DependSys-2020: 12 regular + 8 short
Paper ID Title Authors First author email Type
1570668261 Cognitive Privacy: AI-enabled Privacy using EEG Signals in the Internet of Things Francesco Schiliro, Nour Moustafa, Amin Beheshti francesco.schiliro@hdr.mq.edu.au Regular
1570680619 A scalable Blockchain based system for super resolution images manipulation Antonio Rapuano, Gerardo Iovane, Marta Chinnici arapuano@unisa.it Regular
1570679675 A secret sharing scheme based on game theory and BP neural network Qiuxian Li, Quanxing Zhou, Qixin Pan, Lingyun Wang, Hongfa Ding qiuxianLL@163.com Regular
1570680893 Free Chain: Enabling Freedom of Expression through Public Blockchains Israa Alsarsour, Qutaibah Malluhi, Yongge Wang ia1205702@qu.edu.qa Regular
1570682025 Access Control Method based on a Mutual Trust Mechanism in the Edge Computing Environment Weijin Jiang, Sijian Lv, Yongxia Sun, Liang Guo jwjnudt@163.com Regular
1570680895 Implementing a solution for monitoring SLA violations in Cloud Andreea Floricu, Razvan Buzatu, Catalin Negru, Florin Pop, Aniello Castiglione florin.pop@cs.pub.ro Regular
1570675753 Dependable Wildlife DTN: Wearable Animal Resource Optimization for Sustainable Long-term Monitoring Keijiro Nakagawa, Daisuk´e Shimotoku, Junya Kawase, Hill Hiroki Kobayashi kenakaga@csis.u-tokyo.co.jp Regular
1570675831 Real-Time Fault Detection and Diagnosis of CPS Faults in DEVS Joseph Boi-Ukeme, Cristina Ruiz-Martin, Gabriel Wainer joseph.boiukeme@carleton.ca Regular
1570680174 Modeling and Analysis of Malware Propagation for Cluster-based Wireless Sensor Networks Xuejin Zhu, Jie Huang, Chunyang Qi, Xiaowen Wang xuejinzhu@seu.edu.cn Regular
1570680891 HBD-Authority: Streaming Access Control Model for Hadoop Congwei Chen, Marwa A. Elsayed, Mohammad Zulkernine 14cc66@queensu.ca Regular
1570680900 Physical Fingerprinting of Ultrasonic Sensor and Applications to Sensor Security Eric Cheek, Dhimant Khuttan, Raghu Changalvala, Hafiz Malik echeek@umich.edu Regular
1570680928 An Ensemble Feature Selection Method for IoT IDS Alaa Alhowaide, Izzat Alsmadi, Jian Tang azalhowaide@mun.ca Regular
1570669461 Investigating Root Causes of Authentication Failures Using a SAML and OIDC Observatory Jim Basney, Phuong Cao, Terry Fleury jbasney@illinois.edu Short
1570675820 A new agent-based modeling simulation for compression using the echolocation system in dolphins Khaldoon Dhou, Christopher Cruzen khaldoondhou@gmail.com  Short
1570680675 Network Virtualization Proof of Concept for Remote Management of Multi-Tenant Infrastructure Stephen Ugwuanyi, ukRameez Asif, James Irvine stephen.ugwuanyi@strath.ac.uk Short
1570680797 An attack tree template based on feature diagram hierarchy Rajesh Kumar, Hima Siva Kalyan Reddy rajesh.k@pilani.bits-pilani.ac.in Short
1570680800 Privacy Preservation of Aggregated Data Using Virtual Battery in the Smart Grid Fawaz Kserawi, Qutaibah m. Malluhi fawaz@qu.edu.qa Short
1570680873 Google Apps Biased Rating Prediction Using Text Features and Tree Based Ensemble Learning Saima Sadiq, Muhammad Umer, Saleem Ullah, Michele Nappi, Aniello Castiglione cosc18151010@kfueit.edu.pk Short
1570680884 A novel approach for predictive maintenance combing GAF encoding strategies and deep networks Antonino Ferraro, Antonio Galli, Vincenzo Moscato, Giancarlo Speri antonino.ferraro@unibg.it Short
1570680911 LoRaWAN v1.1 Security: Are We in the Clear Yet? Sumesh J. Philip, James M. McQuillan, Oluwatoba Adegbite sjphil3@ilstu.edu Short