Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
TRUSTCOM-BIGDATASE-ICESS
TRUSTCOM-BIGDATASE-ICESS 2017
Generate Citations
2017 IEEE Trustcom/BigDataSE/ICESS
Aug. 1 2017 to Aug. 4 2017
Sydney, Australia
Table of Contents
[Title page i]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-xv
Message from the IEEE TrustCom / BigDataSE / ICESS 2017 General Chairs
Freely available from IEEE.
pp. xvi-xvi
Message from the IEEE TrustCom 2017 Program Chairs
Freely available from IEEE.
pp. xvii-xvii
Organizers for IEEE TrustCom 2017
Freely available from IEEE.
pp. xviii-xix
Reviewers for IEEE TrustCom 2017
Freely available from IEEE.
pp. xx-xxiii
Message from the IEEE ICESS 2017 Program Chairs
Freely available from IEEE.
pp. xxiv-xxiv
Organizers for IEEE ICESS 2017
Freely available from IEEE.
pp. xxv-xxv
Reviewers for IEEE ICESS 2017
Freely available from IEEE.
pp. xxvi-xxvi
Message from the IEEE BigDataSE 2017 Program Chairs
Freely available from IEEE.
pp. xxvii-xxvii
Organizers for IEEE BigDataSE 2017
Freely available from IEEE.
pp. xxviii-xxviii
Reviewers for IEEE BigDataSE 2017
Freely available from IEEE.
pp. xxix-xxx
Message from the SECSOC 2017 Workshop Chairs
Freely available from IEEE.
pp. xxxi-xxxi
Organizers for SECSOC 2017
Freely available from IEEE.
pp. xxxii-xxxii
List of Reviewers for SECSOC 2017
Freely available from IEEE.
pp. xxxiii-xxxiii
Message from the SOWN 2017 Workshop Chairs
Freely available from IEEE.
pp. xxxiv-xxxiv
Organizers for SOWN 2017
Freely available from IEEE.
pp. xxxv-xxxv
Reviewers for SOWN 2017
Freely available from IEEE.
pp. xxxvi-xxxvi
Message from the TrustWSN 2017 Workshop Chairs
Freely available from IEEE.
pp. xxxvii-xxxvii
Organizers for TrustWSN 2017
Freely available from IEEE.
pp. xxxviii-xxxviii
Reviewers for TrustWSN 2017
Freely available from IEEE.
pp. xxxix-xxxix
Message from the SPTIoT 2017 Workshop Chairs
Freely available from IEEE.
pp. xl-xl
Organizers for SPTIoT 2017
Freely available from IEEE.
pp. xli-xli
Reviewers for IEEE SPTIoT 2017
Freely available from IEEE.
pp. xlii-xlii
Message from the WCSF 2017 Workshop Chairs
Freely available from IEEE.
pp. xliii-xliii
Organizers for WCSF 2017
Freely available from IEEE.
pp. xliv-xliv
Reviewers for WCSF 2017
Freely available from IEEE.
pp. xlv-xlvi
Classification of Landing and Distribution Domains Using Whois’ Text Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Tran Phuong Thao
,
Akira Yamada
,
Kosuke Murakami
,
Jumpei Urakawa
,
Yukiko Sawaya
,
Ayumu Kubota
Evolution of Publicly Disclosed Information in Facebook Profiles
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-16
by
Reza Farahbakhsh
,
Samin Mohammadi
,
Xiao Han
,
Ángel Cuevas
,
Noël Crespi
Practical Application-Level Dynamic Taint Analysis of Android Apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-24
by
Julian Schüette
,
Alexander Küechler
,
Dennis TItze
Authenticating Compromisable Storage Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-32
by
Jiangshan Yu
,
Mark Ryan
,
Liqun Chen
Immediate Attribute Revocation in Decentralized Attribute-Based Encryption Access Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-40
by
Youcef Imine
,
Ahmed Lounis
,
Abdelmadjid Bouabdallah
On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-49
by
Iakovos Gurulian
,
Carlton Shepherd
,
Eibe Frank
,
Konstantinos Markantonakis
,
Raja Naeem Akram
,
Keith Mayes
WENC: HTTPS Encrypted Traffic Classification Using Weighted Ensemble Learning and Markov Chain
Full-text access may be available. Sign in or learn about subscription options.
pp. 50-57
by
Wubin Pan
,
Guang Cheng
,
Yongning Tang
Pseudo Anonymous and Hidden Attribute Comparison Based on Quick Friend Matching in Mobile Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 58-64
by
Entao Luo
,
Guojun Wang
,
Qin Liu
A Distinction Method of Flooding DDoS and Flash Crowds Based on User Traffic Behavior
Full-text access may be available. Sign in or learn about subscription options.
pp. 65-72
by
Degang Sun
,
Kun Yang
,
Zhixin Shi
,
Yan Wang
Based on Multi-features and Clustering Ensemble Method for Automatic Malware Categorization
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-82
by
Yunan Zhang
,
Chenghao Rong
,
Qingjia Huang
,
Yang Wu
,
Zeming Yang
,
Jianguo Jiang
Detection of Single Event Transients Based on Compressed Sensing
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-88
by
Cuiping Shao
,
Huiyun Li
A Practical Anti-Collusion Hierarchical Identity-Based Non-interactive Key Agreement for Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-95
by
Qianqian Xing
,
Baosheng Wang
,
Xiaofeng Wang
,
Jing Tao
,
Liu Liu
Securing the Neighbour Discovery Protocol in IPv6 State-ful Address Auto-Configuration
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-103
by
Nadeem Ahmed
,
Adeel Sadiq
,
Anum Farooq
,
Rabia Akram
A Public Key Encryption Scheme for String Identification
Full-text access may be available. Sign in or learn about subscription options.
pp. 104-111
by
Indranil Ghosh Ray
,
Muttukrishnan Rajarajan
Insider Threat Detection Through Attributed Graph Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-119
by
Anagi Gamachchi
,
Serdar Boztas
Malware Discrimination Based on Reversed Association Task
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-127
by
Lansheng Han
,
Shuxia Han
,
Wenjing Jia
,
Changhua Sun
,
Cai Fu
Fine-Grained Fingerprinting Threats to Software-Defined Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-135
by
Minjian Zhang
,
Jianwei Hou
,
Ziqi Zhang
,
Wenchang Shi
,
Bo Qin
,
Bin Liang
SimiDroid: Identifying and Explaining Similarities in Android Apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-143
by
Li Li
,
Tegawendé F. Bissyandé
,
Jacques Klein
A Self-healing Key Pre-distribution Scheme for Multi-phase Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-151
by
Mohamed-Lamine Messai
,
Hamida Seba
TransCrypt: Transparent Main Memory Encryption Using a Minimal ARM Hypervisor
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-161
by
Julian Horsch
,
Manuel Huber
,
Sascha Wessel
On Designing Collusion-Resistant Incentive Mechanisms for Mobile Crowdsensing Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-169
by
Shiyu Ji
,
Tingting Chen
A Lightweight Anonymous Mutual Authentication with Key Agreement Protocol on ECC
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-176
by
Wei Zhang
,
Dongdai Lin
,
Hailong Zhang
,
Cong Chen
,
Xiaojun Zhou
CloudController: A Writable and Heterogeneous-Adaptive Virtual Machine Introspection for Cloud Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-184
by
Weizhong Qiang
,
Gongping Xu
,
Guozhong Sun
,
Tianqing Zhu
,
Hai Jin
Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 185-192
by
Martin Henze
,
Benedikt Wolters
,
Roman Matzutt
,
Torsten Zimmermann
,
Klaus Wehrle
CSCdroid: Accurately Detect Android Malware via Contribution-Level-Based System Call Categorization
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-200
by
Shaofeng Zhang
,
Xi Xiao
Secure and Light Weight Fine-grained Access Mechanism for Outsourced Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-209
by
Mosarrat Jahan
,
Partha Sarathi Roy
,
Kouichi Sakurai
,
Aruna Seneviratne
,
Sanjay Jha
Viability of Using Shadows Cast by Vehicles for Position Verification in Vehicle Platooning
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-217
by
Tasnuva Tithi
,
Chris Winstead
,
Ryan Gerdes
FEPDF: A Robust Feature Extractor for Malicious PDF Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-224
by
Min Li
,
Yunzheng Liu
,
Min Yu
,
Gang Li
,
Yongjian Wang
,
Chao Liu
Discovering Malicious Domains through Alias-Canonical Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 225-232
by
Chengwei Peng
,
Xiaochun Yun
,
Yongzheng Zhang
,
Shuhao Li
,
Jun Xiao
A Passive Client-based Approach to Detect Evil Twin Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-239
by
Qian Lu
,
Haipeng Qu
,
Yuan Zhuang
,
Xi-Jun Lin
,
Yanyong Zhu
,
Yunzheng Liu
T2Droid: A TrustZone-Based Dynamic Analyser for Android Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 240-247
by
Sileshi Demesie Yalew
,
Gerald Q. Maguire
,
Seif Haridi
,
Miguel Correia
Hidden-Token Searchable Public-Key Encryption
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-254
by
Cong Zuo
,
Jun Shao
,
Zhe Liu
,
Yun Ling
,
Guiyi Wei
A High-Speed and SPA-Resistant Implementation of ECC Point Multiplication Over GF(p)
Full-text access may be available. Sign in or learn about subscription options.
pp. 255-260
by
Xiang Feng
,
Shuguo Li
SEEAD: A Semantic-Based Approach for Automatic Binary Code De-obfuscation
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-268
by
Zhanyong Tang
,
Kaiyuan Kuang
,
Lei Wang
,
Chao Xue
,
Xiaoqing Gong
,
Xiaojiang Chen
,
Dingyi Fang
,
Jie Liu
,
Zheng Wang
Secure-GLOR: An Adaptive Secure Routing Protocol for Dynamic Wireless Mesh Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 269-276
by
Ashish Nanda
,
Priyadarsi Nanda
,
Xiangjian He
,
Aruna Jamdagni
,
Deepak Puthal
Evaluating the Effectiveness of Security Metrics for Dynamic Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 277-284
by
Simon Enoch Yusuf
,
Mengmeng Ge
,
Jin B. Hong
,
Hani Alzaid
,
Dong Seong Kim
SneakLeak: Detecting Multipartite Leakage Paths in Android Apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 285-292
by
Shweta Bhandari
,
Frederic Herbreteau
,
Vijay Laxmi
,
Akka Zemmari
,
Partha S. Roop
,
Manoj Singh Gaur
An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT
Full-text access may be available. Sign in or learn about subscription options.
pp. 293-300
by
Thomas Given-Wilson
,
Nisrine Jafri
,
Jean-Louis Lanet
,
Axel Legay
Grouping-Proofs Based Access Control Using KP-ABE for IoT Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 301-308
by
Lyes Touati
Mediator-Based Immediate Attribute Revocation Mechanism for CP-ABE in Multicast Group Communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 309-314
by
Lyes Touati
,
Yacine Challal
One-Round Provably Secure Yoking-Proof for RFID Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 315-322
by
Da-Zhi Sun
,
Guang-Quan Xu
Network Traffic Classification Using Tri-training Based on Statistical Flow Characteristics
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-330
by
Shuyuan Zhao
,
Yongzheng Zhang
,
Peng Chang
SniffDroid: Detection of Inter-App Privacy Leaks in Android
Full-text access may be available. Sign in or learn about subscription options.
pp. 331-338
by
Vineeta Jain
,
Shweta Bhandari
,
Vijay Laxmi
,
Manoj Singh Gaur
,
Mohamed Mosbah
Detecting DNS Tunnel through Binary-Classification Based on Behavior Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 339-346
by
Jingkun Liu
,
Shuhao Li
,
Yongzheng Zhang
,
Jun Xiao
,
Peng Chang
,
Chengwei Peng
A Secure Virtual Machine Deployment Strategy to Reduce Co-residency in Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 347-354
by
Yuqin Qiu
,
Qingni Shen
,
Yang Luo
,
Cong Li
,
Zhonghai Wu
Improving Leakage Path Coverage in Android Apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 355-362
by
Garima Modi
,
Vijay Laxmi
,
Smita Naval
,
Manoj Singh Gaur
A Traceable Outsourcing CP-ABE Scheme with Attribute Revocation
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-370
by
Ruoqing Zhang
,
Lucas Hui
,
Sm Yiu
,
Xiaoqi Yu
,
Zechao Liu
,
Zoe L. Jiang
Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 371-378
by
Annie Gilda Roselin
,
Priyadarsi Nanda
,
Surya Nepal
Sequential and Unsupervised Document Authorial Clustering Based on Hidden Markov Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 379-385
by
Khaled Aldebei
,
Helia Farhood
,
Wenjing Jia
,
Priyadarsi Nanda
,
Xiangjian He
Access Control Policy Combination from Similarity Analysis for Secure Privacy-Preserved EHR Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 386-393
by
Fatemeh Rezaeibagha
,
Yi Mu
A Relative Privacy Model for Effective Privacy Preservation in Transactional Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 394-401
by
Michael Bewong
,
Jixue Liu
,
Lin Liu
,
Jiuyong Li
,
Kim-Kwang Raymond Choo
A Dual Privacy Preserving Scheme in Continuous Location-Based Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 402-408
by
Shaobo Zhang
,
Guojun Wang
,
Qin Liu
A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 409-416
by
Matthew Bradbury
,
Arshad Jhumka
Privacy Preserving Collaborative Filtering via the Johnson-Lindenstrauss Transform
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-424
by
Mengmeng Yang
,
Tianqing Zhu
,
Lichuan Ma
,
Yang Xiang
,
Wanlei Zhou
An Efficient Disjunctive Query Enabled Ranked Searchable Encryption Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 425-432
by
Shahzaib Tahir
,
Sushmita Ruj
,
Muttukrishnan Rajarajan
An Efficient and Secure Itinerary-Based Data Aggregation Algorithm for WSNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 433-440
by
Taochun Wang
,
Ji Zhang
,
Yonglong Luo
,
Kaizhong Zuo
,
Xintao Ding
Dummy Location Selection Scheme for K-Anonymity in Location Based Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 441-448
by
Di Wu
,
Yu Zhang
,
Yinlong Liu
Secure FPGA as a Service — Towards Secure Data Processing by Physicalizing the Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 449-455
by
Mark A. Will
,
Ryan K. L. Ko
Privacy-Preserving Mechanisms for Parametric Survival Analysis with Weibull Distribution
Full-text access may be available. Sign in or learn about subscription options.
pp. 456-463
by
Thông T. Nguyên
,
Siu Cheung Hui
How to Cooperate Locally to Improve Global Privacy in Social Networks? On Amplification of Privacy Preserving Data Aggregation
Full-text access may be available. Sign in or learn about subscription options.
pp. 464-471
by
Krzysztof Grining
,
Marek Klonowski
,
Malgorzata Sulkowska
Privacy-Preserving Aggregation of Smart Metering via Transformation and Encryption
Full-text access may be available. Sign in or learn about subscription options.
pp. 472-479
by
Lingjuan Lyu
,
Yee Wei Law
,
Jiong Jin
,
Marimuthu Palaniswami
Privacy-Preserving and Collusion-aware k-NN Query Processing in Two-tiered Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 480-486
by
Juru Zeng
,
Hong Chen
,
Weiling Lai
,
Ying Liu
,
Cuiping Li
,
Shan Wang
NodeLeaper: Lower Overhead Oblivious AVL Tree
Full-text access may be available. Sign in or learn about subscription options.
pp. 487-493
by
Yao Liu
,
Qingkai Zeng
,
Pinghai Yuan
Assessing the Privacy Cost in Centralized Event-Based Demand Response for Microgrids
Full-text access may be available. Sign in or learn about subscription options.
pp. 494-501
by
Areg Karapetyan
,
Syafiq Kamarul Azman
,
Zeyar Aung
Privacy-Preserving Detection of Statically Mutually Exclusive Roles Constraints Violation in Interoperable Role-Based Access Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 502-509
by
Meng Liu
,
Xuyun Zhang
,
Chi Yang
,
Shaoning Pang
,
Deepak Puthal
,
Kaijun Ren
A Trajectory Privacy-Preserving Algorithm Based on Road Networks in Continuous Location-Based Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 510-516
by
Ayong Ye
,
Yacheng Li
,
Li Xu
,
Qing Li
,
Hui Lin
Deformable Template Matching Using Proposal-Based Best-Buddies Similarity
Full-text access may be available. Sign in or learn about subscription options.
pp. 517-521
by
Haiying Xia
,
Wenxian Zhao
,
Zheng Zhou
,
Frank Jiang
,
Haisheng Li
,
Xiangjian He
Anonymous CoinJoin Transactions with Arbitrary Values
Full-text access may be available. Sign in or learn about subscription options.
pp. 522-529
by
Felix Konstantin Maurer
,
Till Neudecker
,
Martin Florian
SOMR: Towards a Security-Oriented MapReduce Infrastructure
Full-text access may be available. Sign in or learn about subscription options.
pp. 530-537
by
Rui Zhao
,
Zhaopeng Meng
,
Yan Zheng
,
Qiangguo Jin
,
Anbang Ruan
,
Hanglun Xie
Feedback Entropy: A New Metric to Detect Unfair Rating Attacks for Trust Computing in Cloud Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 538-545
by
Manel Mrabet
,
Yosra Ben Saied
,
Leila Azouz Saidane
Beyond the Hype: On Using Blockchains in Trust Management for Authentication
Full-text access may be available. Sign in or learn about subscription options.
pp. 546-553
by
Nikolaos Alexopoulos
,
Jörg Daubert
,
Max Mühlhäuser
,
Sheikh Mahbub Habib
Showing 100 out of 184
Load More
Load All