Lin and
                  Ruxiang Peng},
  title        = {Security Enhanced Attribute Based Signcryption for Private Data Sharing
                  in Cloud},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {737--743},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0133},
  doi          = {10.1109/TRUSTCOM.2016.0133},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PeiWYLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PengCA16,
  author       = {Jian Peng and
                  Kim{-}Kwang Raymond Choo and
                  Helen Ashman},
  title        = {Astroturfing Detection in Social Media: Using Binary n-Gram Analysis
                  for Authorship Attribution},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {121--128},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0054},
  doi          = {10.1109/TRUSTCOM.2016.0054},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PengCA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PengY16,
  author       = {Hao Peng and
                  Mengzhuo You},
  title        = {The Health Care Fraud Detection Using the Pharmacopoeia Spectrum Tree
                  and Neural Network Analytic Contribution Hierarchy Process},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2006--2011},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0306},
  doi          = {10.1109/TRUSTCOM.2016.0306},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PengY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QiaoY016,
  author       = {Yanchen Qiao and
                  Xiaochun Yun and
                  Yongzheng Zhang},
  title        = {How to Automatically Identify the Homology of Different Malware},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {929--936},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0158},
  doi          = {10.1109/TRUSTCOM.2016.0158},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/QiaoY016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QiaoY016a,
  author       = {Yanchen Qiao and
                  Xiaochun Yun and
                  Yongzheng Zhang},
  title        = {Fast Reused Function Retrieval Method Based on Simhash and Inverted
                  Index},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {937--944},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0159},
  doi          = {10.1109/TRUSTCOM.2016.0159},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/QiaoY016a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QiaoZXZH16,
  author       = {Hong Qiao and
                  Dafang Zhang and
                  Kun Xie and
                  Ji Zhang and
                  Shiming He},
  title        = {Power-Bandwidth Aware Cooperative Routing in Multi-radio Multi-channel
                  Wireless Network},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1342--1349},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0213},
  doi          = {10.1109/TRUSTCOM.2016.0213},
  timestamp    = {Wed, 18 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/QiaoZXZH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QinWLL16,
  author       = {Xiongpai Qin and
                  Bangguo Wang and
                  Ruchuan Lai and
                  Keqin Li},
  title        = {Improving Robustness of a {SVR} Based Algorithm Trading Model with
                  Carefully Crafted Features and a Diversified Portfolio},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1676--1683},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0257},
  doi          = {10.1109/TRUSTCOM.2016.0257},
  timestamp    = {Fri, 27 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/QinWLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QinZL16,
  author       = {Haiyan Qin and
                  Yonglong Zhang and
                  Bin Li},
  title        = {pHSA: {A} Price Schedule for Heterogeneous Spectrum Auction},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2103--2108},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0323},
  doi          = {10.1109/TRUSTCOM.2016.0323},
  timestamp    = {Tue, 05 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/QinZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QuYYXGX16,
  author       = {Hongyang Qu and
                  Zhiwen Yu and
                  Zhiyong Yu and
                  Huang Xu and
                  Bin Guo and
                  Xing Xie},
  title        = {What Is My Next Job: Predicting the Company Size and Position in Career
                  Changes},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1668--1675},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0256},
  doi          = {10.1109/TRUSTCOM.2016.0256},
  timestamp    = {Fri, 23 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/QuYYXGX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RahmanBK16,
  author       = {Mohammad Shahriar Rahman and
                  Anirban Basu and
                  Shinsaku Kiyomoto},
  title        = {Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning
                  with Errors over Rings},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1759--1764},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0270},
  doi          = {10.1109/TRUSTCOM.2016.0270},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RahmanBK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RahmanEK16,
  author       = {Mohammad Shahriar Rahman and
                  Keita Emura and
                  Shinsaku Kiyomoto},
  title        = {On the Leakage Resilient Cryptography in Game-Theoretic Settings},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1984--1989},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0303},
  doi          = {10.1109/TRUSTCOM.2016.0303},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RahmanEK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RaoWZ16,
  author       = {Qiang Rao and
                  Jianjun Wang and
                  Liming Zhang},
  title        = {Enhancing Source Camera Identification Based on Multiplicative Denoising
                  Filter},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {983--988},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0165},
  doi          = {10.1109/TRUSTCOM.2016.0165},
  timestamp    = {Tue, 14 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RaoWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RenJZLW16,
  author       = {Yongjian Ren and
                  Dailiang Jin and
                  Dongyu Zheng and
                  Lei Liu and
                  Xinjing Wei},
  title        = {An Analytical Model of Data Plane Performance Subject to Prioritized
                  Service},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1537--1542},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0239},
  doi          = {10.1109/TRUSTCOM.2016.0239},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RenJZLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RongWLWX16,
  author       = {Hong Rong and
                  Huimei Wang and
                  Jian Liu and
                  Wei Wu and
                  Ming Xian},
  title        = {Efficient Integrity Verification of Secure Outsourced kNN Computation
                  in Cloud Environments},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {236--243},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0069},
  doi          = {10.1109/TRUSTCOM.2016.0069},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RongWLWX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SaadaouiSB16,
  author       = {Amina Saadaoui and
                  Nihel Ben Youssef Ben Souayeh and
                  Adel Bouhoula},
  title        = {An Accurate FDD-Based Approach for Discovering Distributed Firewalls
                  Misconfigurations},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {552--559},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0109},
  doi          = {10.1109/TRUSTCOM.2016.0109},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SaadaouiSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SangL0X16,
  author       = {Yafei Sang and
                  Shicong Li and
                  Yongzheng Zhang and
                  Tao Xu},
  title        = {ProDigger: Towards Robust Automatic Network Protocol Fingerprint Learning
                  via Byte Embedding},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {284--291},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0075},
  doi          = {10.1109/TRUSTCOM.2016.0075},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SangL0X16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SarantinosBAA16,
  author       = {Nikolaos Sarantinos and
                  Chafika Benzaid and
                  Omar Arabiat and
                  Ameer Al{-}Nemrat},
  title        = {Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in
                  Identifying Similarities},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1782--1787},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0274},
  doi          = {10.1109/TRUSTCOM.2016.0274},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SarantinosBAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SasagawaOK16,
  author       = {Takashi Sasagawa and
                  Satoshi Ohzahata and
                  Toshihiko Kato},
  title        = {Suppressing Selfish Transmissions with Extending {NAV} Period and
                  Resetting {CW} of Access Point in Wireless {LAN}},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1910--1916},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0292},
  doi          = {10.1109/TRUSTCOM.2016.0292},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SasagawaOK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ScoonK16,
  author       = {Craig Scoon and
                  Ryan K. L. Ko},
  title        = {The Data Privacy Matrix Project: Towards a Global Alignment of Data
                  Privacy Laws},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1998--2005},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0305},
  doi          = {10.1109/TRUSTCOM.2016.0305},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ScoonK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Serrano-PerezSC16,
  author       = {Jos{\'{e}} de Jes{\'{u}}s Serrano{-}P{\'{e}}rez and
                  Mois{\'{e}}s Salinas{-}Rosales and
                  Nareli Cruz Cort{\'{e}}s},
  title        = {Universal Steganography Detector Based on an Artificial Immune System
                  for {JPEG} Images},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1896--1903},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0290},
  doi          = {10.1109/TRUSTCOM.2016.0290},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Serrano-PerezSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShenXWG16,
  author       = {Chao Shen and
                  Haodi Xu and
                  Haijun Wang and
                  Xiaohong Guan},
  title        = {Handedness Recognition through Keystroke-Typing Behavior in Computer
                  Forensics Analysis},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1054--1060},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0175},
  doi          = {10.1109/TRUSTCOM.2016.0175},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShenXWG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShenZ16,
  author       = {Tong Shen and
                  Dafang Zhang},
  title        = {Rule Selector: {A} Novel Scalable Model for High-Performance Flow
                  Recognition},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1121--1128},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0184},
  doi          = {10.1109/TRUSTCOM.2016.0184},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShenZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShengGCWG16,
  author       = {Long Sheng and
                  Xiaoyun Guang and
                  Feng Chen and
                  Hui Wang and
                  Kang Gao},
  title        = {A Review on Complex Network Dynamics in Evolutionary Algorithm},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2221--2226},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0342},
  doi          = {10.1109/TRUSTCOM.2016.0342},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShengGCWG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShepherdAGLMASC16,
  author       = {Carlton Shepherd and
                  Ghada Arfaoui and
                  Iakovos Gurulian and
                  Robert P. Lee and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  Damien Sauveron and
                  Emmanuel Conchon},
  title        = {Secure and Trusted Execution: Past, Present, and Future - {A} Critical
                  Review in the Context of the Internet of Things and Cyber-Physical
                  Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {168--177},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0060},
  doi          = {10.1109/TRUSTCOM.2016.0060},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShepherdAGLMASC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShinoharaKSS16,
  author       = {Ryoki Shinohara and
                  Takashi Kamimoto and
                  Kazuya Sato and
                  Hiroshi Shigeno},
  title        = {Cache Control Method Mitigating Packet Concentration of Router Caused
                  by Interest Flooding Attack},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {324--331},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0080},
  doi          = {10.1109/TRUSTCOM.2016.0080},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShinoharaKSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShuGDYH16,
  author       = {Peng Shu and
                  Rong Gu and
                  Qianhao Dong and
                  Chunfeng Yuan and
                  Yihua Huang},
  title        = {Accelerating Big Data Applications on Tiered Storage System with Various
                  Eviction Policies},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1350--1357},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0214},
  doi          = {10.1109/TRUSTCOM.2016.0214},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShuGDYH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShuLLL16,
  author       = {Jian Shu and
                  Weijie Lin and
                  Linlan Liu and
                  Xuyan Luo},
  title        = {Topology Prediction Mechanism for Pocket Switched Network Based on
                  Deep Belief Network},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1811--1817},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0278},
  doi          = {10.1109/TRUSTCOM.2016.0278},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShuLLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SignorelloPG16,
  author       = {Salvatore Signorello and
                  Maria Rita Palattella and
                  Luigi Alfredo Grieco},
  title        = {Security Challenges in Future NDN-Enabled VANETs},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1771--1775},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0272},
  doi          = {10.1109/TRUSTCOM.2016.0272},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SignorelloPG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SilvaMPL16,
  author       = {Jo{\~{a}}o A. Silva and
                  Ricardo Monteiro and
                  Herv{\'{e}} Paulino and
                  Jo{\~{a}}o M. Louren{\c{c}}o},
  title        = {Ephemeral Data Storage for Networks of Hand-Held Devices},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1106--1113},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0182},
  doi          = {10.1109/TRUSTCOM.2016.0182},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SilvaMPL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Stricot-Tarboton16,
  author       = {Shaun Stricot{-}Tarboton and
                  Sivadon Chaisiri and
                  Ryan K. L. Ko},
  title        = {Taxonomy of Man-in-the-Middle Attacks on {HTTPS}},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {527--534},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0106},
  doi          = {10.1109/TRUSTCOM.2016.0106},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Stricot-Tarboton16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SuFYS16,
  author       = {Mang Su and
                  Anmin Fu and
                  Yan Yu and
                  Guozhen Shi},
  title        = {Resource-centric Dynamic Access Control in Cloud},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1957--1962},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0299},
  doi          = {10.1109/TRUSTCOM.2016.0299},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SuFYS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SuWWL16,
  author       = {Dan Su and
                  Wei Wang and
                  Xing Wang and
                  Jiqiang Liu},
  title        = {Anomadroid: Profiling Android Applications' Behaviors for Identifying
                  Unknown Malapps},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {691--698},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0127},
  doi          = {10.1109/TRUSTCOM.2016.0127},
  timestamp    = {Wed, 11 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SuWWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SuZLZ16,
  author       = {Xin Su and
                  Dafang Zhang and
                  Wenjia Li and
                  Kai Zhao},
  title        = {A Deep Learning Approach to Android Malware Feature Learning and Detection},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {244--251},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0070},
  doi          = {10.1109/TRUSTCOM.2016.0070},
  timestamp    = {Tue, 24 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SuZLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunLLL16,
  author       = {Yujie Sun and
                  Weijiang Liu and
                  Zhaobin Liu and
                  Chao Liu},
  title        = {Comparison of Five Packet-Sampling-Based Methods for Detecting Elephant
                  Flows},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2018--2023},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0308},
  doi          = {10.1109/TRUSTCOM.2016.0308},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunLLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunSDZH16,
  author       = {Degang Sun and
                  Jun Shi and
                  Xuejie Ding and
                  Meng Zhang and
                  Wei{-}qing Huang},
  title        = {Method for Detecting Information Leakage from Computer Display in
                  Electromagnetic Radiation},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2041--2046},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0312},
  doi          = {10.1109/TRUSTCOM.2016.0312},
  timestamp    = {Fri, 13 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunSDZH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunSLW16,
  author       = {Qian Sun and
                  Qingni Shen and
                  Cong Li and
                  Zhonghai Wu},
  title        = {SeLance: Secure Load Balancing of Virtual Machines in Cloud},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {662--669},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0123},
  doi          = {10.1109/TRUSTCOM.2016.0123},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunSLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunSZC16,
  author       = {Shibin Sun and
                  Yuliang Shi and
                  Shidong Zhang and
                  Lizhen Cui},
  title        = {A Privacy Protection Mechanism for NoSql Database Based on Data Chunks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {829--836},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0145},
  doi          = {10.1109/TRUSTCOM.2016.0145},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunSZC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TanY16,
  author       = {Yujuan Tan and
                  Zhichao Yan},
  title        = {Multi-objective Based Performance Evaluation of Deduplication Approaches},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1137--1144},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0186},
  doi          = {10.1109/TRUSTCOM.2016.0186},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TanY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TangLJW16,
  author       = {Hongyan Tang and
                  Ying Li and
                  Tong Jia and
                  Zhonghai Wu},
  title        = {Evaluating Performance of Rescheduling Strategies in Cloud System},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1559--1566},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0242},
  doi          = {10.1109/TRUSTCOM.2016.0242},
  timestamp    = {Thu, 20 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TangLJW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TaubmannRR16,
  author       = {Benjamin Taubmann and
                  No{\"{e}}lle Rakotondravony and
                  Hans P. Reiser},
  title        = {CloudPhylactor: Harnessing Mandatory Access Control for Virtual Machine
                  Introspection in Cloud Data Centers},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {957--964},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0162},
  doi          = {10.1109/TRUSTCOM.2016.0162},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TaubmannRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TengCSB16,
  author       = {Yiping Teng and
                  Xiang Cheng and
                  Sen Su and
                  Rong Bi},
  title        = {Privacy-Preserving Top-k Nearest Keyword Search on Outsourced Graphs},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {815--822},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0143},
  doi          = {10.1109/TRUSTCOM.2016.0143},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TengCSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TianQDL16,
  author       = {Jianbang Tian and
                  Zhuzhong Qian and
                  Mianxiong Dong and
                  Sanglu Lu},
  title        = {FairShare: Dynamic Max-Min Fairness Bandwidth Allocation in Datacenters},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1463--1470},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0229},
  doi          = {10.1109/TRUSTCOM.2016.0229},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TianQDL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TouatiHC16,
  author       = {Lyes Touati and
                  Hamed Hellaoui and
                  Yacine Challal},
  title        = {Threshold Yoking/Grouping Proofs Based on {CP-ABE} for IoT Applications},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {568--575},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0111},
  doi          = {10.1109/TRUSTCOM.2016.0111},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TouatiHC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TrojaB16,
  author       = {Erald Troja and
                  Spiridon Bakiras},
  title        = {Privacy-Preserving Location-Aware Mobile Advertisement},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {783--790},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0139},
  doi          = {10.1109/TRUSTCOM.2016.0139},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TrojaB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Tse16,
  author       = {Savio S. H. Tse},
  title        = {Bicriteria Load Balancing for Online Placement in Heterogeneous Servers
                  with Extreme Upper Bounds},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1319--1326},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0210},
  doi          = {10.1109/TRUSTCOM.2016.0210},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Tse16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TseWL16,
  author       = {Daniel Tse and
                  Lu Wang and
                  Yuxi Li},
  title        = {Mobility Management for Enterprises in {BYOD} Deployment},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {638--645},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0120},
  doi          = {10.1109/TRUSTCOM.2016.0120},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TseWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/UsmanJHN16,
  author       = {Muhammad Usman and
                  Mian Ahmad Jan and
                  Xiangjian He and
                  Priyadarsi Nanda},
  title        = {Data Sharing in Secure Multimedia Wireless Sensor Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {590--597},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0114},
  doi          = {10.1109/TRUSTCOM.2016.0114},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/UsmanJHN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangALLH16,
  author       = {Yaobin Wang and
                  Hong An and
                  Zhiqin Liu and
                  Ling Li and
                  Jun Huang},
  title        = {A Flexible Chip Multiprocessor Simulator Dedicated for Thread Level
                  Speculation},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2127--2132},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0327},
  doi          = {10.1109/TRUSTCOM.2016.0327},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangALLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangCCZLW16,
  author       = {Hui Wang and
                  Xiaohe Chen and
                  Xinjian Chen and
                  Peilin Zang and
                  Yunqing Liu and
                  Lirong Wang},
  title        = {Fall Detection Based on {KPCA} and 3D {KPCA}},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2187--2191},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0336},
  doi          = {10.1109/TRUSTCOM.2016.0336},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangCCZLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangJMH16,
  author       = {Ying Wang and
                  Yang Ju and
                  Tiantian Miao and
                  Rongxi He},
  title        = {Chunk-Based Resource Allocation with Fairness Consideration for Layered
                  Multicast Streaming in {OFDMA} Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2047--2051},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0313},
  doi          = {10.1109/TRUSTCOM.2016.0313},
  timestamp    = {Tue, 13 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangJMH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangLDQ16,
  author       = {Jun Wang and
                  Zhiyang Li and
                  Yegang Du and
                  Wenyu Qu},
  title        = {Stacked Product Quantization for Nearest Neighbor Search on Large
                  Datasets},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1621--1627},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0250},
  doi          = {10.1109/TRUSTCOM.2016.0250},
  timestamp    = {Tue, 10 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangLDQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangLGQM16,
  author       = {Yuwei Wang and
                  Min Liu and
                  Bo Gao and
                  Chenchong Qin and
                  Cheng Ma},
  title        = {{I/O} Congestion-Aware Computing Resource Assignment and Scheduling
                  in Virtualized Cloud Environments},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1280--1287},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0205},
  doi          = {10.1109/TRUSTCOM.2016.0205},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangLGQM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangLLWC16,
  author       = {Shiqing Wang and
                  Yuanyuan Li and
                  Zhiyang Li and
                  Junfeng Wu and
                  Fengjuan Chen},
  title        = {Surveillance Methods of Running Condition of Chemical Equipments Based
                  on Skyline},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2246--2250},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0346},
  doi          = {10.1109/TRUSTCOM.2016.0346},
  timestamp    = {Mon, 28 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangLLWC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangLZX16,
  author       = {Changhai Wang and
                  Meng Li and
                  Jianzhong Zhang and
                  Yuwei Xu},
  title        = {A Model with Hierarchical Classifiers for Activity Recognition on
                  Mobile Devices},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1295--1301},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0207},
  doi          = {10.1109/TRUSTCOM.2016.0207},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangLZX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangSSL16,
  author       = {Bo Wang and
                  Ying Song and
                  Yuzhong Sun and
                  Jun Liu},
  title        = {Improvements to Online Distributed Monitoring Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1093--1100},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0180},
  doi          = {10.1109/TRUSTCOM.2016.0180},
  timestamp    = {Fri, 10 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangSSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangSZ16,
  author       = {Shu{-}Yan Wang and
                  Jia{-}Ze Sun and
                  Ju Zhang},
  title        = {The Method of Generating Web Link Security Testing Scenario Based
                  on {UML} Diagram},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1831--1838},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0281},
  doi          = {10.1109/TRUSTCOM.2016.0281},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangW16,
  author       = {Jiequn Wang and
                  Lei Wang},
  title        = {A Novel Solution of Data Analysis in Modern Sports Education},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2269--2272},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0350},
  doi          = {10.1109/TRUSTCOM.2016.0350},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangWCZ16,
  author       = {Yan Wang and
                  Lirong Wang and
                  Xiaohe Chen and
                  Wenliang Zhu},
  title        = {P Wave Detection and Delineation Based on Distances Transform},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2197--2201},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0338},
  doi          = {10.1109/TRUSTCOM.2016.0338},
  timestamp    = {Tue, 28 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangWCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangWGM16,
  author       = {Liang Wang and
                  Weiping Wang and
                  Jingzi Gu and
                  Dan Meng},
  title        = {Delta-Generalization: High Accuracy Data Release for Privacy Preserving},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1861--1866},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0285},
  doi          = {10.1109/TRUSTCOM.2016.0285},
  timestamp    = {Thu, 13 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangWGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangWHW16,
  author       = {Xueyi Wang and
                  Xingwei Wang and
                  Min Huang and
                  Zun Wang},
  title        = {Combinatorial Reverse Auction-Based Service Provision in Social Clouds},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2097--2102},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0322},
  doi          = {10.1109/TRUSTCOM.2016.0322},
  timestamp    = {Mon, 04 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangWHW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangXHXH16,
  author       = {Caimei Wang and
                  Yan Xiong and
                  Wenchao Huang and
                  Huihua Xia and
                  Jianmeng Huang},
  title        = {Formal Analysis of Selective Disclosure Attribute-Based Credential
                  System in Applied Pi Calculus},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {42--49},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0044},
  doi          = {10.1109/TRUSTCOM.2016.0044},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangXHXH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangXZY16,
  author       = {Changhai Wang and
                  Yuwei Xu and
                  Jianzhong Zhang and
                  Wenping Yu},
  title        = {{SW-HMM:} {A} Method for Evaluating Confidence of Smartphone-Based
                  Activity Recognition},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2086--2091},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0320},
  doi          = {10.1109/TRUSTCOM.2016.0320},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangXZY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangYHXLS16,
  author       = {Jie Wang and
                  Ce Yu and
                  Zhi Hong and
                  Jian Xiao and
                  Chen Li and
                  Jizhou Sun},
  title        = {Pattern Aware Cache Management for Efficient Subset Retrieving of
                  Astronomical Image Data},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1396--1403},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0220},
  doi          = {10.1109/TRUSTCOM.2016.0220},
  timestamp    = {Wed, 21 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangYHXLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangYTZH16,
  author       = {Xiaolei Wang and
                  Yuexiang Yang and
                  Chuan Tang and
                  Yingzhi Zeng and
                  Jie He},
  title        = {DroidContext: Identifying Malicious Mobile Privacy Leak Using Context},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {807--814},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0142},
  doi          = {10.1109/TRUSTCOM.2016.0142},
  timestamp    = {Tue, 20 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangYTZH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangYZLZ16,
  author       = {Ziyu Wang and
                  Jiahai Yang and
                  Shize Zhang and
                  Chenxi Li and
                  Hui Zhang},
  title        = {Automatic Model Selection for Anomaly Detection},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {276--283},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0074},
  doi          = {10.1109/TRUSTCOM.2016.0074},
  timestamp    = {Sat, 20 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangYZLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangZLW16,
  author       = {Shijia Wang and
                  Liang Zhou and
                  Yuanyuan Li and
                  Junfeng Wu},
  title        = {Parallel Monte Carlo Method with MapReduce for Option Pricing},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2116--2121},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0325},
  doi          = {10.1109/TRUSTCOM.2016.0325},
  timestamp    = {Mon, 28 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangZLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangZWY16,
  author       = {Yu Wang and
                  Yuqing Zhang and
                  Kai Wang and
                  Jingbo Yan},
  title        = {Security Analysis and Vulnerability Detection of Gesture-Based Lock
                  in Android Applications},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {410--417},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0091},
  doi          = {10.1109/TRUSTCOM.2016.0091},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangZWY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WeiJZZX16,
  author       = {Xiaochao Wei and
                  Han Jiang and
                  Chuan Zhao and
                  Minghao Zhao and
                  Qiuliang Xu},
  title        = {Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {418--425},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0092},
  doi          = {10.1109/TRUSTCOM.2016.0092},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WeiJZZX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WeiPYLWM16,
  author       = {Yi Wei and
                  Li Pan and
                  Dong Yuan and
                  Shijun Liu and
                  Lei Wu and
                  Xiangxu Meng},
  title        = {A Distributed Game-Theoretic Approach for IaaS Service Trading in
                  an Auction-Based Cloud Market},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1543--1550},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0240},
  doi          = {10.1109/TRUSTCOM.2016.0240},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WeiPYLWM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WenDZJ16,
  author       = {Zilong Wen and
                  Weiqi Dai and
                  Deqing Zou and
                  Hai Jin},
  title        = {PerfDoc: Automatic Performance Bug Diagnosis in Production Cloud Computing
                  Infrastructures},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {683--690},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0126},
  doi          = {10.1109/TRUSTCOM.2016.0126},
  timestamp    = {Thu, 24 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WenDZJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WenY16,
  author       = {Juping Wen and
                  QingDan Yuan},
  title        = {Social Circles Discovery Based on Structural and Attribute Similarities},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1652--1659},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0254},
  doi          = {10.1109/TRUSTCOM.2016.0254},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WenY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WengL16,
  author       = {Wu{-}Xiang Weng and
                  Shou{-}Chih Lo},
  title        = {Fall Detection Based on Tilt Angle and Acceleration Variations},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1712--1717},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0262},
  doi          = {10.1109/TRUSTCOM.2016.0262},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WengL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WengLL16,
  author       = {Xu Weng and
                  Zhaobin Liu and
                  Zhiyang Li},
  title        = {An Efficient Influence Maximization Algorithm Considering Both Positive
                  and Negative Relationships},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1931--1936},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0295},
  doi          = {10.1109/TRUSTCOM.2016.0295},
  timestamp    = {Wed, 11 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WengLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WillKW16,
  author       = {Mark A. Will and
                  Ryan K. L. Ko and
                  Ian H. Witten},
  title        = {Privacy Preserving Computation by Fragmenting Individual Bits and
                  Distributing Gates},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {900--908},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0154},
  doi          = {10.1109/TRUSTCOM.2016.0154},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WillKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuHWX16,
  author       = {Genqiang Wu and
                  Yeping He and
                  JingZheng Wu and
                  Xianyao Xia},
  title        = {Inherit Differential Privacy in Distributed Setting: Multiparty Randomized
                  Function Computation},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {921--928},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0157},
  doi          = {10.1109/TRUSTCOM.2016.0157},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuHWX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuHYSSZ16,
  author       = {Renke Wu and
                  Linpeng Huang and
                  Peng Yu and
                  Kai Shen and
                  Qiuwei Shi and
                  Haojie Zhou},
  title        = {Meta-Model Evolution with Self-Adaptation: An Empirical Development
                  Approach for Distributed Parallel Computing Framework},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2227--2234},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0343},
  doi          = {10.1109/TRUSTCOM.2016.0343},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuHYSSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuLLJ16,
  author       = {Jigang Wu and
                  Ningjing Liu and
                  Siew Kei Lam and
                  Guiyuan Jiang},
  title        = {Shortest Partial Path First Algorithm for Reconfigurable Processor
                  Array with Faults},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1198--1203},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0194},
  doi          = {10.1109/TRUSTCOM.2016.0194},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuLLJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuLWHL16,
  author       = {Jain{-}Shing Wu and
                  Yuh{-}Jye Lee and
                  Te{-}En Wei and
                  Chih{-}Hung Hsieh and
                  Chia{-}Min Lai},
  title        = {ChainSpot: Mining Service Logs for Cyber Security Threat Detection},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1867--1874},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0286},
  doi          = {10.1109/TRUSTCOM.2016.0286},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuLWHL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuWQJLXS16,
  author       = {Junfeng Wu and
                  Yitong Wan and
                  Wenyu Qu and
                  Changqing Ji and
                  Yuanyuan Li and
                  Peng Xiao and
                  Jianwei Sun},
  title        = {A Novel Image Retrieval Approach with Bag-of-Word Model and Gabor
                  Feature},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1706--1711},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0261},
  doi          = {10.1109/TRUSTCOM.2016.0261},
  timestamp    = {Mon, 28 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuWQJLXS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuXCZ16,
  author       = {Danye Wu and
                  Zhiwei Xu and
                  Bo Chen and
                  Yujun Zhang},
  title        = {What If Routers Are Malicious? Mitigating Content Poisoning Attack
                  in {NDN}},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {481--488},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0100},
  doi          = {10.1109/TRUSTCOM.2016.0100},
  timestamp    = {Fri, 15 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuXCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuZL0W16,
  author       = {Huijun Wu and
                  Liming Zhu and
                  Kai Lu and
                  Gen Li and
                  Dongyao Wu},
  title        = {StageFS: {A} Parallel File System Optimizing Metadata Performance
                  for {SSD} Based Clusters},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2147--2152},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0330},
  doi          = {10.1109/TRUSTCOM.2016.0330},
  timestamp    = {Thu, 28 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuZL0W16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaWP16,
  author       = {Hui Xia and
                  Guo{-}Dong Wang and
                  Zhenkuan Pan},
  title        = {Node Trust Prediction Framework in Mobile Ad Hoc Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {50--56},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0045},
  doi          = {10.1109/TRUSTCOM.2016.0045},
  timestamp    = {Mon, 04 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaWP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaoAC16,
  author       = {Hannan Xiao and
                  Awatif Ali Alshehri and
                  Bruce Christianson},
  title        = {A Cloud-Based {RFID} Authentication Protocol with Insecure Communication
                  Channels},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {332--339},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0081},
  doi          = {10.1109/TRUSTCOM.2016.0081},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaoAC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaoCCWLWB16,
  author       = {Yajuan Xiao and
                  Shoufeng Cao and
                  Zhenzhong Cao and
                  Fengyu Wang and
                  Fengbo Lin and
                  Jiayan Wu and
                  Hancheng Bi},
  title        = {Matching Similar Functions in Different Versions of a Malware},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {252--259},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0071},
  doi          = {10.1109/TRUSTCOM.2016.0071},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaoCCWLWB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaoLQQY16,
  author       = {Peng Xiao and
                  Zhiyang Li and
                  Heng Qi and
                  Wenyu Qu and
                  Haisheng Yu},
  title        = {An Efficient DDoS Detection with Bloom Filter in {SDN}},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0038},
  doi          = {10.1109/TRUSTCOM.2016.0038},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaoLQQY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaoWJM16,
  author       = {Peipei Xiao and
                  Yufeng Wang and
                  Qun Jin and
                  Jianhua Ma},
  title        = {A Privacy-Preserving Incentive Scheme for Advertisement Dissemination
                  in Vehicular Social Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1741--1746},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0267},
  doi          = {10.1109/TRUSTCOM.2016.0267},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaoWJM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaoXLL16,
  author       = {Xiongren Xiao and
                  Guoqi Xie and
                  Renfa Li and
                  Keqin Li},
  title        = {Minimizing Schedule Length of Energy Consumption Constrained Parallel
                  Applications on Heterogeneous Distributed Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1471--1476},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0230},
  doi          = {10.1109/TRUSTCOM.2016.0230},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaoXLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XieWL16,
  author       = {Yuanyuan Xie and
                  Jiang Wu and
                  Fengzhu Liu},
  title        = {A Hierarchic Hybrid Scheduling Algorithm for Static Task with Precedence
                  Constraints},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2079--2085},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0319},
  doi          = {10.1109/TRUSTCOM.2016.0319},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XieWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XieZLLG16,
  author       = {Tianyi Xie and
                  Yuanyuan Zhang and
                  Juanru Li and
                  Hui Liu and
                  Dawu Gu},
  title        = {New Exploit Methods against Ptmalloc of {GLIBC}},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {646--653},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0121},
  doi          = {10.1109/TRUSTCOM.2016.0121},
  timestamp    = {Wed, 21 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XieZLLG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuCCSZ16,
  author       = {Youjun Xu and
                  Xianglan Chen and
                  Zhinan Cheng and
                  Jiachen Song and
                  Yuxiang Zhang},
  title        = {Improving Energy Efficiency by Phase-Grained Migration for Asymmetric
                  Multicore},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1412--1419},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0222},
  doi          = {10.1109/TRUSTCOM.2016.0222},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuCCSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuFGSPSY16,
  author       = {Jingheng Xu and
                  Haohuan Fu and
                  Lin Gan and
                  Yu Song and
                  Hongbo Peng and
                  Wen Shi and
                  Guangwen Yang},
  title        = {Evaluating the {POWER8} Architecture through Optimizing Stencil-Based
                  Algorithms},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1374--1381},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0217},
  doi          = {10.1109/TRUSTCOM.2016.0217},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuFGSPSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuH16,
  author       = {Yuanchao Xu and
                  Zeyi Hou},
  title        = {NVM-Assisted Non-redundant Logging for Android Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1427--1433},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0224},
  doi          = {10.1109/TRUSTCOM.2016.0224},
  timestamp    = {Wed, 05 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuHYL16,
  author       = {Wen Xu and
                  Jiangqiang Hu and
                  Jianchuan Yin and
                  Ke Li},
  title        = {Ship Automatic Collision Avoidance by Altering Course Based on Ship
                  Dynamic Domain},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2024--2030},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0309},
  doi          = {10.1109/TRUSTCOM.2016.0309},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuHYL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuLLQ16,
  author       = {Renhai Xu and
                  Wenxin Li and
                  Keqiu Li and
                  Heng Qi},
  title        = {Towards Application-Aware In-Network Bandwidth Management in Data
                  Centers},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2206--2212},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0340},
  doi          = {10.1109/TRUSTCOM.2016.0340},
  timestamp    = {Tue, 13 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuLLQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuLNCZ16,
  author       = {Shibo Xu and
                  Qingzhou Li and
                  Peng Ni and
                  Wensheng Cao and
                  Xianfeng Zhao},
  title        = {The Application of Ad-Hoc Network in Smart Container Tracking System},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2068--2072},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0317},
  doi          = {10.1109/TRUSTCOM.2016.0317},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuLNCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuWLS16,
  author       = {Yemao Xu and
                  Jialong Wang and
                  Yanhong Liu and
                  Li Shen},
  title        = {Fast Task Submission in Software Thread Level Speculation Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2160--2166},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0332},
  doi          = {10.1109/TRUSTCOM.2016.0332},
  timestamp    = {Thu, 03 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuWLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuZY16,
  author       = {Zhikai Xu and
                  Hongli Zhang and
                  Xiang{-}Zhan Yu},
  title        = {Multiple Mix-Zones Deployment for Continuous Location Privacy Protection},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {760--766},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0136},
  doi          = {10.1109/TRUSTCOM.2016.0136},
  timestamp    = {Sun, 19 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuZY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XueHZ16,
  author       = {Nian Xue and
                  Xin Huang and
                  Jie Zhang},
  title        = {S2Net: {A} Security Framework for Software Defined Intelligent Building
                  Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {654--661},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0122},
  doi          = {10.1109/TRUSTCOM.2016.0122},
  timestamp    = {Sat, 12 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XueHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangCWGX16,
  author       = {Liu Yang and
                  Xingmin Cui and
                  Changyuan Wang and
                  Shanqing Guo and
                  Xin{-}Shun Xu},
  title        = {Risk Analysis of Exposed Methods to JavaScript in Hybrid Apps},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {458--464},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0097},
  doi          = {10.1109/TRUSTCOM.2016.0097},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangCWGX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangHLYY16,
  author       = {Xinyu Yang and
                  Xiaofei He and
                  Jie Lin and
                  Wei Yu and
                  Qingyu Yang},
  title        = {A Game-Theoretic Model on Coalitional Attacks in Smart Grid},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {435--442},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0094},
  doi          = {10.1109/TRUSTCOM.2016.0094},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangHLYY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangJXHWZC16,
  author       = {Xiaoyan Yang and
                  Han Jiang and
                  Qiuliang Xu and
                  Mengbo Hou and
                  Xiaochao Wei and
                  Minghao Zhao and
                  Kim{-}Kwang Raymond Choo},
  title        = {A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated
                  Key Exchange Protocol},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {670--677},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0124},
  doi          = {10.1109/TRUSTCOM.2016.0124},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangJXHWZC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangLLH16,
  author       = {Xu Yang and
                  Ting{-}Ting Lee and
                  Joseph K. Liu and
                  Xinyi Huang},
  title        = {Trust Enhancement over Range Search for Encrypted Data},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {66--73},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0047},
  doi          = {10.1109/TRUSTCOM.2016.0047},
  timestamp    = {Wed, 17 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangLLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangSYW16,
  author       = {Yan Yang and
                  Xingang Shi and
                  Xia Yin and
                  Zhiliang Wang},
  title        = {The Power of Prefix Hijackings in the Internet Hierarchy},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {228--235},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0068},
  doi          = {10.1109/TRUSTCOM.2016.0068},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangSYW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangZLZ16,
  author       = {Xu Yang and
                  Yuexin Zhang and
                  Joseph K. Liu and
                  YaLi Zeng},
  title        = {A Trust and Privacy Preserving Handover Authentication Protocol for
                  Wireless Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {138--143},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0056},
  doi          = {10.1109/TRUSTCOM.2016.0056},
  timestamp    = {Tue, 30 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangZLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YiMLYW16,
  author       = {Zibo Yi and
                  Jun Ma and
                  Lei Luo and
                  Jie Yu and
                  Qingbo Wu},
  title        = {Improving JavaScript Malware Classifier's Security against Evasion
                  by Particle Swarm Optimization},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1734--1740},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0266},
  doi          = {10.1109/TRUSTCOM.2016.0266},
  timestamp    = {Wed, 22 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YiMLYW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Yin0L16,
  author       = {Tao Yin and
                  Yongzheng Zhang and
                  Jia Li},
  title        = {AppBot: {A} Novel {P2P} Botnet Architecture Resistant to Graph-Based
                  Tracking},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {615--622},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0117},
  doi          = {10.1109/TRUSTCOM.2016.0117},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Yin0L16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuCZ16,
  author       = {Fajiang Yu and
                  Lie Chen and
                  Huanguo Zhang},
  title        = {Virtual {TPM} Dynamic Trust Extension Suitable for Frequent Migrations},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {57--65},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0046},
  doi          = {10.1109/TRUSTCOM.2016.0046},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuSWR16,
  author       = {Fangwen Yu and
                  Ming Su and
                  Gang Wang and
                  Mingming Ren},
  title        = {Error Decomposition Algorithm for Approximating the k-Error Linear
                  Complexity of Periodic Sequences},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {505--510},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0103},
  doi          = {10.1109/TRUSTCOM.2016.0103},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuSWR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZengLXZ16,
  author       = {Fanzi Zeng and
                  Jie Li and
                  Jisheng Xu and
                  Jing Zhong},
  title        = {A Trust-Based Cooperative Spectrum Sensing Scheme against {SSDF} Attack
                  in CRNs},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1167--1173},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0190},
  doi          = {10.1109/TRUSTCOM.2016.0190},
  timestamp    = {Fri, 10 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZengLXZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZengWWCLW16,
  author       = {Juru Zeng and
                  Yuncheng Wu and
                  Yao Wu and
                  Hong Chen and
                  Cuiping Li and
                  Shan Wang},
  title        = {Energy-Efficient and Privacy-Preserving Range Query in Participatory
                  Sensing},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {876--883},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0151},
  doi          = {10.1109/TRUSTCOM.2016.0151},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZengWWCLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Zhang0QWL16,
  author       = {Wei Zhang and
                  Sheng Zhang and
                  Zhuzhong Qian and
                  Kaiyuan Wen and
                  Sanglu Lu},
  title        = {Virtual Network Deployment in Hybrid Data Center Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1256--1263},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0202},
  doi          = {10.1109/TRUSTCOM.2016.0202},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Zhang0QWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Zhang16,
  author       = {Jiliang Zhang},
  title        = {Combinational Logic Binding for {FPGA} System Security},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {216--223},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0066},
  doi          = {10.1109/TRUSTCOM.2016.0066},
  timestamp    = {Thu, 23 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Zhang16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangC16,
  author       = {Huirong Zhang and
                  Jianwen Cao},
  title        = {A Subgraph Preconditioning Algorithm for Large Linear Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2153--2159},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0331},
  doi          = {10.1109/TRUSTCOM.2016.0331},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangFCYZ16,
  author       = {Zheng Zhang and
                  Dan Feng and
                  Jianxi Chen and
                  Ya Yu and
                  Jing Zeng},
  title        = {The Design and Implementation of a Lightweight Management Framework
                  for Non-volatile Memory},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1551--1558},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0241},
  doi          = {10.1109/TRUSTCOM.2016.0241},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangFCYZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangHMYJ16,
  author       = {Yunan Zhang and
                  Qingjia Huang and
                  Xinjian Ma and
                  Zeming Yang and
                  Jianguo Jiang},
  title        = {Using Multi-features and Ensemble Learning Method for Imbalanced Malware
                  Classification},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {965--973},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0163},
  doi          = {10.1109/TRUSTCOM.2016.0163},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangHMYJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangJ016,
  author       = {Qian Zhang and
                  Ying Jiang and
                  Peng Wu},
  title        = {Modelling and Analysis of Network Security - An Algebraic Approach},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {308--315},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0078},
  doi          = {10.1109/TRUSTCOM.2016.0078},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangJ016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLHZ16,
  author       = {Jian Zhang and
                  Pin Liu and
                  Jianbiao He and
                  Yawei Zhang},
  title        = {A Hadoop Based Analysis and Detection Model for {IP} Spoofing Typed
                  DDoS Attack},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1976--1983},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0302},
  doi          = {10.1109/TRUSTCOM.2016.0302},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLLXC16,
  author       = {Shuai Zhang and
                  Lei Liu and
                  Hui Li and
                  Zongshui Xiao and
                  Lizhen Cui},
  title        = {MTPGraph: {A} Data-Driven Approach to Predict Medical Risk Based on
                  Temporal Profile Graph},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1174--1181},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0191},
  doi          = {10.1109/TRUSTCOM.2016.0191},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLLXC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLMC16,
  author       = {Puheng Zhang and
                  Chuang Lin and
                  Kun Meng and
                  Ying Chen},
  title        = {A Comprehensive Optimization for Performance, Energy Efficiency, and
                  Maintenance in Cloud Datacenters},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1264--1271},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0203},
  doi          = {10.1109/TRUSTCOM.2016.0203},
  timestamp    = {Thu, 11 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLMC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLW16,
  author       = {Shaobo Zhang and
                  Qin Liu and
                  Guojun Wang},
  title        = {Enhancing Location Privacy through User-Defined Grid in Location-Based
                  Services},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {730--736},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0132},
  doi          = {10.1109/TRUSTCOM.2016.0132},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLY16,
  author       = {Yong Zhang and
                  Bo Liu and
                  Fan Yang},
  title        = {Differential Evolution Based Selective Ensemble of Extreme Learning
                  Machine},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1327--1333},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0211},
  doi          = {10.1109/TRUSTCOM.2016.0211},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLYSC16,
  author       = {Xinwen Zhang and
                  Huakang Li and
                  Yitao Yang and
                  Guozi Sun and
                  Guangxuan Chen},
  title        = {{LIPPS:} Logistics Information Privacy Protection System Based on
                  Encrypted {QR} Code},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {996--1000},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0167},
  doi          = {10.1109/TRUSTCOM.2016.0167},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLYSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLZ16,
  author       = {Jiexin Zhang and
                  Xiaoxue Liu and
                  Peidong Zhu},
  title        = {Securing Power System State Estimation},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {699--706},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0128},
  doi          = {10.1109/TRUSTCOM.2016.0128},
  timestamp    = {Tue, 01 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangPWL16,
  author       = {Jianyi Zhang and
                  Yang Pan and
                  Zhiqiang Wang and
                  Biao Liu},
  title        = {{URL} Based Gateway Side Phishing Detection Method},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {268--275},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0073},
  doi          = {10.1109/TRUSTCOM.2016.0073},
  timestamp    = {Mon, 06 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangPWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangTTLS16,
  author       = {Heng Zhang and
                  Ahmed Taha and
                  Rub{\'{e}}n Trapero and
                  Jesus Luna and
                  Neeraj Suri},
  title        = {{SENTRY:} {A} Novel Approach for Mitigating Application Layer DDoS
                  Threats},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {465--472},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0098},
  doi          = {10.1109/TRUSTCOM.2016.0098},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangTTLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangXJJ16,
  author       = {Guozhu Zhang and
                  Luning Xia and
                  Shijie Jia and
                  Yafei Ji},
  title        = {Identification of Cloned {HF} {RFID} Proximity Cards Based on {RF}
                  Fingerprinting},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {292--300},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0076},
  doi          = {10.1109/TRUSTCOM.2016.0076},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangXJJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangXZZ16,
  author       = {Yang Zhang and
                  Zuocheng Xing and
                  Li Zhou and
                  Chunsheng Zhu},
  title        = {Locality Protected Dynamic Cache Allocation Scheme on GPUs},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1524--1530},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0237},
  doi          = {10.1109/TRUSTCOM.2016.0237},
  timestamp    = {Mon, 10 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangXZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangZW16,
  author       = {Qijia Zhang and
                  Fangjin Zhu and
                  Canhui Wang},
  title        = {An Enhanced Node Mapping Algorithm for {VNE} Problem Based on Path
                  Relevance},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1204--1209},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0195},
  doi          = {10.1109/TRUSTCOM.2016.0195},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaoY16,
  author       = {Jian Zhao and
                  Jianchuan Yin},
  title        = {Study on the Control of Fractional-Order {PID} for Underwater Vehicle
                  Attitude Angle},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2035--2040},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0311},
  doi          = {10.1109/TRUSTCOM.2016.0311},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhaoY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaoZ16,
  author       = {Huan Zhao and
                  Xixiang Zhang},
  title        = {A Mobile Security-Related Behavior Prevention Model Based on Speech
                  Personality Traits},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1803--1810},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0277},
  doi          = {10.1109/TRUSTCOM.2016.0277},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhaoZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhengJHLW16,
  author       = {Dongyu Zheng and
                  Dailiang Jin and
                  Yuanzhe Hao and
                  Lei Liu and
                  Xinjing Wei},
  title        = {Prediction of Consecutive Road Node Congestion Based on Queueing Model},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1531--1536},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0238},
  doi          = {10.1109/TRUSTCOM.2016.0238},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhengJHLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhengYSM16,
  author       = {Xianyi Zheng and
                  Lulu Yang and
                  Gang Shi and
                  Dan Meng},
  title        = {Secure Mobile Payment Employing Trusted Computing on TrustZone Enabled
                  Platforms},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1944--1950},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0297},
  doi          = {10.1109/TRUSTCOM.2016.0297},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhengYSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouCSL16,
  author       = {Kailai Zhou and
                  Hong Chen and
                  Hui Sun and
                  Cuiping Li},
  title        = {A Skew-Insensitive Hashing Sync and Construction Scheme for Many-Core
                  Coprocessors},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1334--1341},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0212},
  doi          = {10.1109/TRUSTCOM.2016.0212},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouCSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouCZZ16,
  author       = {Tianqi Zhou and
                  Bing Chen and
                  Chunsheng Zhu and
                  Xiangping Zhai},
  title        = {{TPAHS:} {A} Truthful and Profit Maximizing Double Auction for Heterogeneous
                  Spectrums},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {27--33},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0042},
  doi          = {10.1109/TRUSTCOM.2016.0042},
  timestamp    = {Wed, 16 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouCZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouLLW16,
  author       = {Lei Zhou and
                  Xiaowei Liu and
                  Qin Liu and
                  Guojun Wang},
  title        = {A Cleanroom Monitoring System for Network Computing Service Based
                  on Remote Attestation},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {451--457},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0096},
  doi          = {10.1109/TRUSTCOM.2016.0096},
  timestamp    = {Mon, 23 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouLLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouSWOA16,
  author       = {Xinping Zhou and
                  Degang Sun and
                  Zhu Wang and
                  Changhai Ou and
                  Juan Ai},
  title        = {Double-Key Recovery Based Correlation Power Analysis},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1016--1022},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0170},
  doi          = {10.1109/TRUSTCOM.2016.0170},
  timestamp    = {Fri, 18 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouSWOA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouSY16,
  author       = {Bo Zhou and
                  Qi Shi and
                  Po Yang},
  title        = {A Survey on Quantitative Evaluation of Web Service Security},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {715--721},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0130},
  doi          = {10.1109/TRUSTCOM.2016.0130},
  timestamp    = {Mon, 09 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouWQHL16,
  author       = {Xiuwen Zhou and
                  Qianhong Wu and
                  Bo Qin and
                  Xinyi Huang and
                  Jianwei Liu},
  title        = {Distributed Bitcoin Account Management},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {105--112},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0052},
  doi          = {10.1109/TRUSTCOM.2016.0052},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouWQHL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouXGC16,
  author       = {Jiang Zhou and
                  Wei Xie and
                  Qiang Gu and
                  Yong Chen},
  title        = {Hierarchical Consistent Hashing for Heterogeneous Object-Based Storage},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1597--1604},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0247},
  doi          = {10.1109/TRUSTCOM.2016.0247},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouXGC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouZJL16,
  author       = {Zhiwei Zhou and
                  Junwu Zhu and
                  Yi Jiang and
                  Bin Li},
  title        = {A Truthful Greedy Mechanism toward Resource Sharing for Cloudlets
                  in Mobile Cloud Computing},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1241--1247},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0200},
  doi          = {10.1109/TRUSTCOM.2016.0200},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouZJL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouZXC16,
  author       = {Huibin Zhou and
                  Dafang Zhang and
                  Kun Xie and
                  Yuxiang Chen},
  title        = {Robust Spatio-temporal Tensor Recovery for Internet Traffic Data},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1404--1411},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0221},
  doi          = {10.1109/TRUSTCOM.2016.0221},
  timestamp    = {Wed, 18 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouZXC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuCWW16,
  author       = {Wenliang Zhu and
                  Xiaohe Chen and
                  Yan Wang and
                  Lirong Wang},
  title        = {The Survey of Low-Power Sleep Monitoring Algorithm Based on the Wrist
                  Movement Signal},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2192--2196},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0337},
  doi          = {10.1109/TRUSTCOM.2016.0337},
  timestamp    = {Tue, 28 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuCWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuCZWK16,
  author       = {Dali Zhu and
                  Junhuang Chen and
                  Yanfang Zhang and
                  Siye Wang and
                  Huafeng Kong},
  title        = {An Efficient Approach of Integrating {RFID} and Vision Techniques
                  in Object Surveillance System},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1023--1029},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0171},
  doi          = {10.1109/TRUSTCOM.2016.0171},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuCZWK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuJL16,
  author       = {Liang Zhu and
                  Hai Jin and
                  Xiaofei Liao},
  title        = {A Tool to Detect Performance Problems of Multi-threaded Programs on
                  {NUMA} Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1145--1152},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0187},
  doi          = {10.1109/TRUSTCOM.2016.0187},
  timestamp    = {Wed, 23 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuJL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuLW16,
  author       = {Xiaoyu Zhu and
                  Qin Liu and
                  Guojun Wang},
  title        = {A Novel Verifiable and Dynamic Fuzzy Keyword Search Scheme over Encrypted
                  Data in Cloud Computing},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {845--851},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0147},
  doi          = {10.1109/TRUSTCOM.2016.0147},
  timestamp    = {Mon, 23 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuPLRF16,
  author       = {Dali Zhu and
                  Na Pang and
                  Gang Li and
                  Wenjing Rong and
                  Zheming Fan},
  title        = {WiN: Non-invasive Abnormal Activity Detection Leveraging Fine-Grained
                  WiFi Signals},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {744--751},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0134},
  doi          = {10.1109/TRUSTCOM.2016.0134},
  timestamp    = {Tue, 04 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuPLRF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuWXCW16,
  author       = {Hong Zhu and
                  Bin Wu and
                  Meiyi Xie and
                  Zongmin Cui and
                  Zongda Wu},
  title        = {Secure Shortest Path Search over Encrypted Graph Supporting Synonym
                  Query in Cloud Computing},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {497--504},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0102},
  doi          = {10.1109/TRUSTCOM.2016.0102},
  timestamp    = {Mon, 31 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuWXCW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuYJSF16,
  author       = {Dali Zhu and
                  Ying Yang and
                  Hao Jin and
                  Jing Shao and
                  Weimiao Feng},
  title        = {Application of Modified {BLP} Model on Mobile Web Operating System},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1818--1824},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0279},
  doi          = {10.1109/TRUSTCOM.2016.0279},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuYJSF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuangMC16,
  author       = {Yu Zhuang and
                  Yu Mao and
                  Xin Chen},
  title        = {A Limited-Iteration Bisecting K-Means for Fast Clustering Large Datasets},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {2257--2262},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0348},
  doi          = {10.1109/TRUSTCOM.2016.0348},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuangMC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZouLLZZX16,
  author       = {Lida Zou and
                  Qingzhong Li and
                  Hui Li and
                  Shidong Zhang and
                  Yongqing Zheng and
                  Zongshui Xiao},
  title        = {Penalty Cost Minimization for Multi-tenant Query Deadline Employing
                  Cache Optimization and Log Based Dispatching},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1248--1255},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0201},
  doi          = {10.1109/TRUSTCOM.2016.0201},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZouLLZZX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZuoMYSL16,
  author       = {Cong Zuo and
                  James Macindoe and
                  Siyin Yang and
                  Ron Steinfeld and
                  Joseph K. Liu},
  title        = {Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {113--120},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0053},
  doi          = {10.1109/TRUSTCOM.2016.0053},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZuoMYSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZuoZ16,
  author       = {Liudong Zuo and
                  Mengxia Michelle Zhu},
  title        = {Improved Scheduling Algorithms for Single-Path Multiple Bandwidth
                  Reservation Requests},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1692--1699},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0259},
  doi          = {10.1109/TRUSTCOM.2016.0259},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZuoZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustcom/2016,
  title        = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7845250/proceeding},
  isbn         = {978-1-5090-3205-1},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0002GR15,
  author       = {Robert Koch and
                  Mario Golling and
                  Gabi Dreo Rodosek},
  title        = {Disequilibrium: Tor's Exit Node Selection under the Stereoscope},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {942--949},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.468},
  doi          = {10.1109/TRUSTCOM.2015.468},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0002GR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0011MD15,
  author       = {Naveen Kumar and
                  Anish Mathuria and
                  Manik Lal Das},
  title        = {Achieving Forward Secrecy and Unlinkability in Cloud-Based Personal
                  Health Record System},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1249--1254},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.513},
  doi          = {10.1109/TRUSTCOM.2015.513},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0011MD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AbrahamN15,
  author       = {Subil Abraham and
                  Suku Nair},
  title        = {A Novel Architecture for Predictive CyberSecurity Using Non-homogenous
                  Markov Models},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {774--781},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.446},
  doi          = {10.1109/TRUSTCOM.2015.446},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AbrahamN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AkramMSM15,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Damien Sauveron and
                  Keith Mayes},
  title        = {Feature Interaction Problems in Smart Cards with Dynamic Application
                  Lifecycle and Their Countermeasures},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {483--490},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.410},
  doi          = {10.1109/TRUSTCOM.2015.410},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AkramMSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Al-NemratB15,
  author       = {Ameer Al{-}Nemrat and
                  Chafika Benzaid},
  title        = {Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions
                  of Internet Risk and Cybercrime Victimisation},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1380--1385},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.534},
  doi          = {10.1109/TRUSTCOM.2015.534},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Al-NemratB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Al-TaharwaLJHWC15,
  author       = {Ismail Adel Al{-}Taharwa and
                  Hahn{-}Ming Lee and
                  Albert B. Jeng and
                  Cheng{-}Seen Ho and
                  Kuo{-}Ping Wu and
                  Shyi{-}Ming Chen},
  title        = {Drive-by Disclosure: {A} Large-Scale Detector of Drive-by Downloads
                  Based on Latent Behavior Prediction},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {334--343},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.392},
  doi          = {10.1109/TRUSTCOM.2015.392},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Al-TaharwaLJHWC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AldiniSLTG15,
  author       = {Alessandro Aldini and
                  Jean{-}Marc Seigneur and
                  Carlos Ballester Lafuente and
                  Xavier Titi and
                  Jonathan Guislain},
  title        = {Formal Modeling and Verification of Opportunity-enabled Risk Management},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {676--684},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.434},
  doi          = {10.1109/TRUSTCOM.2015.434},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AldiniSLTG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AldinucciDDKPT15,
  author       = {Marco Aldinucci and
                  Marco Danelutto and
                  Maurizio Drocco and
                  Peter Kilpatrick and
                  Guilherme Peretti Pezzi and
                  Massimo Torquati},
  title        = {The Loop-of-Stencil-Reduce Paradigm},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 3},
  pages        = {172--177},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.628},
  doi          = {10.1109/TRUSTCOM.2015.628},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AldinucciDDKPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AlmuhaidebSLAA15,
  author       = {Abdullah Mohammed Almuhaideb and
                  Bala Srinivasan and
                  Phu Dung Le and
                  Mohammed A. Alhabeeb and
                  Waleed Alfehaid},
  title        = {A Hybrid Mobile Authentication Model for Ubiquitous Networking},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {360--367},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.395},
  doi          = {10.1109/TRUSTCOM.2015.395},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AlmuhaidebSLAA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AlneyadiSM15,
  author       = {Sultan Alneyadi and
                  Elankayer Sithirasenan and
                  Vallipuram Muthukkumarasamy},
  title        = {Detecting Data Semantic: {A} Data Leakage Prevention Approach},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {910--917},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.464},
  doi          = {10.1109/TRUSTCOM.2015.464},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AlneyadiSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AlruhailyBC15,
  author       = {Nada Alruhaily and
                  Behzad Bordbar and
                  Tom Chothia},
  title        = {Analysis of Mobility Algorithms for Forensic Virtual Machine Based
                  Malware Detection},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {766--773},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.445},
  doi          = {10.1109/TRUSTCOM.2015.445},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AlruhailyBC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AlzuruLGZL15,
  author       = {Icaro Alzuru and
                  Kevin Long and
                  Bhaskar Gowda and
                  David Zimmerman and
                  Tao Li},
  title        = {Hadoop Characterization},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 2},
  pages        = {96--103},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.567},
  doi          = {10.1109/TRUSTCOM.2015.567},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AlzuruLGZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AmarieDM0F15,
  author       = {Maria Carpen{-}Amarie and
                  Dave Dice and
                  Patrick Marlier and
                  Ga{\"{e}}l Thomas and
                  Pascal Felber},
  title        = {Evaluating {HTM} for Pauseless Garbage Collectors in Java},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 3},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.606},
  doi          = {10.1109/TRUSTCOM.2015.606},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AmarieDM0F15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AmbusaidiHN15,
  author       = {Mohammed A. Ambusaidi and
                  Xiangjian He and
                  Priyadarsi Nanda},
  title        = {Unsupervised Feature Selection Method for Intrusion Detection System},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {295--301},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.387},
  doi          = {10.1109/TRUSTCOM.2015.387},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AmbusaidiHN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ApvrilleA15,
  author       = {Ludovic Apvrille and
                  Axelle Apvrille},
  title        = {Identifying Unknown Android Malware with Feature Extractions and Classification
                  Techniques},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {182--189},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.373},
  doi          = {10.1109/TRUSTCOM.2015.373},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ApvrilleA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ArefT15,
  author       = {Abdullah Aref and
                  Thomas T. Tran},
  title        = {{RLTE:} {A} Reinforcement Learning Based Trust Establishment Model},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {694--701},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.436},
  doi          = {10.1109/TRUSTCOM.2015.436},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ArefT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AriasGP15,
  author       = {Jacinto Arias and
                  Jos{\'{e}} A. G{\'{a}}mez and
                  Jos{\'{e}} Miguel Puerta},
  title        = {Scalable Learning of k-dependence Bayesian Classifiers under MapReduce},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 2},
  pages        = {25--32},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.558},
  doi          = {10.1109/TRUSTCOM.2015.558},
  timestamp    = {Tue, 05 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AriasGP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AridhidMN15,
  author       = {Sabeur Aridhi and
                  Laurent d'Orazio and
                  Mondher Maddouri and
                  Engelbert Mephu Nguifo},
  title        = {Cost Models for Distributed Pattern Mining in the Cloud},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 2},
  pages        = {112--119},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.569},
  doi          = {10.1109/TRUSTCOM.2015.569},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AridhidMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ArkkoNNS15,
  author       = {Jari Arkko and
                  Karl Norrman and
                  Mats N{\"{a}}slund and
                  Bengt Sahlin},
  title        = {A {USIM} Compatible 5G {AKA} Protocol with Perfect Forward Secrecy},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1205--1209},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.506},
  doi          = {10.1109/TRUSTCOM.2015.506},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ArkkoNNS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AsnicarEGGMMSST15,
  author       = {Francesco Asnicar and
                  Luca Erculiani and
                  Francesca Galante and
                  Caterina Gallo and
                  Luca Masera and
                  Paolo Morettin and
                  Nadir Sella and
                  Stanislau Semeniuta and
                  Thomas Tolio and
                  Giulia Malacarne and
                  Kristof Engelen and
                  Andrea Argentini and
                  Valter Cavecchia and
                  Claudio Moser and
                  Enrico Blanzieri},
  title        = {Discovering Candidates for Gene Network Expansion by Distributed Volunteer
                  Computing},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 3},
  pages        = {248--253},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.640},
  doi          = {10.1109/TRUSTCOM.2015.640},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AsnicarEGGMMSST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AuricchioFLMRTV15,
  author       = {Ferdinando Auricchio and
                  Marco Ferretti and
                  Adrien Lefieux and
                  Mirto Musci and
                  Alessandro Reali and
                  Santi Trimarchi and
                  Alessandro Veneziani},
  title        = {Assessment of a Black-Box Approach for a Parallel Finite Elements
                  Solver in Computational Hemodynamics},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 3},
  pages        = {202--207},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.633},
  doi          = {10.1109/TRUSTCOM.2015.633},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AuricchioFLMRTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AvdyushkinR15,
  author       = {Maksim Avdyushkin and
                  Musfiq Rahman},
  title        = {Secure Location Validation with Wi-Fi Geo-fencing and {NFC}},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {890--896},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.461},
  doi          = {10.1109/TRUSTCOM.2015.461},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AvdyushkinR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BanFSK15,
  author       = {D{\'{e}}nes B{\'{a}}n and
                  Rudolf Ferenc and
                  Istv{\'{a}}n Siket and
                  {\'{A}}kos Kiss},
  title        = {Prediction Models for Performance, Power, and Energy Efficiency of
                  Software Executed on Heterogeneous Hardware},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 3},
  pages        = {178--183},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.629},
  doi          = {10.1109/TRUSTCOM.2015.629},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BanFSK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BanseR15,
  author       = {Christian Banse and
                  Sathyanarayanan Rangarajan},
  title        = {A Secure Northbound Interface for {SDN} Applications},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {834--839},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.454},
  doi          = {10.1109/TRUSTCOM.2015.454},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BanseR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BarretoFS15,
  author       = {Luciano Barreto and
                  Joni da Silva Fraga and
                  Frank Siqueira},
  title        = {Architectural Model and Security Mechanisms for Cloud Federations},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1108--1115},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.490},
  doi          = {10.1109/TRUSTCOM.2015.490},
  timestamp    = {Mon, 29 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BarretoFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BasuNHK15,
  author       = {Anirban Basu and
                  Toru Nakamura and
                  Seira Hidano and
                  Shinsaku Kiyomoto},
  title        = {k-anonymity: Risks and the Reality},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {983--989},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.473},
  doi          = {10.1109/TRUSTCOM.2015.473},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BasuNHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BaumgartnerHLF15,
  author       = {Lars Baumg{\"{a}}rtner and
                  Jonas Hochst and
                  Matthias Leinweber and
                  Bernd Freisleben},
  title        = {How to Misuse {SMTP} over {TLS:} {A} Study of the (In) Security of
                  Email Server Communication},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {287--294},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.386},
  doi          = {10.1109/TRUSTCOM.2015.386},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BaumgartnerHLF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BelyakovSYV15,
  author       = {Stanislav L. Belyakov and
                  Marina Savelyeva and
                  Jeffrey Yan and
                  Valeriy Vyatkin},
  title        = {Adaptation of Material Flows in Mechanical Transportation Systems
                  Based on Observation Experience},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 3},
  pages        = {269--274},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.643},
  doi          = {10.1109/TRUSTCOM.2015.643},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BelyakovSYV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BenmalekC15,
  author       = {Mourad Benmalek and
                  Yacine Challal},
  title        = {eSKAMI: Efficient and Scalable Multi-group Key Management for Advanced
                  Metering Infrastructure in Smart Grid},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {782--789},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.447},
  doi          = {10.1109/TRUSTCOM.2015.447},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BenmalekC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BiondiGL15,
  author       = {Fabrizio Biondi and
                  Thomas Given{-}Wilson and
                  Axel Legay},
  title        = {Attainable Unconditional Security for Shared-Key Cryptosystems},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {159--166},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.370},
  doi          = {10.1109/TRUSTCOM.2015.370},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BiondiGL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BokRPY15,
  author       = {Kyoungsoo Bok and
                  Eunkyung Ryu and
                  Junho Park and
                  Jaesoo Yoo},
  title        = {An Energy Efficient Congestion Control Scheme for Multimedia Data
                  in Wireless Sensor Networks},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1279--1283},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.518},
  doi          = {10.1109/TRUSTCOM.2015.518},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BokRPY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BolsterM15,
  author       = {Andrew Bolster and
                  Alan Marshall},
  title        = {Single and Multi-metric Trust Management Frameworks for Use in Underwater
                  Autonomous Networks},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {685--693},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.435},
  doi          = {10.1109/TRUSTCOM.2015.435},
  timestamp    = {Fri, 08 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BolsterM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BonnefoiDSAM15,
  author       = {Pierre{-}Fran{\c{c}}ois Bonnefoi and
                  Pierre Dusart and
                  Damien Sauveron and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  title        = {A Set of Efficient Privacy Protection Enforcing Lightweight Authentication
                  Protocols for Low-Cost {RFID} Tags},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {612--620},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.426},
  doi          = {10.1109/TRUSTCOM.2015.426},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BonnefoiDSAM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BonnichsenPK15,
  author       = {Lars Frydendal Bonnichsen and
                  Christian Wilhelm Probst and
                  Sven Karlsson},
  title        = {Hardware Transactional Memory Optimization Guidelines, Applied to
                  Ordered Maps},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 3},
  pages        = {124--131},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.621},
  doi          = {10.1109/TRUSTCOM.2015.621},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BonnichsenPK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BoonkPS15,
  author       = {Martin Boonk and
                  Ronald Petrlic and
                  Christoph Sorge},
  title        = {Save Our Passwords},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {797--800},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.449},
  doi          = {10.1109/TRUSTCOM.2015.449},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BoonkPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BouchamiGPG15,
  author       = {Ahmed Bouchami and
                  Elio Goettelmann and
                  Olivier Perrin and
                  Claude Godart},
  title        = {Enhancing Access-Control with Risk-Metrics for Collaboration on Social
                  Cloud-Platforms},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {864--871},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.458},
  doi          = {10.1109/TRUSTCOM.2015.458},
  timestamp    = {Tue, 26 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BouchamiGPG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BouchamiPZ15,
  author       = {Ahmed Bouchami and
                  Olivier Perrin and
                  Ehtesham Zahoor},
  title        = {Trust-Based Formal Delegation Framework for Enterprise Social Networks},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {127--134},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.366},
  doi          = {10.1109/TRUSTCOM.2015.366},
  timestamp    = {Tue, 26 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BouchamiPZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BradburyLJ15,
  author       = {Matthew Bradbury and
                  Matthew Leeke and
                  Arshad Jhumka},
  title        = {A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless
                  Sensor Networks},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {531--538},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.416},
  doi          = {10.1109/TRUSTCOM.2015.416},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BradburyLJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BuzhinskyPV15,
  author       = {Igor Buzhinsky and
                  Cheng Pang and
                  Valeriy Vyatkin},
  title        = {Formal Modeling of Testing Software for Cyber-Physical Automation
                  Systems},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 3},
  pages        = {301--306},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.648},
  doi          = {10.1109/TRUSTCOM.2015.648},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BuzhinskyPV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaoXG15,
  author       = {Zigang Cao and
                  Gang Xiong and
                  Li Guo},
  title        = {MimicHunter: {A} General Passive Network Protocol Mimicry Detection
                  Framework},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {271--278},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.384},
  doi          = {10.1109/TRUSTCOM.2015.384},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaoXG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChaisiriKN15,
  author       = {Sivadon Chaisiri and
                  Ryan K. L. Ko and
                  Dusit Niyato},
  title        = {A Joint Optimization Approach to Security-as-a-Service Allocation
                  and Cyber Insurance Management},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {426--433},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.403},
  doi          = {10.1109/TRUSTCOM.2015.403},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChaisiriKN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChanTTT15,
  author       = {Jose Juan Mijares Chan and
                  Parimala Thulasiraman and
                  Gabriel Thomas and
                  Ruppa K. Thulasiram},
  title        = {Stationarity Enforcement of Accelerator Based {TRNG} by Genetic Algorithm},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1122--1128},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.492},
  doi          = {10.1109/TRUSTCOM.2015.492},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChanTTT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenHF15,
  author       = {Hongsong Chen and
                  Zhi Han and
                  Zhongchuan Fu},
  title        = {Quantitative Trustworthy Evaluation Scheme for Trust Routing Scheme
                  in Wireless Sensor Networks},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1272--1278},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.517},
  doi          = {10.1109/TRUSTCOM.2015.517},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenHF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenHYYPZL15,
  author       = {Zhenxiang Chen and
                  Hongbo Han and
                  Qiben Yan and
                  Bo Yang and
                  Lizhi Peng and
                  Lei Zhang and
                  Jin Li},
  title        = {A First Look at Android Malware Traffic in First Few Minutes},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {206--213},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.376},
  doi          = {10.1109/TRUSTCOM.2015.376},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenHYYPZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenJWY15,
  author       = {Zuo Chen and
                  Mengyuan Jia and
                  Yan Wang and
                  Xiaolong Yan},
  title        = {A Security Topology Protocol of Wireless Sensor Networks Based on
                  Community Detection and Energy Aware},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1284--1291},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.519},
  doi          = {10.1109/TRUSTCOM.2015.519},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenJWY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenLJW15,
  author       = {Yen{-}Lin Chen and
                  Hahn{-}Ming Lee and
                  Albert B. Jeng and
                  Te{-}En Wei},
  title        = {DroidCIA: {A} Novel Detection Method of Code Injection Attacks on
                  HTML5-Based Mobile Apps},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1014--1021},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.477},
  doi          = {10.1109/TRUSTCOM.2015.477},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenLJW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenLLJ15,
  author       = {Zuo Chen and
                  Xue Li and
                  Bin Lv and
                  Mengyuan Jia},
  title        = {A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion
                  Tolerance Based on Particle Swarm Optimization and Cuckoo Search},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1298--1305},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.521},
  doi          = {10.1109/TRUSTCOM.2015.521},
  timestamp    = {Wed, 16 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenLLJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenMSS15,
  author       = {Jiageng Chen and
                  Atsuko Miyaji and
                  Hiroyuki Sato and
                  Chunhua Su},
  title        = {Improved Lightweight Pseudo-Random Number Generators for the Low-Cost
                  {RFID} Tags},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {17--24},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.352},
  doi          = {10.1109/TRUSTCOM.2015.352},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenMSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenPDYZ15,
  author       = {Jing Chen and
                  Yuling Peng and
                  Ruiying Du and
                  Quan Yuan and
                  Minghui Zheng},
  title        = {Regenerating-Codes-Based Efficient Remote Data Checking and Repairing
                  in Cloud Storage},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {143--150},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.368},
  doi          = {10.1109/TRUSTCOM.2015.368},
  timestamp    = {Mon, 10 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenPDYZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenTC15,
  author       = {Jun{-}Horng Chen and
                  I{-}Lin Tang and
                  Chun{-}Hsuan Chang},
  title        = {Enhancing the Detection Rate of Inclined Faces},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 2},
  pages        = {143--146},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.573},
  doi          = {10.1109/TRUSTCOM.2015.573},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenTC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CherrueauDS15,
  author       = {Ronan{-}Alexandre Cherrueau and
                  R{\'{e}}mi Douence and
                  Mario S{\"{u}}dholt},
  title        = {A Language for the Composition of Privacy-Enforcement Techniques},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1037--1044},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.480},
  doi          = {10.1109/TRUSTCOM.2015.480},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CherrueauDS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChibaYAAHG15,
  author       = {Daiki Chiba and
                  Takeshi Yagi and
                  Mitsuaki Akiyama and
                  Kazufumi Aoki and
                  Takeo Hariu and
                  Shigeki Goto},
  title        = {BotProfiler: Profiling Variability of Substrings in {HTTP} Requests
                  to Detect Malware-Infected Hosts},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {758--765},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.444},
  doi          = {10.1109/TRUSTCOM.2015.444},
  timestamp    = {Thu, 16 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChibaYAAHG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChivilikhinSV15,
  author       = {Daniil Chivilikhin and
                  Anatoly Shalyto and
                  Valeriy Vyatkin},
  title        = {Inferring Automata Logic from Manual Control Scenarios: Implementation
                  in Function Blocks},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 3},
  pages        = {307--312},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.649},
  doi          = {10.1109/TRUSTCOM.2015.649},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChivilikhinSV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Classen0VHBM15,
  author       = {Jiska Classen and
                  Johannes Braun and
                  Florian Volk and
                  Matthias Hollick and
                  Johannes Buchmann and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {A Distributed Reputation System for Certification Authority Trust
                  Management},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1349--1356},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.529},
  doi          = {10.1109/TRUSTCOM.2015.529},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Classen0VHBM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CoetzeeJ15,
  author       = {Peter Coetzee and
                  Stephen A. Jarvis},
  title        = {Goal-Based Analytic Composition for On-and Off-line Execution at Scale},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 2},
  pages        = {56--65},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.562},
  doi          = {10.1109/TRUSTCOM.2015.562},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CoetzeeJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CzarneckiR15,
  author       = {Wojciech Marian Czarnecki and
                  Krzysztof Rataj},
  title        = {Compounds Activity Prediction in Large Imbalanced Datasets with Substructural
                  Relations Fingerprint and {EEM}},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 2},
  pages        = {192},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.581},
  doi          = {10.1109/TRUSTCOM.2015.581},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CzarneckiR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DaberdakuF15,
  author       = {Sebastian Daberdaku and
                  Carlo Ferrari},
  title        = {Parallel Computation of Voxelized Macromolecular Surfaces by Spatial
                  Slicing},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 3},
  pages        = {184--189},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.630},
  doi          = {10.1109/TRUSTCOM.2015.630},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DaberdakuF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DaneluttoMMT15,
  author       = {Marco Danelutto and
                  Tiziano De Matteis and
                  Gabriele Mencagli and
                  Massimo Torquati},
  title        = {Parallelizing High-Frequency Trading Applications by Using {C++11}
                  Attributes},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 3},
  pages        = {140--147},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.623},
  doi          = {10.1109/TRUSTCOM.2015.623},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DaneluttoMMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DangHN15,
  author       = {Thanh Dat Dang and
                  Doan B. Hoang and
                  Priyadarsi Nanda},
  title        = {Data Mobility Management Model for Active Data Cubes},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {750--757},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.443},
  doi          = {10.1109/TRUSTCOM.2015.443},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DangHN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DelamoreK15,
  author       = {Baden Delamore and
                  Ryan K. L. Ko},
  title        = {A Global, Empirical Analysis of the Shellshock Vulnerability in Web
                  Applications},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1129--1135},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.493},
  doi          = {10.1109/TRUSTCOM.2015.493},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DelamoreK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DuB15,
  author       = {Chaohui Du and
                  Guoqiang Bai},
  title        = {A Family of Scalable Polynomial Multiplier Architectures for Lattice-Based
                  Cryptography},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {392--399},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.399},
  doi          = {10.1109/TRUSTCOM.2015.399},
  timestamp    = {Sat, 03 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/DuB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DuBC15,
  author       = {Chaohui Du and
                  Guoqiang Bai and
                  Hongyi Chen},
  title        = {Towards Efficient Implementation of Lattice-Based Public-Key Encryption
                  on Modern CPUs},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1230--1236},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.510},
  doi          = {10.1109/TRUSTCOM.2015.510},
  timestamp    = {Sat, 03 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/DuBC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DubininVH15,
  author       = {Victor Dubinin and
                  Valeriy Vyatkin and
                  Hans{-}Michael Hanisch},
  title        = {Synthesis of Safety Controllers for Distributed Automation Systems
                  on the Basis of Reverse Safe Net Condition/Event Systems},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 3},
  pages        = {287--292},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.646},
  doi          = {10.1109/TRUSTCOM.2015.646},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DubininVH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DubrovaNS15,
  author       = {Elena Dubrova and
                  Mats N{\"{a}}slund and
                  G{\"{o}}ran Selander},
  title        = {CRC-Based Message Authentication for 5G Mobile Technology},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1186--1191},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.503},
  doi          = {10.1109/TRUSTCOM.2015.503},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DubrovaNS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DuncanW15,
  author       = {Bob Duncan and
                  Mark Whittington},
  title        = {Enhancing Cloud Security and Privacy: Broadening the Service Level
                  Agreement},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1088--1093},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.487},
  doi          = {10.1109/TRUSTCOM.2015.487},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DuncanW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/El-SerngawyT15,
  author       = {Mohamed Ali El{-}Serngawy and
                  Chamseddine Talhi},
  title        = {CaptureMe: Attacking the User Credential in Mobile Banking Applications},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {924--933},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.466},
  doi          = {10.1109/TRUSTCOM.2015.466},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/El-SerngawyT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/EmuraPW15,
  author       = {Keita Emura and
                  Le Trieu Phong and
                  Yohei Watanabe},
  title        = {Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance
                  and Re-generateability},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {167--174},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.371},
  doi          = {10.1109/TRUSTCOM.2015.371},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/EmuraPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/EricksonKNS15,
  author       = {Alejandro Erickson and
                  Abbas Eslami Kiasari and
                  Javier Navaridas and
                  Iain A. Stewart},
  title        = {Routing Algorithms for Recursively-Defined Data Centre Networks},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 3},
  pages        = {84--91},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.616},
  doi          = {10.1109/TRUSTCOM.2015.616},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/EricksonKNS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Estivill-Castro15,
  author       = {Vladimir Estivill{-}Castro and
                  David F. Nettleton},
  title        = {Can On-line Social Network Users Trust That What They Designated as
                  Confidential Data Remains So?},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {966--973},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.471},
  doi          = {10.1109/TRUSTCOM.2015.471},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Estivill-Castro15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/EtaherWA15,
  author       = {Najla Etaher and
                  George R. S. Weir and
                  Mamoun Alazab},
  title        = {From ZeuS to Zitmo: Trends in Banking Malware},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1386--1391},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.535},
  doi          = {10.1109/TRUSTCOM.2015.535},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/EtaherWA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/EzzeddineA15,
  author       = {Mazen Ezzeddine and
                  Haitham Akkary},
  title        = {Issues in Trustworthy Software Systems},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1142--1147},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.495},
  doi          = {10.1109/TRUSTCOM.2015.495},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/EzzeddineA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FanGDLY15,
  author       = {Kai Fan and
                  Yuanyuan Gong and
                  Zhao Du and
                  Hui Li and
                  Yintang Yang},
  title        = {{RFID} Secure Application Revocation for IoT in 5G},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {175--181},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.372},
  doi          = {10.1109/TRUSTCOM.2015.372},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FanGDLY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FanHZWS15,
  author       = {Wei Fan and
                  Wei{-}qing Huang and
                  Zhujun Zhang and
                  Ye Wang and
                  Degang Sun},
  title        = {A Near Field Communication(NFC) Security Model Based on {OSI} Reference
                  Model},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1324--1328},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.525},
  doi          = {10.1109/TRUSTCOM.2015.525},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FanHZWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FarooqIVI15,
  author       = {Ali Farooq and
                  Johanna Isoaho and
                  Seppo Virtanen and
                  Jouni Isoaho},
  title        = {Information Security Awareness in Educational Institution: An Analysis
                  of Students' Individual Factors},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {352--359},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.394},
  doi          = {10.1109/TRUSTCOM.2015.394},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FarooqIVI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FarrashW15,
  author       = {Majed Farrash and
                  Wenjia Wang},
  title        = {An Algorithm for Identifying the Learning Patterns in Big Data},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 2},
  pages        = {48--55},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.561},
  doi          = {10.1109/TRUSTCOM.2015.561},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FarrashW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FengHLXY15,
  author       = {Jing Feng and
                  Xin Huang and
                  Yulin Lu and
                  Ruiyang Xu and
                  Zheng Yan},
  title        = {A Study of {IEEE} 802.15.6 Association Protocols},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {848--855},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.456},
  doi          = {10.1109/TRUSTCOM.2015.456},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FengHLXY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FigueredoWGA15,
  author       = {Grazziela P. Figueredo and
                  Christian Wagner and
                  Jonathan M. Garibaldi and
                  Uwe Aickelin},
  title        = {Adaptive Data Communication Interface: {A} User-Centric Visual Data
                  Interpretation Framework},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 2},
  pages        = {128--135},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.571},
  doi          = {10.1109/TRUSTCOM.2015.571},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FigueredoWGA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FlourisGGD15,
  author       = {Ioannis Flouris and
                  Nikos Giatrakos and
                  Minos N. Garofalakis and
                  Antonios Deligiannakis},
  title        = {Issues in Complex Event Processing Systems},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 2},
  pages        = {241--246},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.590},
  doi          = {10.1109/TRUSTCOM.2015.590},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FlourisGGD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FuZL15,
  author       = {Jianming Fu and
                  Xu Zhang and
                  Yan Lin},
  title        = {An Instruction-Set Randomization Using Length-Preserving Permutation},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {376--383},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.397},
  doi          = {10.1109/TRUSTCOM.2015.397},
  timestamp    = {Thu, 17 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FuZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GhoorchianRG15,
  author       = {Kambiz Ghoorchian and
                  Fatemeh Rahimian and
                  Sarunas Girdzijauskas},
  title        = {Semi-Supervised Multiple Disambiguation},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 2},
  pages        = {88--95},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.566},
  doi          = {10.1109/TRUSTCOM.2015.566},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GhoorchianRG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GimenoMPQ15,
  author       = {Adri{\'{a}}n Castell{\'{o}} and
                  Rafael Mayo and
                  Judit Planas and
                  Enrique S. Quintana{-}Ort{\'{\i}}},
  title        = {Exploiting Task-Parallelism on {GPU} Clusters via OmpSs and rCUDA
                  Virtualization},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 3},
  pages        = {160--165},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.626},
  doi          = {10.1109/TRUSTCOM.2015.626},
  timestamp    = {Mon, 02 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GimenoMPQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GoncalvesBC15,
  author       = {Daniel Gon{\c{c}}alves and
                  Joao Bota and
                  Miguel Correia},
  title        = {Big Data Analytics for Detecting Host Misbehavior in Large Logs},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {238--245},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.380},
  doi          = {10.1109/TRUSTCOM.2015.380},
  timestamp    = {Tue, 12 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GoncalvesBC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Gonzalez-Manzano15,
  author       = {Lorena Gonz{\'{a}}lez{-}Manzano and
                  Jos{\'{e}} Mar{\'{\i}}a de Fuentes and
                  Agust{\'{\i}}n Orfila},
  title        = {Access Control for the Cloud Based on Multi-device Authentication},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {856--863},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.457},
  doi          = {10.1109/TRUSTCOM.2015.457},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Gonzalez-Manzano15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GornerupDH15,
  author       = {Olof G{\"{o}}rnerup and
                  Nima Dokoohaki and
                  Andrea Hess},
  title        = {Privacy-Preserving Mining of Frequent Routes in Cellular Network Data},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {581--587},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.422},
  doi          = {10.1109/TRUSTCOM.2015.422},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GornerupDH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuenaneLS15,
  author       = {Fouad Amine Guenane and
                  Michele Nogueira Lima and
                  Ahmed Serhrouchni},
  title        = {{DDOS} Mitigation Cloud-Based Service},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1363--1368},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.531},
  doi          = {10.1109/TRUSTCOM.2015.531},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuenaneLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuriPSE15,
  author       = {Mordechai Guri and
                  Yuri Poliak and
                  Bracha Shapira and
                  Yuval Elovici},
  title        = {JoKER: Trusted Detection of Kernel Rootkits in Android Devices via
                  {JTAG} Interface},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {65--73},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.358},
  doi          = {10.1109/TRUSTCOM.2015.358},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuriPSE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GurumdimmaJLCB15,
  author       = {Nentawe Gurumdimma and
                  Arshad Jhumka and
                  Maria Liakata and
                  Edward Chuah and
                  James C. Browne},
  title        = {Towards Increasing the Error Handling Time Window in Large-Scale Distributed
                  Systems Using Console and Resource Usage Logs},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 3},
  pages        = {61--68},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.613},
  doi          = {10.1109/TRUSTCOM.2015.613},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GurumdimmaJLCB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HameedJS15,
  author       = {Sufian Hameed and
                  Usman Murad Jamali and
                  Adnan Samad},
  title        = {Integrity Protection of {NDEF} Message with Flexible and Enhanced
                  {NFC} Signature Records},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {368--375},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.396},
  doi          = {10.1109/TRUSTCOM.2015.396},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HameedJS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Hamid15,
  author       = {Brahim Hamid},
  title        = {Interplay of Security{\&}Dependability and Resource Using Model-Driven
                  and Pattern-Based Development},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {254--262},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.382},
  doi          = {10.1109/TRUSTCOM.2015.382},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Hamid15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}