Selected conference and journal publications of Computer Science faculty
2021
Model checking agent-based communities against uncertain group commitments and knowledge Journal Article
In: Expert Syst. Appl., vol. 177, pp. 114792, 2021.
On Parallel Real-Time Security Improvement Using Mixed-Integer Programming Journal Article
In: IEEE Access, vol. 9, pp. 58824–58837, 2021.
Panconnectivity Algorithm for Eisenstein-Jacobi Networks Journal Article
In: CoRR, vol. abs/2103.10500, 2021.
Real-Time Fault-Tolerance Node-to-Node Disjoint Paths Algorithm for Symmetric Networks Journal Article
In: CoRR, vol. abs/2103.09801, 2021.
Independent Spanning Trees in Eisenstein-Jacobi Networks Journal Article
In: CoRR, vol. abs/2101.09797, 2021.
Tap: an app framework for dynamically composable mobile systems Inproceedings
In: Suman Banerjee; Luca Mottola; Xia Zhou (Ed.): MobiSys '21: The 19th Annual International Conference on Mobile Systems, Applications, and Services, Virtual Event, Wisconsin, USA, 24 June - 2 July, 2021, pp. 336–349, ACM, 2021.
Reliability of Autonomous Internet of Things Systems With Intrusion Detection Attack-Defense Game Design Journal Article
In: IEEE Trans. Reliab., vol. 70, no. 1, pp. 188–199, 2021.
2020
A novel scalable representative-based forecasting approach of service quality Journal Article
In: Computing, vol. 102, no. 11, pp. 2471–2500, 2020.
A rewriting system for the assessment of XACML policies relationship Journal Article
In: Comput. Secur., vol. 97, pp. 101957, 2020.
An efficient deception architecture for cloud-based virtual networks Journal Article
In: CoRR, vol. abs/2004.06933, 2020.
An Attack-Resilient Architecture for the Internet of Things Journal Article
In: IEEE Trans. Inf. Forensics Secur., vol. 15, pp. 3940–3954, 2020.
Predictability of IP Address Allocations for Cloud Computing Platforms Journal Article
In: IEEE Trans. Inf. Forensics Secur., vol. 15, pp. 500–511, 2020.
A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud Journal Article
In: Secur. Commun. Networks, vol. 2020, pp. 8873258:1–8873258:12, 2020.
Optimizing the Lifetime of IoT-Based Star and Mesh Networks Journal Article
In: IEEE Access, vol. 8, pp. 63090–63105, 2020.
Attack and Defense Strategies for Intrusion Detection in Autonomous Distributed IoT Systems Journal Article
In: IEEE Access, vol. 8, pp. 168994–169009, 2020.
Toward cognitive support for automated defect detection Journal Article
In: Neural Comput. Appl., vol. 32, no. 9, pp. 4325–4333, 2020.
Corrections to "Attack and Defense Strategies for Intrusion Detection in Autonomous Distributed IoT Systems" Journal Article
In: IEEE Access, vol. 8, pp. 207181, 2020.
2019
A novel trend based SAX reduction technique for time series Journal Article
In: Expert Syst. Appl., vol. 130, pp. 113–123, 2019.
Heterogeneous Multi-Mobile Computing Inproceedings
In: Junehwa Song; Minkyong Kim; Nicholas D. Lane; Rajesh Krishna Balan; Fahim Kawsar; Yunxin Liu (Ed.): Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2019, Seoul, Republic of Korea, June 17-21, 2019, pp. 707, ACM, 2019.
Heterogeneous Multi-Mobile Computing Inproceedings
In: Junehwa Song; Minkyong Kim; Nicholas D. Lane; Rajesh Krishna Balan; Fahim Kawsar; Yunxin Liu (Ed.): Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2019, Seoul, Republic of Korea, June 17-21, 2019, pp. 494–507, ACM, 2019.
Identifying Android Malware Families Using Android-Oriented Metrics Inproceedings
In: Chaitanya Baru; Jun Huan; Latifur Khan; Xiaohua Hu; Ronay Ak; Yuanyuan Tian; Roger S. Barga; Carlo Zaniolo; Kisung Lee; Yanfang Fanny Ye (Ed.): 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, December 9-12, 2019, pp. 4708–4713, IEEE, 2019.
Trust Management of Smart Service Communities Journal Article
In: IEEE Access, vol. 7, pp. 26362–26378, 2019.
COSTA: Composite Trust-Based Asset-Task Assignment in Mobile Ad Hoc Networks Journal Article
In: IEEE Access, vol. 7, pp. 92296–92313, 2019.
Trust-Based Service Management for Mobile Cloud IoT Systems Journal Article
In: IEEE Trans. Netw. Serv. Manag., vol. 16, no. 1, pp. 246–263, 2019.
Trust-Based IoT Cloud Participatory Sensing of Air Quality Journal Article
In: Wirel. Pers. Commun., vol. 105, no. 4, pp. 1461–1474, 2019.
Analysis of Attack-Defense Strategies in Autonomous Distributed IoT Systems Inproceedings
In: 14th IEEE International Symposium on Autonomous Decentralized System, ISADS 2019, Utrecht, The Netherlands, April 8-10, 2019, pp. 1–6, IEEE, 2019.
2018
Unsupervised clustering of service performance behaviors Journal Article
In: Inf. Sci., vol. 422, pp. 558–571, 2018.
An Improved One-to-All Broadcasting in Higher Dimensional Eisenstein-Jacobi Networks Inproceedings
In: Ivan Merelli; Pietro Liò; Igor V. Kotenko (Ed.): 26th Euromicro International Conference on Parallel, Distributed and Network-based Processing, PDP 2018, Cambridge, United Kingdom, March 21-23, 2018, pp. 34–44, IEEE Computer Society, 2018.
Fidelius Charm: Isolating Unsafe Rust Code Inproceedings
In: Ziming Zhao; Gail-Joon Ahn; Ram Krishnan; Gabriel Ghinita (Ed.): Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 248–255, ACM, 2018.
Misery Digraphs: Delaying Intrusion Attacks in Obscure Clouds Journal Article
In: IEEE Trans. Inf. Forensics Secur., vol. 13, no. 6, pp. 1361–1375, 2018.
Computer Aided Qur'an Pronunciation using DNN Journal Article
In: J. Intell. Fuzzy Syst., vol. 34, no. 5, pp. 3257–3271, 2018.
Trust as a Service for IoT Service Management in Smart Cities Inproceedings
In: 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2018, Exeter, United Kingdom, June 28-30, 2018, pp. 1358–1365, IEEE, 2018.
2017
A Novel Method to Investigate the Effect of Social Network "Hook" Images on Purchasing Prospects in E-Commerce Journal Article
In: Complexity, vol. 2017, pp. 9264920:1–9264920:16, 2017.
Formal specification and integration of distributed security policies Journal Article
In: Comput. Lang. Syst. Struct., vol. 49, pp. 1–35, 2017.
A new framework for the verification of service trust behaviors Journal Article
In: Knowl. Based Syst., vol. 121, pp. 7–22, 2017.
Security Evaluation by Arrogance: Saving Time and Money Inproceedings
In: 1st IEEE/ACM International Workshop on Software Engineeting for Startups, SoftStart@ICSE 2017, Buenos Aires, Argentina, May 21, 2017, pp. 12–16, IEEE, 2017.
On Threat Modeling and Mitigation of Medical Cyber-Physical Systems Inproceedings
In: Paolo Bonato; Honggang Wang (Ed.): Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2017, Philadelphia, PA, USA, July 17-19, 2017, pp. 114–119, IEEE Computer Society / ACM, 2017.
MuTrans: A multi-channel network coding approach to mobile data collection Inproceedings
In: 13th Annual Conference on Wireless On-demand Network Systems and Services, WONS 2017, Jackson, WY, USA, February 21-24, 2017, pp. 120–123, IEEE, 2017.
Data Collection Techniques Using Multi-Channel Network Coding in Low-Power and Lossy Networks PhD Thesis
George Mason University, Fairfax, Virginia, USA, 2017.
Partitioned Similarity Search with Cache-Conscious Data Traversal Journal Article
In: ACM Trans. Knowl. Discov. Data, vol. 11, no. 3, pp. 34:1–34:38, 2017.
Fog Intelligence for Real-Time IoT Sensor Data Analytics Journal Article
In: IEEE Access, vol. 5, pp. 24062–24069, 2017.
Node-independent spanning trees in Gaussian networks Journal Article
In: J. Parallel Distributed Comput., vol. 109, pp. 324–332, 2017.
An optimal adaptive stabilizing algorithm for two edge-disjoint paths problem Journal Article
In: The Journal of Supercomputing, vol. 73, no. 3, pp. 1257–1273, 2017.
Node-Independent Spanning Trees in Gaussian Networks Journal Article
In: CoRR, vol. abs/1701.02991, 2017.
A GPU-based genetic algorithm for the p-median problem Journal Article
In: J. Supercomput., vol. 73, no. 10, pp. 4221–4244, 2017.
Binary compatible graphics support in Android for running iOS apps Inproceedings
In: K. R. Jayaram; Anshul Gandhi; Bettina Kemme; Peter R. Pietzuch (Ed.): Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, Las Vegas, NV, USA, December 11 - 15, 2017, pp. 55–67, ACM, 2017.
Trust-Based Decision Making for Health IoT Systems Journal Article
In: IEEE Internet Things J., vol. 4, no. 5, pp. 1408–1419, 2017.
Higher dimensional Eisenstein-Jacobi networks Journal Article
In: J. Parallel Distributed Comput., vol. 102, pp. 91–102, 2017.
A Case Study of IoT Participatory Sensing of Hazardous Ozone Using Traces Inproceedings
In: Antonio J. Tallón-Ballesteros; Kaicheng Li (Ed.): Fuzzy Systems and Data Mining III - Proceedings of FSDM 2017 [Hualien, Taiwan, November 2017], pp. 479–484, IOS Press, 2017.
2016
Verifying concurrent probabilistic systems using probabilistic-epistemic logic specifications Journal Article
In: Appl. Intell., vol. 45, no. 3, pp. 747–776, 2016.