DependSys-2020: 12 regular + 8 short |
Paper
ID |
Title |
Authors |
First
author email |
Type |
1570668261 |
Cognitive
Privacy: AI-enabled Privacy using EEG Signals in the Internet of Things |
Francesco
Schiliro, Nour Moustafa, Amin Beheshti |
francesco.schiliro@hdr.mq.edu.au |
Regular |
1570680619 |
A scalable Blockchain based system for super resolution images
manipulation |
Antonio Rapuano, Gerardo Iovane, Marta Chinnici |
arapuano@unisa.it |
Regular |
1570679675 |
A secret sharing scheme based on game theory and BP neural
network |
Qiuxian Li, Quanxing Zhou, Qixin Pan, Lingyun Wang, Hongfa Ding |
qiuxianLL@163.com |
Regular |
1570680893 |
Free Chain: Enabling Freedom of Expression through Public
Blockchains |
Israa Alsarsour, Qutaibah Malluhi, Yongge Wang |
ia1205702@qu.edu.qa |
Regular |
1570682025 |
Access Control Method based on a Mutual Trust Mechanism in the
Edge Computing Environment |
Weijin Jiang, Sijian Lv, Yongxia Sun, Liang Guo |
jwjnudt@163.com |
Regular |
1570680895 |
Implementing a solution for monitoring SLA violations in Cloud |
Andreea Floricu, Razvan Buzatu, Catalin Negru, Florin Pop,
Aniello Castiglione |
florin.pop@cs.pub.ro |
Regular |
1570675753 |
Dependable Wildlife DTN: Wearable Animal Resource Optimization
for Sustainable Long-term Monitoring |
Keijiro Nakagawa, Daisuk´e Shimotoku, Junya Kawase, Hill Hiroki
Kobayashi |
kenakaga@csis.u-tokyo.co.jp |
Regular |
1570675831 |
Real-Time Fault Detection and Diagnosis of CPS Faults in DEVS |
Joseph Boi-Ukeme, Cristina Ruiz-Martin,
Gabriel Wainer |
joseph.boiukeme@carleton.ca |
Regular |
1570680174 |
Modeling and Analysis of Malware Propagation for Cluster-based
Wireless Sensor Networks |
Xuejin Zhu, Jie Huang, Chunyang Qi,
Xiaowen Wang |
xuejinzhu@seu.edu.cn |
Regular |
1570680891 |
HBD-Authority: Streaming Access Control Model for Hadoop |
Congwei Chen, Marwa A. Elsayed, Mohammad
Zulkernine |
14cc66@queensu.ca |
Regular |
1570680900 |
Physical Fingerprinting of Ultrasonic Sensor and Applications to
Sensor Security |
Eric Cheek, Dhimant Khuttan, Raghu Changalvala, Hafiz Malik |
echeek@umich.edu |
Regular |
1570680928 |
An Ensemble Feature Selection Method for IoT IDS |
Alaa Alhowaide, Izzat Alsmadi, Jian Tang |
azalhowaide@mun.ca |
Regular |
1570669461 |
Investigating Root Causes of Authentication Failures Using a
SAML and OIDC Observatory |
Jim Basney, Phuong Cao, Terry Fleury |
jbasney@illinois.edu |
Short |
1570675820 |
A new agent-based modeling simulation for compression using the
echolocation system in dolphins |
Khaldoon Dhou, Christopher Cruzen |
khaldoondhou@gmail.com |
Short |
1570680675 |
Network Virtualization Proof of Concept for Remote Management of
Multi-Tenant Infrastructure |
Stephen Ugwuanyi, ukRameez Asif, James Irvine |
stephen.ugwuanyi@strath.ac.uk |
Short |
1570680797 |
An attack tree template based on feature diagram hierarchy |
Rajesh Kumar, Hima Siva Kalyan Reddy |
rajesh.k@pilani.bits-pilani.ac.in |
Short |
1570680800 |
Privacy Preservation of Aggregated Data Using Virtual Battery in
the Smart Grid |
Fawaz Kserawi, Qutaibah m. Malluhi |
fawaz@qu.edu.qa |
Short |
1570680873 |
Google Apps Biased Rating Prediction Using Text Features and
Tree Based Ensemble Learning |
Saima Sadiq, Muhammad Umer, Saleem
Ullah, Michele Nappi, Aniello Castiglione |
cosc18151010@kfueit.edu.pk |
Short |
1570680884 |
A novel approach for predictive maintenance combing GAF encoding
strategies and deep networks |
Antonino Ferraro, Antonio Galli, Vincenzo Moscato, Giancarlo
Speri |
antonino.ferraro@unibg.it |
Short |
1570680911 |
LoRaWAN v1.1 Security: Are We in the Clear Yet? |
Sumesh J. Philip, James M. McQuillan,
Oluwatoba Adegbite |
sjphil3@ilstu.edu |
Short |
|
|
|
|
|