Paper ID Title Authors First author email Type Uploaded Registration Payment
1570529388 Distributed Privacy Preserving Platform for Ridesharing Services Yevhenii Semenko, Damien Saucez semenkoe@gmail.com Regular
1570534535 Ransomware Attack Protection: A Cryptographic Approach Anjali Kumari, Zakirul Alam Bhuiyan, Jigyasa Namdeo, Shipra Kanaujia, Ruhul Amin, Satyanarayana Vollala anjali16100@iiitnr.edu.in Regular
1570534594 A Lightweight Secure Communication Protocol for IoT devices using Physically Unclonable Function Priyanka Mall, Md Zakirul Alam Bhuiyan, Ruhul Amin ruhul@iiitnr.edu.in Regular
1570535046 Blockchain-based Mobility Management for LTE and Beyond Han Lee, Maode Ma han009@e.ntu.edu.sg Regular
1570535089 EPT: EDNS Privacy Tunnel for DNS Lanlan Pan, Jie Chen, Anlei Hu, Xuebiao Yuchi abbypan@gmail.com Regular
1570535838 Ensuring Data Integrity in Fog Computing Based Healthcare Systems Abdulwahab Alazeb, Brajendra Panda afalazeb@uark.edu Regular
1570536090 Modelling Security Requirements for Software Development with Common Criteria Amara Naseer, Huang Zhiqui, Ali Awais mari.choudhary@yahoo.com Regular
1570536095 Visualization of DNS Tunneling Attacks using Parallel Coordinates Technique Yasir F. Mohammed, Dale R. Thompson yfmohamm@email.uark.edu Regular
1570536161 A Data-Driven Network Intrusion Detection Model based on Host Clustering and Integrated Learning: A Case Study on Botnet Detection Lena Ara, Xiao Luo leara@iu.edu Regular
1570536447 Towards H-SDN Traffic Analytic Through Visual Analytics and Machine Learning Tze Chiang, Tin; Saw Chin, Tan; Ching Kwang, Lee sctan1@mmu.edu.my Regular
1570536582 Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data Melodee Montgomery, Prosenjit Chatterjee, Kaushik Roy kroy@ncat.edu Regular
1570536823 Paper Document Authentication Using Print-scan Resistant Image Hashing and Public-key Cryptography Fawad Ahmad, Lee-Ming Cheng fahmad4-c@my.cityu.edu.hk Regular
1570536851 TLShps: SDN-based TLS Handshake Protocol Simplification for IoT Lei YAN, Yan MA, Maode MA yanlei@bupt.edu.cn Regular
1570536867 Framework for Calculating Applications' Authenticity using Free Tools Rida Zojaj Naeem, Haider Abbas, Narmeen Shafqat, Waseem Iqbal, Asif Yaseen rnaeem.msis16mcs@students.mcs.edu.pk Regular
1570536870 A Bird's View on TOR: Routing attacks and Countermeasures Mahnoor Hamza, Haider Abbas, Novera Tahir, Rabiya Farooq, Narmeen Shafqat, Asif Yaseen mahnoorhamza.bete50@students.mcs.edu.pk Regular
1570538715 Data Protection Labware for Secure Mobile Software Development Hossain Shahriar, Kai Qian, Md Arabin Talukder, Mike Whitman, Hongmei Chi, Mohammad Rahman, Sheikh Ahamed hshahria@kennesaw.edu Regular
1570539784 Multi-Round Bidding Strategy Based on Game Theory for Crowdsensing Task Yongjian, Jie Wu, En Wang, Hengzhi Wang wangen0310@126.com Regular
1570539798 Information Leakage in Wearable Applications Babatunde Olabenjo, Dwight Makaroff b.olabenjo@usask.ca Regular
1570541081 An Encryption based Approach to Protect Fog Federations from Rogue Nodes Mohammed Alshehri, Brajendra Panda msalsheh@uark.edu Regular
1570541963 Python Scrapers for Scraping Cryptomarkets on Tor Yubao Wu, Fengpan Zhao, Xucan Chen, Pavel Skums, Eric L. Sevigny, David Maimon, Marie Ouellet, Monica Haavisto Swahn, Sheryl M Strasser, Mohammad Javad Feizollahi, Youfang Zhang, and Gunjan Sekhon ywu28@gsu.edu Regular
1570541968 Characteristics of Bitcoin Transactions on Cryptomarkets Xucan Chen, Mohammad Al Hasan, Xintao Wu, Pavel Skums, Mohammad Javad Feizollahi, Marie Ouellet, Eric L. Sevigny, David Maimon, and Yubao Wu xchen41@student.gsu.edu Regular
1570542859 Effectiveness of Machine Learning based Intrusion Detection Systems Mohammed Alrowaily, Freeh Alenezi, and Zhuo Lu malrowaily@mail.usf.edu Regular
1570543450 DNS Flood Attack Mitigation Utilizing Hot-lists and Stale Content Updates Tasnuva Mahjabin, Yang Xiao yangxiao@cs.ua.edu Regular
1570543478 Attack-Aware Recovery Controller-Switch-Link Cost Minimization Placement Algorithm in Software-Defined Networking CQ Cheng, SC Tan, CK Lee, Zulfadzli Y. Sctan1@mmu.edu.my Regular
1570543573 Challenges and Future Direction of Time-Sensitive Software-Defined Networking (TSSDN) in Automation industry Ng Kean Haur, Tan Saw Chin Sctan1@mmu.edu.my Regular
1570543953 Method of Deep Web Collection for Mobile Application Store Based on Category Keyword Searching Guosheng Xu, Zhimin Wu, Lu Wang, Zhiyong Wang, Chengze Li, Jinghua Yan, Jing Yuan, Hao Wu guoshengxu@bupt.edu.cn Regular
1570544983 A New Intrusion Detection System Based on Gated Recurrent Unit(GRU) and Genetic Algorithm Mahdi Manavi, Yunpeng Zhang mahdi.manavi24@gmail.com Regular
1570545219 Topic Model Based Android Malware Detection Yucai Song, Yang Chen, Bo Lang, Hongyu Liu, Shaojie Chen songyucai1206@buaa.edu.cn Regular
1570545220 A Verifiable Encryption Scheme Supporting Fuzzy Search Ruwei Huang, Zhikun Li, Siqi Chen ruweih@126.com Regular
1570545271 A Verifiable Fully Homomorphic Encryption Scheme Ruwei Huang, Zhikun Li, Siqi Chen ruweih@126.com Regular
1570545697 Secure Communication in UAV Assisted HetNets: A Proposed Model Aabid Rashid, Diwankshi Sharma, Sumeet Gupta, Sachin Kumar Gupta waniaabid1992@gmail.com Regular
1570545743 Detection of Application-Layer Tunnels with Rules and Machine Learning Huaqing Lin, Gao Liu, Zheng Yan zyan@xidian.edu.cn Regular
1570546717 A Study on Anonymous Protocol in a Permission Blockchain with Ensure Privacy for a Member Gyeong-Jin Ra, Daehee See, Md Zakirul Alam Bhuiyan, Im-Yeong Lee imylee@sch.ac.kr Regular
1570547116 Automated Construction of Malware Families Krishnendu Ghosh, Jeffery Mills krismath@gmail.com Regular
1570547199 A Closer Look At Anonymous Proxy Re-encryption Schemes Sharmila Deva Selvi, C Pandu Rangan, Harish S, Swethashree Dhanabal sharmioshin@gmail.com Regular
1570547301 Approximate String Matching for DNS Anomaly Detection Roni Mateless, Michael Segal mateless@post.bgu.ac.il Regular
1570544498 Cyber Weapons Storage Mechanisms Muhammd Mudassar Yamin, Basel Katt, Mazaher Kianpour    muhammad.m.yamin@ntnu.no Regular
1570536573 End-to-end Encryption Schemes for Online Social Networks Fabian Schillinger, ChristianSchindelhauer schillfa@informatik.uni-freiburg.de Regular
1570544405 Using machine learning to find anomalies in fieldbus network traffic Peters Martin, Goltz Johannes, Wiedenmann Simeon, Mundt Thomas johannes.goltz@uni-rostock.de Regular
2100000001 Limited Memory Eigenvector Recursive Principal Component Analysis in Sensor-Cloud Based Adaptive Operational Modal Online Identification Cheng Wang, Haiyang Huang, Tianshu Zhang and Jianwei Chen wangcheng@hqu.edu.cn;  Workshop: SCS
2100000002 A Framework for Context-aware Fog-assisted Healthcare Monitoring Jianqiang Hu hujianqiang@tsinghua.org.cn Workshop: SCS
2100000003 Optimization of optical Imaging MIMO-OFDM precoding matrix for underwater VLC Yanlong Li, Hongbing Qiu, Xiao Chen, Jielin Fu, Junyi Wang and Yitao Zhang hmfjl@guet.edu.cn Workshop: SCS
2100000004 Data collection scheme for Underwater Sensor Cloud System Based on Fog Computing Haitao Yu, Jiansheng Yao and Xianhao Shen albertyht@163.com Workshop: SCS
2100000005 A Survey on Fog Computing Rui Huang, Yu Sun, Chao Huang, Guang Zhao and Ying Ma maying@xmut.edu.cn Workshop: SCS
2100000006 An Approximate Data Collection Algorithm in Space-based Internet of Things Changjiang Fei, Baokang Zhao, Wanrong Yu and Chunqing Wu feichangjiang.hi@163.com Workshop: SCS
2100000007 Outlier Detection of Internet of Vehicles Yingming Zeng, Huanlei Zhao, Haibin Zhang and Qian Zhang hbzhang@mail.xidian.edu.cn Workshop: SCS
2100000008 Review of Power Spatio-Temporal Big Data Technologies, Applications, and Challenges Ying Ma, Chao Huang, Yu Sun, Guang Zhao and Yunjie Lei maying@xmut.edu.cn Workshop: SCS
2100000009 CP-MCNN:Multi-label Chest X-ray Diagnostic based on Confidence Predictor and CNN Huazhen Wang, Junlong Liu, Sisi Lai, Nengguang Wu and Jixiang Du jxdu@hqu.edu.cn;wanghuazhen@hqu.edu.cn Workshop: SCS
2100000010 Naïve Approach for Bounding Box Annotation and Object Detection towards Smart Retail Systems Pubudu Ekanayake, Chenhui Yang, Li Deng and Xin Hong pubudu1ekanayake@gmail.com Workshop: SCS
2100000011 Evaluation of Face Recognition Techniques Based on Symlet 2 Wavelet and Support Vector Machine Zhipeng Li, Xuesong Jiang and Yewen Pang lizhipengqilu@gmail.com Workshop: SCS
2200000001 Robust Hybrid Cryptosystem for Protecting IoT Smart Devices Ahmed Abdul Hamid M. Ragab, Gamal M I. Selim, Abdel Moniem Wahdan,  Ahmed Madani a.abdelhamid92@gmail.com Symposium: SPIoT
2200000002  A Weighted Risk Score Model for IoT Devices Shachar Siboni, Chanan Glezer, Asaf Shabtai, Yuval Elovici sibonish@post.bgu.ac.il Symposium: SPIoT
2200000003 Connected Vehicles: A Privacy Analysis Mark Quinlan, Jun Zhao, Andrew Simpson mark.quinlan@linacre.ox.ac.uk Symposium: SPIoT
2200000004 Privacy-Preserving Big Data Analytics: From Theory to Practice Mohammad G. Raeini and Mehrdad Nojoumian mghasemineja2017@fau.edu Symposium: SPIoT
2300000001 A Framework to Identify People in Unstructured Environments Incorporating Biometrics Janelle Mason, Prosenjit Chatterjee, Kaushik Roy and Albert Esterline jcmason@aggies.ncat.edu Symposium: TSP
2300000002 Continuous Authentication Using Mouse Clickstream Data Analysis Sultan Almalki, Prosenjit Chatterjee and Kaushik Roy ssalmalki@aggies.ncat.edu Symposium: TSP
2300000003 Presentation Attack detection using Wavelet Transform and Deep Residual Neural Net Prosenjit Chatterjee, Alex Yalchin, Joseph Shelton, Kaushik Roy, Xiaohong Yuan and Kossi D. Edoh pchatterjee@aggies.ncat.edu Symposium: TSP
2300000004 Cost-Efficient Task Scheduling for Geo-distributed Data Analytics Linfeng Xie, Yang Dai, Yongjin Zhu, Xin Li, Xiangbo Li and Zhuzhong Qian lics@nuaa.edu.cn Symposium: TSP
2300000005 Task scheduling for streaming applications in a cloud-edge system Fei Yin, Xinjia Li, Xin Li and Yize Li lics@nuaa.edu.cn Symposium: TSP
2400000001  An Approach of ACARS Trajectory Reconstruction Based on Adaptive Cubic Spline Interpolation Zhijun Wu, Shan Tian, Yang Song, Lan Ma and Meng Yue. zjwu@cauc.eeu.cn, 18322604323@163.com Symposium: UbiSafe 
2400000002 Survivability of System Wide Information Management Zhijun Wu, Xinran Xu and Meng Yue xrxu2016@163.com Symposium: UbiSafe 
2400000003 Security Analysis and Countermeasures in SWIM Zhijun Wu, Enzhong Xu and Xuan Liu 1874471517@qq.com  Symposium: UbiSafe 
2400000004 Lightweight Distributed Attribute Based Keyword Search System for Internet of Things Jiahuan Long, Xiaofen Wang and Zhang Ke 790581228@qq.com, xfwang@uestc.edu.cn Symposium: UbiSafe 
2400000005 The Influence Mechanism of authentic leadership in Blockchain Team on Employees' Performance: Mediating role of psychological safety Meng Hao, Wei-Feng Lv and Bo-Wen Du 15010982534@163.com Symposium: UbiSafe 
2400000006 Continuous Objects Detection Based on Optimized Greedy Algorithm in IoT Sensing Networks Jin Diao, Jine Tang, Deng Zhao and Zhangbing Zhou zbzhou@cugb.edu.cn Symposium: UbiSafe 
2500000001 Software Quality Optimization: Tools & Techniques Allah Bachayo Brohi, Pinial Khan Butt, Shaobo Zhang and Faisal Ul Rehman Qureshi pinial@yahoo.com Workshop: ISSR 
2500000002 PINGCHEGO: An Android Real-time Carlpooling System Xuesong Wang, Yizhi Liu, Zhengtao Jiang, You Peng and Tianhao Yin yizhi_liu@sina.cn Workshop: ISSR 
2600000001 Web-based intelligence for IDS Christopher B. Freas, Robert W. Harrison cfreas@cs.gsu.edu, rwh@gsu.edu Workshop: CMRM 
2600000002 Predictably Deterrable? The Case of System Trespassers David Maimon, Alexander Testa, Bertrand Sobesto, Michel Cukier, and Wuling Ren dmaimon@gsu.edu Workshop: CMRM