default search action
Kim-Kwang Raymond Choo
Person information
- affiliation: University of Texas at San Antonio, USA
- affiliation: University of South Australia, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2018
- [b4]Darren Quick, Kim-Kwang Raymond Choo:
Big Digital Forensic Data - Volume 1: Data Reduction Framework and Selective Imaging. SpringerBriefs on Cyber Security Systems and Networks, Springer 2018, ISBN 978-981-10-7762-3, pp. 1-96 - [b3]Darren Quick, Kim-Kwang Raymond Choo:
Big Digital Forensic Data - Volume 2: Quick Analysis for Evidence and Intelligence. SpringerBriefs on Cyber Security Systems and Networks, Springer 2018, ISBN 978-981-13-0262-6, pp. 1-86 - 2014
- [b2]Darren Quick, Ben Martini, Kim-Kwang Raymond Choo:
Cloud Storage Forensics. Syngress Publishing / Elsevier 2014, ISBN 978-0-12-419970-5, pp. I-XVIII, 1-189 - 2009
- [b1]Kim-Kwang Raymond Choo:
Secure Key Establishment. Advances in Information Security 41, Springer 2009, ISBN 978-0-387-87968-0, pp. 1-210
Journal Articles
- 2024
- [j856]Faqian Guan, Tianqing Zhu, Wanlei Zhou, Kim-Kwang Raymond Choo:
Graph neural networks: a survey on the links between privacy and security. Artif. Intell. Rev. 57(2): 40 (2024) - [j855]Xinyu Tang, Cheng Guo, Kim-Kwang Raymond Choo, Xueru Jiang, Yi-Ning Liu:
A secure and lightweight cloud data deduplication scheme with efficient access control and key management. Comput. Commun. 222: 209-219 (2024) - [j854]Jiajie Guo, Muhammad Bilal, Yuying Qiu, Cheng Qian, Xiaolong Xu, Kim-Kwang Raymond Choo:
Survey on digital twins for Internet of Vehicles: Fundamentals, challenges, and opportunities. Digit. Commun. Networks 10(2): 237-247 (2024) - [j853]Ahmad Azab, Mahmoud Khasawneh, Saed Alrabaee, Kim-Kwang Raymond Choo, Maysa Sarsour:
Network traffic classification: Techniques, datasets, and challenges. Digit. Commun. Networks 10(3): 676-692 (2024) - [j852]Zhimin Zhang, Huansheng Ning, Fadi Farha, Jianguo Ding, Kim-Kwang Raymond Choo:
Artificial intelligence in physiological characteristics recognition for internet of things authentication. Digit. Commun. Networks 10(3): 740-755 (2024) - [j851]Wasif Khan, Saed Alrabaee, Mousa Al-Kfairy, Jie Tang, Kim-Kwang Raymond Choo:
Compiler-provenance identification in obfuscated binaries using vision transformers. Forensic Sci. Int. Digit. Investig. 49: 301764 (2024) - [j850]Yingmo Jie, Charles Zhechao Liu, Kim-Kwang Raymond Choo, Cheng Guo:
An incentive compatible ZD strategy-based data sharing model for federated learning: A perspective of iterated prisoner's dilemma. Eur. J. Oper. Res. 315(2): 764-776 (2024) - [j849]Ruoting Xiong, Wei Ren, Shenghui Zhao, Jie He, Yi Ren, Kim-Kwang Raymond Choo, Geyong Min:
CoPiFL: A collusion-resistant and privacy-preserving federated learning crowdsourcing scheme using blockchain and homomorphic encryption. Future Gener. Comput. Syst. 156: 95-104 (2024) - [j848]Liping Zhang, Anzi Li, Shukai Chen, Wei Ren, Kim-Kwang Raymond Choo:
A Secure, Flexible, and PPG-Based Biometric Scheme for Healthy IoT Using Homomorphic Random Forest. IEEE Internet Things J. 11(1): 612-622 (2024) - [j847]Daojing He, Xin Lv, Shanshan Zhu, Sammy Chan, Kim-Kwang Raymond Choo:
A Method for Detecting Phishing Websites Based on Tiny-Bert Stacking. IEEE Internet Things J. 11(2): 2236-2243 (2024) - [j846]Jingwang Huang, Qi Cui, Zhili Zhou, Keping Yu, Ching-Nung Yang, Kim-Kwang Raymond Choo:
Encrypted Domain Secret Medical-Image Sharing With Secure Outsourcing Computation in IoT Environment. IEEE Internet Things J. 11(2): 2382-2393 (2024) - [j845]Haoran Qin, Yining Tan, Yuxian Chen, Wei Ren, Kim-Kwang Raymond Choo:
TriBoDeS: A Tri-Blockchain-Based Detection and Sharing Scheme for Dangerous Road Condition Information in Internet of Vehicles. IEEE Internet Things J. 11(2): 3563-3577 (2024) - [j844]Wei Zhou, Tianqing Zhu, Dayong Ye, Wei Ren, Kim-Kwang Raymond Choo:
A Concurrent Federated Reinforcement Learning for IoT Resources Allocation With Local Differential Privacy. IEEE Internet Things J. 11(4): 6537-6550 (2024) - [j843]Xiaodong Li, Hehe Gao, Jianyi Zhang, Shuya Yang, Xin Jin, Kim-Kwang Raymond Choo:
GPU Accelerated Full Homomorphic Encryption Cryptosystem, Library, and Applications for IoT Systems. IEEE Internet Things J. 11(4): 6893-6903 (2024) - [j842]Jie Zhao, Hejiao Huang, Xiaojun Zhang, Daojing He, Kim-Kwang Raymond Choo, Zoe Lin Jiang:
VMEMDA: Verifiable Multidimensional Encrypted Medical Data Aggregation Scheme for Cloud-Based Wireless Body Area Networks. IEEE Internet Things J. 11(10): 18647-18662 (2024) - [j841]Yilei Wang, Chunmei Li, Yiting Zhang, Tao Li, Jianting Ning, Keke Gai, Kim-Kwang Raymond Choo:
A Detection Method Against Selfish Mining-Like Attacks Based on Ensemble Deep Learning in IoT. IEEE Internet Things J. 11(11): 19564-19574 (2024) - [j840]Image Bhattarai, Cong Pu, Kim-Kwang Raymond Choo, Dragan Korac:
A Lightweight and Anonymous Application-Aware Authentication and Key Agreement Protocol for the Internet of Drones. IEEE Internet Things J. 11(11): 19790-19803 (2024) - [j839]Changti Wu, Lei Zhang, Lin Xu, Kim-Kwang Raymond Choo, Liangyu Zhong:
Privacy-Preserving Serverless Federated Learning Scheme for Internet of Things. IEEE Internet Things J. 11(12): 22429-22438 (2024) - [j838]Jie Zhao, Hejiao Huang, Daojing He, Xiaojun Zhang, Yuan Zhang, Kim-Kwang Raymond Choo:
IB-IADR: Enabling Identity-Based Integrity Auditing and Data Recovery With Fault Localization for Multicloud Storage. IEEE Internet Things J. 11(16): 27214-27231 (2024) - [j837]Shuqin Liu, Yinbin Miao, Feng Li, Xinghua Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Practical Revocable Keyword Search Over Mobile Cloud-Assisted Internet of Things. IEEE Internet Things J. 11(16): 27494-27508 (2024) - [j836]Yuexin Xiang, Tiantian Li, Wei Ren, Jie He, Tianqing Zhu, Kim-Kwang Raymond Choo:
AdvEWM: Generating image adversarial examples by embedding digital watermarks. J. Inf. Secur. Appl. 80: 103662 (2024) - [j835]Suman Kumar Choudhury, Pankaj Kumar Sa, Kim-Kwang Raymond Choo, Sambit Bakshi:
Segmenting foreground objects in a multi-modal background using modified Z-score. J. Ambient Intell. Humaniz. Comput. 15(2): 1213-1227 (2024) - [j834]Tongnian Wang, Kai Zhang, Jiannan Cai, Yanmin Gong, Kim-Kwang Raymond Choo, Yuanxiong Guo:
Analyzing the Impact of Personalization on Fairness in Federated Learning for Healthcare. J. Heal. Informatics Res. 8(2): 181-205 (2024) - [j833]Zeli Wang, Weiqi Dai, Ming Li, Kim-Kwang Raymond Choo, Deqing Zou:
DFier: A directed vulnerability verifier for Ethereum smart contracts. J. Netw. Comput. Appl. 231: 103984 (2024) - [j832]Pengbiao Zhao, Bintao Wang, Zhen Qin, Yi Ding, Kim-Kwang Raymond Choo:
A privacy protection scheme for green communication combining digital steganography. Peer Peer Netw. Appl. 17(4): 2507-2522 (2024) - [j831]Qi Feng, Debiao He, Jian Shen, Min Luo, Kim-Kwang Raymond Choo:
PpNNT: Multiparty Privacy-Preserving Neural Network Training System. IEEE Trans. Artif. Intell. 5(1): 370-383 (2024) - [j830]Tianming Zhuang, Zhen Qin, Yi Ding, Fuhu Deng, Leduo Chen, Zhiguang Qin, Kim-Kwang Raymond Choo:
Temporal Refinement Graph Convolutional Network for Skeleton-Based Action Recognition. IEEE Trans. Artif. Intell. 5(4): 1586-1598 (2024) - [j829]Haiyan Zhang, Xinghua Li, Jiawei Tang, Chunlei Peng, Yunwei Wang, Ning Zhang, Yingbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo:
Hiding in Plain Sight: Adversarial Attack via Style Transfer on Image Borders. IEEE Trans. Computers 73(10): 2405-2419 (2024) - [j828]Kejing Zhao, Zhiyong Zhang, Kim-Kwang Raymond Choo, Zhongya Zhang, Tiantian Zhang:
A Combinatorial Optimization Analysis Method for Detecting Malicious Industrial Internet Attack Behaviors. ACM Trans. Cyber Phys. Syst. 8(1): 8:1-8:20 (2024) - [j827]Wajiha Shahid, Bahman Jamshidi, Saqib Hakak, Haruna Isah, Wazir Zada Khan, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
Detecting and Mitigating the Dissemination of Fake News: Challenges and Future Research Opportunities. IEEE Trans. Comput. Soc. Syst. 11(4): 4649-4662 (2024) - [j826]Jianping Cai, Ximeng Liu, Jiayin Li, Kim-Kwang Raymond Choo:
Differentially Private Non-Negative Consistent Release for Large-Scale Hierarchical Trees. IEEE Trans. Dependable Secur. Comput. 21(1): 388-402 (2024) - [j825]Cheng Guo, Wenfeng Li, Xinyu Tang, Kim-Kwang Raymond Choo, Yining Liu:
Forward Private Verifiable Dynamic Searchable Symmetric Encryption With Efficient Conjunctive Query. IEEE Trans. Dependable Secur. Comput. 21(2): 746-763 (2024) - [j824]Zikang Ding, Daojing He, Qi Qiao, Xuru Li, Yun Gao, Sammy Chan, Kim-Kwang Raymond Choo:
A Lightweight and Secure Communication Protocol for the IoT Environment. IEEE Trans. Dependable Secur. Comput. 21(3): 1050-1067 (2024) - [j823]Yinbin Miao, Feng Li, Xinghua Li, Jianting Ning, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Verifiable Outsourced Attribute-Based Encryption Scheme for Cloud-Assisted Mobile E-Health System. IEEE Trans. Dependable Secur. Comput. 21(4): 1845-1862 (2024) - [j822]Yinbin Miao, Ziteng Liu, Xinghua Li, Meng Li, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Robust Asynchronous Federated Learning With Time-Weighted and Stale Model Aggregation. IEEE Trans. Dependable Secur. Comput. 21(4): 2361-2375 (2024) - [j821]Hongsheng Hu, Xuyun Zhang, Zoran Salcic, Lichao Sun, Kim-Kwang Raymond Choo, Gillian Dobbie:
Source Inference Attacks: Beyond Membership Inference Attacks in Federated Learning. IEEE Trans. Dependable Secur. Comput. 21(4): 3012-3029 (2024) - [j820]Tara Salman, Ali Ghubaish, Roberto Di Pietro, Mohamed Baza, Hani Alshahrani, Raj Jain, Kim-Kwang Raymond Choo:
CrowdFAB: Intelligent Crowd-Forecasting Using Blockchains and its Use in Security. IEEE Trans. Dependable Secur. Comput. 21(4): 3030-3047 (2024) - [j819]Ning Lu, Ruxiao Huang, Mingliang Yao, Wenbo Shi, Kim-Kwang Raymond Choo:
V-Digger: An Efficient and Secure Vulnerability Assessment for Large-Scale ISP Network. IEEE Trans. Dependable Secur. Comput. 21(4): 3227-3246 (2024) - [j818]Yinbin Miao, Feng Li, Xiaohua Jia, Huaxiong Wang, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
REKS: Role-Based Encrypted Keyword Search With Enhanced Access Control for Outsourced Cloud Data. IEEE Trans. Dependable Secur. Comput. 21(4): 3247-3261 (2024) - [j817]Ying Miao, Keke Gai, Liehuang Zhu, Kim-Kwang Raymond Choo, Jaideep Vaidya:
Blockchain-Based Shared Data Integrity Auditing and Deduplication. IEEE Trans. Dependable Secur. Comput. 21(4): 3688-3703 (2024) - [j816]Ning Lu, Mingxi Liu, Wenbo Shi, Ximeng Liu, Kim-Kwang Raymond Choo:
SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid. IEEE Trans. Dependable Secur. Comput. 21(4): 4162-4179 (2024) - [j815]Yinbin Miao, Rongpeng Xie, Xinghua Li, Zhiquan Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
Efficient and Secure Federated Learning Against Backdoor Attacks. IEEE Trans. Dependable Secur. Comput. 21(5): 4619-4636 (2024) - [j814]Yingmo Jie, Charles Zhechao Liu, Kim-Kwang Raymond Choo:
A Game-Theory-Based Contract Mechanism to Facilitate Technology Spillover in Emerging Electric Vehicle Markets. IEEE Trans. Engineering Management 71: 76-89 (2024) - [j813]Christian Baliker, Mohamed Baza, Abdullah Alourani, Ali Alshehri, Hani Alshahrani, Kim-Kwang Raymond Choo:
On the Applications of Blockchain in FinTech: Advancements and Opportunities. IEEE Trans. Engineering Management 71: 6338-6355 (2024) - [j812]Zainatun N. Hussin, Christie Pei-Yee Chin, Stephen Laison Sondoh, Kim-Kwang Raymond Choo:
How do Governments Leverage the Use of Social Media? A Systematic Review. IEEE Trans. Engineering Management 71: 7242-7256 (2024) - [j811]Soroush Haghsefat, Milad Taleby Ahvanooey, Huaming Song, Charles Zhechao Liu, Kim-Kwang Raymond Choo:
PrFAHP-GT: A New Privacy Risk Analysis Framework Using FAHP and Game Theory for Digital Supply Chain Management. IEEE Trans. Engineering Management 71: 11718-11733 (2024) - [j810]Xinyu Tang, Cheng Guo, Kim-Kwang Raymond Choo, Yi-Ning Liu:
An Efficient and Dynamic Privacy-Preserving Federated Learning System for Edge Computing. IEEE Trans. Inf. Forensics Secur. 19: 207-220 (2024) - [j809]Yi Ding, Zi Wang, Zhen Qin, Erqiang Zhou, Guobin Zhu, Zhiguang Qin, Kim-Kwang Raymond Choo:
Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption Network. IEEE Trans. Inf. Forensics Secur. 19: 280-292 (2024) - [j808]Qiuhua Wang, Chengyu Li, Tianyu Xia, Yizhi Ren, Dong Wang, Guoyan Zhang, Kim-Kwang Raymond Choo:
Optimal Selfish Mining-Based Denial-of-Service Attack. IEEE Trans. Inf. Forensics Secur. 19: 835-850 (2024) - [j807]Yuexin Xiang, Yuchen Lei, Ding Bao, Tiantian Li, Qingqing Yang, Wenmao Liu, Wei Ren, Kim-Kwang Raymond Choo:
BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis. IEEE Trans. Inf. Forensics Secur. 19: 2171-2185 (2024) - [j806]Weiqi Dai, Jinkai Liu, Yang Zhou, Kim-Kwang Raymond Choo, Xia Xie, Deqing Zou, Hai Jin:
PRBFPT: A Practical Redactable Blockchain Framework With a Public Trapdoor. IEEE Trans. Inf. Forensics Secur. 19: 2425-2437 (2024) - [j805]Weixuan Tang, Zhili Zhou, Bin Li, Kim-Kwang Raymond Choo, Jiwu Huang:
Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography. IEEE Trans. Inf. Forensics Secur. 19: 2826-2839 (2024) - [j804]Runmeng Du, Xuru Li, Daojing He, Kim-Kwang Raymond Choo:
Toward Secure and Verifiable Hybrid Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 2935-2950 (2024) - [j803]Wael Issa, Nour Moustafa, Benjamin P. Turnbull, Kim-Kwang Raymond Choo:
RVE-PFL: Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion Attacks. IEEE Trans. Inf. Forensics Secur. 19: 3772-3787 (2024) - [j802]Daojing He, Xin Lv, Xueqian Xu, Sammy Chan, Kim-Kwang Raymond Choo:
Double-Layer Detection of Internal Threat in Enterprise Systems Based on Deep Learning. IEEE Trans. Inf. Forensics Secur. 19: 4741-4751 (2024) - [j801]Yinbin Miao, Da Kuang, Xinghua Li, Shujiang Xu, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Privacy-Preserving Asynchronous Federated Learning Under Non-IID Settings. IEEE Trans. Inf. Forensics Secur. 19: 5828-5841 (2024) - [j800]Yujie Song, Yue Cao, Chaklam Cheong, Debiao He, Kim-Kwang Raymond Choo, Juan Wang:
CAT: A Consensus-Adaptive Trust Management Based on the Group Decision Making in IoVs. IEEE Trans. Inf. Forensics Secur. 19: 7730-7743 (2024) - [j799]Ruochen Wang, Jun Zhou, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo:
Updatable Private Set Intersection With Forward Privacy. IEEE Trans. Inf. Forensics Secur. 19: 8573-8586 (2024) - [j798]Amjad Abu-Mahfouz, Saed Alrabaee, Mahmoud Khasawneh, Marton Gergely, Kim-Kwang Raymond Choo:
A Deep Learning Approach to Discover Router Firmware Vulnerabilities. IEEE Trans. Ind. Informatics 20(1): 691-702 (2024) - [j797]Yifan Zhang, Yinbin Miao, Xinghua Li, Linfeng Wei, Zhiquan Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
Efficient Privacy-Preserving Federated Learning With Improved Compressed Sensing. IEEE Trans. Ind. Informatics 20(3): 3316-3326 (2024) - [j796]Yihang Wei, Keke Gai, Jing Yu, Liehuang Zhu, Kim-Kwang Raymond Choo:
Trustworthy Access Control for Multiaccess Edge Computing in Blockchain-Assisted 6G Systems. IEEE Trans. Ind. Informatics 20(5): 7732-7743 (2024) - [j795]Jie Lin, Yinbin Miao, Linfeng Wei, Tao Leng, Kim-Kwang Raymond Choo:
Efficient Secure Inference Scheme in Multiparty Settings for Industrial Internet of Things. IEEE Trans. Ind. Informatics 20(10): 11877-11886 (2024) - [j794]Hong Qin, Debiao He, Qi Feng, Muhammad Khurram Khan, Min Luo, Kim-Kwang Raymond Choo:
Cryptographic Primitives in Privacy-Preserving Machine Learning: A Survey. IEEE Trans. Knowl. Data Eng. 36(5): 1919-1934 (2024) - [j793]Yinbin Miao, Feng Li, Xinghua Li, Zhiquan Liu, Jianting Ning, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Time-Controllable Keyword Search Scheme With Efficient Revocation in Mobile E-Health Cloud. IEEE Trans. Mob. Comput. 23(5): 3650-3665 (2024) - [j792]Yinbin Miao, Lin Song, Xinghua Li, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Privacy-Preserving Arbitrary Geometric Range Query in Mobile Internet of Vehicles. IEEE Trans. Mob. Comput. 23(7): 7725-7738 (2024) - [j791]Amar Rasheed, Mohamed Baza, Mahmoud M. Badr, Hani Alshahrani, Kim-Kwang Raymond Choo:
Efficient Crypto Engine for Authenticated Encryption, Data Traceability, and Replay Attack Detection Over CAN Bus Network. IEEE Trans. Netw. Sci. Eng. 11(1): 1008-1025 (2024) - [j790]Weiqi Dai, Liangliang Yu, Yang Zhou, Kim-Kwang Raymond Choo, Deqing Zou, Xia Xie, Hai Jin:
PASSP: A Private Authorization Scheme Oriented Service Providers. IEEE Trans. Netw. Serv. Manag. 21(4): 4888-4899 (2024) - [j789]Liping Zhang, Shukai Chen, Fei Lin, Wei Ren, Kim-Kwang Raymond Choo, Geyong Min:
1DIEN: Cross-session Electrocardiogram Authentication Using 1D Integrated EfficientNet. ACM Trans. Multim. Comput. Commun. Appl. 20(1): 17:1-17:17 (2024) - [j788]Liping Zhang, Wenshuo Han, Shukai Chen, Kim-Kwang Raymond Choo:
An Efficient and Secure Health Data Propagation Scheme Using Steganography-Based Approach for Electronic Health Networks. IEEE/ACM Trans. Netw. 32(2): 1261-1272 (2024) - [j787]Man Zhang, Xinghua Li, Yinbin Miao, Bin Luo, Siqi Ma, Kim-Kwang Raymond Choo, Robert H. Deng:
Oasis: Online All-Phase Quality-Aware Incentive Mechanism for MCS. IEEE Trans. Serv. Comput. 17(2): 589-603 (2024) - [j786]Cong Pu, Clare Warner, Kim-Kwang Raymond Choo, Sunho Lim, Imtiaz Ahmed:
liteGAP: Lightweight Group Authentication Protocol for Internet of Drones Systems. IEEE Trans. Veh. Technol. 73(4): 5849-5860 (2024) - 2023
- [j785]Zhiqiu Zhang, Tianqing Zhu, Wei Ren, Ping Xiong, Kim-Kwang Raymond Choo:
Preserving data privacy in federated learning through large gradient pruning. Comput. Secur. 125: 103039 (2023) - [j784]Othmane Friha, Mohamed Amine Ferrag, Mohamed Benbouzid, Tarek Berghout, Burak Kantarci, Kim-Kwang Raymond Choo:
2DF-IDS: Decentralized and differentially private federated learning-based intrusion detection system for industrial IoT. Comput. Secur. 127: 103097 (2023) - [j783]Milad Taleby Ahvanooey, Mark Xuefang Zhu, Shiyan Ou, Hassan Dana Mazraeh, Wojciech Mazurczyk, Kim-Kwang Raymond Choo, Chuan Li:
AFPr-AM: A novel Fuzzy-AHP based privacy risk assessment model for strategic information management of social media platforms. Comput. Secur. 130: 103263 (2023) - [j782]Jie Li, Tianqing Zhu, Wei Ren, Kim-Kwang Raymond Choo:
Improve individual fairness in federated learning via adversarial training. Comput. Secur. 132: 103336 (2023) - [j781]Hudan Studiawan, George Grispos, Kim-Kwang Raymond Choo:
Unmanned Aerial Vehicle (UAV) Forensics: The Good, The Bad, and the Unaddressed. Comput. Secur. 132: 103340 (2023) - [j780]Mohamed Amine Ferrag, Othmane Friha, Burak Kantarci, Norbert Tihanyi, Lucas C. Cordeiro, Mérouane Debbah, Djallel Hamouda, Muna Al-Hawawreh, Kim-Kwang Raymond Choo:
Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses. IEEE Commun. Surv. Tutorials 25(4): 2654-2713 (2023) - [j779]Junsik Sim, Beomjoong Kim, Kiseok Jeon, Moonho Joo, Jihun Lim, Junghee Lee, Kim-Kwang Raymond Choo:
Technical Requirements and Approaches in Personal Data Control. ACM Comput. Surv. 55(9): 190:1-190:30 (2023) - [j778]Heba Saleous, Muhusina Ismail, Saleh H. Aldaajeh, Nisha Madathil, Saed Alrabaee, Kim-Kwang Raymond Choo, Nabeel Al-Qirim:
COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities. Digit. Commun. Networks 9(1): 211-222 (2023) - [j777]Leonardo Bertolin Furstenau, Yan Pablo Reckziegel Rodrigues, Michele Kremer Sott, Pedro Leivas, Michael S. Dohan, José Ricardo López-Robles, Manuel J. Cobo, Nicola Luigi Bragazzi, Kim-Kwang Raymond Choo:
Internet of things: Conceptual network structure, main challenges and future directions. Digit. Commun. Networks 9(3): 677-687 (2023) - [j776]Leonardo Bertolin Furstenau, Pedro Leivas, Michele Kremer Sott, Michael S. Dohan, José Ricardo López-Robles, Manuel J. Cobo, Nicola Luigi Bragazzi, Kim-Kwang Raymond Choo:
Big data in healthcare: Conceptual network structure, key challenges and opportunities. Digit. Commun. Networks 9(4): 856-868 (2023) - [j775]Posie Aagaard, Bijan Dinyarian, Omar Abduljabbar, Kim-Kwang Raymond Choo:
Family locating sharing app forensics: Life360 as a case study. Forensic Sci. Int. Digit. Investig. 44: 301478 (2023) - [j774]Naga Vemprala, Charles Zhechao Liu, Kim-Kwang Raymond Choo:
From puzzles to portraits: Enhancing situation awareness during natural disasters using a design science approach. Decis. Sci. 54(2): 211-231 (2023) - [j773]Mohsen M. Jozani, Charles Zhechao Liu, Kim-Kwang Raymond Choo:
An empirical study of content-based recommendation systems in mobile app markets. Decis. Support Syst. 169: 113954 (2023) - [j772]Yuexin Xiang, Tiantian Li, Wei Ren, Tianqing Zhu, Kim-Kwang Raymond Choo:
A lightweight privacy-preserving scheme using pixel block mixing for facial image classification in deep learning. Eng. Appl. Artif. Intell. 126(Part D): 107180 (2023) - [j771]Claudia Greco, Giancarlo Fortino, Bruno Crispo, Kim-Kwang Raymond Choo:
AI-enabled IoT penetration testing: state-of-the-art and research challenges. Enterp. Inf. Syst. 17(9) (2023) - [j770]Henry Chacon, Vishwa Koppisetti, David Hardage, Kim-Kwang Raymond Choo, Paul Rad:
Forecasting call center arrivals using temporal memory networks and gradient boosting algorithm. Expert Syst. Appl. 224: 119983 (2023) - [j769]Ding Bao, Wei Ren, Yuexin Xiang, Weimao Liu, Tianqing Zhu, Yi Ren, Kim-Kwang Raymond Choo:
BTC-Shadow: an analysis and visualization system for exposing implicit behaviors in Bitcoin transaction graphs. Frontiers Comput. Sci. 17(6): 176215 (2023) - [j768]Xiaofan Liu, Wei Ren, Kim-Kwang Raymond Choo:
BSKCN and BSAML: blind signatures from the module lattice and the asymmetric module lattice. Frontiers Comput. Sci. 17(6): 176815 (2023) - [j767]Shaobo Zhang, Tao Guo, Qin Liu, Entao Luo, Kim-Kwang Raymond Choo, Guojun Wang:
ALPS: Achieving accuracy-aware location privacy service via assisted regions. Future Gener. Comput. Syst. 145: 189-199 (2023) - [j766]Pouyan Jahanbin, Ravi S. Sharma, Stephen C. Wingreen, Nir Kshetri, Kim-Kwang Raymond Choo:
Towards CRISP-BC: 3TIC specification framework for Blockchain use-cases. IET Blockchain 3(3): 159-168 (2023) - [j765]Xiaofan Liu, Weihui Qiu, Wei Ren, Caixu Xu, Kim-Kwang Raymond Choo:
An in-situ authentication with privacy preservation scheme for accident response in Internet of Vehicles. Internet Things 22: 100728 (2023) - [j764]Renwan Bi, Jinbo Xiong, Youliang Tian, Qi Li, Kim-Kwang Raymond Choo:
Achieving Lightweight and Privacy-Preserving Object Detection for Connected Autonomous Vehicles. IEEE Internet Things J. 10(3): 2314-2329 (2023) - [j763]Siva Sai, Vinay Chamola, Kim-Kwang Raymond Choo, Biplab Sikdar, Joel J. P. C. Rodrigues:
Confluence of Blockchain and Artificial Intelligence Technologies for Secure and Scalable Healthcare Solutions: A Review. IEEE Internet Things J. 10(7): 5873-5897 (2023) - [j762]Yajing Xu, Zhihui Lu, Keke Gai, Qiang Duan, Junxiong Lin, Jie Wu, Kim-Kwang Raymond Choo:
BESIFL: Blockchain-Empowered Secure and Incentive Federated Learning Paradigm in IoT. IEEE Internet Things J. 10(8, April 15): 6561-6573 (2023) - [j761]Zhixin Li, Chunpu Huang, Keke Gai, Zhihui Lu, Jie Wu, Lulu Chen, Yangchuan Xu, Kim-Kwang Raymond Choo:
AsyFed: Accelerated Federated Learning With Asynchronous Communication Mechanism. IEEE Internet Things J. 10(10): 8670-8683 (2023) - [j760]Xinru Yan, Yinbin Miao, Xinghua Li, Kim-Kwang Raymond Choo, Xiangdong Meng, Robert H. Deng:
Privacy-Preserving Asynchronous Federated Learning Framework in Distributed IoT. IEEE Internet Things J. 10(15): 13281-13291 (2023) - [j759]Pengxu Tian, Cheng Guo, Kim-Kwang Raymond Choo, Xinyu Tang, Lin Yao:
A Privacy-Preserving Hybrid Range Search Scheme Over Encrypted Electronic Medical Data in IoT Systems. IEEE Internet Things J. 10(17): 15314-15324 (2023) - [j758]Dongyang Xu, Keping Yu, Li Zhen, Kim-Kwang Raymond Choo, Mohsen Guizani:
Quantum Learning on Structured Code With Computing Traps for Secure URLLC in Industrial IoT Scenarios. IEEE Internet Things J. 10(18): 16516-16530 (2023) - [j757]Tianxiu Xie, Keke Gai, Liehuang Zhu, Yunwei Guo, Kim-Kwang Raymond Choo:
Cross-Chain-Based Trustworthy Node Identity Governance in Internet of Things. IEEE Internet Things J. 10(24): 21580-21594 (2023) - [j756]Ruoting Xiong, Wei Ren, Xiaohan Hao, Jie He, Kim-Kwang Raymond Choo:
BDIM: A Blockchain-Based Decentralized Identity Management Scheme for Large Scale Internet of Things. IEEE Internet Things J. 10(24): 22581-22590 (2023) - [j755]Haixia Peng, Nan Cheng, Qiang Ye, He Fang, Shen Yan, Kim-Kwang Raymond Choo, Trung Q. Duong:
Guest Editorial: Ubiquitous Intelligence for Internet of Vehicles. IEEE Internet Things Mag. 6(3): 52-54 (2023) - [j754]Qiuhua Wang, Rui Zhang, Chuangchuang Li, Chengyu Li, Yeru Wang, Yizhi Ren, Kim-Kwang Raymond Choo:
S-DeepTrust: A deep trust prediction method based on sentiment polarity perception. Inf. Sci. 633: 104-121 (2023) - [j753]Xiaofeng Ding, Yinting Zheng, Zuan Wang, Kim-Kwang Raymond Choo, Hai Jin:
A learned spatial textual index for efficient keyword queries. J. Intell. Inf. Syst. 60(3): 803-827 (2023) - [j752]Adarsh Kumar, Neelu Jyothi Ahuja, Monika Thapliyal, Sarthika Dutt, Tanesh Kumar, Diego Augusto de Jesus Pacheco, Charalambos Konstantinou, Kim-Kwang Raymond Choo:
Blockchain for unmanned underwater drones: Research issues, challenges, trends and future directions. J. Netw. Comput. Appl. 215: 103649 (2023) - [j751]Shiwen Zhang, Yibin Yang, Wei Liang, Voundi Koe Arthur Sandor, Guoqi Xie, Kim-Kwang Raymond Choo:
MKSS: An Effective Multi-authority Keyword Search Scheme for edge-cloud collaboration. J. Syst. Archit. 144: 102998 (2023) - [j750]Jack Long, Ivan Cvitic, Xiaolu Zhang, Dragan Perakovic, Kim-Kwang Raymond Choo:
Badoo Android and iOS Dating Application Analysis. Mob. Networks Appl. 28(4): 1272-1281 (2023) - [j749]George Grispos, Kim-Kwang Raymond Choo, William Bradley Glisson:
Sickly Apps: A Forensic Analysis of Medical Device Smartphone Applications on Android and iOS Devices. Mob. Networks Appl. 28(4): 1282-1292 (2023) - [j748]Zijian Bao, Debiao He, Cong Peng, Min Luo, Kim-Kwang Raymond Choo:
An Identity-Based Adaptor Signature Scheme and its Applications in the Blockchain System. IEEE Open J. Comput. Soc. 4: 231-242 (2023) - [j747]Tongtong Sang, Peng Zeng, Kim-Kwang Raymond Choo:
Provable Multiple-Copy Integrity Auditing Scheme for Cloud-Based IoT. IEEE Syst. J. 17(1): 224-233 (2023) - [j746]Yizhi Liu, Xiaohan Hao, Wei Ren, Ruoting Xiong, Tianqing Zhu, Kim-Kwang Raymond Choo, Geyong Min:
A Blockchain-Based Decentralized, Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things. IEEE Trans. Computers 72(2): 501-512 (2023) - [j745]Qi Feng, Debiao He, Min Luo, Xinyi Huang, Kim-Kwang Raymond Choo:
EPRICE: An Efficient and Privacy-Preserving Real-Time Incentive System for Crowdsensing in Industrial Internet of Things. IEEE Trans. Computers 72(9): 2482-2495 (2023) - [j744]Feng Li, Jianfeng Ma, Yinbin Miao, Qi Jiang, Ximeng Liu, Kim-Kwang Raymond Choo:
Verifiable and Dynamic Multi-Keyword Search Over Encrypted Cloud Data Using Bitmap. IEEE Trans. Cloud Comput. 11(1): 336-348 (2023) - [j743]Feng Li, Jianfeng Ma, Yinbin Miao, Zhiquan Liu, Kim-Kwang Raymond Choo, Ximeng Liu, Robert H. Deng:
Towards Efficient Verifiable Boolean Search Over Encrypted Cloud Data. IEEE Trans. Cloud Comput. 11(1): 839-853 (2023) - [j742]Qiuyun Lyu, Hao Li, Zhining Deng, Jingyu Wang, Yizhi Ren, Ning Zheng, Junliang Liu, Huaping Liu, Kim-Kwang Raymond Choo:
A2UA: An Auditable Anonymous User Authentication Protocol Based on Blockchain for Cloud Services. IEEE Trans. Cloud Comput. 11(3): 2546-2561 (2023) - [j741]Junchang Jing, Fei Li, Bin Song, Zhiyong Zhang, Kim-Kwang Raymond Choo:
Disinformation Propagation Trend Analysis and Identification Based on Social Situation Analytics and Multilevel Attention Network. IEEE Trans. Comput. Soc. Syst. 10(2): 507-522 (2023) - [j740]Rui Zhang, Lei Zhang, Kim-Kwang Raymond Choo, Tong Chen:
Dynamic Authenticated Asymmetric Group Key Agreement With Sender Non-Repudiation and Privacy for Group-Oriented Applications. IEEE Trans. Dependable Secur. Comput. 20(1): 492-505 (2023) - [j739]Diana Laura Aguilar, Miguel Angel Medina-Pérez, Octavio Loyola-González, Kim-Kwang Raymond Choo, Edoardo Bucheli-Susarrey:
Towards an Interpretable Autoencoder: A Decision-Tree-Based Autoencoder and its Application in Anomaly Detection. IEEE Trans. Dependable Secur. Comput. 20(2): 1048-1059 (2023) - [j738]Xuru Li, Daojing He, Yun Gao, Ximeng Liu, Sammy Chan, Manghan Pan, Kim-Kwang Raymond Choo:
LIGHT: Lightweight Authentication for Intra Embedded Integrated Electronic Systems. IEEE Trans. Dependable Secur. Comput. 20(2): 1088-1103 (2023) - [j737]Junchang Jing, Zhiyong Zhang, Kim-Kwang Raymond Choo, Kefeng Fan, Bin Song, Lili Zhang:
Inference of User Desires to Spread Disinformation Based on Social Situation Analytics and Group Effect. IEEE Trans. Dependable Secur. Comput. 20(3): 1833-1848 (2023) - [j736]Jun Zhou, Nan Wu, Yisong Wang, Shouzhen Gu, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo:
A Differentially Private Federated Learning Model Against Poisoning Attacks in Edge Computing. IEEE Trans. Dependable Secur. Comput. 20(3): 1941-1958 (2023) - [j735]Yi Chen, Zoran Salcic, Hongxia Wang, Kim-Kwang Raymond Choo, Xuyun Zhang:
NACA: A Joint Distortion-Based Non-Additive Cost Assignment Method for Video Steganography. IEEE Trans. Dependable Secur. Comput. 20(3): 2360-2374 (2023) - [j734]Yi Ding, Fuyuan Tan, Ji Geng, Zhen Qin, Mingsheng Cao, Kim-Kwang Raymond Choo, Zhiguang Qin:
Interpreting Universal Adversarial Example Attacks on Image Classification Models. IEEE Trans. Dependable Secur. Comput. 20(4): 3392-3407 (2023) - [j733]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Wei Zheng, Kim-Kwang Raymond Choo, Robert H. Deng:
VerifyTL: Secure and Verifiable Collaborative Transfer Learning. IEEE Trans. Dependable Secur. Comput. 20(6): 5087-5101 (2023) - [j732]Jun Zhou, Guobin Gao, Zhenfu Cao, Kim-Kwang Raymond Choo, Xiaolei Dong:
Lightweight Privacy-Preserving Distributed Recommender System Using Tag-Based Multikey Fully Homomorphic Data Encapsulation. IEEE Trans. Dependable Secur. Comput. 20(6): 5230-5246 (2023) - [j731]Leili Soltanisehat, Reza Alizadeh Kordabad, Haijing Hao, Kim-Kwang Raymond Choo:
Technical, Temporal, and Spatial Research Challenges and Opportunities in Blockchain-Based Healthcare: A Systematic Literature Review. IEEE Trans. Engineering Management 70(1): 353-368 (2023) - [j730]Gianluca Zanella, Charles Zhechao Liu, Kim-Kwang Raymond Choo:
Understanding the Trends in Blockchain Domain Through an Unsupervised Systematic Patent Analysis. IEEE Trans. Engineering Management 70(6): 1991-2005 (2023) - [j729]Saeed Alzahrani, Tugrul U. Daim, Kim-Kwang Raymond Choo:
Assessment of the Blockchain Technology Adoption for the Management of the Electronic Health Record Systems. IEEE Trans. Engineering Management 70(8): 2846-2863 (2023) - [j728]Zuan Wang, Liang Zhang, Xiaofeng Ding, Kim-Kwang Raymond Choo, Hai Jin:
A Dynamic-Efficient Structure for Secure and Verifiable Location-Based Skyline Queries. IEEE Trans. Inf. Forensics Secur. 18: 920-935 (2023) - [j727]Jiayan Shen, Peng Zeng, Kim-Kwang Raymond Choo, Chengju Li:
A Certificateless Provable Data Possession Scheme for Cloud-Based EHRs. IEEE Trans. Inf. Forensics Secur. 18: 1156-1168 (2023) - [j726]Zhili Zhou, Xiaohua Dong, Ruohan Meng, Meimin Wang, Hongyang Yan, Keping Yu, Kim-Kwang Raymond Choo:
Generative Steganography via Auto-Generation of Semantic Object Contours. IEEE Trans. Inf. Forensics Secur. 18: 2751-2765 (2023) - [j725]Yang Liu, Debiao He, Qi Feng, Min Luo, Kim-Kwang Raymond Choo:
PERCE: A Permissioned Redactable Credentials Scheme for a Period of Membership. IEEE Trans. Inf. Forensics Secur. 18: 3132-3142 (2023) - [j724]Biwen Chen, Tao Xiang, Debiao He, Hongwei Li, Kim-Kwang Raymond Choo:
BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records. IEEE Trans. Inf. Forensics Secur. 18: 3171-3184 (2023) - [j723]Peiying Zhang, Ning Chen, Shibao Li, Kim-Kwang Raymond Choo, Chunxiao Jiang, Sheng Wu:
Multi-Domain Virtual Network Embedding Algorithm Based on Horizontal Federated Learning. IEEE Trans. Inf. Forensics Secur. 18: 3363-3375 (2023) - [j722]Yinbin Miao, Wei Zheng, Xinghua Li, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Secure Model-Contrastive Federated Learning With Improved Compressive Sensing. IEEE Trans. Inf. Forensics Secur. 18: 3430-3444 (2023) - [j721]Yinbin Miao, Yutao Yang, Xinghua Li, Zhiquan Liu, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Efficient Privacy-Preserving Spatial Range Query Over Outsourced Encrypted Data. IEEE Trans. Inf. Forensics Secur. 18: 3921-3933 (2023) - [j720]Lin Chen, Danyang Yue, Xiaofeng Ding, Zuan Wang, Kim-Kwang Raymond Choo, Hai Jin:
Differentially Private Deep Learning With Dynamic Privacy Budget Allocation and Adaptive Optimization. IEEE Trans. Inf. Forensics Secur. 18: 4422-4435 (2023) - [j719]Zhongyun Lin, Jun Zhou, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo:
Generalized Autonomous Path Proxy Re-Encryption Scheme to Support Branch Functionality. IEEE Trans. Inf. Forensics Secur. 18: 5387-5400 (2023) - [j718]Keke Gai, Haokun Tang, Guangshun Li, Tianxiu Xie, Shuo Wang, Liehuang Zhu, Kim-Kwang Raymond Choo:
Blockchain-Based Privacy-Preserving Positioning Data Sharing for IoT-Enabled Maritime Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(2): 2344-2358 (2023) - [j717]Tong Wu, Xinghua Li, Yinbin Miao, Mengfan Xu, Haiyan Zhang, Ximeng Liu, Kim-Kwang Raymond Choo:
CITS-MEW: Multi-Party Entangled Watermark in Cooperative Intelligent Transportation System. IEEE Trans. Intell. Transp. Syst. 24(3): 3528-3540 (2023) - [j716]Mohammad Bany Taha, Saed Alrabaee, Kim-Kwang Raymond Choo:
Efficient Resource Management of Micro-Services in VANETs. IEEE Trans. Intell. Transp. Syst. 24(7): 6820-6835 (2023) - [j715]Yinbin Miao, Yutao Yang, Xinghua Li, Kim-Kwang Raymond Choo, Xiangdong Meng, Robert H. Deng:
Comprehensive Survey on Privacy-Preserving Spatial Data Query in Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(12): 13603-13616 (2023) - [j714]Yulin Liu, Debiao He, Zijian Bao, Huaqun Wang, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks. IEEE Trans. Intell. Veh. 8(4): 2998-3011 (2023) - [j713]Qiuyun Tong, Yinbin Miao, Jian Weng, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
Verifiable Fuzzy Multi-Keyword Search Over Encrypted Data With Adaptive Security. IEEE Trans. Knowl. Data Eng. 35(5): 5386-5399 (2023) - [j712]Zuan Wang, Xiaofeng Ding, Junfeng Lu, Liang Zhang, Pan Zhou, Kim-Kwang Raymond Choo, Hai Jin:
Efficient Location-Based Skyline Queries With Secure R-Tree Over Encrypted Data. IEEE Trans. Knowl. Data Eng. 35(10): 10436-10450 (2023) - [j711]Jun Zhou, Shiying Chen, Kim-Kwang Raymond Choo, Zhenfu Cao, Xiaolei Dong:
EPNS: Efficient Privacy-Preserving Intelligent Traffic Navigation From Multiparty Delegated Computation in Cloud-Assisted VANETs. IEEE Trans. Mob. Comput. 22(3): 1491-1506 (2023) - [j710]Patricia Akello, Naga Vemprala, Nicole Lang Beebe, Kim-Kwang Raymond Choo:
Blockchain Use Case in Ballistics and Crime Gun Tracing and Intelligence: Toward Overcoming Gun Violence. ACM Trans. Manag. Inf. Syst. 14(1): 7:1-7:26 (2023) - [j709]Tao Ye, Min Luo, Yi Yang, Kim-Kwang Raymond Choo, Debiao He:
A Survey on Redactable Blockchain: Challenges and Opportunities. IEEE Trans. Netw. Sci. Eng. 10(3): 1669-1683 (2023) - [j708]Sahil Garg, Yulei Wu, Shahid Mumtaz, Fabrizio Granelli, Kim-Kwang Raymond Choo, Min Chen:
Guest Editorial Introduction to the Special Section on AI-Driven Cybersecurity for Healthcare Cyber Physical Systems. IEEE Trans. Netw. Sci. Eng. 10(5): 2396-2401 (2023) - [j707]Keke Gai, Yufeng She, Liehuang Zhu, Kim-Kwang Raymond Choo, Zhiguo Wan:
A Blockchain-Based Access Control Scheme for Zero Trust Cross-Organizational Data Sharing. ACM Trans. Internet Techn. 23(3): 38:1-38:25 (2023) - [j706]Xinghua Li, Lizhong Bai, Yinbin Miao, Siqi Ma, Jianfeng Ma, Ximeng Liu, Kim-Kwang Raymond Choo:
Privacy-Preserving Top-$k$k Spatial Keyword Queries in Fog-Based Cloud Computing. IEEE Trans. Serv. Comput. 16(1): 504-514 (2023) - [j705]Yinbin Miao, Wei Zheng, Xiaohua Jia, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
Ranked Keyword Search Over Encrypted Cloud Data Through Machine Learning Method. IEEE Trans. Serv. Comput. 16(1): 525-536 (2023) - [j704]Xinghua Li, Qiuyun Tong, Jinwei Zhao, Yinbin Miao, Siqi Ma, Jian Weng, Jianfeng Ma, Kim-Kwang Raymond Choo:
VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data. IEEE Trans. Serv. Comput. 16(1): 698-710 (2023) - [j703]Xiaohan Hao, Wei Ren, Yangyang Fei, Tianqing Zhu, Kim-Kwang Raymond Choo:
A Blockchain-Based Cross-Domain and Autonomous Access Control Scheme for Internet of Things. IEEE Trans. Serv. Comput. 16(2): 773-786 (2023) - [j702]Tengfei Yang, Jianfeng Ma, Yinbin Miao, Yue Wang, Ximeng Liu, Kim-Kwang Raymond Choo, Bin Xiao:
MU-TEIR: Traceable Encrypted Image Retrieval in the Multi-User Setting. IEEE Trans. Serv. Comput. 16(2): 1282-1295 (2023) - [j701]Liping Zhang, Yue Zhu, Wei Ren, Yixin Zhang, Kim-Kwang Raymond Choo:
Privacy-Preserving Fast Three-Factor Authentication and Key Agreement for IoT-Based E-Health Systems. IEEE Trans. Serv. Comput. 16(2): 1324-1333 (2023) - [j700]Xiaoqin Feng, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo:
Regulatable and Hardware-Based Proof of Stake to Approach Nothing at Stake and Long Range Attacks. IEEE Trans. Serv. Comput. 16(3): 2114-2125 (2023) - [j699]Yuanyuan Gao, Lei Zhang, Lulu Wang, Kim-Kwang Raymond Choo, Rui Zhang:
Privacy-Preserving and Reliable Decentralized Federated Learning. IEEE Trans. Serv. Comput. 16(4): 2879-2891 (2023) - [j698]Yinbin Miao, Yueming Yu, Xinghua Li, Yu Guo, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
Defending Against Membership Inference Attack by Shielding Membership Signals. IEEE Trans. Serv. Comput. 16(6): 4087-4101 (2023) - [j697]Xiaotong Zhou, Debiao He, Muhammad Khurram Khan, Wei Wu, Kim-Kwang Raymond Choo:
An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for VANETs. IEEE Trans. Veh. Technol. 72(1): 81-92 (2023) - [j696]Mohammad Bany Taha, Chamseddine Talhi, Hakima Ould-Slimane, Saed Alrabaee, Kim-Kwang Raymond Choo:
A Multi-Objective Approach Based on Differential Evolution and Deep Learning Algorithms for VANETs. IEEE Trans. Veh. Technol. 72(3): 3035-3050 (2023) - [j695]Di Wang, Yue Cao, Kim-Kwang Raymond Choo, Zhaohui Yang, Zhili Sun, Haitham S. Cruickshank:
Secure Battery Swapping: A Reservation Scheme With Conditional Privacy-Preserving Bidirectional Heterogeneous Aggregate Signcryption and Incentive Mechanism. IEEE Trans. Veh. Technol. 72(11): 14087-14102 (2023) - [j694]Yaxing Yue, Chengwei Zhou, Fangyuan Xing, Kim-Kwang Raymond Choo, Zhiguo Shi:
Adaptive Beamforming for Cascaded Sparse Diversely Polarized Planar Array. IEEE Trans. Veh. Technol. 72(12): 15648-15664 (2023) - [j693]Biwen Chen, Zhongming Wang, Tao Xiang, Jiyun Yang, Debiao He, Kim-Kwang Raymond Choo:
BCGS: Blockchain-assisted privacy-preserving cross-domain authentication for VANETs. Veh. Commun. 41: 100602 (2023) - 2022
- [j692]Md. Asikuzzaman, Hannes Mareen, Nour Moustafa, Kim-Kwang Raymond Choo, Mark R. Pickering:
Blind Camcording-Resistant Video Watermarking in the DTCWT and SVD Domain. IEEE Access 10: 15681-15698 (2022) - [j691]Sanjeev Kumar Dwivedi, Ruhul Amin, Ashok Kumar Das, Mark T. Leung, Kim-Kwang Raymond Choo, Satyanarayana Vollala:
Blockchain-based vehicular ad-hoc networks: A comprehensive survey. Ad Hoc Networks 137: 102980 (2022) - [j690]Zhimin Zhang, Huansheng Ning, Feifei Shi, Fadi Farha, Yang Xu, Jiabo Xu, Fan Zhang, Kim-Kwang Raymond Choo:
Artificial intelligence in cyber security: research advances, challenges, and opportunities. Artif. Intell. Rev. 55(2): 1029-1053 (2022) - [j689]Siyuan Chen, Peng Zeng, Kim-Kwang Raymond Choo:
A New Code-Based Blind Signature Scheme. Comput. J. 65(7): 1776-1786 (2022) - [j688]Gaurav Dave, Gaurav Choudhary, Vikas Sihag, Ilsun You, Kim-Kwang Raymond Choo:
Cyber security challenges in aviation communication, navigation, and surveillance. Comput. Secur. 112: 102516 (2022) - [j687]Cong Pu, Kim-Kwang Raymond Choo:
Lightweight Sybil Attack Detection in IoT based on Bloom Filter and Physical Unclonable Function. Comput. Secur. 113: 102541 (2022) - [j686]Qiuhua Wang, Hui Yang, Guohua Wu, Kim-Kwang Raymond Choo, Zheng Zhang, Gongxun Miao, Yizhi Ren:
Black-box adversarial attacks on XSS attack detection model. Comput. Secur. 113: 102554 (2022) - [j685]Chenguang Wang, Tianqing Zhu, Ping Xiong, Wei Ren, Kim-Kwang Raymond Choo:
A privacy preservation method for multiple-source unstructured data in online social networks. Comput. Secur. 113: 102574 (2022) - [j684]Mohammed Hassanin, Nour Moustafa, Murat Tahtali, Kim-Kwang Raymond Choo:
Rethinking maximum-margin softmax for adversarial robustness. Comput. Secur. 116: 102640 (2022) - [j683]Saleh H. Aldaajeh, Heba Saleous, Saed Alrabaee, Ezedin Barka, Frank Breitinger, Kim-Kwang Raymond Choo:
The role of national cybersecurity strategies on the improvement of cybersecurity education. Comput. Secur. 119: 102754 (2022) - [j682]Xiuting Gu, Tianqing Zhu, Jie Li, Tao Zhang, Wei Ren, Kim-Kwang Raymond Choo:
Privacy, accuracy, and model fairness trade-offs in federated learning. Comput. Secur. 122: 102907 (2022) - [j681]Xiaoyu Zhu, Jie Wu, Wei Chang, Md. Zakirul Alam Bhuiyan, Kim-Kwang Raymond Choo, Fang Qi, Qin Liu, Guojun Wang:
On authenticated skyline query processing over road networks. Concurr. Comput. Pract. Exp. 34(14) (2022) - [j680]Jun Huang, Debiao He, Mohammad S. Obaidat, Pandi Vijayakumar, Min Luo, Kim-Kwang Raymond Choo:
The Application of the Blockchain Technology in Voting Systems: A Review. ACM Comput. Surv. 54(3): 60:1-60:28 (2022) - [j679]Jinglin Zou, Debiao He, Sherali Zeadally, Neeraj Kumar, Huaqun Wang, Kim-Kwang Raymond Choo:
Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges. ACM Comput. Surv. 54(8): 160:1-160:36 (2022) - [j678]Kim-Kwang Raymond Choo, Mohammad Hammoudeh:
Editorial: The Inaugural Issue of ACM Distributed Ledger Technologies: Research and Practice. Distributed Ledger Technol. Res. Pract. 1(1): 1-4 (2022) - [j677]Saad Khalid Alabdulsalam, Trung Q. Duong, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
An efficient IoT forensic approach for the evidence acquisition and analysis based on network link. Log. J. IGPL 30(6): 1041-1055 (2022) - [j676]Christos Xenofontos, Ioannis Zografopoulos, Charalambos Konstantinou, Alireza Jolfaei, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
Consumer, Commercial, and Industrial IoT (In)Security: Attack Taxonomy and Case Studies. IEEE Internet Things J. 9(1): 199-221 (2022) - [j675]Cheng Guo, Shenghao Su, Kim-Kwang Raymond Choo, Pengxu Tian, Xinyu Tang:
A Provably Secure and Efficient Range Query Scheme for Outsourced Encrypted Uncertain Data From Cloud-Based Internet of Things Systems. IEEE Internet Things J. 9(3): 1848-1860 (2022) - [j674]Xiaolong Xu, Liang Yao, Muhammad Bilal, Shaohua Wan, Fei Dai, Kim-Kwang Raymond Choo:
Service Migration Across Edge Devices in 6G-Enabled Internet of Vehicles Networks. IEEE Internet Things J. 9(3): 1930-1937 (2022) - [j673]Ivan Cvitic, Dragan Perakovic, Brij B. Gupta, Kim-Kwang Raymond Choo:
Boosting-Based DDoS Detection in Internet of Things Systems. IEEE Internet Things J. 9(3): 2109-2123 (2022) - [j672]Xinghua Li, Hengyou Zhang, Yinbin Miao, Siqi Ma, Jianfeng Ma, Ximeng Liu, Kim-Kwang Raymond Choo:
CAN Bus Messages Abnormal Detection Using Improved SVDD in Internet of Vehicles. IEEE Internet Things J. 9(5): 3359-3371 (2022) - [j671]Xiaoqin Feng, Jianfeng Ma, Shaobin Liu, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo:
Transparent Ciphertext Retrieval System Supporting Integration of Encrypted Heterogeneous Database in Cloud-Assisted IoT. IEEE Internet Things J. 9(5): 3784-3798 (2022) - [j670]Keke Gai, Yaoling Ding, An Wang, Liehuang Zhu, Kim-Kwang Raymond Choo, Qi Zhang, Zhuping Wang:
Attacking the Edge-of-Things: A Physical Attack Perspective. IEEE Internet Things J. 9(7): 5240-5253 (2022) - [j669]Chaosheng Feng, Bin Liu, Zhen Guo, Keping Yu, Zhiguang Qin, Kim-Kwang Raymond Choo:
Blockchain-Based Cross-Domain Authentication for Intelligent 5G-Enabled Internet of Drones. IEEE Internet Things J. 9(8): 6224-6238 (2022) - [j668]Milad Taleby Ahvanooey, Mark Xuefang Zhu, Qianmu Li, Wojciech Mazurczyk, Kim-Kwang Raymond Choo, Brij Bhooshan Gupta, Mauro Conti:
Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey. IEEE Internet Things J. 9(10): 7639-7663 (2022) - [j667]Keping Yu, Liang Tan, Caixia Yang, Kim-Kwang Raymond Choo, Ali Kashif Bashir, Joel J. P. C. Rodrigues, Takuro Sato:
A Blockchain-Based Shamir's Threshold Cryptography Scheme for Data Protection in Industrial Internet of Things Settings. IEEE Internet Things J. 9(11): 8154-8167 (2022) - [j666]Priyanka Mall, Ruhul Amin, Ashok Kumar Das, Mark T. Leung, Kim-Kwang Raymond Choo:
PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey. IEEE Internet Things J. 9(11): 8205-8228 (2022) - [j665]Cong Pu, Andrew Wall, Kim-Kwang Raymond Choo, Imtiaz Ahmed, Sunho Lim:
A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment. IEEE Internet Things J. 9(12): 9918-9933 (2022) - [j664]Xiaoying Jia, Min Luo, Kim-Kwang Raymond Choo, Li Li, Debiao He:
A Redesigned Identity-Based Anonymous Authentication Scheme for Mobile-Edge Computing. IEEE Internet Things J. 9(12): 10108-10120 (2022) - [j663]Mohammad Wazid, Ashok Kumar Das, Kim-Kwang Raymond Choo, Youngho Park:
SCS-WoT: Secure Communication Scheme for Web of Things Deployment. IEEE Internet Things J. 9(13): 10411-10423 (2022) - [j662]Kshira Sagar Sahoo, Mayank Tiwari, Ashish Kr. Luhach, Anand Nayyar, Kim-Kwang Raymond Choo, Muhammad Bilal:
Demand-Supply-Based Economic Model for Resource Provisioning in Industrial IoT Traffic. IEEE Internet Things J. 9(13): 10529-10538 (2022) - [j661]Tong Liu, Yinbin Miao, Kim-Kwang Raymond Choo, Hongwei Li, Ximeng Liu, Xiangdong Meng, Robert H. Deng:
Time-Controlled Hierarchical Multikeyword Search Over Encrypted Data in Cloud-Assisted IoT. IEEE Internet Things J. 9(13): 11017-11029 (2022) - [j660]Jiayan Shen, Peng Zeng, Kim-Kwang Raymond Choo:
Multicopy and Multiserver Provable Data Possession for Cloud-Based IoT. IEEE Internet Things J. 9(14): 12300-12310 (2022) - [j659]Lin Song, Yinbin Miao, Jian Weng, Kim-Kwang Raymond Choo, Ximeng Liu, Robert H. Deng:
Privacy-Preserving Threshold-Based Image Retrieval in Cloud-Assisted Internet of Things. IEEE Internet Things J. 9(15): 13598-13611 (2022) - [j658]Keke Gai, Zhengkang Fang, Ruili Wang, Liehuang Zhu, Peng Jiang, Kim-Kwang Raymond Choo:
Edge Computing and Lightning Network Empowered Secure Food Supply Management. IEEE Internet Things J. 9(16): 14247-14259 (2022) - [j657]Yutao Yang, Yinbin Miao, Zuobin Ying, Jianting Ning, Xiangdong Meng, Kim-Kwang Raymond Choo:
Privacy-Preserving Threshold Spatial Keyword Search in Cloud-Assisted IIoT. IEEE Internet Things J. 9(18): 16990-17001 (2022) - [j656]Dajiang Chen, Hao Wang, Ning Zhang, Xuyun Nie, Hong-Ning Dai, Kuan Zhang, Kim-Kwang Raymond Choo:
Privacy-Preserving Encrypted Traffic Inspection With Symmetric Cryptographic Techniques in IoT. IEEE Internet Things J. 9(18): 17265-17279 (2022) - [j655]Jiannan Wei, Qinchuan Zhu, Qianmu Li, Laisen Nie, Zhangyi Shen, Kim-Kwang Raymond Choo, Keping Yu:
A Redactable Blockchain Framework for Secure Federated Learning in Industrial Internet of Things. IEEE Internet Things J. 9(18): 17901-17911 (2022) - [j654]Cong Pu, Haleigh Zerkle, Andrew Wall, Sunho Lim, Kim-Kwang Raymond Choo, Imtiaz Ahmed:
A Lightweight and Anonymous Authentication and Key Agreement Protocol for Wireless Body Area Networks. IEEE Internet Things J. 9(21): 21136-21146 (2022) - [j653]Bin Luo, Xinghua Li, Ximeng Liu, Yanbing Ren, Man Zhang, Jingjing Guo, Kim-Kwang Raymond Choo:
RESAT: A Utility-Aware Incentive Mechanism-Based Distributed Spatial Cloaking. IEEE Internet Things J. 9(22): 23201-23214 (2022) - [j652]Jing Wang, Libing Wu, Huaqun Wang, Kim-Kwang Raymond Choo, Lianhai Wang, Debiao He:
A Secure and Efficient Multiserver Authentication and Key Agreement Protocol for Internet of Vehicles. IEEE Internet Things J. 9(23): 24398-24416 (2022) - [j651]Weiqi Dai, Shuyue Tuo, Liangliang Yu, Kim-Kwang Raymond Choo, Deqing Zou, Hai Jin:
HAPPS: A Hidden Attribute and Privilege-Protection Data-Sharing Scheme With Verifiability. IEEE Internet Things J. 9(24): 25538-25550 (2022) - [j650]Zhen Qin, Qingya Chen, Yi Ding, Tianming Zhuang, Zhiguang Qin, Kim-Kwang Raymond Choo:
Segmentation mask and feature similarity loss guided GAN for object-oriented image-to-image translation. Inf. Process. Manag. 59(3): 102926 (2022) - [j649]Kim-Kwang Raymond Choo, Deepak Puthal, Charles Zhechao Liu, Chonggang Wang:
Introducing the Special Topic on "Mitigating Cyber Threats and Defense in Data Intensive Smart Cities". Inf. Syst. Frontiers 24(5): 1393-1394 (2022) - [j648]Milad Taleby Ahvanooey, Mark Xuefang Zhu, Wojciech Mazurczyk, Qianmu Li, Max Kilger, Kim-Kwang Raymond Choo, Mauro Conti:
CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks. J. Inf. Secur. Appl. 71: 103368 (2022) - [j647]Milad Taleby Ahvanooey, Mark Xuefang Zhu, Wojciech Mazurczyk, Kim-Kwang Raymond Choo, Mauro Conti, Jing Zhang:
Misinformation Detection on Social Media: Challenges and the Road Ahead. IT Prof. 24(1): 34-40 (2022) - [j646]Marina Liu, William Yeoh, Frank Jiang, Kim-Kwang Raymond Choo:
Blockchain for Cybersecurity: Systematic Literature Review and Classification. J. Comput. Inf. Syst. 62(6): 1182-1198 (2022) - [j645]Dragan Korac, Boris Damjanovic, Dejan Simic, Kim-Kwang Raymond Choo:
A hybrid XSS attack (HYXSSA) based on fusion approach: Challenges, threats and implications in cybersecurity. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 9284-9300 (2022) - [j644]Othmane Friha, Mohamed Amine Ferrag, Lei Shu, Leandros Maglaras, Kim-Kwang Raymond Choo, Mehdi Nafaa:
FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things. J. Parallel Distributed Comput. 165: 17-31 (2022) - [j643]Songtao Tang, Xin Du, Zhihui Lu, Keke Gai, Jie Wu, Patrick C. K. Hung, Kim-Kwang Raymond Choo:
Coordinate-based efficient indexing mechanism for intelligent IoT systems in heterogeneous edge computing. J. Parallel Distributed Comput. 166: 45-56 (2022) - [j642]Yue Zhang, Keke Gai, Jiang Xiao, Liehuang Zhu, Kim-Kwang Raymond Choo:
Blockchain-Empowered Efficient Data Sharing in Internet of Things Settings. IEEE J. Sel. Areas Commun. 40(12): 3422-3436 (2022) - [j641]Victor R. Kebande, Kim-Kwang Raymond Choo:
Finite state machine for cloud forensic readiness as a service (CFRaaS) events. Secur. Priv. 5(1) (2022) - [j640]Chao Lin, Min Luo, Xinyi Huang, Kim-Kwang Raymond Choo, Debiao He:
An Efficient Privacy-Preserving Credit Score System Based on Noninteractive Zero-Knowledge Proof. IEEE Syst. J. 16(1): 1592-1601 (2022) - [j639]Xinyu Tang, Cheng Guo, Yizhi Ren, Cong Wang, Kim-Kwang Raymond Choo:
A Global Secure Ranked Multikeyword Search Based on the Multiowner Model for Cloud-Based Systems. IEEE Syst. J. 16(2): 1717-1728 (2022) - [j638]Songsong Zhang, Xie Yong, Min Luo, Debiao He, Kim-Kwang Raymond Choo:
DssP: Efficient Dual-Server Secret Sharing Protocol Based on Password Authentication for Cloud Storage Services. IEEE Syst. J. 16(2): 2172-2182 (2022) - [j637]Pengxu Tian, Cheng Guo, Kim-Kwang Raymond Choo, Yining Liu, Long Li, Lin Yao:
EAFS: An Efficient, Accurate, and Forward Secure Searchable Encryption Scheme Supporting Range Search. IEEE Syst. J. 16(2): 3450-3460 (2022) - [j636]Viraaji Mothukuri, Reza M. Parizi, Seyedamin Pouriyeh, Ali Dehghantanha, Kim-Kwang Raymond Choo:
FabricFL: Blockchain-in-the-Loop Federated Learning for Trusted Decentralized Systems. IEEE Syst. J. 16(3): 3711-3722 (2022) - [j635]Qin Liu, Yunlian Liu, Min Luo, Debiao He, Huaqun Wang, Kim-Kwang Raymond Choo:
The Security of Blockchain-Based Medical Systems: Research Challenges and Opportunities. IEEE Syst. J. 16(4): 5741-5752 (2022) - [j634]Hu Xiong, Kim-Kwang Raymond Choo, Athanasios V. Vasilakos:
Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing. IEEE Trans. Big Data 8(1): 1-13 (2022) - [j633]Xue Yang, Rongxing Lu, Kim-Kwang Raymond Choo, Fan Yin, Xiaohu Tang:
Achieving Efficient and Privacy-Preserving Cross-Domain Big Data Deduplication in Cloud. IEEE Trans. Big Data 8(1): 73-84 (2022) - [j632]Nima Ebadi, Mohsen M. Jozani, Kim-Kwang Raymond Choo, Paul Rad:
A Memory Network Information Retrieval Model for Identification of News Misinformation. IEEE Trans. Big Data 8(5): 1358-1370 (2022) - [j631]Yingying Li, Jianfeng Ma, Yinbin Miao, Huizhong Li, Qiang Yan, Yue Wang, Ximeng Liu, Kim-Kwang Raymond Choo:
DVREI: Dynamic Verifiable Retrieval Over Encrypted Images. IEEE Trans. Computers 71(8): 1755-1769 (2022) - [j630]Jun Zhou, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo:
Efficient Privacy-Preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain. IEEE Trans. Cloud Comput. 10(1): 366-382 (2022) - [j629]Keke Gai, Liehuang Zhu, Meikang Qiu, Kai Xu, Kim-Kwang Raymond Choo:
Multi-Access Filtering for Privacy-Preserving Fog Computing. IEEE Trans. Cloud Comput. 10(1): 539-552 (2022) - [j628]Gaurang Panchal, Debasis Samanta, Ashok Kumar Das, Neeraj Kumar, Kim-Kwang Raymond Choo:
Designing Secure and Efficient Biometric-Based Access Mechanism for Cloud Services. IEEE Trans. Cloud Comput. 10(2): 749-761 (2022) - [j627]Yinbin Miao, Qiuyun Tong, Robert H. Deng, Kim-Kwang Raymond Choo, Ximeng Liu, Hongwei Li:
Verifiable Searchable Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage. IEEE Trans. Cloud Comput. 10(2): 835-848 (2022) - [j626]Yingying Li, Jianfeng Ma, Yinbin Miao, Yue Wang, Ximeng Liu, Kim-Kwang Raymond Choo:
Similarity Search for Encrypted Images in Secure Cloud Computing. IEEE Trans. Cloud Comput. 10(2): 1142-1155 (2022) - [j625]Jiayi Li, Jianfeng Ma, Yinbin Miao, Ruikang Yang, Ximeng Liu, Kim-Kwang Raymond Choo:
Practical Multi-Keyword Ranked Search With Access Control Over Encrypted Cloud Data. IEEE Trans. Cloud Comput. 10(3): 2005-2019 (2022) - [j624]Yinbin Miao, Robert H. Deng, Kim-Kwang Raymond Choo, Ximeng Liu, Hongwei Li:
Threshold Multi-Keyword Search for Cloud-Based Group Data Sharing. IEEE Trans. Cloud Comput. 10(3): 2146-2162 (2022) - [j623]Ismail M. Ali, Karam M. Sallam, Nour Moustafa, Ripon K. Chakrabortty, Michael J. Ryan, Kim-Kwang Raymond Choo:
An Automated Task Scheduling Model Using Non-Dominated Sorting Genetic Algorithm II for Fog-Cloud Systems. IEEE Trans. Cloud Comput. 10(4): 2294-2308 (2022) - [j622]Feng Wang, Li Xu, Jiguo Li, Kim-Kwang Raymond Choo:
Lightweight Public/Private Auditing Scheme for Resource-Constrained End Devices in Cloud Storage. IEEE Trans. Cloud Comput. 10(4): 2704-2716 (2022) - [j621]Yingying Li, Jianfeng Ma, Yinbin Miao, Yue Wang, Tengfei Yang, Ximeng Liu, Kim-Kwang Raymond Choo:
Traceable and Controllable Encrypted Cloud Image Search in Multi-User Settings. IEEE Trans. Cloud Comput. 10(4): 2936-2948 (2022) - [j620]Qiuyun Tong, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Hongwei Li:
VPSL: Verifiable Privacy-Preserving Data Search for Cloud-Assisted Internet of Things. IEEE Trans. Cloud Comput. 10(4): 2964-2976 (2022) - [j619]Mandrita Banerjee, Carlo Borges, Kim-Kwang Raymond Choo, Junghee Lee, Chrysostomos Nicopoulos:
A Hardware-Assisted Heartbeat Mechanism for Fault Identification in Large-Scale IoT Systems. IEEE Trans. Dependable Secur. Comput. 19(2): 1254-1265 (2022) - [j618]Ning Lu, Yuan Chang, Wenbo Shi, Kim-Kwang Raymond Choo:
CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions. IEEE Trans. Dependable Secur. Comput. 19(3): 1974-1987 (2022) - [j617]Yi Chen, Hongxia Wang, Kim-Kwang Raymond Choo, Peisong He, Zoran Salcic, Dali Kaafar, Xuyun Zhang:
DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain. IEEE Trans. Dependable Secur. Comput. 19(4): 2405-2420 (2022) - [j616]Xiaoqin Feng, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo:
Social Characteristic-Based Propagation-Efficient PBFT Protocol to Broadcast in Unstructured Overlay Networks. IEEE Trans. Dependable Secur. Comput. 19(6): 3621-3639 (2022) - [j615]Kim-Kwang Raymond Choo, Sercan Ozcan, Ali Dehghantanha, Reza M. Parizi:
Editorial: Blockchain Ecosystem - Technological and Management Opportunities and Challenges: Part II. IEEE Trans. Engineering Management 69(3): 773-775 (2022) - [j614]Yafang Yang, Lei Zhang, Yunlei Zhao, Kim-Kwang Raymond Choo, Yan Zhang:
Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET. IEEE Trans. Inf. Forensics Secur. 17: 317-331 (2022) - [j613]Yanbing Ren, Xinghua Li, Yinbin Miao, Bin Luo, Jian Weng, Kim-Kwang Raymond Choo, Robert H. Deng:
Towards Privacy-Preserving Spatial Distribution Crowdsensing: A Game Theoretic Approach. IEEE Trans. Inf. Forensics Secur. 17: 804-818 (2022) - [j612]Yinbin Miao, Ziteng Liu, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Privacy-Preserving Byzantine-Robust Federated Learning via Blockchain Systems. IEEE Trans. Inf. Forensics Secur. 17: 2848-2861 (2022) - [j611]Dajiang Chen, Shaoquan Jiang, Ning Zhang, Lei Liu, Kim-Kwang Raymond Choo:
On Message Authentication Channel Capacity Over a Wiretap Channel. IEEE Trans. Inf. Forensics Secur. 17: 3107-3122 (2022) - [j610]Qiuhua Wang, Tianyu Xia, Dong Wang, Yizhi Ren, Gongxun Miao, Kim-Kwang Raymond Choo:
SDoS: Selfish Mining-Based Denial-of-Service Attack. IEEE Trans. Inf. Forensics Secur. 17: 3335-3349 (2022) - [j609]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Yu Gao, Robert H. Deng:
Verifiable Data Mining Against Malicious Adversaries in Industrial Internet of Things. IEEE Trans. Ind. Informatics 18(2): 953-964 (2022) - [j608]Nour Moustafa, Kim-Kwang Raymond Choo, Adnan M. Abu-Mahfouz:
Guest Editorial: AI-Enabled Threat Intelligence and Hunting Microservices for Distributed Industrial IoT System. IEEE Trans. Ind. Informatics 18(3): 1892-1895 (2022) - [j607]Xiaohan Hao, Wei Ren, Kim-Kwang Raymond Choo, Neal N. Xiong:
A Self-Trading and Authenticated Roaming Scheme Based on Blockchain for Smart Grids. IEEE Trans. Ind. Informatics 18(6): 4097-4106 (2022) - [j606]Liping Zhang, Wenhao Gao, Shukai Chen, Wei Ren, Kim-Kwang Raymond Choo, Neal N. Xiong:
A Privacy-Preserving Proximity Testing Using Private Set Intersection for Vehicular Ad-Hoc Networks. IEEE Trans. Ind. Informatics 18(10): 7373-7383 (2022) - [j605]Yi Ding, Wei Zheng, Ji Geng, Zhen Qin, Kim-Kwang Raymond Choo, Zhiguang Qin, Xiaolin Hou:
MVFusFra: A Multi-View Dynamic Fusion Framework for Multimodal Brain Tumor Segmentation. IEEE J. Biomed. Health Informatics 26(4): 1570-1581 (2022) - [j604]Ying Chen, Tianhui Zhou, Jun Zhou, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo:
SAVE: Efficient Privacy-Preserving Location-Based Service Bundle Authentication in Self-Organizing Vehicular Social Networks. IEEE Trans. Intell. Transp. Syst. 23(8): 11752-11766 (2022) - [j603]Xiaofeng Ding, Hongbiao Fang, Zhilin Zhang, Kim-Kwang Raymond Choo, Hai Jin:
Privacy-Preserving Feature Extraction via Adversarial Training. IEEE Trans. Knowl. Data Eng. 34(4): 1967-1979 (2022) - [j602]Chong-zhi Gao, Jin Li, Shi-bing Xia, Kim-Kwang Raymond Choo, Wenjing Lou, Changyu Dong:
MAS-Encryption and its Applications in Privacy-Preserving Classifiers. IEEE Trans. Knowl. Data Eng. 34(5): 2306-2323 (2022) - [j601]Fadi Farha, Huansheng Ning, Shunkun Yang, Jiabo Xu, Weishan Zhang, Kim-Kwang Raymond Choo:
Timestamp Scheme to Mitigate Replay Attacks in Secure ZigBee Networks. IEEE Trans. Mob. Comput. 21(1): 342-351 (2022) - [j600]Wanlun Ma, Xiangyu Hu, Chao Chen, Sheng Wen, Kim-Kwang Raymond Choo, Yang Xiang:
Social Media Event Prediction using DNN with Feedback Mechanism. ACM Trans. Manag. Inf. Syst. 13(3): 33:1-33:24 (2022) - [j599]Yi Ding, Fuyuan Tan, Zhen Qin, Mingsheng Cao, Kim-Kwang Raymond Choo, Zhiguang Qin:
DeepKeyGen: A Deep Learning-Based Stream Cipher Generator for Medical Image Encryption and Decryption. IEEE Trans. Neural Networks Learn. Syst. 33(9): 4915-4929 (2022) - [j598]Ling Zuo, Yinghan Xu, Chi Cheng, Kim-Kwang Raymond Choo:
A Privacy-Preserving Semisupervised Algorithm Under Maximum Correntropy Criterion. IEEE Trans. Neural Networks Learn. Syst. 33(11): 6817-6830 (2022) - [j597]Dingde Jiang, Zhihao Wang, Wenjuan Wang, Zhihan Lv, Kim-Kwang Raymond Choo:
AI-Assisted Energy-Efficient and Intelligent Routing for Reconfigurable Wireless Networks. IEEE Trans. Netw. Sci. Eng. 9(1): 78-88 (2022) - [j596]Akbar Telikani, Amir H. Gandomi, Kim-Kwang Raymond Choo, Jun Shen:
A Cost-Sensitive Deep Learning-Based Approach for Network Traffic Classification. IEEE Trans. Netw. Serv. Manag. 19(1): 661-670 (2022) - [j595]Beibei Li, Shang Ma, Ruilong Deng, Kim-Kwang Raymond Choo, Jin Yang:
Federated Anomaly Detection on System Logs for the Internet of Things: A Customizable and Communication-Efficient Approach. IEEE Trans. Netw. Serv. Manag. 19(2): 1705-1716 (2022) - [j594]Renyong Wu, Jieming Ma, Zhixiang Tang, Xiehua Li, Kim-Kwang Raymond Choo:
A Generic Secure Transmission Scheme Based on Random Linear Network Coding. IEEE/ACM Trans. Netw. 30(2): 855-866 (2022) - [j593]Lei Zhang, Hu Xiong, Qiong Huang, Jiguo Li, Kim-Kwang Raymond Choo, Jiangtao Li:
Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities. IEEE Trans. Serv. Comput. 15(1): 567-587 (2022) - [j592]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Ruikang Yang, Xiangyu Wang:
Lightweight Privacy-Preserving Medical Diagnosis in Edge Computing. IEEE Trans. Serv. Comput. 15(3): 1606-1618 (2022) - [j591]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
Pocket Diagnosis: Secure Federated Learning Against Poisoning Attack in the Cloud. IEEE Trans. Serv. Comput. 15(6): 3429-3442 (2022) - [j590]Jiayi Li, Jianfeng Ma, Yinbin Miao, Lei Chen, Yunbo Wang, Ximeng Liu, Kim-Kwang Raymond Choo:
Verifiable Semantic-Aware Ranked Keyword Search in Cloud-Assisted Edge Computing. IEEE Trans. Serv. Comput. 15(6): 3591-3605 (2022) - [j589]Qiuyun Tong, Yinbin Miao, Lei Chen, Jian Weng, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
VFIRM: Verifiable Fine-Grained Encrypted Image Retrieval in Multi-Owner Multi-User Settings. IEEE Trans. Serv. Comput. 15(6): 3606-3619 (2022) - [j588]Yuntao Wang, Zhou Su, Jiliang Li, Ning Zhang, Kuan Zhang, Kim-Kwang Raymond Choo, Yiliang Liu:
Blockchain-Based Secure and Cooperative Private Charging Pile Sharing Services for Vehicular Networks. IEEE Trans. Veh. Technol. 71(2): 1857-1874 (2022) - [j587]Quanrun Li, Debiao He, Zhichao Yang, Qi Xie, Kim-Kwang Raymond Choo:
Lattice-Based Conditional Privacy-Preserving Authentication Protocol for the Vehicular Ad Hoc Network. IEEE Trans. Veh. Technol. 71(4): 4336-4347 (2022) - [j586]Zhiwei Guo, Keping Yu, Zhihan Lv, Kim-Kwang Raymond Choo, Peng Shi, Joel J. P. C. Rodrigues:
Deep Federated Learning Enhanced Secure POI Microservices for Cyber-Physical Systems. IEEE Wirel. Commun. 29(2): 22-29 (2022) - 2021
- [j585]Yan Zhang, Lei Zhang, Dingkai Ni, Kim-Kwang Raymond Choo, Burong Kang:
Secure, Robust and Flexible Cooperative Downloading Scheme for Highway VANETs. IEEE Access 9: 5199-5211 (2021) - [j584]Jing Zhao, Peng Zeng, Kim-Kwang Raymond Choo:
An Efficient Access Control Scheme With Outsourcing and Attribute Revocation for Fog-Enabled E-Health. IEEE Access 9: 13789-13799 (2021) - [j583]Sidra Zafar, Mohsin Nazir, Taimur Bakhshi, Hasan Ali Khattak, Sarmadullah Khan, Muhammad Bilal, Kim-Kwang Raymond Choo, Kyung-Sup Kwak, Aneeqa Sabah:
A Systematic Review of Bio-Cyber Interface Technologies and Security Issues for Internet of Bio-Nano Things. IEEE Access 9: 93529-93566 (2021) - [j582]Arafat Al-Dhaqm, Richard Adeyemi Ikuesan, Victor R. Kebande, Shukor Abd Razak, George Grispos, Kim-Kwang Raymond Choo, Bander Ali Saleh Al-Rimy, Abdul Rahman A. Alsewari:
Digital Forensics Subdomains: The State of the Art and Future Directions. IEEE Access 9: 152476-152502 (2021) - [j581]Cong Pu, Imtiaz Ahmed, Evan J. Allen, Kim-Kwang Raymond Choo:
A Stochastic Packet Forwarding Algorithm in Flying Ad Hoc Networks: Design, Analysis, and Evaluation. IEEE Access 9: 162614-162632 (2021) - [j580]Kim-Kwang Raymond Choo, Ali Dehghantanha, Hadis Karimipour:
Introduction to the special section on application of artificial intelligence in security of cyber physical systems (VSI-aicps). Comput. Electr. Eng. 92: 107145 (2021) - [j579]Zisang Xu, Xiong Li, Jianbo Xu, Wei Liang, Kim-Kwang Raymond Choo:
A secure and computationally efficient authentication and key agreement scheme for Internet of Vehicles. Comput. Electr. Eng. 95: 107409 (2021) - [j578]Xinyu Tang, Cheng Guo, Kim-Kwang Raymond Choo, Yining Liu, Long Li:
A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain. Comput. Networks 200: 108540 (2021) - [j577]Mohammad Dabbagh, Kim-Kwang Raymond Choo, Amin Beheshti, Mohammad Tahir, Nader Sohrabi Safa:
A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities. Comput. Secur. 100: 102078 (2021) - [j576]Ehsan Nowroozi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo:
A survey of machine learning techniques in adversarial image forensics. Comput. Secur. 100: 102092 (2021) - [j575]Kim-Kwang Raymond Choo, Keke Gai, Luca Chiaraviglio, Qing Yang:
A multidisciplinary approach to Internet of Things (IoT) cybersecurity and risk management. Comput. Secur. 102: 102136 (2021) - [j574]Asma Aloufi, Peizhao Hu, Hang Liu, Sherman S. M. Chow, Kim-Kwang Raymond Choo:
Universal location referencing and homomorphic evaluation of geospatial query. Comput. Secur. 102: 102137 (2021) - [j573]Dongming Sun, Xiaolu Zhang, Kim-Kwang Raymond Choo, Liang Hu, Feng Wang:
NLP-based digital forensic investigation platform for online communications. Comput. Secur. 104: 102210 (2021) - [j572]Xiaolu Zhang, Charles Zhechao Liu, Kim-Kwang Raymond Choo, Jesus A. Alvarado:
A design science approach to developing an integrated mobile app forensic framework. Comput. Secur. 105: 102226 (2021) - [j571]Yue Liu, Qinghua Lu, Shiping Chen, Qiang Qu, Hugo O'Connor, Kim-Kwang Raymond Choo, He Zhang:
Capability-based IoT access control using blockchain. Digit. Commun. Networks 7(4): 463-469 (2021) - [j570]Sean Lanagan, Kim-Kwang Raymond Choo:
On the need for AI to triage encrypted data containers in U.S. law enforcement applications. Digit. Investig. 38: 301217 (2021) - [j569]Gagangeet Singh Aujla, Neeraj Kumar, Biplab Sikdar, Kim-Kwang Raymond Choo:
Security and privacy solutions in edge envisioned connected things environment. Trans. Emerg. Telecommun. Technol. 32(6) (2021) - [j568]Zeli Wang, Hai Jin, Weiqi Dai, Kim-Kwang Raymond Choo, Deqing Zou:
Ethereum smart contract security research: survey and future research opportunities. Frontiers Comput. Sci. 15(2): 152802 (2021) - [j567]Sherman S. M. Chow, Kim-Kwang Raymond Choo, Jinguang Han:
Editorial for accountability and privacy issues in blockchain and cryptocurrency. Future Gener. Comput. Syst. 114: 647-648 (2021) - [j566]Zar Bakht Imtiaz, Awais Manzoor, Saif ul Islam, Malik Ali Judge, Kim-Kwang Raymond Choo, Joel J. P. C. Rodrigues:
Discovering communities from disjoint complex networks using Multi-Layer Ant Colony Optimization. Future Gener. Comput. Syst. 115: 659-670 (2021) - [j565]Theodoros Apostolopoulos, Vasilios Katos, Kim-Kwang Raymond Choo, Constantinos Patsakis:
Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks. Future Gener. Comput. Syst. 116: 393-405 (2021) - [j564]Nour Moustafa, Marwa Keshk, Kim-Kwang Raymond Choo, Timothy M. Lynar, Seyit Camtepe, Monica T. Whitty:
DAD: A Distributed Anomaly Detection system using ensemble one-class statistical learning in edge networks. Future Gener. Comput. Syst. 118: 240-251 (2021) - [j563]Xiaohan Hao, Wei Ren, Ruoting Xiong, Tianqing Zhu, Kim-Kwang Raymond Choo:
Asymmetric cryptographic functions based on generative adversarial neural networks for Internet of Things. Future Gener. Comput. Syst. 124: 243-253 (2021) - [j562]Diana Laura Aguilar, Octavio Loyola-González, Miguel Angel Medina-Pérez, Leonardo Cañete-Sifuentes, Kim-Kwang Raymond Choo:
PBC4occ: A novel contrast pattern-based classifier for one-class classification. Future Gener. Comput. Syst. 125: 71-90 (2021) - [j561]Zhiyan Xu, Min Luo, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, Debiao He:
Analysis and Improvement of a Certificateless Signature Scheme for Resource-Constrained Scenarios. IEEE Commun. Lett. 25(4): 1074-1078 (2021) - [j560]Mohamed Amine Ferrag, Lei Shu, Kim-Kwang Raymond Choo:
Fighting COVID-19 and Future Pandemics With the Internet of Things: Security and Privacy Perspectives. IEEE CAA J. Autom. Sinica 8(9): 1477-1499 (2021) - [j559]Mohammad Mehedi Hassan, Giancarlo Fortino, Laurence T. Yang, Hai Jiang, Kim-Kwang Raymond Choo, Jun Jason Zhang, Fei-Yue Wang:
Guest Editorial for Special Issue on Blockchain for Internet-of-Things and Cyber-Physical Systems. IEEE CAA J. Autom. Sinica 8(12): 1867 (2021) - [j558]Jing Wang, Libing Wu, Huaqun Wang, Kim-Kwang Raymond Choo, Debiao He:
An Efficient and Privacy-Preserving Outsourced Support Vector Machine Training for Internet of Medical Things. IEEE Internet Things J. 8(1): 458-473 (2021) - [j557]Sreenivas Sudarshan Seshadri, David Rodriguez, Mukunda Subedi, Kim-Kwang Raymond Choo, Sara Ahmed, Qian Chen, Junghee Lee:
IoTCop: A Blockchain-Based Monitoring Framework for Detection and Isolation of Malicious Devices in Internet-of-Things Systems. IEEE Internet Things J. 8(5): 3346-3359 (2021) - [j556]Hamed HaddadPajouh, Alireza Mohtadi, Ali Dehghantanha, Hadis Karimipour, Xiaodong Lin, Kim-Kwang Raymond Choo:
A Multikernel and Metaheuristic Feature Selection Approach for IoT Malware Threat Hunting in the Edge Layer. IEEE Internet Things J. 8(6): 4540-4547 (2021) - [j555]Linghui Chen, Jun Zhou, Ying Chen, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo:
PADP: Efficient Privacy-Preserving Data Aggregation and Dynamic Pricing for Vehicle-to-Grid Networks. IEEE Internet Things J. 8(10): 7863-7873 (2021) - [j554]Yongkai Fan, Guanqun Zhao, Xia Lei, Wei Liang, Kuan-Ching Li, Kim-Kwang Raymond Choo, Chunsheng Zhu:
SBBS: A Secure Blockchain-Based Scheme for IoT Data Credibility in Fog Environment. IEEE Internet Things J. 8(11): 9268-9277 (2021) - [j553]Osama Al-Kadi, Nour Moustafa, Benjamin P. Turnbull, Kim-Kwang Raymond Choo:
A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks. IEEE Internet Things J. 8(12): 9463-9472 (2021) - [j552]Tong Chen, Lei Zhang, Kim-Kwang Raymond Choo, Rui Zhang, Xinyu Meng:
Blockchain-Based Key Management Scheme in Fog-Enabled IoT Systems. IEEE Internet Things J. 8(13): 10766-10778 (2021) - [j551]Peng Zeng, Zhiting Zhang, Rongxing Lu, Kim-Kwang Raymond Choo:
Efficient Policy-Hiding and Large Universe Attribute-Based Encryption With Public Traceability for Internet of Medical Things. IEEE Internet Things J. 8(13): 10963-10972 (2021) - [j550]Kai Peng, Meijun Li, Haojun Huang, Chen Wang, Shaohua Wan, Kim-Kwang Raymond Choo:
Security Challenges and Opportunities for Smart Contracts in Internet of Things: A Survey. IEEE Internet Things J. 8(15): 12004-12020 (2021) - [j549]Jiliang Li, Zhou Su, Deke Guo, Kim-Kwang Raymond Choo, Yusheng Ji:
PSL-MAAKA: Provably Secure and Lightweight Mutual Authentication and Key Agreement Protocol for Fully Public Channels in Internet of Medical Things. IEEE Internet Things J. 8(17): 13183-13195 (2021) - [j548]Amir Namavar Jahromi, Hadis Karimipour, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Toward Detection and Attribution of Cyber-Attacks in IoT-Enabled Cyber-Physical Systems. IEEE Internet Things J. 8(17): 13712-13722 (2021) - [j547]Cong Peng, Min Luo, Li Li, Kim-Kwang Raymond Choo, Debiao He:
Efficient Certificateless Online/Offline Signature Scheme for Wireless Body Area Networks. IEEE Internet Things J. 8(18): 14287-14298 (2021) - [j546]Harsh Grover, Tejasvi Alladi, Vinay Chamola, Dheerendra Singh, Kim-Kwang Raymond Choo:
Edge Computing and Deep Learning Enabled Secure Multitier Network for Internet of Vehicles. IEEE Internet Things J. 8(19): 14787-14796 (2021) - [j545]Liping Zhang, Yue Zhu, Wei Ren, Yinghan Wang, Kim-Kwang Raymond Choo, Neal N. Xiong:
An Energy-Efficient Authentication Scheme Based on Chebyshev Chaotic Map for Smart Grid Environments. IEEE Internet Things J. 8(23): 17120-17130 (2021) - [j544]Tiantian Li, Wei Ren, Yuexin Xiang, Xianghan Zheng, Tianqing Zhu, Kim-Kwang Raymond Choo, Gautam Srivastava:
FAPS: A fair, autonomous and privacy-preserving scheme for big data exchange based on oblivious transfer, Ether cheque and smart contracts. Inf. Sci. 544: 469-484 (2021) - [j543]Huaqun Wang, Debiao He, Kim-Kwang Raymond Choo, Xi Chen:
Blockchain-based multi-party proof of assets with privacy preservation. Inf. Sci. 547: 609-621 (2021) - [j542]Zhijun Li, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo:
Forward and backward secure keyword search with flexible keyword shielding. Inf. Sci. 576: 507-521 (2021) - [j541]Qiuhua Wang, Mingyang Kang, Lifeng Yuan, Yunlu Wang, Gongxun Miao, Kim-Kwang Raymond Choo:
On the Application of Channel Characteristic-Based Physical Layer Authentication in Industrial Wireless Networks. KSII Trans. Internet Inf. Syst. 15(6): 2255-2281 (2021) - [j540]Yizhang Jiang, Kim-Kwang Raymond Choo, Hoon Ko:
A Special Section on Deep & Advanced Machine Learning Approaches for Human Behavior Analysis. J. Inf. Process. Syst. 17(2): 334-336 (2021) - [j539]Jannatul Fardous, Jia Tina Du, Preben Hansen, Kim-Kwang Raymond Choo, Songshan (Sam) Huang:
Group trip planning and information seeking behaviours by mobile social media users: A study of tourists in Australia, Bangladesh and China. J. Inf. Sci. 47(3) (2021) - [j538]Saira Beg, Adeel Anjum, Mansoor Ahmad, Shahid Hussain, Ghufran Ahmad, Suleman Khan, Kim-Kwang Raymond Choo:
A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS). J. Netw. Comput. Appl. 174: 102874 (2021) - [j537]Yuexin Xiang, Wei Ren, Tiantian Li, Xianghan Zheng, Tianqing Zhu, Kim-Kwang Raymond Choo:
A multi-type and decentralized data transaction scheme based on smart contracts and digital watermarks. J. Netw. Comput. Appl. 176: 102953 (2021) - [j536]Ismael Amezcua Valdovinos, Jesús Arturo Pérez Díaz, Kim-Kwang Raymond Choo, Juan Felipe Botero:
Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions. J. Netw. Comput. Appl. 187: 103093 (2021) - [j535]Kim-Kwang Raymond Choo, Keke Gai, Luca Chiaraviglio:
Blockchain-enabled secure communications in smart cities. J. Parallel Distributed Comput. 152: 125-127 (2021) - [j534]Adu Asare Baffour, Zhen Qin, Yong Wang, Zhiguang Qin, Kim-Kwang Raymond Choo:
Spatial self-attention network with self-attention distillation for fine-grained image recognition. J. Vis. Commun. Image Represent. 81: 103368 (2021) - [j533]Miryam Elizabeth Villa-Pérez, Miguel Ángel Álvarez-Carmona, Octavio Loyola-González, Miguel Angel Medina-Pérez, Juan Carlos Velazco-Rossell, Kim-Kwang Raymond Choo:
Semi-supervised anomaly detection algorithms: A comparative summary and future research directions. Knowl. Based Syst. 218: 106878 (2021) - [j532]Yulei Wu, Hong-Ning Dai, Hao Wang, Kim-Kwang Raymond Choo:
Blockchain-Based Privacy Preservation for 5G-Enabled Drone Communications. IEEE Netw. 35(1): 50-56 (2021) - [j531]Peiying Zhang, Chao Wang, Neeraj Kumar, Chunxiao Jiang, Qinghua Lu, Kim-Kwang Raymond Choo, Joel J. P. C. Rodrigues:
Artificial Intelligence Technologies for COVID-19-Like Epidemics: Methods and Challenges. IEEE Netw. 35(3): 27-33 (2021) - [j530]Zijian Bao, Min Luo, Huaqun Wang, Kim-Kwang Raymond Choo, Debiao He:
Blockchain-Based Secure Communication for Space Information Networks. IEEE Netw. 35(4): 50-57 (2021) - [j529]Victor R. Kebande, Nickson M. Karie, Kim-Kwang Raymond Choo, Sadi Alawadi:
Digital forensic readiness intelligence crime repository. Secur. Priv. 4(3) (2021) - [j528]Ruonan Wang, Min Luo, Yihong Wen, Lianhai Wang, Kim-Kwang Raymond Choo, Debiao He:
The Applications of Blockchain in Artificial Intelligence. Secur. Commun. Networks 2021: 6126247:1-6126247:16 (2021) - [j527]Jiabin Bao, Debiao He, Min Luo, Kim-Kwang Raymond Choo:
A Survey of Blockchain Applications in the Energy Sector. IEEE Syst. J. 15(3): 3370-3381 (2021) - [j526]Chao Lin, Debiao He, Xinyi Huang, Xiang Xie, Kim-Kwang Raymond Choo:
PPChain: A Privacy-Preserving Permissioned Blockchain Architecture for Cryptocurrency and Other Regulated Applications. IEEE Syst. J. 15(3): 4367-4378 (2021) - [j525]Arijit Karati, Ruhul Amin, SK Hafizul Islam, Kim-Kwang Raymond Choo:
Provably Secure and Lightweight Identity-Based Authenticated Data Sharing Protocol for Cyber-Physical Cloud Environment. IEEE Trans. Cloud Comput. 9(1): 318-330 (2021) - [j524]Saeed Akbar, Saif Ur Rehman Malik, Kim-Kwang Raymond Choo, Samee U. Khan, Naveed Ahmad, Adeel Anjum:
A Game-based Thermal-Aware Resource Allocation Strategy for Data Centers. IEEE Trans. Cloud Comput. 9(3): 845-853 (2021) - [j523]Avinab Marahatta, Sandeep Pirbhulal, Fa Zhang, Reza M. Parizi, Kim-Kwang Raymond Choo, Zhiyong Liu:
Classification-Based and Energy-Efficient Dynamic Task Scheduling Scheme for Virtualized Cloud Data Center. IEEE Trans. Cloud Comput. 9(4): 1376-1390 (2021) - [j522]Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Jiguo Li, Hongwei Li, Jian-Feng Ma:
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting. IEEE Trans. Dependable Secur. Comput. 18(3): 1080-1094 (2021) - [j521]Yinbin Miao, Robert H. Deng, Ximeng Liu, Kim-Kwang Raymond Choo, Hongjun Wu, Hongwei Li:
Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data. IEEE Trans. Dependable Secur. Comput. 18(4): 1667-1680 (2021) - [j520]Ruiyang Xiao, Wei Ren, Tianqing Zhu, Kim-Kwang Raymond Choo:
A Mixing Scheme Using a Decentralized Signature Protocol for Privacy Protection in Bitcoin Blockchain. IEEE Trans. Dependable Secur. Comput. 18(4): 1793-1803 (2021) - [j519]Yinbin Miao, Robert H. Deng, Kim-Kwang Raymond Choo, Ximeng Liu, Jianting Ning, Hongwei Li:
Optimized Verifiable Fine-Grained Keyword Search in Dynamic Multi-Owner Settings. IEEE Trans. Dependable Secur. Comput. 18(4): 1804-1820 (2021) - [j518]Jun Zhou, Kim-Kwang Raymond Choo, Zhenfu Cao, Xiaolei Dong:
PVOPM: Verifiable Privacy-Preserving Pattern Matching with Efficient Outsourcing in the Malicious Setting. IEEE Trans. Dependable Secur. Comput. 18(5): 2253-2270 (2021) - [j517]Jie Liang, Yu Jiang, Mingzhe Wang, Xun Jiao, Yuanliang Chen, Houbing Song, Kim-Kwang Raymond Choo:
DeepFuzzer: Accelerated Deep Greybox Fuzzing. IEEE Trans. Dependable Secur. Comput. 18(6): 2675-2688 (2021) - [j516]Ximeng Liu, Robert H. Deng, Kim-Kwang Raymond Choo, Yang Yang:
Privacy-Preserving Reinforcement Learning Design for Patient-Centric Dynamic Treatment Regimes. IEEE Trans. Emerg. Top. Comput. 9(1): 456-470 (2021) - [j515]Biwen Chen, Libing Wu, Neeraj Kumar, Kim-Kwang Raymond Choo, Debiao He:
Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data. IEEE Trans. Emerg. Top. Comput. 9(4): 1753-1764 (2021) - [j514]Zhen Qin, Gu Huang, Hu Xiong, Zhiguang Qin, Kim-Kwang Raymond Choo:
A Fuzzy Authentication System Based on Neural Network Learning and Extreme Value Statistics. IEEE Trans. Fuzzy Syst. 29(3): 549-559 (2021) - [j513]Chao Lin, Debiao He, Xinyi Huang, Kim-Kwang Raymond Choo:
OBFP: Optimized Blockchain-Based Fair Payment for Outsourcing Computations in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 16: 3241-3253 (2021) - [j512]Weiqi Dai, Yan Lv, Kim-Kwang Raymond Choo, Zhongze Liu, Deqing Zou, Hai Jin:
CRSA: A Cryptocurrency Recovery Scheme Based on Hidden Assistance Relationships. IEEE Trans. Inf. Forensics Secur. 16: 4291-4305 (2021) - [j511]Xiaofeng Ding, Zuan Wang, Pan Zhou, Kim-Kwang Raymond Choo, Hai Jin:
Efficient and Privacy-Preserving Multi-Party Skyline Queries Over Encrypted Data. IEEE Trans. Inf. Forensics Secur. 16: 4589-4604 (2021) - [j510]Cheng Guo, Shenghao Su, Kim-Kwang Raymond Choo, Xinyu Tang:
A Fast Nearest Neighbor Search Scheme Over Outsourced Encrypted Medical Images. IEEE Trans. Ind. Informatics 17(1): 514-523 (2021) - [j509]Jian Gao, Xin Yang, Yu Jiang, Houbing Song, Kim-Kwang Raymond Choo, Jiaguang Sun:
Semantic Learning Based Cross-Platform Binary Vulnerability Search For IoT Devices. IEEE Trans. Ind. Informatics 17(2): 971-979 (2021) - [j508]Cheng Guo, Pengxu Tian, Kim-Kwang Raymond Choo:
Enabling Privacy-Assured Fog-Based Data Aggregation in E-Healthcare Systems. IEEE Trans. Ind. Informatics 17(3): 1948-1957 (2021) - [j507]Xiaodi Wang, Yining Liu, Kim-Kwang Raymond Choo:
Fault-Tolerant Multisubset Aggregation Scheme for Smart Grid. IEEE Trans. Ind. Informatics 17(6): 4065-4072 (2021) - [j506]Yingying Li, Jianfeng Ma, Yinbin Miao, Liming Liu, Ximeng Liu, Kim-Kwang Raymond Choo:
Secure and Verifiable Multikey Image Search in Cloud-Assisted Edge Computing. IEEE Trans. Ind. Informatics 17(8): 5348-5359 (2021) - [j505]Keke Gai, Yulu Wu, Liehuang Zhu, Kim-Kwang Raymond Choo, Bin Xiao:
Blockchain-Enabled Trustworthy Group Communications in UAV Networks. IEEE Trans. Intell. Transp. Syst. 22(7): 4118-4130 (2021) - [j504]Chao Lin, Debiao He, Xinyi Huang, Neeraj Kumar, Kim-Kwang Raymond Choo:
BCPPA: A Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 22(12): 7408-7420 (2021) - [j503]Xiaofeng Ding, Cui Wang, Kim-Kwang Raymond Choo, Hai Jin:
A Novel Privacy Preserving Framework for Large Scale Graph Data Publishing. IEEE Trans. Knowl. Data Eng. 33(2): 331-343 (2021) - [j502]Luca Chiaraviglio, Fabio D'Andreagiovanni, William Liu, Jairo A. Gutiérrez, Nicola Blefari-Melazzi, Kim-Kwang Raymond Choo, Mohamed-Slim Alouini:
Multi-Area Throughput and Energy Optimization of UAV-Aided Cellular Networks Powered by Solar Panels and Grid. IEEE Trans. Mob. Comput. 20(7): 2427-2444 (2021) - [j501]Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Blockchain-Enabled Authentication Handover With Efficient Privacy Protection in SDN-Based 5G Networks. IEEE Trans. Netw. Sci. Eng. 8(2): 1120-1132 (2021) - [j500]Liping Zhang, Zhen Wei, Wei Ren, Xianghan Zheng, Kim-Kwang Raymond Choo, Neal N. Xiong:
SIP: An Efficient and Secure Information Propagation Scheme in E-Health Networks. IEEE Trans. Netw. Sci. Eng. 8(2): 1502-1516 (2021) - [j499]Biwen Chen, Debiao He, Neeraj Kumar, Huaqun Wang, Kim-Kwang Raymond Choo:
A Blockchain-Based Proxy Re-Encryption With Equality Test for Vehicular Communication Systems. IEEE Trans. Netw. Sci. Eng. 8(3): 2048-2059 (2021) - [j498]Kim-Kwang Raymond Choo, Uttam Ghosh, Deepak K. Tosh, Reza M. Parizi, Ali Dehghantanha:
Introduction to the Special Issue on Decentralized Blockchain Applications and Infrastructures for Next Generation Cyber-Physical Systems. ACM Trans. Internet Techn. 21(2): 38e:1-38e:3 (2021) - [j497]Wu Chen, Yong Yu, Keke Gai, Jiamou Liu, Kim-Kwang Raymond Choo:
Time-Efficient Ensemble Learning with Sample Exchange for Edge Computing. ACM Trans. Internet Techn. 21(3): 76:1-76:17 (2021) - [j496]Rafael Salema Marques, Gregory Epiphaniou, Haider M. Al-Khateeb, Carsten Maple, Mohammad Hammoudeh, Paulo André Lima de Castro, Ali Dehghantanha, Kim-Kwang Raymond Choo:
A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks. ACM Trans. Internet Techn. 21(4): 103:1-103:30 (2021) - [j495]Zhen Zhou, Debiao He, Zhe Liu, Min Luo, Kim-Kwang Raymond Choo:
A Software/Hardware Co-Design of Crystals-Dilithium Signature Scheme. ACM Trans. Reconfigurable Technol. Syst. 14(2): 11:1-11:21 (2021) - [j494]Jianting Ning, Zhenfu Cao, Xiaolei Dong, Kaitai Liang, Lifei Wei, Kim-Kwang Raymond Choo:
CryptCloud$^+$+: Secure and Expressive Data Access Control for Cloud Storage. IEEE Trans. Serv. Comput. 14(1): 111-124 (2021) - [j493]Ximeng Liu, Robert H. Deng, Kim-Kwang Raymond Choo, Yang Yang:
Privacy-Preserving Outsourced Clinical Decision Support System in the Cloud. IEEE Trans. Serv. Comput. 14(1): 222-234 (2021) - [j492]Shafiq Ahmed, Salman Shamshad, Zahid Ghaffar, Khalid Mahmood, Neeraj Kumar, Reza M. Parizi, Kim-Kwang Raymond Choo:
Signcryption Based Authenticated and Key Exchange Protocol for EI-Based V2G Environment. IEEE Trans. Smart Grid 12(6): 5290-5298 (2021) - [j491]M. A. Manazir Ahsan, Ainuddin Wahid Bin Abdul Wahab, Mohd Yamani Idna Bin Idris, Suleman Khan, Eric Bachura, Kim-Kwang Raymond Choo:
CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics. IEEE Trans. Sustain. Comput. 6(2): 184-196 (2021) - [j490]Rushank Shetty, George Grispos, Kim-Kwang Raymond Choo:
Are You Dating Danger? An Interdisciplinary Approach to Evaluating the (In)Security of Android Dating Apps. IEEE Trans. Sustain. Comput. 6(2): 197-207 (2021) - [j489]Jiliang Li, Zhou Su, Deke Guo, Kim-Kwang Raymond Choo, Yusheng Ji, Huayan Pu:
Secure Data Deduplication Protocol for Edge-Assisted Mobile CrowdSensing Services. IEEE Trans. Veh. Technol. 70(1): 742-753 (2021) - [j488]Palak Bagga, Ashok Kumar Das, Mohammad Wazid, Joel J. P. C. Rodrigues, Kim-Kwang Raymond Choo, YoungHo Park:
On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System. IEEE Trans. Veh. Technol. 70(2): 1736-1751 (2021) - [j487]Jiayi Li, Jianfeng Ma, Yinbin Miao, Fan Yang, Ximeng Liu, Kim-Kwang Raymond Choo:
Secure Semantic-Aware Search Over Dynamic Spatial Data in VANETs. IEEE Trans. Veh. Technol. 70(9): 8912-8925 (2021) - [j486]Homero Toral-Cruz, Debiao He, Albena Dimitrova Mihovska, Kim-Kwang Raymond Choo, Muhammad Khurram Khan:
Reliable and Secure e-Health Networks. Wirel. Pers. Commun. 117(1): 1-6 (2021) - 2020
- [j485]Feng Wang, Li Xu, Kim-Kwang Raymond Choo, Yuexin Zhang, Huaqun Wang, Jiguo Li:
Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage. IEEE Access 8: 2258-2271 (2020) - [j484]Biwen Chen, Libing Wu, Li Li, Kim-Kwang Raymond Choo, Debiao He:
A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing. IEEE Access 8: 28009-28020 (2020) - [j483]Shahzeb Haider, Adnan Akhunzada, Iqra Mustafa, Tanil Bharat Patel, Amanda S. Fernandez, Kim-Kwang Raymond Choo, Javed Iqbal:
A Deep CNN Ensemble Framework for Efficient DDoS Attack Detection in Software Defined Networks. IEEE Access 8: 53972-53983 (2020) - [j482]Arafat Mohammed Rashad Al-Dhaqm, Shukor Abd Razak, David A. Dampier, Kim-Kwang Raymond Choo, Kamran Siddique, Adeyemi Richard Ikuesan, Abdulhadi Alqarni, Victor R. Kebande:
Categorization and Organization of Database Forensic Investigation Processes. IEEE Access 8: 112846-112858 (2020) - [j481]Saqib Hakak, Wazir Zada Khan, Muhammad Imran, Kim-Kwang Raymond Choo, Muhammad Shoaib:
Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies. IEEE Access 8: 124134-124144 (2020) - [j480]Shancang Li, Kim-Kwang Raymond Choo, Zhiyuan Tan, Xiangjian He, Jiankun Hu, Tao Qin:
IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities. IEEE Access 8: 145033-145036 (2020) - [j479]Jesús Arturo Pérez Díaz, Ismael Amezcua Valdovinos, Kim-Kwang Raymond Choo, Dakai Zhu:
A Flexible SDN-Based Architecture for Identifying and Mitigating Low-Rate DDoS Attacks Using Machine Learning. IEEE Access 8: 155859-155872 (2020) - [j478]Octavio Loyola-González, Miguel Angel Medina-Pérez, Raymundo Adrián Coronilla Valdez, Kim-Kwang Raymond Choo:
A Contrast Pattern-Based Scientometric Study of the QS World University Ranking. IEEE Access 8: 206088-206104 (2020) - [j477]Yingmo Jie, Charles Zhechao Liu, Mingchu Li, Kim-Kwang Raymond Choo, Ling Chen, Cheng Guo:
Game theoretic resource allocation model for designing effective traffic safety solution against drunk driving. Appl. Math. Comput. 376: 125142 (2020) - [j476]Shaohua Wan, Tariq Umer, Kim-Kwang Raymond Choo:
Introduction to the special section on blockchain technologies for industrial Internet of Things (SI-bciot). Comput. Electr. Eng. 81: 106538 (2020) - [j475]Tejasvi Alladi, Vinay Chamola, Biplab Sikdar, Kim-Kwang Raymond Choo:
Consumer IoT: Security Vulnerability Case Studies and Solutions. IEEE Consumer Electron. Mag. 9(2): 17-25 (2020) - [j474]Mohsen M. Jozani, Emmanuel Ayaburi, Myung Ko, Kim-Kwang Raymond Choo:
Privacy concerns and benefits of engagement with social media-enabled apps: A privacy calculus perspective. Comput. Hum. Behav. 107: 106260 (2020) - [j473]Chao Lin, Debiao He, Sherali Zeadally, Neeraj Kumar, Kim-Kwang Raymond Choo:
SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system. Sci. China Inf. Sci. 63(3) (2020) - [j472]Yizhi Ren, Mengjin Jiang, Ting Wu, Ye Yao, Kim-Kwang Raymond Choo, Zhen Wang:
An eigenvalue-based immunization scheme for node attacks in networks with uncertainty. Sci. China Inf. Sci. 63(3) (2020) - [j471]Lynne Graves, William Bradley Glisson, Kim-Kwang Raymond Choo:
LinkedLegal: Investigating social media as evidence in courtrooms. Comput. Law Secur. Rev. 38: 105408 (2020) - [j470]Amritraj Singh, Reza M. Parizi, Qi Zhang, Kim-Kwang Raymond Choo, Ali Dehghantanha:
Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities. Comput. Secur. 88 (2020) - [j469]Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking. Comput. Secur. 88 (2020) - [j468]Amir Namavar Jahromi, Sattar Hashemi, Ali Dehghantanha, Kim-Kwang Raymond Choo, Hadis Karimipour, David Ellis Newton, Reza M. Parizi:
An improved two-hidden-layer extreme learning machine for malware hunting. Comput. Secur. 89 (2020) - [j467]Yizhi Ren, Qi Zhou, Zhen Wang, Ting Wu, Guohua Wu, Kim-Kwang Raymond Choo:
Query-efficient label-only attacks against black-box machine learning models. Comput. Secur. 90: 101698 (2020) - [j466]Ning Lu, Yongxin Zhang, Wenbo Shi, Saru Kumari, Kim-Kwang Raymond Choo:
A secure and scalable data integrity auditing scheme based on hyperledger fabric. Comput. Secur. 92: 101741 (2020) - [j465]Shawn Knox, Steven Moghadam, Kenny Patrick, Anh Phan, Kim-Kwang Raymond Choo:
What's really 'Happning'? A forensic analysis of Android and iOS Happn dating apps. Comput. Secur. 94: 101833 (2020) - [j464]Waqas Haider, Nour Moustafa, Marwa Keshk, Amanda S. Fernandez, Kim-Kwang Raymond Choo, Abdul Wahab:
FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems. Comput. Secur. 96: 101906 (2020) - [j463]Shuyun Shi, Debiao He, Li Li, Neeraj Kumar, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey. Comput. Secur. 97: 101966 (2020) - [j462]Cheng Guo, Jing Jia, Kim-Kwang Raymond Choo, Yingmo Jie:
Privacy-preserving image search (PPIS): Secure classification and searching using convolutional neural network over large-scale encrypted medical images. Comput. Secur. 99: 102021 (2020) - [j461]Lanxiang Chen, Nan Zhang, Hung-Min Sun, Chin-Chen Chang, Shui Yu, Kim-Kwang Raymond Choo:
Secure search for encrypted personal health records from big data NoSQL databases in cloud. Computing 102(6): 1521-1545 (2020) - [j460]Hamid Darabian, Ali Dehghantanha, Sattar Hashemi, Sajad Homayoun, Kim-Kwang Raymond Choo:
An opcode-based technique for polymorphic Internet of Things malware detection. Concurr. Comput. Pract. Exp. 32(6) (2020) - [j459]Nijia Lu, Guohua Wu, Zhen Zhang, Yitao Zheng, Yizhi Ren, Kim-Kwang Raymond Choo:
Cyberbullying detection in social media text based on character-level convolutional neural network with shortcuts. Concurr. Comput. Pract. Exp. 32(23) (2020) - [j458]Bharat Manral, Gaurav Somani, Kim-Kwang Raymond Choo, Mauro Conti, Manoj Singh Gaur:
A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions. ACM Comput. Surv. 52(6): 124:1-124:38 (2020) - [j457]Paul J. Taylor, Tooska Dargahi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo:
A systematic literature review of blockchain cyber security. Digit. Commun. Networks 6(2): 147-156 (2020) - [j456]Xiaolu Zhang, Oren Upton, Nicole Lang Beebe, Kim-Kwang Raymond Choo:
IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers. Digit. Investig. 32 Supplement: 300926 (2020) - [j455]Yudi Zhang, Debiao He, Mingwu Zhang, Kim-Kwang Raymond Choo:
A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm. Frontiers Comput. Sci. 14(3): 143803 (2020) - [j454]Neeraj Kumar, Athanasios V. Vasilakos, Kim-Kwang Raymond Choo, Laurence T. Yang:
Energy Management for Cyber-Physical Cloud Systems. Future Gener. Comput. Syst. 105: 754-756 (2020) - [j453]Jiachen Yang, Bin Jiang, Zhihan Lv, Kim-Kwang Raymond Choo:
A task scheduling algorithm considering game theory designed for energy management in cloud computing. Future Gener. Comput. Syst. 105: 985-992 (2020) - [j452]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Kim-Kwang Raymond Choo, Ximeng Liu, Xiangyu Wang, Tengfei Yang:
PMKT: Privacy-preserving Multi-party Knowledge Transfer for financial market forecasting. Future Gener. Comput. Syst. 106: 545-558 (2020) - [j451]Cristian Mateos, Kim-Kwang Raymond Choo, Alejandro Zunino:
Sharpening the edge: Towards improved edge computing environment for mobile and IoT applications. Future Gener. Comput. Syst. 107: 1130-1133 (2020) - [j450]Gonzalo De La Torre Parra, Paul Rad, Kim-Kwang Raymond Choo:
Driverless vehicle security: Challenges and future research opportunities. Future Gener. Comput. Syst. 108: 1092-1111 (2020) - [j449]Nhien-An Le-Khac, Daniel Jacobs, John Nijhoff, Karsten Bertens, Kim-Kwang Raymond Choo:
Smart vehicle forensics: Challenges and case study. Future Gener. Comput. Syst. 109: 500-510 (2020) - [j448]Cheng Guo, Xueru Jiang, Kim-Kwang Raymond Choo, Xinyu Tang, Jing Zhang:
Lightweight privacy preserving data aggregation with batch verification for smart grid. Future Gener. Comput. Syst. 112: 512-523 (2020) - [j447]Hamid Darabian, Sajad Homayoun, Ali Dehghantanha, Sattar Hashemi, Hadis Karimipour, Reza M. Parizi, Kim-Kwang Raymond Choo:
Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis. J. Grid Comput. 18(2): 293-303 (2020) - [j446]Octavio Loyola-González, Miguel Angel Medina-Pérez, Kim-Kwang Raymond Choo:
A Review of Supervised Classification based on Contrast Patterns: Applications, Trends, and Challenges. J. Grid Comput. 18(4): 797-845 (2020) - [j445]Zhiyong Zhang, Junchang Jing, Xiaoxue Wang, Kim-Kwang Raymond Choo, Brij B. Gupta:
A crowdsourcing method for online social networks security assessment based on human-centric computing. Hum. centric Comput. Inf. Sci. 10: 23 (2020) - [j444]Yudi Zhang, Debiao He, Xinyi Huang, Ding Wang, Kim-Kwang Raymond Choo, Jing Wang:
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography. IEICE Trans. Inf. Syst. 103-D(2): 188-195 (2020) - [j443]Qi Feng, Debiao He, Zhe Liu, Ding Wang, Kim-Kwang Raymond Choo:
Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme. IET Inf. Secur. 14(4): 443-451 (2020) - [j442]Linfang Yu, Zhen Qin, Tianming Zhuang, Yi Ding, Zhiguang Qin, Kim-Kwang Raymond Choo:
A framework for hierarchical division of retinal vascular networks. Neurocomputing 392: 221-232 (2020) - [j441]Zhen Qin, Yibo Zhang, Shuyu Meng, Zhiguang Qin, Kim-Kwang Raymond Choo:
Imaging and fusing time series for wearable sensor-based human activity recognition. Inf. Fusion 53: 80-87 (2020) - [j440]Chao Lin, Debiao He, Neeraj Kumar, Xinyi Huang, Pandi Vijayakumar, Kim-Kwang Raymond Choo:
HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes. IEEE Internet Things J. 7(2): 818-829 (2020) - [j439]Sen He, Wei Ren, Tianqing Zhu, Kim-Kwang Raymond Choo:
BoSMoS: A Blockchain-Based Status Monitoring System for Defending Against Unauthorized Software Updating in Industrial Internet of Things. IEEE Internet Things J. 7(2): 948-959 (2020) - [j438]Zhigang Huang, Lei Zhang, Xinyu Meng, Kim-Kwang Raymond Choo:
Key-Free Authentication Protocol Against Subverted Indoor Smart Devices for Smart Home. IEEE Internet Things J. 7(2): 1039-1047 (2020) - [j437]Jialu Chen, Jun Zhou, Zhenfu Cao, Athanasios V. Vasilakos, Xiaolei Dong, Kim-Kwang Raymond Choo:
Lightweight Privacy-Preserving Training and Evaluation for Discretized Neural Networks. IEEE Internet Things J. 7(4): 2663-2678 (2020) - [j436]Yingmo Jie, Cheng Guo, Kim-Kwang Raymond Choo, Charles Zhechao Liu, Mingchu Li:
Game-Theoretic Resource Allocation for Fog-Based Industrial Internet of Things Environment. IEEE Internet Things J. 7(4): 3041-3052 (2020) - [j435]Cheng Guo, Jing Jia, Yingmo Jie, Charles Zhechao Liu, Kim-Kwang Raymond Choo:
Enabling Secure Cross-Modal Retrieval Over Encrypted Heterogeneous IoT Databases With Collective Matrix Factorization. IEEE Internet Things J. 7(4): 3104-3113 (2020) - [j434]Shobhan Mandal, Basudeb Bera, Anil Kumar Sutrala, Ashok Kumar Das, Kim-Kwang Raymond Choo, Youngho Park:
Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment. IEEE Internet Things J. 7(4): 3184-3197 (2020) - [j433]Sahil Garg, Kuljeet Kaur, Georges Kaddoum, Kim-Kwang Raymond Choo:
Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0. IEEE Internet Things J. 7(5): 4598-4606 (2020) - [j432]Sahil Garg, Song Guo, Vincenzo Piuri, Kim-Kwang Raymond Choo, Balasubramanian Raman:
Guest Editorial Special Issue on Edge-Cloud Interplay Based on SDN and NFV for Next-Generation IoT Applications. IEEE Internet Things J. 7(7): 5690-5694 (2020) - [j431]Huajie Shen, Jun Zhou, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo:
Blockchain-Based Lightweight Certificate Authority for Efficient Privacy-Preserving Location-Based Service in Vehicular Social Networks. IEEE Internet Things J. 7(7): 6610-6622 (2020) - [j430]Mahdis Saharkhizan, Amin Azmoodeh, Ali Dehghantanha, Kim-Kwang Raymond Choo, Reza M. Parizi:
An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic. IEEE Internet Things J. 7(9): 8852-8859 (2020) - [j429]Cheng Xu, Wei Ren, Linchen Yu, Tianqing Zhu, Kim-Kwang Raymond Choo:
A Hierarchical Encryption and Key Management Scheme for Layered Access Control on H.264/SVC Bitstream in the Internet of Things. IEEE Internet Things J. 7(9): 8932-8942 (2020) - [j428]Zhiting Zhang, Peng Zeng, Bofeng Pan, Kim-Kwang Raymond Choo:
Large-Universe Attribute-Based Encryption With Public Traceability for Cloud Storage. IEEE Internet Things J. 7(10): 10314-10323 (2020) - [j427]Wei Ren, Jingjing Hu, Tianqing Zhu, Yi Ren, Kim-Kwang Raymond Choo:
A flexible method to defend against computationally resourceful miners in blockchain proof of work. Inf. Sci. 507: 161-171 (2020) - [j426]Shaobo Zhang, Xinjun Mao, Kim-Kwang Raymond Choo, Tao Peng, Guojun Wang:
A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services. Inf. Sci. 527: 406-419 (2020) - [j425]Chao Lin, Debiao He, Xinyi Huang, Xiang Xie, Kim-Kwang Raymond Choo:
Blockchain-based system for secure outsourcing of bilinear pairings. Inf. Sci. 527: 590-601 (2020) - [j424]Xiaofeng Ding, Wenxiang Zhou, Shujun Sheng, Zhifeng Bao, Kim-Kwang Raymond Choo, Hai Jin:
Differentially private publication of streaming trajectory data. Inf. Sci. 538: 159-175 (2020) - [j423]Furqan Shahid, Abid Khan, Saif Ur Rehman Malik, Kim-Kwang Raymond Choo:
WOTS-S: A Quantum Secure Compact Signature Scheme for Distributed Ledger. Inf. Sci. 539: 229-249 (2020) - [j422]Christie Pei-Yee Chin, Nina Evans, Charles Zhechao Liu, Kim-Kwang Raymond Choo:
Understanding Factors Influencing Employees' Consumptive and Contributive Use of Enterprise Social Networks. Inf. Syst. Frontiers 22(6): 1357-1376 (2020) - [j421]Juan Du, Hengqing Jing, Kim-Kwang Raymond Choo, Vijayan Sugumaran, Daniel Castro-Lacouture:
An Ontology and Multi-Agent Based Decision Support Framework for Prefabricated Component Supply Chain. Inf. Syst. Frontiers 22(6): 1467-1485 (2020) - [j420]Zhiyan Xu, Debiao He, Huaqun Wang, Pandi Vijayakumar, Kim-Kwang Raymond Choo:
A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems. J. Inf. Secur. Appl. 51: 102453 (2020) - [j419]Cong Peng, Jianhua Chen, Lu Zhou, Kim-Kwang Raymond Choo, Debiao He:
CsiIBS: A post-quantum identity-based signature scheme based on isogenies. J. Inf. Secur. Appl. 54: 102504 (2020) - [j418]Yue Huang, Peng Zeng, Kim-Kwang Raymond Choo:
An Efficient Privacy-Preserving Protocol for Computing kth Minimum Value in P2P Networks. J. Circuits Syst. Comput. 29(9): 2050138:1-2050138:20 (2020) - [j417]Zhiyan Xu, Debiao He, Pandi Vijayakumar, Kim-Kwang Raymond Choo, Li Li:
Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems. J. Medical Syst. 44(5): 92 (2020) - [j416]Amritraj Singh, Kelly Click, Reza M. Parizi, Qi Zhang, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Sidechain technologies in blockchain networks: An examination and state-of-the-art review. J. Netw. Comput. Appl. 149 (2020) - [j415]Mohammad Alauthman, Nauman Aslam, Mouhammd Al-Kasassbeh, Suleman Khan, Ahmad Al-Qerem, Kim-Kwang Raymond Choo:
An efficient reinforcement learning-based Botnet detection approach. J. Netw. Comput. Appl. 150 (2020) - [j414]Zeli Wang, Weiqi Dai, Kim-Kwang Raymond Choo, Hai Jin, Deqing Zou:
FSFC: An input filter-based secure framework for smart contract. J. Netw. Comput. Appl. 154: 102530 (2020) - [j413]Abbas Yazdinejad, Reza M. Parizi, Ali Bohlooli, Ali Dehghantanha, Kim-Kwang Raymond Choo:
A high-performance framework for a network programmable packet processor using P4 and FPGA. J. Netw. Comput. Appl. 156: 102564 (2020) - [j412]Cheng Guo, Xueru Jiang, Kim-Kwang Raymond Choo, Yingmo Jie:
R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity. J. Netw. Comput. Appl. 162: 102664 (2020) - [j411]Gonzalo De La Torre Parra, Paul Rad, Kim-Kwang Raymond Choo, Nicole Beebe:
Detecting Internet of Things attacks using distributed deep learning. J. Netw. Comput. Appl. 163: 102662 (2020) - [j410]Yang Liu, Debiao He, Mohammad S. Obaidat, Neeraj Kumar, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
Blockchain-based identity management systems: A review. J. Netw. Comput. Appl. 166: 102731 (2020) - [j409]Peng Zeng, Bofeng Pan, Kim-Kwang Raymond Choo, Hong Liu:
MMDA: Multidimensional and multidirectional data aggregation for edge computing-enhanced IoT. J. Syst. Archit. 106: 101713 (2020) - [j408]Hamed HaddadPajouh, Raouf Khayami, Ali Dehghantanha, Kim-Kwang Raymond Choo, Reza M. Parizi:
AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things. Neural Comput. Appl. 32(20): 16119-16133 (2020) - [j407]Gang Han, Yannan Li, Yong Yu, Kim-Kwang Raymond Choo, Nadra Guizani:
Blockchain-Based Self-Tallying Voting System with Software Updates in Decentralized IoT. IEEE Netw. 34(4): 166-172 (2020) - [j406]Zhihui Lu, Keke Gai, Qiang Duan, Kim-Kwang Raymond Choo, Junnan Li, Jie Wu, Yajing Xu:
Machine Learning Empowered Content Delivery: Status, Challenges, and Opportunities. IEEE Netw. 34(6): 228-234 (2020) - [j405]Zhiyan Xu, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo:
Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs. Secur. Commun. Networks 2020: 5276813:1-5276813:12 (2020) - [j404]Xiaoying Jia, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo:
A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing. IEEE Syst. J. 14(1): 560-571 (2020) - [j403]Kuljeet Kaur, Sahil Garg, Neeraj Kumar, Gagangeet Singh Aujla, Kim-Kwang Raymond Choo, Mohammad S. Obaidat:
An Adaptive Grid Frequency Support Mechanism for Energy Management in Cloud Data Centers. IEEE Syst. J. 14(1): 1195-1205 (2020) - [j402]Qi Feng, Debiao He, Huaqun Wang, Neeraj Kumar, Kim-Kwang Raymond Choo:
White-Box Implementation of Shamir's Identity-Based Signature Scheme. IEEE Syst. J. 14(2): 1820-1829 (2020) - [j401]Yudi Zhang, Debiao He, Yumei Li, Mingwu Zhang, Kim-Kwang Raymond Choo:
Efficient Obfuscation for Encrypted Identity-Based Signatures in Wireless Body Area Networks. IEEE Syst. J. 14(4): 5320-5328 (2020) - [j400]Brandon Lwowski, Paul Rad, Kim-Kwang Raymond Choo:
Geospatial Event Detection by Grouping Emotion Contagion in Social Media. IEEE Trans. Big Data 6(1): 159-170 (2020) - [j399]Ximeng Liu, Robert H. Deng, Kim-Kwang Raymond Choo, Yang Yang:
Privacy-Preserving Outsourced Support Vector Machine Design for Secure Drug Discovery. IEEE Trans. Cloud Comput. 8(2): 610-622 (2020) - [j398]Geetanjali Rathee, Naveen Jaglan, Sahil Garg, Bong Jun Choi, Kim-Kwang Raymond Choo:
A Secure Spectrum Handoff Mechanism in Cognitive Radio Networks. IEEE Trans. Cogn. Commun. Netw. 6(3): 959-969 (2020) - [j397]Muhammad Faizan Ayub, Salman Shamshad, Khalid Mahmood, SK Hafizul Islam, Reza M. Parizi, Kim-Kwang Raymond Choo:
A Provably Secure Two-Factor Authentication Scheme for USB Storage Devices. IEEE Trans. Consumer Electron. 66(4): 396-405 (2020) - [j396]Neetesh Saxena, Alvaro A. Cárdenas, Raheem Beyah, Rongxing Lu, Kim-Kwang Raymond Choo, Yiran Chen:
Introduction to the Special Issue on User-Centric Security and Safety for CPS. ACM Trans. Cyber Phys. Syst. 4(3): 29:1-29:2 (2020) - [j395]Berat A. Erol, Abhijit Majumdar, Patrick Benavidez, Paul Rad, Kim-Kwang Raymond Choo, Mo M. Jamshidi:
Toward Artificial Emotional Intelligence for Cooperative Social Human-Machine Interaction. IEEE Trans. Comput. Soc. Syst. 7(1): 234-246 (2020) - [j394]Neetesh Saxena, Hong Shen, Nikos Komninos, Kim-Kwang Raymond Choo, Narendra S. Chaudhari:
BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users. IEEE Trans. Dependable Secur. Comput. 17(3): 550-565 (2020) - [j393]Lei Zhang, Xinyu Meng, Kim-Kwang Raymond Choo, Yuanfei Zhang, Feifei Dai:
Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud. IEEE Trans. Dependable Secur. Comput. 17(3): 634-647 (2020) - [j392]Jun Feng, Laurence T. Yang, Qing Zhu, Kim-Kwang Raymond Choo:
Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment. IEEE Trans. Dependable Secur. Comput. 17(4): 857-868 (2020) - [j391]Ximeng Liu, Robert H. Deng, Kim-Kwang Raymond Choo, Yang Yang, HweeHwa Pang:
Privacy-Preserving Outsourced Calculation Toolkit in the Cloud. IEEE Trans. Dependable Secur. Comput. 17(5): 898-911 (2020) - [j390]Debiao He, Yudi Zhang, Ding Wang, Kim-Kwang Raymond Choo:
Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography. IEEE Trans. Dependable Secur. Comput. 17(5): 1124-1132 (2020) - [j389]Kim-Kwang Raymond Choo, Sercan Ozcan, Ali Dehghantanha, Reza M. Parizi:
Editorial: Blockchain Ecosystem - Technological and Management Opportunities and Challenges. IEEE Trans. Engineering Management 67(4): 982-987 (2020) - [j388]Zhe Liu, Kim-Kwang Raymond Choo, Weiqiang Liu, Muhammad Khurram Khan:
Guest Editorial: Introduction to the Special Section on Cyber Security Threats and Defense Advance. IEEE Trans. Emerg. Top. Comput. 8(2): 264-266 (2020) - [j387]Amir Namavar Jahromi, Sattar Hashemi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo:
An Enhanced Stacked LSTM Method With No Random Initialization for Malware Threat Hunting in Safety and Time-Critical Systems. IEEE Trans. Emerg. Top. Comput. Intell. 4(5): 630-640 (2020) - [j386]Weiqi Dai, Chunkai Dai, Kim-Kwang Raymond Choo, Changze Cui, Deqing Zou, Hai Jin:
SDTE: A Secure Blockchain-Based Data Trading Ecosystem. IEEE Trans. Inf. Forensics Secur. 15: 725-737 (2020) - [j385]Osama Al-Kadi, Nour Moustafa, Benjamin P. Turnbull, Kim-Kwang Raymond Choo:
An Ontological Graph Identification Method for Improving Localization of IP Prefix Hijacking in Network Systems. IEEE Trans. Inf. Forensics Secur. 15: 1164-1174 (2020) - [j384]Neetesh Saxena, Mauro Conti, Kim-Kwang Raymond Choo, Narendra S. Chaudhari:
BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices. IEEE Trans. Inf. Forensics Secur. 15: 1470-1485 (2020) - [j383]Xu An Wang, Kim-Kwang Raymond Choo, Jian Weng, Jianfeng Ma:
Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources". IEEE Trans. Inf. Forensics Secur. 15: 1586-1588 (2020) - [j382]Renyong Wu, Chao Yuan, Ning Zhang, Kim-Kwang Raymond Choo:
A Two-Dimensional Vectorized Secure Transmission Scheme for Wireless Communications. IEEE Trans. Inf. Forensics Secur. 15: 2336-2345 (2020) - [j381]Chao Lin, Debiao He, Xinyi Huang, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain. IEEE Trans. Inf. Forensics Secur. 15: 2440-2452 (2020) - [j380]Qi Feng, Debiao He, Zhe Liu, Huaqun Wang, Kim-Kwang Raymond Choo:
SecureNLP: A System for Multi-Party Privacy-Preserving Natural Language Processing. IEEE Trans. Inf. Forensics Secur. 15: 3709-3721 (2020) - [j379]Fei Song, Zheng-Yang Ai, Yutong Zhou, Ilsun You, Kim-Kwang Raymond Choo, Hongke Zhang:
Smart Collaborative Automation for Receive Buffer Control in Multipath Industrial Networks. IEEE Trans. Ind. Informatics 16(2): 1385-1394 (2020) - [j378]Jing Wang, Libing Wu, Kim-Kwang Raymond Choo, Debiao He:
Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure. IEEE Trans. Ind. Informatics 16(3): 1984-1992 (2020) - [j377]Kuljeet Kaur, Sahil Garg, Georges Kaddoum, Elias Bou-Harb, Kim-Kwang Raymond Choo:
A Big Data-Enabled Consolidated Framework for Energy Efficient Software Defined Data Centers in IoT Setups. IEEE Trans. Ind. Informatics 16(4): 2687-2697 (2020) - [j376]Kim-Kwang Raymond Choo, Zheng Yan, Weizhi Meng:
Editorial: Blockchain in Industrial IoT Applications: Security and Privacy Advances, Challenges, and Opportunities. IEEE Trans. Ind. Informatics 16(6): 4119-4121 (2020) - [j375]Marwa Keshk, Benjamin P. Turnbull, Nour Moustafa, Dinusha Vatsalan, Kim-Kwang Raymond Choo:
A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks. IEEE Trans. Ind. Informatics 16(8): 5110-5118 (2020) - [j374]Abbas Yazdinejad, Gautam Srivastava, Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo, Mohammed Aledhari:
Decentralized Authentication of Distributed Patients in Hospital Networks Using Blockchain. IEEE J. Biomed. Health Informatics 24(8): 2146-2156 (2020) - [j373]Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, Qi Zhang, Kim-Kwang Raymond Choo:
An Energy-Efficient SDN Controller Architecture for IoT Networks With Blockchain-Based Security. IEEE Trans. Serv. Comput. 13(4): 625-638 (2020) - [j372]Gagangeet Singh Aujla, Amritpal Singh, Maninderpal Singh, Sumit Sharma, Neeraj Kumar, Kim-Kwang Raymond Choo:
BloCkEd: Blockchain-Based Secure Data Processing Framework in Edge Envisioned V2X Environment. IEEE Trans. Veh. Technol. 69(6): 5850-5863 (2020) - [j371]Qi Jiang, Ning Zhang, Jianbing Ni, Jianfeng Ma, Xindi Ma, Kim-Kwang Raymond Choo:
Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles. IEEE Trans. Veh. Technol. 69(9): 9390-9401 (2020) - [j370]Hamid Darabian, Ali Dehghantanha, Sattar Hashemi, Mohammad Taheri, Amin Azmoodeh, Sajad Homayoun, Kim-Kwang Raymond Choo, Reza M. Parizi:
A multiview learning method for malware threat hunting: windows, IoT and android as case studies. World Wide Web 23(2): 1241-1260 (2020) - 2019
- [j369]Peining Shi, Zhiyong Zhang, Kim-Kwang Raymond Choo:
Detecting Malicious Social Bots Based on Clickstream Sequences. IEEE Access 7: 28855-28862 (2019) - [j368]Yulei Wu, Zheng Yan, Kim-Kwang Raymond Choo, Laurence T. Yang:
IEEE Access Special Section Editorial: Internet-of-Things Big Data Trust Management. IEEE Access 7: 65223-65227 (2019) - [j367]Luca Chiaraviglio, Fabio D'Andreagiovanni, Kim-Kwang Raymond Choo, Francesca Cuomo, Stefania Colonnese:
Joint Optimization of Area Throughput and Grid-Connected Microgeneration in UAV-Based Mobile Networks. IEEE Access 7: 69545-69558 (2019) - [j366]Hadis Karimipour, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo, Henry Leung:
A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids. IEEE Access 7: 80778-80788 (2019) - [j365]Ibrahim Radwan, Nour Moustafa, Byron W. Keating, Kim-Kwang Raymond Choo, Roland Goecke:
Hierarchical Adversarial Network for Human Pose Estimation. IEEE Access 7: 103619-103628 (2019) - [j364]Osama Al-Kadi, Nour Moustafa, Benjamin P. Turnbull, Kim-Kwang Raymond Choo:
Mixture Localization-Based Outliers Models for securing Data Migration in Cloud Centers. IEEE Access 7: 114607-114618 (2019) - [j363]Zhiyong Zhang, Ranran Sun, Kim-Kwang Raymond Choo, Kefeng Fan, Wei Wu, Manhua Zhang, Changwei Zhao:
A Novel Social Situation Analytics-Based Recommendation Algorithm for Multimedia Social Networks. IEEE Access 7: 117749-117760 (2019) - [j362]Nighat Usman, Qaisar Javaid, Adnan Akhunzada, Kim-Kwang Raymond Choo, Saeeda Usman, Asma Sher, Manzoor Ilahi, Masoom Alam:
A Novel Internet of Things-Centric Framework to Mine Malicious Frequent Patterns. IEEE Access 7: 133914-133923 (2019) - [j361]Stephan Zollner, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
An Automated Live Forensic and Postmortem Analysis Tool for Bitcoin on Windows Systems. IEEE Access 7: 158250-158263 (2019) - [j360]Tejasvi Alladi, Vinay Chamola, Reza M. Parizi, Kim-Kwang Raymond Choo:
Blockchain Applications for Industry 4.0 and Industrial IoT: A Review. IEEE Access 7: 176935-176951 (2019) - [j359]Bo Mi, Darong Huang, Shaohua Wan, Yu Hu, Kim-Kwang Raymond Choo:
A post-quantum light weight 1-out-n oblivious transfer protocol. Comput. Electr. Eng. 75: 90-100 (2019) - [j358]Dean Richard McKinnel, Tooska Dargahi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment. Comput. Electr. Eng. 75: 175-188 (2019) - [j357]Weizhi Meng, Lijun Jiang, Kim-Kwang Raymond Choo, Yu Wang, Chong Jiang:
Towards detection of juice filming charging attacks via supervised CPU usage analysis on smartphones. Comput. Electr. Eng. 78: 230-241 (2019) - [j356]Jiaxi Hu, Debiao He, Qinglan Zhao, Kim-Kwang Raymond Choo:
Parking Management: A Blockchain-Based Privacy-Preserving System. IEEE Consumer Electron. Mag. 8(4): 45-49 (2019) - [j355]Quang Do, Ben Martini, Kim-Kwang Raymond Choo:
The role of the adversary model in applied security research. Comput. Secur. 81: 156-181 (2019) - [j354]Rajat Chaudhary, Anish Jindal, Gagangeet Singh Aujla, Shubhani Aggarwal, Neeraj Kumar, Kim-Kwang Raymond Choo:
BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system. Comput. Secur. 85: 288-299 (2019) - [j353]Pooneh Nikkhah Bahrami, Hamid H. S. Javadi, Tooska Dargahi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
A hierarchical key pre-distribution scheme for fog networks. Concurr. Comput. Pract. Exp. 31(22) (2019) - [j352]Michael Bewong, Jixue Liu, Lin Liu, Jiuyong Li, Kim-Kwang Raymond Choo:
A relative privacy model for effective privacy preservation in transactional data. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j351]Morteza Safaei Pour, Elias Bou-Harb, Kavita Varma, Nataliia Neshenko, Dimitris A. Pados, Kim-Kwang Raymond Choo:
Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns. Digit. Investig. 28 Supplement: S40-S49 (2019) - [j350]Sajad Homayoun, Ali Dehghantanha, Marzieh Ahmadzadeh, Sattar Hashemi, Raouf Khayami, Kim-Kwang Raymond Choo, David Ellis Newton:
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer. Future Gener. Comput. Syst. 90: 94-104 (2019) - [j349]Tejaswi Volety, Shalabh Saini, Thomas McGhin, Charles Zhechao Liu, Kim-Kwang Raymond Choo:
Cracking Bitcoin wallets: I want what you have in the wallets. Future Gener. Comput. Syst. 91: 136-143 (2019) - [j348]Shaohua Wan, Yu Zhao, Tian Wang, Zonghua Gu, Qammer H. Abbasi, Kim-Kwang Raymond Choo:
Multi-dimensional data indexing and range query processing via Voronoi diagram for internet of things. Future Gener. Comput. Syst. 91: 382-391 (2019) - [j347]Liehuang Zhu, Yulu Wu, Keke Gai, Kim-Kwang Raymond Choo:
Controllable and trustworthy blockchain-based cloud data management. Future Gener. Comput. Syst. 91: 527-535 (2019) - [j346]Arun Das, Paul Rad, Kim-Kwang Raymond Choo, Babak Nouhi, Jonathan Lish, James Martel:
Distributed machine learning cloud teleophthalmology IoT for predicting AMD disease progression. Future Gener. Comput. Syst. 93: 486-498 (2019) - [j345]Lanxiang Chen, Wai-Kong Lee, Chin-Chen Chang, Kim-Kwang Raymond Choo, Nan Zhang:
Blockchain based searchable encryption for electronic health record sharing. Future Gener. Comput. Syst. 95: 420-429 (2019) - [j344]Umara Noor, Zahid Anwar, Tehmina Amjad, Kim-Kwang Raymond Choo:
A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise. Future Gener. Comput. Syst. 96: 227-242 (2019) - [j343]Yingmo Jie, Kim-Kwang Raymond Choo, Mingchu Li, Ling Chen, Cheng Guo:
Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic model. Future Gener. Comput. Syst. 101: 169-179 (2019) - [j342]Peng Zeng, Siyuan Chen, Kim-Kwang Raymond Choo:
An IND-CCA2 secure post-quantum encryption scheme and a secure cloud storage use case. Hum. centric Comput. Inf. Sci. 9: 32 (2019) - [j341]Libing Wu, Yubo Zhang, Kim-Kwang Raymond Choo, Debiao He:
Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks. Int. J. Found. Comput. Sci. 30(4): 647-664 (2019) - [j340]Cheng Guo, Ruhan Zhuang, Yingmo Jie, Kim-Kwang Raymond Choo, Xinyu Tang:
Secure Range Search Over Encrypted Uncertain IoT Outsourced Data. IEEE Internet Things J. 6(2): 1520-1529 (2019) - [j339]Yong Cheng, Xiangyu Zhou, Shaohua Wan, Kim-Kwang Raymond Choo:
Deep Belief Network for Meteorological Time Series Prediction in the Internet of Things. IEEE Internet Things J. 6(3): 4369-4376 (2019) - [j338]Christian Esposito, Aniello Castiglione, Flavio Frattini, Marcello Cinque, Yanjiang Yang, Kim-Kwang Raymond Choo:
On Data Sovereignty in Cloud-Based Computation Offloading for Smart Cities Applications. IEEE Internet Things J. 6(3): 4521-4535 (2019) - [j337]Nour Moustafa, Benjamin P. Turnbull, Kim-Kwang Raymond Choo:
An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things. IEEE Internet Things J. 6(3): 4815-4830 (2019) - [j336]Shancang Li, Kim-Kwang Raymond Choo, Qindong Sun, William J. Buchanan, Jiuxin Cao:
IoT Forensics: Amazon Echo as a Use Case. IEEE Internet Things J. 6(4): 6487-6497 (2019) - [j335]Xiaolu Zhang, Kim-Kwang Raymond Choo, Nicole Lang Beebe:
How Do I Share My IoT Forensic Experience With the Broader Community? An Automated Knowledge Sharing IoT Forensic Platform. IEEE Internet Things J. 6(4): 6850-6861 (2019) - [j334]Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Hongjun Wu, Hongwei Li:
Fair and Dynamic Data Sharing Framework in Cloud-Assisted Internet of Everything. IEEE Internet Things J. 6(4): 7201-7212 (2019) - [j333]Zhen Qin, Lingzhou Hu, Ning Zhang, Dajiang Chen, Kuan Zhang, Zhiguang Qin, Kim-Kwang Raymond Choo:
Learning-Aided User Identification Using Smartphone Sensors for Smart Homes. IEEE Internet Things J. 6(5): 7760-7772 (2019) - [j332]Mimi Ma, Debiao He, Huaqun Wang, Neeraj Kumar, Kim-Kwang Raymond Choo:
An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks. IEEE Internet Things J. 6(5): 8065-8075 (2019) - [j331]Yinbin Miao, Qiuyun Tong, Kim-Kwang Raymond Choo, Ximeng Liu, Robert H. Deng, Hongwei Li:
Secure Online/Offline Data Sharing Framework for Cloud-Assisted Industrial Internet of Things. IEEE Internet Things J. 6(5): 8681-8691 (2019) - [j330]Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, Jangirala Srinivas, Neeraj Kumar, Samiran Chattopadhyay, Kim-Kwang Raymond Choo:
A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment. IEEE Internet Things J. 6(5): 8739-8752 (2019) - [j329]Zan Gao, Hai-Zhen Xuan, Hua Zhang, Shaohua Wan, Kim-Kwang Raymond Choo:
Adaptive Fusion and Category-Level Dictionary Learning Model for Multiview Human Action Recognition. IEEE Internet Things J. 6(6): 9280-9293 (2019) - [j328]Cheng Guo, Ruhan Zhuang, Chunhua Su, Charles Zhechao Liu, Kim-Kwang Raymond Choo:
Secure and Efficient K Nearest Neighbor Query Over Encrypted Uncertain Data in Cloud-IoT Ecosystem. IEEE Internet Things J. 6(6): 9868-9879 (2019) - [j327]Jiliang Li, Yusheng Ji, Kim-Kwang Raymond Choo, Dieter Hogrefe:
CL-CPPA: Certificate-Less Conditional Privacy-Preserving Authentication Protocol for the Internet of Vehicles. IEEE Internet Things J. 6(6): 10332-10343 (2019) - [j326]Lu Zhou, Xin Sun, Chunhua Su, Zhe Liu, Kim-Kwang Raymond Choo:
Game theoretic security of quantum bit commitment. Inf. Sci. 479: 503-514 (2019) - [j325]Wanchun Dou, Wenda Tang, Shu Li, Shui Yu, Kim-Kwang Raymond Choo:
A heuristic line piloting method to disclose malicious taxicab driver's privacy over GPS big data. Inf. Sci. 483: 247-261 (2019) - [j324]P. Punithavathi, S. Geetha, Marimuthu Karuppiah, SK Hafizul Islam, Mohammad Mehedi Hassan, Kim-Kwang Raymond Choo:
A lightweight machine learning-based authentication framework for smart IoT devices. Inf. Sci. 484: 255-268 (2019) - [j323]Tehsin Kanwal, Sayed Ali Asjad Shaukat, Adeel Anjum, Saif Ur Rehman Malik, Kim-Kwang Raymond Choo, Abid Khan, Naveed Ahmad, Mansoor Ahmad, Samee U. Khan:
Privacy-preserving model and generalization correlation attacks for 1: M data with multiple sensitive attributes. Inf. Sci. 488: 238-256 (2019) - [j322]Xiaofeng Ding, Wanlu Yang, Kim-Kwang Raymond Choo, Xiaoli Wang, Hai Jin:
Privacy preserving similarity joins using MapReduce. Inf. Sci. 493: 20-33 (2019) - [j321]K. Selvakumar, Marimuthu Karuppiah, L. Sai Ramesh, SK Hafizul Islam, Mohammad Mehedi Hassan, Giancarlo Fortino, Kim-Kwang Raymond Choo:
Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs. Inf. Sci. 497: 77-90 (2019) - [j320]Yandong Zheng, Rongxing Lu, Beibei Li, Jun Shao, Haomiao Yang, Kim-Kwang Raymond Choo:
Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data. Inf. Sci. 498: 91-105 (2019) - [j319]Chunming Wu, Meng Wang, Lang Gao, Weijing Song, Tian Tian, Kim-Kwang Raymond Choo:
Convolutional Neural Network with Expert Knowledge for Hyperspectral Remote Sensing Imagery Classification. KSII Trans. Internet Inf. Syst. 13(8): 3917-3941 (2019) - [j318]Kim-Kwang Raymond Choo, Jemal H. Abawajy, Md. Rafiqul Islam:
Special issue on cybersecurity in the critical infrastructure: Advances and future directions. J. Comput. Syst. Sci. 102: 40-41 (2019) - [j317]Pooneh Nikkhah Bahrami, Ali Dehghantanha, Tooska Dargahi, Reza M. Parizi, Kim-Kwang Raymond Choo, Hamid H. S. Javadi:
Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures. J. Inf. Process. Syst. 15(4): 865-889 (2019) - [j316]Aparna Kumari, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar, Reza M. Parizi, Kim-Kwang Raymond Choo:
Fog data analytics: A taxonomy and process model. J. Netw. Comput. Appl. 128: 90-104 (2019) - [j315]JiLiang Li, WeiGuo Zhang, Vivek Dabra, Kim-Kwang Raymond Choo, Saru Kumari, Dieter Hogrefe:
AEP-PPA: An anonymous, efficient and provably-secure privacy-preserving authentication protocol for mobile services in smart cities. J. Netw. Comput. Appl. 134: 52-61 (2019) - [j314]Gonzalo De La Torre Parra, Paul Rad, Kim-Kwang Raymond Choo:
Implementation of deep packet inspection in smart grids and industrial Internet of Things: Challenges and opportunities. J. Netw. Comput. Appl. 135: 32-46 (2019) - [j313]Thomas McGhin, Kim-Kwang Raymond Choo, Charles Zhechao Liu, Debiao He:
Blockchain in healthcare applications: Research challenges and opportunities. J. Netw. Comput. Appl. 135: 62-75 (2019) - [j312]Shubhani Aggarwal, Rajat Chaudhary, Gagangeet Singh Aujla, Neeraj Kumar, Kim-Kwang Raymond Choo, Albert Y. Zomaya:
Blockchain for smart communities: Applications, challenges and opportunities. J. Netw. Comput. Appl. 144: 13-48 (2019) - [j311]Mordechai Guri, Rami Puzis, Kim-Kwang Raymond Choo, Sergey Rubinshtein, Gabi Kedma, Yuval Elovici:
Using malware for the greater good: Mitigating data leakage. J. Netw. Comput. Appl. 145 (2019) - [j310]Feng Zhang, Victor E. Lee, Ruoming Jin, Saurabh Garg, Kim-Kwang Raymond Choo, Michele Maasberg, Lijun Dong, Chi Cheng:
Privacy-aware smart city: A case study in collaborative filtering recommender systems. J. Parallel Distributed Comput. 127: 145-159 (2019) - [j309]Samuel Henrique Silva, Paul Rad, Nicole Beebe, Kim-Kwang Raymond Choo, Mahesh Umapathy:
Cooperative unmanned aerial vehicles with privacy preserving deep vision for real-time object identification and tracking. J. Parallel Distributed Comput. 131: 147-160 (2019) - [j308]Xiong Li, Fan Wu, Saru Kumari, Lili Xu, Arun Kumar Sangaiah, Kim-Kwang Raymond Choo:
A provably secure and anonymous message authentication scheme for smart grids. J. Parallel Distributed Comput. 132: 242-249 (2019) - [j307]José María de Fuentes, Lorena González-Manzano, Javier López, Pedro Peris-Lopez, Kim-Kwang Raymond Choo:
Editorial: Security and Privacy in Internet of Things. Mob. Networks Appl. 24(3): 878-880 (2019) - [j306]Weitong Hu, Ye Yao, Di Zhou, Qiuhua Zheng, Kim-Kwang Raymond Choo:
A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method. Mob. Networks Appl. 24(4): 1317-1335 (2019) - [j305]Weijing Song, Lizhe Wang, Peng Liu, Kim-Kwang Raymond Choo:
Improved t-SNE based manifold dimensional reduction for remote sensing data processing. Multim. Tools Appl. 78(4): 4311-4326 (2019) - [j304]Quanrun Li, Ching-Fang Hsu, Kim-Kwang Raymond Choo, Debiao He:
A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks. Secur. Commun. Networks 2019: 7871067:1-7871067:13 (2019) - [j303]Giovanni Pau, Mario Collotta, Vincenzo Maniscalco, Kim-Kwang Raymond Choo:
A fuzzy-PSO system for indoor localization based on visible light communications. Soft Comput. 23(14): 5547-5557 (2019) - [j302]Kim-Kwang Raymond Choo, Mauro Conti, Ali Dehghantanha:
Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 1. IEEE Trans. Big Data 5(3): 279-281 (2019) - [j301]Kim-Kwang Raymond Choo, Mauro Conti, Ali Dehghantanha:
Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 2. IEEE Trans. Big Data 5(4): 423-424 (2019) - [j300]Beibei Li, Rongxing Lu, Kim-Kwang Raymond Choo, Wei Wang, Sheng Luo:
On Reliability Analysis of Smart Grids under Topology Attacks: A Stochastic Petri Net Approach. ACM Trans. Cyber Phys. Syst. 3(1): 10:1-10:25 (2019) - [j299]Chaoqun Yang, Li Feng, Zhiguo Shi, Rongxing Lu, Kim-Kwang Raymond Choo:
A Crowdsensing-based Cyber-physical System for Drone Surveillance Using Random Finite Set Theory. ACM Trans. Cyber Phys. Syst. 3(4): 42:1-42:22 (2019) - [j298]Yannan Li, Yong Yu, Geyong Min, Willy Susilo, Jianbing Ni, Kim-Kwang Raymond Choo:
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems. IEEE Trans. Dependable Secur. Comput. 16(1): 72-83 (2019) - [j297]Zhe Liu, Hwajeong Seo, Aniello Castiglione, Kim-Kwang Raymond Choo, Howon Kim:
Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things. IEEE Trans. Dependable Secur. Comput. 16(3): 521-529 (2019) - [j296]Hamed Haddad Pajouh, Reza Javidan, Raouf Khayami, Ali Dehghantanha, Kim-Kwang Raymond Choo:
A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks. IEEE Trans. Emerg. Top. Comput. 7(2): 314-323 (2019) - [j295]Libing Wu, Jing Wang, Kim-Kwang Raymond Choo, Debiao He:
Secure Key Agreement and Key Protection for Mobile Device User Authentication. IEEE Trans. Inf. Forensics Secur. 14(2): 319-330 (2019) - [j294]Nour Moustafa, Kim-Kwang Raymond Choo, Ibrahim Radwan, Seyit Camtepe:
Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog. IEEE Trans. Inf. Forensics Secur. 14(8): 1975-1987 (2019) - [j293]Fran Casino, Kim-Kwang Raymond Choo, Constantinos Patsakis:
HEDGE: Efficient Traffic Classification of Encrypted and Compressed Packets. IEEE Trans. Inf. Forensics Secur. 14(11): 2916-2926 (2019) - [j292]Amritpal Singh, Sahil Garg, Kuljeet Kaur, Shalini Batra, Neeraj Kumar, Kim-Kwang Raymond Choo:
Fuzzy-Folded Bloom Filter-as-a-Service for Big Data Storage in the Cloud. IEEE Trans. Ind. Informatics 15(4): 2338-2348 (2019) - [j291]Vishal Sharma, Ilsun You, Dushantha Nalin K. Jayakody, Daniel Gutiérrez-Reina, Kim-Kwang Raymond Choo:
Neural-Blockchain-Based Ultrareliable Caching for Edge-Enabled UAV Networks. IEEE Trans. Ind. Informatics 15(10): 5723-5736 (2019) - [j290]Ruhul Amin, SK Hafizul Islam, Prosanta Gope, Kim-Kwang Raymond Choo, Nachiket Tapas:
Anonymity Preserving and Lightweight Multimedical Server Authentication Protocol for Telecare Medical Information System. IEEE J. Biomed. Health Informatics 23(4): 1749-1759 (2019) - [j289]Sharaj Panwar, Paul Rad, Kim-Kwang Raymond Choo, Mehdi Roopaei:
Are you emotional or depressed? Learning about your emotional state from your music using machine learning. J. Supercomput. 75(6): 2986-3009 (2019) - [j288]Amin Azmoodeh, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning. IEEE Trans. Sustain. Comput. 4(1): 88-95 (2019) - [j287]Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda, Mohd Taufik Abdullah:
Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study. IEEE Trans. Sustain. Comput. 4(2): 204-216 (2019) - [j286]Lei Zhang, Mingxing Luo, Jiangtao Li, Man Ho Au, Kim-Kwang Raymond Choo, Tong Chen, Shengwei Tian:
Blockchain based secure data sharing system for Internet of vehicles: A position paper. Veh. Commun. 16: 85-93 (2019) - [j285]Xiaoying Jia, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo:
Authenticated key agreement scheme for fog-driven IoT healthcare system. Wirel. Networks 25(8): 4737-4750 (2019) - 2018
- [j284]Zuming Shen, Peng Zeng, Yuyin Qian, Kim-Kwang Raymond Choo:
A Secure and Practical RFID Ownership Transfer Protocol Based on Chebyshev Polynomials. IEEE Access 6: 14560-14566 (2018) - [j283]Guofeng Wang, Chuanyi Liu, Yingfei Dong, Kim-Kwang Raymond Choo, Peiyi Han, Hezhong Pan, Binxing Fang:
Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems. IEEE Access 6: 21828-21839 (2018) - [j282]Chao Lin, Debiao He, Xinyi Huang, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems. IEEE Access 6: 28203-28212 (2018) - [j281]Sheng Zhong, Wei Ren, Tianqing Zhu, Yi Ren, Kim-Kwang Raymond Choo:
Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt. IEEE Access 6: 37850-37857 (2018) - [j280]Bo Wang, Shaohua Wan, Xiujun Zhang, Kim-Kwang Raymond Choo:
A Novel Index for Assessing the Robustness of Integrated Electrical Network and a Natural Gas Network. IEEE Access 6: 40400-40410 (2018) - [j279]Darren Quick, Kim-Kwang Raymond Choo:
IoT Device Forensics and Data Reduction. IEEE Access 6: 47566-47574 (2018) - [j278]Simin Li, Wei Ren, Tianqing Zhu, Kim-Kwang Raymond Choo:
Lico: A Lightweight Access Control Model for Inter-Networking Linkages. IEEE Access 6: 51748-51755 (2018) - [j277]Rixin Xu, Liehuang Zhu, An Wang, Xiaojiang Du, Kim-Kwang Raymond Choo, Guoshuang Zhang, Keke Gai:
Side-Channel Attack on a Protected RFID Card. IEEE Access 6: 58395-58404 (2018) - [j276]Peng Zeng, Kim-Kwang Raymond Choo:
A New Kind of Conditional Proxy Re-Encryption for Secure Cloud Storage. IEEE Access 6: 70017-70024 (2018) - [j275]Debiao He, Kim-Kwang Raymond Choo, Neeraj Kumar, Aniello Castiglione:
IEEE Access Special Section Editorial: Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies. IEEE Access 6: 72033-72036 (2018) - [j274]Xiaoying Jia, Debiao He, Qin Liu, Kim-Kwang Raymond Choo:
An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment. Ad Hoc Networks 71: 78-87 (2018) - [j273]Yizhi Ren, Xiangyu Chen, Zhen Wang, Benyun Shi, Guanghai Cui, Ting Wu, Kim-Kwang Raymond Choo:
Neighbor-considered migration facilitates cooperation in prisoner's dilemma games. Appl. Math. Comput. 323: 95-105 (2018) - [j272]Zhiyong Zhang, Kim-Kwang Raymond Choo, Arun Kumar Sangaiah, Liang Chen:
Crowd computing for social media ecosystems. Appl. Soft Comput. 66: 492-494 (2018) - [j271]Fang-Yie Leu, Chia-Yin Ko, Ilsun You, Kim-Kwang Raymond Choo, Chi-Lun Ho:
A smartphone-based wearable sensors for monitoring real-time physiological data. Comput. Electr. Eng. 65: 376-392 (2018) - [j270]Fuhong Lin, Yutong Zhou, Xingshuo An, Ilsun You, Kim-Kwang Raymond Choo:
Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices. IEEE Consumer Electron. Mag. 7(6): 45-50 (2018) - [j269]Alireza Heravi, Sameera Mubarak, Kim-Kwang Raymond Choo:
Information privacy in online social networks: Uses and gratification perspective. Comput. Hum. Behav. 84: 441-459 (2018) - [j268]Siyuan Chen, Peng Zeng, Kim-Kwang Raymond Choo, Xiaolei Dong:
Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols. Comput. J. 61(4): 545-560 (2018) - [j267]Christian Esposito, Alfredo De Santis, Genny Tortora, Henry Chang, Kim-Kwang Raymond Choo:
Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy? IEEE Cloud Comput. 5(1): 31-37 (2018) - [j266]Christian Esposito, Francesco Palmieri, Kim-Kwang Raymond Choo:
Cloud Message Queueing and Notification: Challenges and Opportunities. IEEE Cloud Comput. 5(2): 11-16 (2018) - [j265]Marcello Cinque, Stefano Russo, Christian Esposito, Kim-Kwang Raymond Choo, Frederica Free-Nelson, Charles A. Kamhoua:
Cloud Reliability: Possible Sources of Security and Legal Issues? IEEE Cloud Comput. 5(3): 31-38 (2018) - [j264]David A. Maluf, Raghuram S. Sudhaakar, Kim-Kwang Raymond Choo:
Trust Erosion: Dealing with Unknown-Unknowns in Cloud Security. IEEE Cloud Comput. 5(4): 24-32 (2018) - [j263]Silvio Barra, Kim-Kwang Raymond Choo, Michele Nappi, Arcangelo Castiglione, Fabio Narducci, Rajiv Ranjan:
Biometrics-as-a-Service: Cloud-Based Technology, Systems, and Applications. IEEE Cloud Comput. 5(4): 33-37 (2018) - [j262]Silvio Barra, Aniello Castiglione, Maria De Marsico, Michele Nappi, Kim-Kwang Raymond Choo:
Cloud-Based Biometrics (Biometrics as a Service) for Smart Cities, Nations, and Beyond. IEEE Cloud Comput. 5(5): 92-100 (2018) - [j261]Keke Gai, Kim-Kwang Raymond Choo, Liehuang Zhu:
Blockchain-Enabled Reengineering of Cloud Datacenters. IEEE Cloud Comput. 5(6): 21-25 (2018) - [j260]Adam J. Brown, William Bradley Glisson, Todd R. Andel, Kim-Kwang Raymond Choo:
Cloud forecasting: Legal visibility issues in saturated environments. Comput. Law Secur. Rev. 34(6): 1278-1290 (2018) - [j259]Chao Shen, Weiqin Tong, Kim-Kwang Raymond Choo, Samina Kausar:
Performance prediction of parallel computing models to analyze cloud-based big data applications. Clust. Comput. 21(2): 1439-1454 (2018) - [j258]Chao Lin, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Alexey V. Vinel, Xinyi Huang:
Security and Privacy for the Internet of Drones: Challenges and Solutions. IEEE Commun. Mag. 56(1): 64-69 (2018) - [j257]Zhe Liu, Kim-Kwang Raymond Choo, Johann Großschädl:
Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography. IEEE Commun. Mag. 56(2): 158-162 (2018) - [j256]Neeraj Kumar, Joel J. P. C. Rodrigues, Mohsen Guizani, Kim-Kwang Raymond Choo, Rongxing Lu, Christos V. Verikoukis, Zhimeng Zhong:
Achieving Energy Efficiency and Sustainability in Edge/Fog Deployment. IEEE Commun. Mag. 56(5): 20-21 (2018) - [j255]Quang Do, Ben Martini, Kim-Kwang Raymond Choo:
Cyber-physical systems information gathering: A smart home case study. Comput. Networks 138: 1-12 (2018) - [j254]Adeel Anjum, Saif Ur Rehman Malik, Kim-Kwang Raymond Choo, Abid Khan, Asma Haroon, Sangeen Khan, Samee U. Khan, Naveed Ahmad, Basit Raza:
An efficient privacy mechanism for electronic health records. Comput. Secur. 72: 196-211 (2018) - [j253]Kim-Kwang Raymond Choo, Matt Bishop, William Bradley Glisson, Kara L. Nance:
Internet- and cloud-of-things cybersecurity research challenges and advances. Comput. Secur. 74: 275-276 (2018) - [j252]Daniel Bradford Miller, William Bradley Glisson, Mark Yampolskiy, Kim-Kwang Raymond Choo:
Identifying 3D printer residual data via open-source documentation. Comput. Secur. 75: 10-23 (2018) - [j251]Andeep S. Toor, Harry Wechsler, Michele Nappi, Kim-Kwang Raymond Choo:
Visual Question Authentication Protocol (VQAP). Comput. Secur. 76: 285-294 (2018) - [j250]Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo:
CloudMe forensics: A case of big data forensic investigation. Concurr. Comput. Pract. Exp. 30(5) (2018) - [j249]Mandrita Banerjee, Junghee Lee, Kim-Kwang Raymond Choo:
A blockchain future for internet of things security: a position paper. Digit. Commun. Networks 4(3): 149-160 (2018) - [j248]Arie Kouwen, Mark Scanlon, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
Digital forensic investigation of two-way radio communication equipment and services. Digit. Investig. 26 Supplement: S77-S86 (2018) - [j247]Jitendra Kumar Rout, Kim-Kwang Raymond Choo, Amiya Kumar Dash, Sambit Bakshi, Sanjay Kumar Jena, Karen L. Williams:
A model for sentiment and emotion analysis of unstructured social media text. Electron. Commer. Res. 18(1): 181-199 (2018) - [j246]Qianwen Pei, Burong Kang, Lei Zhang, Kim-Kwang Raymond Choo, Yuanfei Zhang, Yinxia Sun:
Secure and privacy-preserving 3D vehicle positioning schemes for vehicular ad hoc network. EURASIP J. Wirel. Commun. Netw. 2018: 271 (2018) - [j245]Yan Hu, Shanshan Wang, Yizhi Ren, Kim-Kwang Raymond Choo:
User influence analysis for Github developer social networks. Expert Syst. Appl. 108: 108-118 (2018) - [j244]JiLiang Li, WeiGuo Zhang, Saru Kumari, Kim-Kwang Raymond Choo, Dieter Hogrefe:
Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps. Trans. Emerg. Telecommun. Technol. 29(6) (2018) - [j243]Rong Jiang, Rongxing Lu, Kim-Kwang Raymond Choo:
Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data. Future Gener. Comput. Syst. 78: 392-401 (2018) - [j242]Darren Quick, Kim-Kwang Raymond Choo:
Digital forensic intelligence: Data subsets and Open Source Intelligence (DFINT+OSINT): A timely and cohesive mix. Future Gener. Comput. Syst. 78: 558-567 (2018) - [j241]Kim-Kwang Raymond Choo, Rongxing Lu, Liqun Chen, Xun Yi:
A foggy research future: Advances and future opportunities in fog computing research. Future Gener. Comput. Syst. 78: 677-679 (2018) - [j240]Christian Javier D'Orazio, Kim-Kwang Raymond Choo:
Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps. Future Gener. Comput. Syst. 79: 247-261 (2018) - [j239]Huaqun Wang, Debiao He, Yanfei Sun, Neeraj Kumar, Kim-Kwang Raymond Choo:
PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds. Future Gener. Comput. Syst. 79: 262-270 (2018) - [j238]Lu Zhou, Youwen Zhu, Kim-Kwang Raymond Choo:
Efficiently and securely harnessing cloud to solve linear regression and other matrix operations. Future Gener. Comput. Syst. 81: 404-413 (2018) - [j237]Wenyin Yang, Guojun Wang, Kim-Kwang Raymond Choo, Shuhong Chen:
HEPart: A balanced hypergraph partitioning algorithm for big data applications. Future Gener. Comput. Syst. 83: 250-268 (2018) - [j236]Kim-Kwang Raymond Choo, Yongtang Shi, Zengqiang Chen:
Measurements and security of complex networks and systems: Research advances and challenges. Future Gener. Comput. Syst. 83: 374-375 (2018) - [j235]Xiong Li, Jianwei Niu, Saru Kumari, Fan Wu, Kim-Kwang Raymond Choo:
A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city. Future Gener. Comput. Syst. 83: 607-618 (2018) - [j234]Zitao Chen, Wei Ren, Yi Ren, Kim-Kwang Raymond Choo:
LiReK: A lightweight and real-time key establishment scheme for wearable embedded devices by gestures or motions. Future Gener. Comput. Syst. 84: 126-138 (2018) - [j233]Hamed Haddad Pajouh, Ali Dehghantanha, Raouf Khayami, Kim-Kwang Raymond Choo:
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting. Future Gener. Comput. Syst. 85: 88-96 (2018) - [j232]Shaobo Zhang, Kim-Kwang Raymond Choo, Qin Liu, Guojun Wang:
Enhancing privacy through uniform grid and caching in location-based services. Future Gener. Comput. Syst. 86: 881-892 (2018) - [j231]Jining Yan, Yan Ma, Lizhe Wang, Kim-Kwang Raymond Choo, Wei Jie:
A cloud-based remote sensing data production system. Future Gener. Comput. Syst. 86: 1154-1166 (2018) - [j230]Masoom Alam, Naina Emmanuel, Tanveer Khan, Abid Khan, Nadeem Javaid, Kim-Kwang Raymond Choo, Rajkumar Buyya:
Secure policy execution using reusable garbled circuit in the cloud. Future Gener. Comput. Syst. 87: 488-501 (2018) - [j229]Lu Zhou, Chunhua Su, Xin Sun, Xishun Zhao, Kim-Kwang Raymond Choo:
Stag hunt and trust emergence in social networks. Future Gener. Comput. Syst. 88: 168-172 (2018) - [j228]Jun Song, Kun Gao, Xinyang Shen, Xiaotian Qi, Rui Liu, Kim-Kwang Raymond Choo:
QRFence: A flexible and scalable QR link security detection framework for Android devices. Future Gener. Comput. Syst. 88: 663-674 (2018) - [j227]Xiaoying Jia, Neeraj Kumar, Kim-Kwang Raymond Choo, Debiao He:
Efficient revocable ID-based encryption with cloud revocation server. Int. J. Commun. Syst. 31(1) (2018) - [j226]Zheng Xu, Lin Mei, Kim-Kwang Raymond Choo, Zhihan Lv, Chuanping Hu, Xiangfeng Luo, Yunhuai Liu:
Mobile crowd sensing of human-like intelligence using social sensors: A survey. Neurocomputing 279: 3-10 (2018) - [j225]Xiong Li, Jieyao Peng, Jianwei Niu, Fan Wu, Junguo Liao, Kim-Kwang Raymond Choo:
A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things. IEEE Internet Things J. 5(3): 1606-1615 (2018) - [j224]Gregory Epiphaniou, Petros Karadimas, Dhouha Kbaier Ben Ismail, Haider M. Al-Khateeb, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks. IEEE Internet Things J. 5(4): 2496-2505 (2018) - [j223]Seyed Ali Miraftabzadeh, Paul Rad, Kim-Kwang Raymond Choo, Mo M. Jamshidi:
A Privacy-Aware Architecture at the Edge for Autonomous Real-Time Identity Reidentification in Crowds. IEEE Internet Things J. 5(4): 2936-2946 (2018) - [j222]Keke Gai, Kim-Kwang Raymond Choo, Meikang Qiu, Liehuang Zhu:
Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things. IEEE Internet Things J. 5(4): 3059-3067 (2018) - [j221]Yudi Zhang, Debiao He, Sherali Zeadally, Ding Wang, Kim-Kwang Raymond Choo:
Efficient and Provably Secure Distributed Signing Protocol for Mobile Devices in Wireless Networks. IEEE Internet Things J. 5(6): 5271-5280 (2018) - [j220]Charith Perera, Mahmoud Barhamgi, Suparna De, Tim Baarslag, Massimo Vecchio, Kim-Kwang Raymond Choo:
Designing the Sensing as a Service Ecosystem for the Internet of Things. IEEE Internet Things Mag. 1(2): 18-23 (2018) - [j219]Fakhruddin Muhammad Mahbub Ul Islam, Man Lin, Laurence T. Yang, Kim-Kwang Raymond Choo:
Task aware hybrid DVFS for multi-core real-time systems using machine learning. Inf. Sci. 433-434: 315-332 (2018) - [j218]Yinbin Miao, Jian Weng, Ximeng Liu, Kim-Kwang Raymond Choo, Zhiquan Liu, Hongwei Li:
Enabling verifiable multiple keywords search over encrypted cloud data. Inf. Sci. 465: 21-37 (2018) - [j217]Feng Zhang, Victor E. Lee, Kim-Kwang Raymond Choo:
Jo-DPMF: Differentially private matrix factorization learning through joint optimization. Inf. Sci. 467: 271-281 (2018) - [j216]Amin Azmoodeh, Ali Dehghantanha, Mauro Conti, Kim-Kwang Raymond Choo:
Detecting crypto-ransomware in IoT networks based on energy consumption footprint. J. Ambient Intell. Humaniz. Comput. 9(4): 1141-1152 (2018) - [j215]Xiong Li, Jianwei Niu, Saru Kumari, Fan Wu, Arun Kumar Sangaiah, Kim-Kwang Raymond Choo:
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J. Netw. Comput. Appl. 103: 194-204 (2018) - [j214]Ruhul Amin, SK Hafizul Islam, Neeraj Kumar, Kim-Kwang Raymond Choo:
An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks. J. Netw. Comput. Appl. 104: 133-144 (2018) - [j213]Chao Lin, Debiao He, Xinyi Huang, Kim-Kwang Raymond Choo, Athanasios V. Vasilakos:
BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J. Netw. Comput. Appl. 116: 42-52 (2018) - [j212]Aparna Kumari, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar, Michele Maasberg, Kim-Kwang Raymond Choo:
Multimedia big data computing and Internet of Things applications: A taxonomy and process model. J. Netw. Comput. Appl. 124: 169-195 (2018) - [j211]Zhiyong Zhang, Kim-Kwang Raymond Choo, Brij B. Gupta:
The convergence of new computing paradigms and big data analytics methodologies for online social networks. J. Comput. Sci. 26: 453-455 (2018) - [j210]Shunxiang Zhang, Wenjuan Liu, XiaoLu Deng, Zheng Xu, Kim-Kwang Raymond Choo:
Micro-blog topic recommendation based on knowledge flow and user selection. J. Comput. Sci. 26: 512-521 (2018) - [j209]Dennis Kiwia, Ali Dehghantanha, Kim-Kwang Raymond Choo, Jim Slaughter:
A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence. J. Comput. Sci. 27: 394-409 (2018) - [j208]Libing Wu, Biwen Chen, Kim-Kwang Raymond Choo, Debiao He:
Efficient and secure searchable encryption protocol for cloud-based Internet of Things. J. Parallel Distributed Comput. 111: 152-161 (2018) - [j207]Hang Zhou, Qing Li, Kim-Kwang Raymond Choo, Hai Zhu:
DADTA: A novel adaptive strategy for energy and performance efficient virtual machine consolidation. J. Parallel Distributed Comput. 121: 15-26 (2018) - [j206]Yingmo Jie, Xinyu Tang, Kim-Kwang Raymond Choo, Shenghao Su, Mingchu Li, Cheng Guo:
Online task scheduling for edge computing based on repeated stackelberg game. J. Parallel Distributed Comput. 122: 159-172 (2018) - [j205]Zhihan Lv, Xiaoming Li, Kim-Kwang Raymond Choo:
E-government multimedia big data platform for disaster management. Multim. Tools Appl. 77(8): 10077-10089 (2018) - [j204]Xiaoying Jia, Debiao He, Li Li, Kim-Kwang Raymond Choo:
Signature-based three-factor authenticated key exchange for internet of things applications. Multim. Tools Appl. 77(14): 18355-18382 (2018) - [j203]Tian Tian, Lang Gao, Weijing Song, Kim-Kwang Raymond Choo, Jijun He:
Feature extraction and classification of VHR images with attribute profiles and convolutional neural networks. Multim. Tools Appl. 77(14): 18637-18656 (2018) - [j202]Shanshan Ge, Peng Zeng, Rongxing Lu, Kim-Kwang Raymond Choo:
FGDA: Fine-grained data analysis in privacy-preserving smart grid communications. Peer-to-Peer Netw. Appl. 11(5): 966-978 (2018) - [j201]Yunru Zhang, Min Luo, Kim-Kwang Raymond Choo, Debiao He:
A General Architecture for Multiserver Authentication Key Agreement with Provable Security. Secur. Commun. Networks 2018: 2462901:1-2462901:9 (2018) - [j200]Zhenxing Qian, Kim-Kwang Raymond Choo, Rémi Cogranne, Xinpeng Zhang:
Multimedia Security: Novel Steganography and Privacy Preserving. Secur. Commun. Networks 2018: 6390945:1-6390945:2 (2018) - [j199]Zheng Yan, Yuqing Zhang, Kim-Kwang Raymond Choo, Yang Xiang:
Security Measurements of Cyber Networks. Secur. Commun. Networks 2018: 6545314:1-6545314:3 (2018) - [j198]Li Li, Siqin Zhou, Kim-Kwang Raymond Choo, Xiaohong Li, Debiao He:
An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System. Secur. Commun. Networks 2018: 7524102:1-7524102:11 (2018) - [j197]Hong Ding, Yao Zhang, Yizhi Ren, Benyun Shi, Kim-Kwang Raymond Choo:
Heterogeneous investment in spatial public goods game with mixed strategy. Soft Comput. 22(4): 1287-1294 (2018) - [j196]Vangipuram Radhakrishna, Shadi A. Aljawarneh, Puligadda Veereswara Kumar, Kim-Kwang Raymond Choo:
A novel fuzzy gaussian-based dissimilarity measure for discovering similarity temporal association patterns. Soft Comput. 22(6): 1903-1919 (2018) - [j195]Mohammad Reza Jabbarpour, Houman Zarrabi, Rashid Hafeez Khokhar, Shahaboddin Shamshirband, Kim-Kwang Raymond Choo:
Applications of computational intelligence in vehicle traffic congestion problem: a survey. Soft Comput. 22(7): 2299-2320 (2018) - [j194]Lizhe Wang, Peng Liu, Weijing Song, Kim-Kwang Raymond Choo:
DUK-SVD: dynamic dictionary updating for sparse representation of a long-time remote sensing image sequence. Soft Comput. 22(10): 3331-3342 (2018) - [j193]Zheng Xu, Xiangfeng Luo, Yunhuai Liu, Kim-Kwang Raymond Choo, Vijayan Sugumaran, Neil Y. Yen, Lin Mei, Chuanping Hu:
From Latency, Through Outbreak, to Decline: Detecting Different States of Emergency Events Using Web Resources. IEEE Trans. Big Data 4(2): 245-257 (2018) - [j192]Mehran Mozaffari Kermani, Amir Jalali, Reza Azarderakhsh, Jiafeng Xie, Kim-Kwang Raymond Choo:
Reliable Inversion in GF(28) With Redundant Arithmetic for Secure Error Detection of Cryptographic Architectures. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(3): 696-704 (2018) - [j191]Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Rongxing Lu, Jian Weng:
Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers. IEEE Trans. Dependable Secur. Comput. 15(1): 27-39 (2018) - [j190]Debiao He, Neeraj Kumar, Huaqun Wang, Lina Wang, Kim-Kwang Raymond Choo, Alexey V. Vinel:
A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network. IEEE Trans. Dependable Secur. Comput. 15(4): 633-645 (2018) - [j189]Mimi Ma, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Jianhua Chen:
Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things. IEEE Trans. Ind. Informatics 14(2): 759-767 (2018) - [j188]Kim-Kwang Raymond Choo, Stefanos Gritzalis, Jong Hyuk Park:
Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities. IEEE Trans. Ind. Informatics 14(8): 3567-3569 (2018) - [j187]Ashok Kumar Das, Mohammad Wazid, Neeraj Kumar, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, YoungHo Park:
Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment. IEEE J. Biomed. Health Informatics 22(4): 1310-1322 (2018) - [j186]Weizhi Meng, Kim-Kwang Raymond Choo, Steven Furnell, Athanasios V. Vasilakos, Christian W. Probst:
Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks. IEEE Trans. Netw. Serv. Manag. 15(2): 761-773 (2018) - [j185]Libing Wu, Yubo Zhang, Kim-Kwang Raymond Choo, Debiao He:
Efficient Identity-Based Encryption Scheme with Equality Test in Smart City. IEEE Trans. Sustain. Comput. 3(1): 44-55 (2018) - [j184]He Fang, Li Xu, Yulong Zou, Xianbin Wang, Kim-Kwang Raymond Choo:
Three-Stage Stackelberg Game for Defending Against Full-Duplex Active Eavesdropping Attacks in Cooperative Communication. IEEE Trans. Veh. Technol. 67(11): 10788-10799 (2018) - [j183]JiLiang Li, Kim-Kwang Raymond Choo, WeiGuo Zhang, Saru Kumari, Joel J. P. C. Rodrigues, Muhammad Khurram Khan, Dieter Hogrefe:
EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks. Veh. Commun. 13: 104-113 (2018) - [j182]Hamed Haddad Pajouh, Ali Dehghantanha, Raouf Khayami, Kim-Kwang Raymond Choo:
Intelligent OS X malware threat detection with code inspection. J. Comput. Virol. Hacking Tech. 14(3): 213-223 (2018) - [j181]Yunru Zhang, Debiao He, Kim-Kwang Raymond Choo:
BaDS: Blockchain-Based Architecture for Data Sharing with ABS and CP-ABE in IoT. Wirel. Commun. Mob. Comput. 2018: 2783658:1-2783658:9 (2018) - [j180]Ding Wang, Jian Shen, Joseph K. Liu, Kim-Kwang Raymond Choo:
Rethinking Authentication on Smart Mobile Devices. Wirel. Commun. Mob. Comput. 2018: 7079037:1-7079037:4 (2018) - [j179]Ximeng Liu, Yang Yang, Kim-Kwang Raymond Choo, Huaqun Wang:
Security and Privacy Challenges for Internet-of-Things and Fog Computing. Wirel. Commun. Mob. Comput. 2018: 9373961:1-9373961:3 (2018) - 2017
- [j178]Jitendra Kumar Rout, Anmol Dalmia, Kim-Kwang Raymond Choo, Sambit Bakshi, Sanjay Kumar Jena:
Revisiting Semi-Supervised Learning for Online Deceptive Review Detection. IEEE Access 5: 1319-1327 (2017) - [j177]Vanga Odelu, Ashok Kumar Das, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, Minho Jo:
Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts. IEEE Access 5: 3273-3283 (2017) - [j176]Min Luo, Xiaotong Zhou, Li Li, Kim-Kwang Raymond Choo, Debiao He:
Security Analysis of Two Password-Authenticated Multi-Key Exchange Protocols. IEEE Access 5: 8017-8024 (2017) - [j175]Opeyemi A. Osanaiye, Shuo Chen, Zheng Yan, Rongxing Lu, Kim-Kwang Raymond Choo, Mqhele E. Dlodlo:
From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework. IEEE Access 5: 8284-8300 (2017) - [j174]Yan Hu, Weiqiang Kong, Yizhi Ren, Kim-Kwang Raymond Choo:
A Branch History Directed Heuristic Search for Effective Binary Level Dynamic Symbolic Execution. IEEE Access 5: 8752-8762 (2017) - [j173]Luuc Van Der Horst, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
Process Memory Investigation of the Bitcoin Clients Electrum and Bitcoin Core. IEEE Access 5: 22385-22398 (2017) - [j172]Arafat Mohammed Rashad Al-Dhaqm, Shukor Abd Razak, Siti Hajar Othman, Kim-Kwang Raymond Choo, William Bradley Glisson, Abdul-Rahman Al-Ali, Mohammad Al-Rousan:
CDBFIP: Common Database Forensic Investigation Processes for Internet of Things. IEEE Access 5: 24401-24416 (2017) - [j171]Vanga Odelu, Ashok Kumar Das, Kim-Kwang Raymond Choo, Neeraj Kumar, Youngho Park:
Efficient and Secure Time-Key Based Single Sign-On Authentication for Mobile Devices. IEEE Access 5: 27707-27721 (2017) - [j170]Weiyao Lin, Zheng Xu, Yunhuai Liu, Neil Y. Yen, Kim-Kwang Raymond Choo, Vijayan Sugumaran:
IEEE Access Special Section Editorial: Intelligent Sensing On Mobile and Social Media Analytics. IEEE Access 5: 27841-27844 (2017) - [j169]Christian Javier D'Orazio, Rongxing Lu, Kim-Kwang Raymond Choo, Athanasios V. Vasilakos:
A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps. Appl. Math. Comput. 293: 523-544 (2017) - [j168]He Fang, Li Xu, Kim-Kwang Raymond Choo:
Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks. Appl. Math. Comput. 296: 153-167 (2017) - [j167]Debiao He, Neeraj Kumar, Huaqun Wang, Lina Wang, Kim-Kwang Raymond Choo:
Privacy-preserving certificateless provable data possession scheme for big data storage on cloud. Appl. Math. Comput. 314: 31-43 (2017) - [j166]Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Laurence T. Yang:
Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study. Comput. Electr. Eng. 58: 350-363 (2017) - [j165]Xiong Li, Jieyao Peng, Saru Kumari, Fan Wu, Marimuthu Karuppiah, Kim-Kwang Raymond Choo:
An enhanced 1-round authentication protocol for wireless body area networks with user anonymity. Comput. Electr. Eng. 61: 238-249 (2017) - [j164]Nikola Milosevic, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Machine learning aided Android malware classification. Comput. Electr. Eng. 61: 266-274 (2017) - [j163]Debiao He, Kim-Kwang Raymond Choo, Neeraj Kumar:
Introduction to the Special Section on Security and Privacy in Wearable and Embedded Technologies. Comput. Electr. Eng. 63: 157-159 (2017) - [j162]Muhammad Muneer Umar, Amjad Mehmood, Houbing Song, Kim-Kwang Raymond Choo:
I-Marks: An iris code embedding system for ownership identification of multimedia content. Comput. Electr. Eng. 63: 209-219 (2017) - [j161]Mehdi Roopaei, Paul Rad, Kim-Kwang Raymond Choo:
Cloud of Things in Smart Agriculture: Intelligent Irrigation Monitoring by Thermal Imaging. IEEE Cloud Comput. 4(1): 10-15 (2017) - [j160]Christian Esposito, Aniello Castiglione, Florin Pop, Kim-Kwang Raymond Choo:
Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective. IEEE Cloud Comput. 4(2): 13-17 (2017) - [j159]Kim-Kwang Raymond Choo, Christian Esposito, Aniello Castiglione:
Evidence and Forensics in the Cloud: Challenges and Future Research Directions. IEEE Cloud Comput. 4(3): 14-19 (2017) - [j158]Aniello Castiglione, Kim-Kwang Raymond Choo, Michele Nappi, Fabio Narducci:
Biometrics in the Cloud: Challenges and Research Opportunities. IEEE Cloud Comput. 4(4): 12-17 (2017) - [j157]Aniello Castiglione, Kim-Kwang Raymond Choo, Michele Nappi, Stefano Ricciardi:
Context Aware Ubiquitous Biometrics in Edge of Military Things. IEEE Cloud Comput. 4(6): 16-20 (2017) - [j156]Cheng Huang, Rongxing Lu, Kim-Kwang Raymond Choo:
Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges. IEEE Commun. Mag. 55(11): 105-111 (2017) - [j155]Xiong Li, Maged Hamada Ibrahim, Saru Kumari, Arun Kumar Sangaiah, Vidushi Gupta, Kim-Kwang Raymond Choo:
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput. Networks 129: 429-443 (2017) - [j154]Shiwen Zhang, Yaping Lin, Qin Liu, Junqiang Jiang, Bo Yin, Kim-Kwang Raymond Choo:
Secure hitch in location based social networks. Comput. Commun. 100: 65-77 (2017) - [j153]He Fang, Li Xu, Jie Li, Kim-Kwang Raymond Choo:
An adaptive trust-Stackelberg game model for security and energy efficiency in dynamic cognitive radio networks. Comput. Commun. 105: 124-132 (2017) - [j152]Weizhi Meng, Wenjuan Li, Lam-for Kwok, Kim-Kwang Raymond Choo:
Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones. Comput. Secur. 65: 213-229 (2017) - [j151]Zhe Liu, Kim-Kwang Raymond Choo, Minghao Zhao:
Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions. Comput. Secur. 69: 97-113 (2017) - [j150]Brett Eterovic-Soric, Kim-Kwang Raymond Choo, Helen Ashman, Sameera Mubarak:
Stalking the stalkers - detecting and deterring stalking behaviours using technology: A review. Comput. Secur. 70: 278-289 (2017) - [j149]Cristina Alcaraz, Javier López, Kim-Kwang Raymond Choo:
Resilient interconnection in cyber-physical control systems. Comput. Secur. 71: 2-14 (2017) - [j148]Shasi Pokharel, Kim-Kwang Raymond Choo, Jixue Liu:
Can Android VoIP voice conversations be decoded? I can eavesdrop on your Android VoIP communication. Concurr. Comput. Pract. Exp. 29(7) (2017) - [j147]Niken Dwi Wahyu Cahyani, Ben Martini, Kim-Kwang Raymond Choo, AKBP Muhammad Nuh Al-Azhar:
Forensic data acquisition from cloud-of-things devices: windows Smartphones as a case study. Concurr. Comput. Pract. Exp. 29(14) (2017) - [j146]Nurul Hidayah Ab Rahman, Niken Dwi Wahyu Cahyani, Kim-Kwang Raymond Choo:
Cloud incident handling and forensic-by-design: cloud storage as a case study. Concurr. Comput. Pract. Exp. 29(14) (2017) - [j145]Jian Peng, Sam Detchon, Kim-Kwang Raymond Choo, Helen Ashman:
Astroturfing detection in social media: a binary n-gram-based approach. Concurr. Comput. Pract. Exp. 29(17) (2017) - [j144]Ala' F. A. Aburumman, Wei Jye Seo, Christian Esposito, Aniello Castiglione, Md. Rafiqul Islam, Kim-Kwang Raymond Choo:
A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j143]Saru Kumari, Ashok Kumar Das, Mohammad Wazid, Xiong Li, Fan Wu, Kim-Kwang Raymond Choo, Muhammad Khurram Khan:
On the design of a secure user authentication and key agreement scheme for wireless sensor networks. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j142]Shasi Pokharel, Kim-Kwang Raymond Choo, Jixue Liu:
Mobile cloud security: An adversary model for lightweight browser security. Comput. Stand. Interfaces 49: 71-78 (2017) - [j141]Vanga Odelu, Ashok Kumar Das, Y. Sreenivasa Rao, Saru Kumari, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Comput. Stand. Interfaces 54: 3-9 (2017) - [j140]Wei Ren, Ran Liu, Min Lei, Kim-Kwang Raymond Choo:
SeGoAC: A tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing. Comput. Stand. Interfaces 54: 29-35 (2017) - [j139]Geong Sen Poh, Ji-Jian Chin, Wei-Chuen Yau, Kim-Kwang Raymond Choo, Moesfa Soeheila Mohamad:
Searchable Symmetric Encryption: Designs and Challenges. ACM Comput. Surv. 50(3): 40:1-40:37 (2017) - [j138]Kai Shi, Ming Xu, Haoxia Jin, Tong Qiao, Xue Yang, Ning Zheng, Jian Xu, Kim-Kwang Raymond Choo:
A novel file carving algorithm for National Marine Electronics Association (NMEA) logs in GPS forensics. Digit. Investig. 23: 11-21 (2017) - [j137]Saru Kumari, Xiong Li, Fan Wu, Ashok Kumar Das, Kim-Kwang Raymond Choo, Jian Shen:
Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Future Gener. Comput. Syst. 68: 320-330 (2017) - [j136]Libing Wu, Yubo Zhang, Kim-Kwang Raymond Choo, Debiao He:
Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Gener. Comput. Syst. 73: 22-31 (2017) - [j135]Christian Javier D'Orazio, Kim-Kwang Raymond Choo:
A technique to circumvent SSL/TLS validations on iOS devices. Future Gener. Comput. Syst. 74: 366-374 (2017) - [j134]Shengtao Sun, Weijing Song, Albert Y. Zomaya, Yang Xiang, Kim-Kwang Raymond Choo, Tejal Shah, Lizhe Wang:
Associative retrieval in spatial big data based on spreading activation with semantic ontology. Future Gener. Comput. Syst. 76: 499-509 (2017) - [j133]Huakang Li, Zheng Xu, Tao Li, Guozi Sun, Kim-Kwang Raymond Choo:
An optimized approach for massive web page classification using entity similarity based on semantic network. Future Gener. Comput. Syst. 76: 510-518 (2017) - [j132]Yunliang Chen, Lizhe Wang, Fangyuan Li, Bo Du, Kim-Kwang Raymond Choo, Houcine Hassan, Wenjian Qin:
Air quality data clustering using EPLS method. Inf. Fusion 36: 225-232 (2017) - [j131]Christian D'Orazio, Kim-Kwang Raymond Choo, Laurence T. Yang:
Data Exfiltration From Internet of Things Devices: iOS Devices as Case Studies. IEEE Internet Things J. 4(2): 524-535 (2017) - [j130]Zheng Xu, Junyu Xuan, Yunhuai Liu, Kim-Kwang Raymond Choo, Lin Mei, Chuanping Hu:
Building spatial temporal relation graph of concepts pair using web repository. Inf. Syst. Frontiers 19(5): 1029-1038 (2017) - [j129]Libing Wu, Jing Wang, Kim-Kwang Raymond Choo, Yuangang Li, Debiao He:
An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network. J. Inf. Secur. Appl. 37: 112-121 (2017) - [j128]Kim-Kwang Raymond Choo, Jemal H. Abawajy, Md. Rafiqul Islam:
Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions. J. Comput. Syst. Sci. 83(1): 1-2 (2017) - [j127]Cheng Huang, Rongxing Lu, Kim-Kwang Raymond Choo:
Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases. J. Comput. Syst. Sci. 89: 51-63 (2017) - [j126]Yong Ding, Zheng Xu, Jun Ye, Kim-Kwang Raymond Choo:
Secure outsourcing of modular exponentiations under single untrusted programme model. J. Comput. Syst. Sci. 90: 1-13 (2017) - [j125]Weizhi Meng, Wenjuan Li, Yang Xiang, Kim-Kwang Raymond Choo:
A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks. J. Netw. Comput. Appl. 78: 162-169 (2017) - [j124]Darren Quick, Kim-Kwang Raymond Choo:
Pervasive social networking forensics: Intelligence and evidence from mobile device extracts. J. Netw. Comput. Appl. 86: 24-33 (2017) - [j123]Wenyin Yang, Guojun Wang, Md. Zakirul Alam Bhuiyan, Kim-Kwang Raymond Choo:
Hypergraph partitioning for social networks based on information entropy modularity. J. Netw. Comput. Appl. 86: 59-71 (2017) - [j122]Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Jian Shen, Kim-Kwang Raymond Choo, Mohammad Wazid, Ashok Kumar Das:
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J. Netw. Comput. Appl. 89: 72-85 (2017) - [j121]Beibei Li, Rongxing Lu, Wei Wang, Kim-Kwang Raymond Choo:
Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system. J. Parallel Distributed Comput. 103: 32-41 (2017) - [j120]Yunliang Chen, Fangyuan Li, Jia Chen, Bo Du, Kim-Kwang Raymond Choo, Houcine Hassan:
EPLS: A novel feature extraction method for migration data clustering. J. Parallel Distributed Comput. 103: 96-103 (2017) - [j119]Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman, William Bradley Glisson, Kim-Kwang Raymond Choo:
The Role of Mobile Forensics in Terrorism Investigations Involving the Use of Cloud Storage Service and Communication Apps. Mob. Networks Appl. 22(2): 240-254 (2017) - [j118]Zhiyong Zhang, Kim-Kwang Raymond Choo:
Guest Editorial: Multimedia Social Network Security and Applications. Multim. Tools Appl. 76(3): 3163-3168 (2017) - [j117]Abdullah Azfar, Kim-Kwang Raymond Choo, Lin Liu:
Forensic taxonomy of android productivity apps. Multim. Tools Appl. 76(3): 3313-3341 (2017) - [j116]Yu-Chen Hu, Kim-Kwang Raymond Choo, Wu-Lin Chen:
Tamper detection and image recovery for BTC-compressed images. Multim. Tools Appl. 76(14): 15435-15463 (2017) - [j115]Tian Tian, Yun Zhang, Kim-Kwang Raymond Choo, Weijing Song:
A biologically inspired spatio-chromatic feature for color object recognition. Multim. Tools Appl. 76(18): 18731-18747 (2017) - [j114]Nishant Doshi, Saru Kumari, Dheerendra Mishra, Xiong Li, Kim-Kwang Raymond Choo, Arun Kumar Sangaiah:
A password based authentication scheme for wireless multimedia systems. Multim. Tools Appl. 76(24): 25893-25918 (2017) - [j113]Yanjiang Yang, Zhuo Wei, Youcheng Zhang, Haibing Lu, Kim-Kwang Raymond Choo, Haibin Cai:
V2X security: A case study of anonymous authentication. Pervasive Mob. Comput. 41: 259-269 (2017) - [j112]Joseph K. Liu, Kim-Kwang Raymond Choo, Xinyi Huang, Man Ho Au:
Special issue on security and privacy for smart cities. Pers. Ubiquitous Comput. 21(5): 775 (2017) - [j111]Joseph K. Liu, Kim-Kwang Raymond Choo, Xinyi Huang, Man Ho Au:
Erratum to: Special issue on security and privacy for smart cities. Pers. Ubiquitous Comput. 21(5): 777 (2017) - [j110]Guomin Zhou, Peng Zeng, Xiaohui Yuan, Siyuan Chen, Kim-Kwang Raymond Choo:
An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model. Secur. Commun. Networks 2017: 1915239:1-1915239:7 (2017) - [j109]Guomin Zhou, Peng Zeng, Xiaohui Yuan, Siyuan Chen, Kim-Kwang Raymond Choo:
Erratum to "An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model". Secur. Commun. Networks 2017: 2041842:1 (2017) - [j108]Jingyu Hua, An Tang, Qingyun Pan, Kim-Kwang Raymond Choo, Hong Ding, Yizhi Ren:
Practical m-k-Anonymization for Collaborative Data Publishing without Trusted Third Party. Secur. Commun. Networks 2017: 9532163:1-9532163:10 (2017) - [j107]Kuo-Hui Yeh, Chunhua Su, Kim-Kwang Raymond Choo, Wayne Chiu:
A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things. Sensors 17(5): 1001 (2017) - [j106]Lizhe Wang, Jiabin Zhang, Peng Liu, Kim-Kwang Raymond Choo, Fang Huang:
Spectral-spatial multi-feature-based deep learning for hyperspectral remote sensing image classification. Soft Comput. 21(1): 213-221 (2017) - [j105]Peng Liu, Kim-Kwang Raymond Choo, Lizhe Wang, Fang Huang:
SVM or deep learning? A comparative study on remote sensing image classification. Soft Comput. 21(23): 7053-7065 (2017) - [j104]Quang Do, Ben Martini, Kim-Kwang Raymond Choo:
Is the data on your wearable device secure? An Android Wear smartwatch case study. Softw. Pract. Exp. 47(3): 391-403 (2017) - [j103]Jin Liu, Xiao Yu, Zheng Xu, Kim-Kwang Raymond Choo, Liang Hong, Xiaohui Cui:
A cloud-based taxi trace mining framework for smart city. Softw. Pract. Exp. 47(8): 1081-1094 (2017) - [j102]Darren Quick, Kim-Kwang Raymond Choo:
Big forensic data management in heterogeneous distributed systems: quick analysis of multimedia forensic data. Softw. Pract. Exp. 47(8): 1095-1109 (2017) - [j101]Kim-Kwang Raymond Choo, Omer F. Rana, Muttukrishnan Rajarajan:
Cloud Security Engineering: Theory, Practice and Future Research. IEEE Trans. Cloud Comput. 5(3): 372-374 (2017) - [j100]Kim-Kwang Raymond Choo, Mehran Mozaffari Kermani, Reza Azarderakhsh, Manimaran Govindarasu:
Emerging Embedded and Cyber Physical System Security Challenges and Innovations. IEEE Trans. Dependable Secur. Comput. 14(3): 235-236 (2017) - [j99]Kim-Kwang Raymond Choo, Yunsi Fei, Yang Xiang, Yu Yu:
Embedded Device Forensics and Security. ACM Trans. Embed. Comput. Syst. 16(2): 50:1-50:5 (2017) - [j98]Jun Song, Fan Yang, Kim-Kwang Raymond Choo, Zhijian Zhuang, Lizhe Wang:
SIPF: A Secure Installment Payment Framework for Drive-Thru Internet. ACM Trans. Embed. Comput. Syst. 16(2): 52:1-52:18 (2017) - [j97]Zheng Xu, Neil Y. Yen, Hui Zhang, Xiao Wei, Zhihan Lv, Kim-Kwang Raymond Choo, Lin Mei, Xiangfeng Luo:
Social Sensors Based Online Attention Computing of Public Safety Events. IEEE Trans. Emerg. Top. Comput. 5(3): 403-411 (2017) - [j96]Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Wei Wu:
Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System. IEEE Trans. Inf. Forensics Secur. 12(2): 454-464 (2017) - [j95]Quratulain Alam, Saif Ur Rehman Malik, Adnan Akhunzada, Kim-Kwang Raymond Choo, Saher Tabbasum, Masoom Alam:
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification. IEEE Trans. Inf. Forensics Secur. 12(6): 1259-1268 (2017) - [j94]Zheng Xu, Shunxiang Zhang, Kim-Kwang Raymond Choo, Lin Mei, Xiao Wei, Xiangfeng Luo, Chuanping Hu, Yunhuai Liu:
Hierarchy-Cutting Model Based Association Semantic for Analyzing Domain Topic on the Web. IEEE Trans. Ind. Informatics 13(4): 1941-1950 (2017) - [j93]Zhiyan Xu, Libing Wu, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, Debiao He:
A secure and efficient public auditing scheme using RSA algorithm for cloud storage. J. Supercomput. 73(12): 5285-5309 (2017) - [j92]Zheng Xu, Yunhuai Liu, Kim-Kwang Raymond Choo, Neil Y. Yen:
Special Issue on Big Data Analytics and Network Applications for Cyber-Physical Systems Wireless Personal Communications. Wirel. Pers. Commun. 95(3): 1855-1857 (2017) - 2016
- [j91]Victor Prokhorenko, Kim-Kwang Raymond Choo, Helen Ashman:
Context-oriented web application protection model. Appl. Math. Comput. 285: 59-78 (2016) - [j90]Christian Esposito, Aniello Castiglione, Kim-Kwang Raymond Choo:
Encryption-Based Solution for Data Sovereignty in Federated Clouds. IEEE Cloud Comput. 3(1): 12-17 (2016) - [j89]Nurul Hidayah Ab Rahman, William Bradley Glisson, Yanjiang Yang, Kim-Kwang Raymond Choo:
Forensic-by-Design Framework for Cyber-Physical Cloud Systems. IEEE Cloud Comput. 3(1): 50-59 (2016) - [j88]Massimo Ficco, Christian Esposito, Henry Chang, Kim-Kwang Raymond Choo:
Live Migration in Emerging Cloud Paradigms. IEEE Cloud Comput. 3(2): 12-19 (2016) - [j87]Aniello Castiglione, Francesco Palmieri, Kim-Kwang Raymond Choo:
Enhanced Network Support for Federated Cloud Infrastructures. IEEE Cloud Comput. 3(3): 16-23 (2016) - [j86]Christian Esposito, Aniello Castiglione, Ben Martini, Kim-Kwang Raymond Choo:
Cloud Manufacturing: Security, Privacy, and Forensic Concerns. IEEE Cloud Comput. 3(4): 16-22 (2016) - [j85]Christian Esposito, Aniello Castiglione, Kim-Kwang Raymond Choo:
Challenges in Delivering Software in the Cloud as Microservices. IEEE Cloud Comput. 3(5): 10-14 (2016) - [j84]Valentina Casola, Aniello Castiglione, Kim-Kwang Raymond Choo, Christian Esposito:
Healthcare-Related Data in the Cloud: Challenges and Opportunities. IEEE Cloud Comput. 3(6): 10-14 (2016) - [j83]Lingjun Zhao, Lajiao Chen, Rajiv Ranjan, Kim-Kwang Raymond Choo, Jijun He:
Geographical information system parallelization for spatial big data processing: a review. Clust. Comput. 19(1): 139-152 (2016) - [j82]Yan Hu, Jun Yan, Kim-Kwang Raymond Choo:
PEDAL: a dynamic analysis tool for efficient concurrency bug reproduction in big data environment. Clust. Comput. 19(1): 153-166 (2016) - [j81]Darren Quick, Kim-Kwang Raymond Choo:
Big forensic data reduction: digital forensic images and electronic evidence. Clust. Comput. 19(2): 723-740 (2016) - [j80]Christian D'Orazio, Kim-Kwang Raymond Choo:
An adversary model to evaluate DRM protection of video contents on iOS devices. Comput. Secur. 56: 94-110 (2016) - [j79]Zheng Xu, Hui Zhang, Chuanping Hu, Lin Mei, Junyu Xuan, Kim-Kwang Raymond Choo, Vijayan Sugumaran, Yiwei Zhu:
Building knowledge base of urban emergency events based on crowdsourcing of social media. Concurr. Comput. Pract. Exp. 28(15): 4038-4052 (2016) - [j78]Kim-Kwang Raymond Choo, Martin Herman, Michaela Iorga, Ben Martini:
Cloud forensics: State-of-the-art and future directions. Digit. Investig. 18: 77-78 (2016) - [j77]Mustapha Aminu Bagiwa, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Bin Idris, Suleman Khan, Kim-Kwang Raymond Choo:
Chroma key background detection for digital video using statistical correlation of blurring artifact. Digit. Investig. 19: 29-43 (2016) - [j76]Abdullah Azfar, Kim-Kwang Raymond Choo, Lin Liu:
Android mobile VoIP apps: a survey and examination of their security and privacy. Electron. Commer. Res. 16(1): 73-111 (2016) - [j75]Zheng Xu, Hui Zhang, Vijayan Sugumaran, Kim-Kwang Raymond Choo, Lin Mei, Yiwei Zhu:
Participatory sensing-based semantic and spatial analysis of urban emergency events using mobile social media. EURASIP J. Wirel. Commun. Netw. 2016: 44 (2016) - [j74]Opeyemi A. Osanaiye, Haibin Cai, Kim-Kwang Raymond Choo, Ali Dehghantanha, Zheng Xu, Mqhele E. Dlodlo:
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. EURASIP J. Wirel. Commun. Netw. 2016: 130 (2016) - [j73]Saidur Rahman, Anika Anzum Prima, Md. Abdur Razzaque, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi, Majed A. AlRubaian, Kim-Kwang Raymond Choo:
Internet data budget allocation policies for diverse smartphone applications. EURASIP J. Wirel. Commun. Netw. 2016: 226 (2016) - [j72]Kim-Kwang Raymond Choo, Josep Domingo-Ferrer, Lei Zhang:
Cloud Cryptography: Theory, Practice and Future Research Directions. Future Gener. Comput. Syst. 62: 51-53 (2016) - [j71]Ya Gao, Peng Zeng, Kim-Kwang Raymond Choo, Fu Song:
An Improved Online/Offline Identity-Based Signature Scheme for WSNs. Int. J. Netw. Secur. 18(6): 1143-1151 (2016) - [j70]Zheng Xu, Xiao Wei, Yunhuai Liu, Lin Mei, Chuanping Hu, Kim-Kwang Raymond Choo, Yiwei Zhu, Vijayan Sugumaran:
Building the search pattern of web users using conceptual semantic space model. Int. J. Web Grid Serv. 12(3): 328-347 (2016) - [j69]Cheng Guo, Ruhan Zhuang, Yingmo Jie, Yizhi Ren, Ting Wu, Kim-Kwang Raymond Choo:
Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds. J. Medical Syst. 40(11): 235:1-235:8 (2016) - [j68]Victor Prokhorenko, Kim-Kwang Raymond Choo, Helen Ashman:
Web application protection techniques: A taxonomy. J. Netw. Comput. Appl. 60: 95-112 (2016) - [j67]Mengmeng Ge, Kim-Kwang Raymond Choo, Huai Wu, Yong Yu:
Survey on key revocation mechanisms in wireless sensor networks. J. Netw. Comput. Appl. 63: 24-38 (2016) - [j66]Opeyemi A. Osanaiye, Kim-Kwang Raymond Choo, Mqhele E. Dlodlo:
Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework. J. Netw. Comput. Appl. 67: 147-165 (2016) - [j65]Jian Peng, Kim-Kwang Raymond Choo, Helen Ashman:
Bit-level n-gram based forensic authorship analysis on social media: Identifying individuals from linguistic profiles. J. Netw. Comput. Appl. 70: 171-182 (2016) - [j64]Jian Peng, Kim-Kwang Raymond Choo, Helen Ashman:
User profiling in intrusion detection: A review. J. Netw. Comput. Appl. 72: 14-27 (2016) - [j63]Salman Iqbal, Miss Laiha Mat Kiah, Babak Dhaghighi, Muzammil Hussain, Suleman Khan, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. J. Netw. Comput. Appl. 74: 98-120 (2016) - [j62]Nor Bakiah Abd Warif, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Bin Idris, Roziana Ramli, Rosli Salleh, Shahaboddin Shamshirband, Kim-Kwang Raymond Choo:
Copy-move forgery detection: Survey, challenges and future directions. J. Netw. Comput. Appl. 75: 259-278 (2016) - [j61]Ahmad Karim, Rosli Salleh, Muhammad Khurram Khan, Aisha Siddiqa, Kim-Kwang Raymond Choo:
On the Analysis and Detection of Mobile Botnet Applications. J. Univers. Comput. Sci. 22(4): 567-588 (2016) - [j60]Xiaodong Lin, Kim-Kwang Raymond Choo, Ying-Dar Lin, Peter Mueller:
Guest Editorial: Network Forensics and Surveillance for Emerging Networks. IEEE Netw. 30(6): 4-5 (2016) - [j59]Yanjiang Yang, Haiyan Zhu, Haibing Lu, Jian Weng, Youcheng Zhang, Kim-Kwang Raymond Choo:
Cloud based data sharing with fine-grained proxy re-encryption. Pervasive Mob. Comput. 28: 122-134 (2016) - [j58]Kim-Kwang Raymond Choo, Lior Rokach, Claudio Bettini:
Mobile security and privacy: Advances, challenges and future research directions. Pervasive Mob. Comput. 32: 1-2 (2016) - [j57]Lichun Li, Rongxing Lu, Kim-Kwang Raymond Choo, Anwitaman Datta, Jun Shao:
Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases. IEEE Trans. Inf. Forensics Secur. 11(8): 1847-1861 (2016) - [j56]Quang Do, Ben Martini, Kim-Kwang Raymond Choo:
A Data Exfiltration and Remote Exploitation Attack on Consumer 3D Printers. IEEE Trans. Inf. Forensics Secur. 11(10): 2174-2186 (2016) - [j55]Victor Prokhorenko, Kim-Kwang Raymond Choo, Helen Ashman:
Intent-Based Extensible Real-Time PHP Supervision Framework. IEEE Trans. Inf. Forensics Secur. 11(10): 2215-2226 (2016) - [j54]Ximeng Liu, Robert H. Deng, Kim-Kwang Raymond Choo, Jian Weng:
An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys. IEEE Trans. Inf. Forensics Secur. 11(11): 2401-2414 (2016) - [j53]Beibei Li, Rongxing Lu, Wei Wang, Kim-Kwang Raymond Choo:
DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System. IEEE Trans. Inf. Forensics Secur. 11(11): 2415-2425 (2016) - [j52]Elisa Bertino, Kim-Kwang Raymond Choo, Dimitrios Georgakopoulos, Surya Nepal:
Internet of Things (IoT): Smart and Secure Service Delivery. ACM Trans. Internet Techn. 16(4): 22:1-22:7 (2016) - 2015
- [j51]Nina Viktoria Juliadotter, Kim-Kwang Raymond Choo:
Cloud Attack and Risk Assessment Taxonomy. IEEE Cloud Comput. 2(1): 14-20 (2015) - [j50]Surya Nepal, Rajiv Ranjan, Kim-Kwang Raymond Choo:
Trustworthy Processing of Healthcare Big Data in Hybrid Clouds. IEEE Cloud Comput. 2(2): 78-84 (2015) - [j49]Kim-Kwang Raymond Choo, Rick Sarre:
Balancing Privacy with Legitimate Surveillance and Lawful Data Access. IEEE Cloud Comput. 2(4): 8-13 (2015) - [j48]Quang Do, Ben Martini, Kim-Kwang Raymond Choo:
A Cloud-Focused Mobile Forensics Methodology. IEEE Cloud Comput. 2(4): 60-65 (2015) - [j47]Quang Do, Ben Martini, Kim-Kwang Raymond Choo:
Exfiltrating data from Android devices. Comput. Secur. 48: 74-91 (2015) - [j46]Nurul Hidayah Ab Rahman, Kim-Kwang Raymond Choo:
A survey of information security incident handling in the cloud. Comput. Secur. 49: 45-69 (2015) - [j45]Brenton Borgman, Sameera Mubarak, Kim-Kwang Raymond Choo:
Cyber security readiness in the South Australian Government. Comput. Stand. Interfaces 37: 1-8 (2015) - [j44]Peter Adewale Amosun, Olugbenga Adedayo Ige, Kim-Kwang Raymond Choo:
Impact of a participatory cyber crime prevention programme on secondary school students' attainment in crime prevention concepts in civic education and social studies. Educ. Inf. Technol. 20(3): 505-518 (2015) - [j43]Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won:
An Offline Dictionary Attack against Abdalla and Pointcheval's Key Exchange in the Password-Only Three-Party Setting. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 424-427 (2015) - [j42]Shengbao Wang, Peng Zeng, Kim-Kwang Raymond Choo, Hongbing Wang:
A CCA2-Secure Multi-Decrypter Encryption Scheme Without Random Oracles. Informatica 26(3): 543-556 (2015) - [j41]Christie Pei-Yee Chin, Nina Evans, Kim-Kwang Raymond Choo:
Exploring Factors Influencing the Use of Enterprise Social Networks in Multinational Professional Service Firms. J. Organ. Comput. Electron. Commer. 25(3): 289-315 (2015) - [j40]Junghyun Nam, Kim-Kwang Raymond Choo, Sangchul Han, Juryon Paik, Dongho Won:
Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting. Symmetry 7(1): 105-124 (2015) - 2014
- [j39]James Imgraben, Alewyn Engelbrecht, Kim-Kwang Raymond Choo:
Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users. Behav. Inf. Technol. 33(12): 1347-1360 (2014) - [j38]Kim-Kwang Raymond Choo:
Legal Issues in the Cloud. IEEE Cloud Comput. 1(1): 94-96 (2014) - [j37]Kim-Kwang Raymond Choo:
A Cloud Security Risk-Management Strategy. IEEE Cloud Comput. 1(2): 52-56 (2014) - [j36]Kim-Kwang Raymond Choo:
Mobile Cloud Storage Users. IEEE Cloud Comput. 1(3): 20-23 (2014) - [j35]Ben Martini, Kim-Kwang Raymond Choo:
Cloud Forensic Technical Challenges and Solutions: A Snapshot. IEEE Cloud Comput. 1(4): 20-25 (2014) - [j34]Henry Hillman, Christopher Hooper, Kim-Kwang Raymond Choo:
Online child exploitation: Challenges and future research directions. Comput. Law Secur. Rev. 30(6): 687-698 (2014) - [j33]Darren Quick, Kim-Kwang Raymond Choo:
Impacts of increasing volume of digital forensic data: A survey and future research challenges. Digit. Investig. 11(4): 273-294 (2014) - [j32]Ben Martini, Kim-Kwang Raymond Choo:
Distributed filesystem forensics: XtreemFS as a case study. Digit. Investig. 11(4): 295-313 (2014) - [j31]Deepa Mani, Kim-Kwang Raymond Choo, Sameera Mubarak:
Information security in the South Australian real estate industry: A study of 40 real estate organisations. Inf. Manag. Comput. Secur. 22(1): 24-41 (2014) - [j30]Kim-Kwang Raymond Choo, Junghyun Nam, Dongho Won:
A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols. Inf. Sci. 281: 182-200 (2014) - [j29]Darren Quick, Kim-Kwang Raymond Choo:
Google Drive: Forensic analysis of data remnants. J. Netw. Comput. Appl. 40: 179-193 (2014) - [j28]Hongbing Wang, Peng Zeng, Kim-Kwang Raymond Choo:
MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption. Secur. Commun. Networks 7(11): 1641-1651 (2014) - 2013
- [j27]Christopher Hooper, Ben Martini, Kim-Kwang Raymond Choo:
Cloud computing and its implications for cybercrime investigations in Australia. Comput. Law Secur. Rev. 29(2): 152-163 (2013) - [j26]Kim-Kwang Raymond Choo:
New payment methods: A review of 2010-2012 FATF mutual evaluation reports. Comput. Secur. 36: 12-26 (2013) - [j25]Darren Quick, Kim-Kwang Raymond Choo:
Dropbox analysis: Data remnants on user machines. Digit. Investig. 10(1): 3-18 (2013) - [j24]Darren Quick, Kim-Kwang Raymond Choo:
Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata? Digit. Investig. 10(3): 266-277 (2013) - [j23]Ben Martini, Kim-Kwang Raymond Choo:
Cloud storage forensics: ownCloud as a case study. Digit. Investig. 10(4): 287-299 (2013) - [j22]Darren Quick, Kim-Kwang Raymond Choo:
Digital droplets: Microsoft SkyDrive forensic data remnants. Future Gener. Comput. Syst. 29(6): 1378-1394 (2013) - [j21]Junghyun Nam, Kim-Kwang Raymond Choo, Moonseong Kim, Juryon Paik, Dongho Won:
Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols. KSII Trans. Internet Inf. Syst. 7(12): 3244-3260 (2013) - 2012
- [j20]Ben Martini, Kim-Kwang Raymond Choo:
An integrated conceptual digital forensic framework for cloud computing. Digit. Investig. 9(2): 71-80 (2012) - [j19]Kim-Kwang Raymond Choo:
Review of insider threats in cyber security by Probst, Hunker, Gollman, Bishop. SIGACT News 43(2): 38-40 (2012) - 2011
- [j18]Peng Zeng, Zhenfu Cao, Kim-Kwang Raymond Choo:
An ID-based digital watermarking protocol for copyright protection. Comput. Electr. Eng. 37(4): 526-531 (2011) - [j17]Kim-Kwang Raymond Choo:
The cyber threat landscape: Challenges and future research directions. Comput. Secur. 30(8): 719-731 (2011) - 2010
- [j16]Kim-Kwang Raymond Choo:
High tech criminal threats to the national information infrastructure. Inf. Secur. Tech. Rep. 15(3): 104-111 (2010) - [j15]Peng Zeng, Kim-Kwang Raymond Choo, Da-Zhi Sun:
On the security of an enhanced novel access control protocol for wireless sensor networks. IEEE Trans. Consumer Electron. 56(2): 566-569 (2010) - 2009
- [j14]Shengbao Wang, Zhenfu Cao, ZhaoHui Cheng, Kim-Kwang Raymond Choo:
Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode. Sci. China Ser. F Inf. Sci. 52(8): 1358-1370 (2009) - [j13]Peng Zeng, Zhenfu Cao, Kim-Kwang Raymond Choo, Shengbao Wang:
On the anonymity of some authentication schemes for wireless communications. IEEE Commun. Lett. 13(3): 170-171 (2009) - [j12]Peng Zeng, Zhenfu Cao, Kim-Kwang Raymond Choo, Shengbao Wang:
Security weakness in a dynamic program update protocol for wireless sensor networks. IEEE Commun. Lett. 13(6): 426-428 (2009) - [j11]Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo, Lihua Wang:
An improved identity-based key agreement protocol and its security proof. Inf. Sci. 179(3): 307-318 (2009) - 2008
- [j10]Kim-Kwang Raymond Choo:
Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition. Comput. J. 51(6): 744 (2008) - [j9]Kim-Kwang Raymond Choo:
Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols. Int. J. Netw. Secur. 7(1): 15-23 (2008) - 2007
- [j8]Kim-Kwang Raymond Choo:
A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model. Comput. J. 50(5): 591-601 (2007) - [j7]Kim-Kwang Raymond Choo:
An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker. Informatica 18(4): 547-568 (2007) - 2006
- [j6]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock:
The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols. Comput. Commun. 29(15): 2788-2797 (2006) - [j5]Kim-Kwang Raymond Choo:
Revisiting Lee, Kim, & Yoo Authenticated Key Agreement Protocol. Int. J. Netw. Secur. 2(1): 64-68 (2006) - [j4]Kim-Kwang Raymond Choo:
On the Security of Lee, Kim, Kim, & Oh Key Agreement Protocol. Int. J. Netw. Secur. 3(1): 85-94 (2006) - [j3]Kim-Kwang Raymond Choo:
Issue report on business adoption of Microsoft Passport. Inf. Manag. Comput. Secur. 14(3): 218-234 (2006) - [j2]Kim-Kwang Raymond Choo:
On the Security Analysis of Lee, Hwang & Lee (2004) and Song & Kim (2000) Key Exchange / Agreement Protocols. Informatica 17(4): 467-480 (2006) - 2005
- [j1]Kim-Kwang Raymond Choo:
Revisit of McCullagh-Barreto Two-party ID-based Authenticated Key Agreement Protocols. Int. J. Netw. Secur. 1(3): 154-160 (2005)
Conference and Workshop Papers
- 2024
- [c194]Zhiyu Zhu, Huaming Chen, Jiayu Zhang, Xinyi Wang, Zhibo Jin, Minhui Xue, Dongxiao Zhu, Kim-Kwang Raymond Choo:
MFABA: A More Faithful and Accelerated Boundary-Based Attribution Method for Deep Neural Networks. AAAI 2024: 17228-17236 - [c193]Image Bhattarai, Cong Pu, Kim-Kwang Raymond Choo:
A Lightweight Aggregate Authentication Protocol for Internet of Drones. CCNC 2024: 143-151 - [c192]Cong Pu, Kim-Kwang Raymond Choo, Image Bhattarai:
Chebyshev Polynomial and Private Blockchain Based Cross-Domain Authentication Protocol for IoD Networks. CCNC 2024: 931-936 - [c191]Bingyi Wu, Charles Zhechao Liu, Kim-Kwang Raymond Choo, Hongyi Zhu, Shen Chang:
Two-sided Long Tails on Blockchain-Based Crowdsourcing Platforms. HICSS 2024: 4143-4152 - [c190]Xiaoxiao Chi, Xuyun Zhang, Yan Wang, Lianyong Qi, Amin Beheshti, Xiaolong Xu, Kim-Kwang Raymond Choo, Shuo Wang, Hongsheng Hu:
Shadow-Free Membership Inference Attacks: Recommender Systems Are More Vulnerable Than You Thought. IJCAI 2024: 5781-5789 - [c189]Zhiyu Zhu, Huaming Chen, Xinyi Wang, Jiayu Zhang, Zhibo Jin, Kim-Kwang Raymond Choo, Jun Shen, Dong Yuan:
GE-AdvGAN: Improving the transferability of adversarial samples by gradient editing-based adversarial generative model. SDM 2024: 706-714 - [c188]Wassila Lalouani, Ivan Omorogbe, Christopher Dube, Mohamed Baza, Amar Rasheed, Kim-Kwang Raymond Choo:
A Robust Physical Layer IDS for Intra-Vehicle Communication Security. SmartNets 2024: 1-6 - 2023
- [c187]Lukas Malina, Patrik Dobias, Jan Hajny, Kim-Kwang Raymond Choo:
On Deploying Quantum-Resistant Cybersecurity in Intelligent Infrastructures. ARES 2023: 131:1-131:10 - [c186]Zhiqi Lei, Keke Gai, Jing Yu, Shuo Wang, Liehuang Zhu, Kim-Kwang Raymond Choo:
Efficiency-enhanced Blockchain-based Client Selection in Heterogeneous Federated Learning. Blockchain 2023: 289-296 - [c185]Zhiyu Zhu, Huaming Chen, Jiayu Zhang, Xinyi Wang, Zhibo Jin, Qinghua Lu, Jun Shen, Kim-Kwang Raymond Choo:
Improving Adversarial Transferability via Frequency-based Stationary Point Search. CIKM 2023: 3626-3635 - [c184]Zhiyu Zhu, Huaming Chen, Zhibo Jin, Xinyi Wang, Jiayu Zhang, Minhui Xue, Qinghua Lu, Jun Shen, Kim-Kwang Raymond Choo:
FVW: Finding Valuable Weight on Deep Neural Network for Model Pruning. CIKM 2023: 3657-3666 - [c183]Tongnian Wang, Yuanxiong Guo, Kim-Kwang Raymond Choo:
Enabling Privacy-Preserving Prediction for Length of Stay in ICU - A Multimodal Federated-Learning-based Approach. ECIS 2023 - [c182]Sheri Osborn, Kim-Kwang Raymond Choo:
A Blockchain Patient-Centric Records Framework for Older Adult Healthcare. FABULOUS 2023: 18-36 - [c181]Muhusina Ismail, Saed Alrabaee, Saad Harous, Kim-Kwang Raymond Choo:
Empirical Evaluations of Machine Learning Effectiveness in Detecting Web Application Attacks. FABULOUS 2023: 99-116 - [c180]Bingyi Wu, Charles Zhechao Liu, Kim-Kwang Raymond Choo, Takeshi Tsuyuguchi:
Voters' Impacts on Creators' Popularity Disparity and Network Size in Two-sided Decentralized User-Generated Content Market. HICSS 2023: 3547-3556 - [c179]Mohamed Amine Ferrag, Burak Kantarci, Lucas C. Cordeiro, Mérouane Debbah, Kim-Kwang Raymond Choo:
Poisoning Attacks in Federated Edge Learning for Digital Twin 6G-Enabled IoTs: An Anticipatory Study. ICC Workshops 2023: 1253-1258 - [c178]Aleck Nash, Kim-Kwang Raymond Choo:
Password Managers and Vault Application Security and Forensics: Research Challenges and Future Opportunities. ICDF2C (2) 2023: 31-53 - [c177]Aleck Nash, Hudan Studiawan, George Grispos, Kim-Kwang Raymond Choo:
Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy. ICDF2C (2) 2023: 197-206 - [c176]Tongnian Wang, Kai Zhang, Jiannan Cai, Yanmin Gong, Kim-Kwang Raymond Choo, Yuanxiong Guo:
Analyzing the Impact of Personalization on Fairness in Federated Learning for Healthcare. ICHI 2023: 701-703 - [c175]Xiang Wu, Bohao Li, Boyang Zhang, Xiaofan Liu, Wei Ren, Kim-Kwang Raymond Choo:
Attack Analysis on Two-party Signature and Threshold Signature Based on Dilithium. ISCC 2023: 291-297 - [c174]Zhiyu Zhu, Jiayu Zhang, Zhibo Jin, Xinyi Wang, Minhui Xue, Jun Shen, Kim-Kwang Raymond Choo, Huaming Chen:
Towards Minimising Perturbation Rate for Adversarial Machine Learning with Pruning. ECML/PKDD (1) 2023: 147-163 - 2022
- [c173]Keke Gai, Kim-Kwang Raymond Choo:
BSCI 2022: The 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure. AsiaCCS 2022: 1263-1264 - [c172]Glenn Dietrich, Kim-Kwang Raymond Choo, Ali Dehghantanha:
Introduction to the Minitrack on Machine Learning and Cyber Threat Intelligence and Analytics. HICSS 2022: 1-2 - [c171]Zhiming Yin, Xiong Li, Kim-Kwang Raymond Choo, Yuzhen Liu, Wei Liang:
Forward and Backward Private Searchable Symmetric Encryption with Efficient Updates. HPCC/DSS/SmartCity/DependSys 2022: 603-610 - [c170]Yutao Yang, Yinbin Miao, Kim-Kwang Raymond Choo, Robert H. Deng:
Lightweight Privacy-Preserving Spatial Keyword Query over Encrypted Cloud Data. ICDCS 2022: 392-402 - [c169]Cong Pu, Andrew Wall, Imtiaz Ahmed, Kim-Kwang Raymond Choo:
SecureIoD: A Secure Data Collection and Storage Mechanism for Internet of Drones. MDM 2022: 83-92 - [c168]Lukas Malina, Sara Ricci, Patrik Dobias, Petr Jedlicka, Jan Hajny, Kim-Kwang Raymond Choo:
On the Efficiency and Security of Quantum-resistant Key Establishment Mechanisms on FPGA Platforms. SECRYPT 2022: 605-613 - 2021
- [c167]Pranali Mandaokar, Paras Bhatt, Kim-Kwang Raymond Choo:
Investigating formation of Collective Identity driving the Black Lives Matter movement during COVID-19. AMCIS 2021 - [c166]Kim-Kwang Raymond Choo:
Internet of Things (IoT) Security and Forensics: Challenges and Opportunities. CPSIOTSEC@CCS 2021: 27-28 - [c165]Xuyun Zhang, Deepak Puthal, Chi Yang, Guanfeng Liu, Kim-Kwang Raymond Choo, Hongzhi Yin:
International Workshop on Privacy, Security and Trust in Computational Intelligence (PSTCI2021). CIKM 2021: 4886-4887 - [c164]Wenjuan Li, Weizhi Meng, Javier Parra-Arnau, Kim-Kwang Raymond Choo:
Enhancing Challenge-based Collaborative Intrusion Detection Against Insider Attacks using Spatial Correlation. DSC 2021: 1-8 - [c163]Kevin Jochims, Andres Bello, Kim-Kwang Raymond Choo:
Effectiveness of Mobile Wiping Applications. FABULOUS 2021: 3-24 - [c162]George Grispos, Talon Flynn, William Bradley Glisson, Kim-Kwang Raymond Choo:
Investigating Protected Health Information Leakage from Android Medical Applications. FABULOUS 2021: 311-322 - [c161]Kim-Kwang Raymond Choo, George Grispos, William Bradley Glisson:
Introduction to the Minitrack on Cyber Operations, Defence, and Forensics. HICSS 2021: 1-2 - [c160]Ali Dehghantanha, Glenn Dietrich, Kim-Kwang Raymond Choo:
Introduction to the Minitrack on Machine Learning and Cyber Threat Intelligence and Analytics. HICSS 2021: 1-3 - [c159]Milad Taleby Ahvanooey, Mark Xuefang Zhu, Wojciech Mazurczyk, Max Kilger, Kim-Kwang Raymond Choo:
Do Dark Web and Cryptocurrencies Empower Cybercriminals? ICDF2C 2021: 277-293 - [c158]Selim Ozcan, Merve Astekin, William Bradley Glisson, Kim-Kwang Raymond Choo:
DIEF: An Autopsy Module for Distributed Identification of E-mail Files from Disk Images. iSCI 2021: 53-61 - [c157]Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li, Kim-Kwang Raymond Choo:
Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach. ISPEC 2021: 327-344 - [c156]Tien N. Nguyen, Kim-Kwang Raymond Choo:
Human-in-the-Loop XAI-enabled Vulnerability Detection, Investigation, and Mitigation. ASE 2021: 1210-1212 - [c155]Bin Liu, Keping Yu, Chaosheng Feng, Kim-Kwang Raymond Choo:
Cross-domain authentication for 5G-enabled UAVs: a blockchain approach. DroneCom@MobiCom 2021: 25-30 - [c154]Megan Stigall, Kim-Kwang Raymond Choo:
Digital Forensics Education: Challenges and Future Opportunities. NCS 2021: 28-46 - [c153]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Ruikang Yang, Xiangyu Wang:
Lightweight Privacy-preserving Medical Diagnosis in Edge Computing. SERVICES 2021: 9 - [c152]George Grispos, Frank Tursi, Kim-Kwang Raymond Choo, William Mahoney, William Bradley Glisson:
A Digital Forensics Investigation of a Smart Scale IoT Ecosystem. TrustCom 2021: 710-717 - [c151]Saed Alrabaee, Kim-Kwang Raymond Choo, Mohammad Qbea'h, Mahmoud Khasawneh:
BinDeep: Binary to Source Code Matching Using Deep Learning. TrustCom 2021: 1100-1107 - 2020
- [c150]Saad Khalid Alabdulsalam, Trung Q. Duong, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
Evidence Identification and Acquisition Based on Network Link in an Internet of Things Environment. CISIS 2020: 163-173 - [c149]Saqib Hakak, Wazir Zada Khan, Sweta Bhattacharya, G. Thippa Reddy, Kim-Kwang Raymond Choo:
Propagation of Fake News on Social Media: Challenges and Opportunities. CSoNet 2020: 345-353 - [c148]Naga Vemprala, Charles Zhechao Liu, Kim-Kwang Raymond Choo:
How Helpful are Comparative Reviews for Predicting Product demand? ECIS 2020 - [c147]Sharmistha Nayak, Nurzaman Ahmed, Sudip Misra, Kim-Kwang Raymond Choo:
Blockchain-Based Programmable Fog Architecture for Future Internet of Things Applications. GLOBECOM 2020: 1-6 - [c146]Kim-Kwang Raymond Choo, Ali Dehghantanha:
Introduction to the Minitrack on Machine Learning and Cyber Threat Intelligence and Analytics. HICSS 2020: 1-2 - [c145]William Bradley Glisson, George Grispos, Kim-Kwang Raymond Choo:
Introduction to the Minitrack on Cybersecurity Investigations and Digital Forensics. HICSS 2020: 1-2 - [c144]Yuntong Zhang, Jingye Xu, Zhiwei Wang, Rong Geng, Kim-Kwang Raymond Choo, Jesús Arturo Pérez Díaz, Dakai Zhu:
Efficient and Intelligent Attack Detection in Software Defined IoT Networks. ICESS 2020: 1-9 - [c143]Areej Althubaity, Tao Gong, Kim-Kwang Raymond Choo, Mark Nixon, Reda Ammar, Song Han:
Specification-based Distributed Detection of Rank-related Attacks in RPL-based Resource-Constrained Real-Time Wireless Networks. ICPS 2020: 168-175 - [c142]Yunru Zhang, Min Luo, Kim-Kwang Raymond Choo, Li Li, Debiao He:
Efficient and Secure Two-Party Distributed Signing Protocol for the GOST Signature Algorithm. SocialSec 2020: 3-19 - [c141]Qi Feng, Debiao He, Min Luo, Zengxiang Li, Kim-Kwang Raymond Choo:
Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in Cryptocurrency. TrustCom 2020: 137-147 - 2019
- [c140]Jaryn Shen, Timothy T. Yuen, Kim-Kwang Raymond Choo, Qingkai Zeng:
AMOGAP: Defending Against Man-in-the-Middle and Offline Guessing Attacks on Passwords. ACISP 2019: 514-532 - [c139]Rachael Ruizhu Xiong, Charles Zhechao Liu, Kim-Kwang Raymond Choo, Anthony Rios:
Complex contagions of information diffusion across social networking platforms. AMCIS 2019 - [c138]Emmanuel Nyaletey, Reza M. Parizi, Qi Zhang, Kim-Kwang Raymond Choo:
BlockIPFS - Blockchain-Enabled Interplanetary File System for Forensic and Trusted Data Traceability. Blockchain 2019: 18-25 - [c137]Sajad Homayoun, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo:
A Blockchain-based Framework for Detecting Malicious Mobile Applications in App Stores. CCECE 2019: 1-4 - [c136]Reza M. Parizi, Sajad Homayoun, Abbas Yazdinejad, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains. CCECE 2019: 1-4 - [c135]Hao Jiang, Weizhi Meng, Chunhua Su, Kim-Kwang Raymond Choo:
CAVAEva: An Engineering Platform for Evaluating Commercial Anti-malware Applications on Smartphones. Inscrypt 2019: 208-224 - [c134]Jiaxi Hu, Zhiqiang Xu, Debiao He, Sherali Zeadally, Kim-Kwang Raymond Choo:
Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps. CSS (1) 2019: 186-202 - [c133]Weizhi Meng, Wenjuan Li, Lijun Jiang, Kim-Kwang Raymond Choo, Chunhua Su:
Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks. ESORICS (1) 2019: 493-511 - [c132]Abbas Yazdinejad, Reza M. Parizi, Gautam Srivastava, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Energy Efficient Decentralized Authentication in Internet of Underwater Things Using Blockchain. GLOBECOM Workshops 2019: 1-6 - [c131]Kim-Kwang Raymond Choo, Ali Dehghantanha:
Introduction to the Minitrack on Cyber Threat Intelligence and Analytics. HICSS 2019: 1-2 - [c130]Naga Vemprala, Rachael Ruizhu Xiong, Charles Zhechao Liu, Kim-Kwang Raymond Choo:
Where Does My Product Stand? A Social Network Perspective on Online Product Reviews. HICSS 2019: 1-10 - [c129]Mohammed Aledhari, Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
A Hybrid RSA Algorithm in Support of IoT Greenhouse Applications. ICII 2019: 233-240 - [c128]Gautam Srivastava, Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Data Sharing and Privacy for Patient IoT Devices Using Blockchain. iSCI 2019: 334-348 - [c127]Jianguo Jiang, Jiuming Chen, Tianbo Gu, Kim-Kwang Raymond Choo, Chao Liu, Min Yu, Weiqing Huang, Prasant Mohapatra:
Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation. MILCOM 2019: 1-6 - [c126]Jianguo Jiang, Jiuming Chen, Tianbo Gu, Kim-Kwang Raymond Choo, Chao Liu, Min Yu, Weiqing Huang, Prasant Mohapatra:
Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection. MILCOM 2019: 109-114 - [c125]Alan Roder, Kim-Kwang Raymond Choo:
Unmanned Aerial Vehicles (UAVs) Threat Analysis and a Routine Activity Theory Based Mitigation Approach. NCS 2019: 99-115 - [c124]Lars Diederichsen, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
A Graph Database-Based Approach to Analyze Network Log Files. NSS 2019: 53-73 - [c123]Na Huang, Ming Xu, Ning Zheng, Tong Qiao, Kim-Kwang Raymond Choo:
Deep Android Malware Classification with API-Based Feature Graph. TrustCom/BigDataSE 2019: 296-303 - 2018
- [c122]Robert E. Crossler, France Bélanger, Kim-Kwang Raymond Choo:
Intelligent Home Assistant Use in the Home Environment. AMCIS 2018 - [c121]Mohsen M. Jozani, Emmanuel Ayaburi, Myung Ko, Kim-Kwang Raymond Choo:
A Conceptual Model to Understand Privacy Concerns in a Social P2P Payment App. AMCIS 2018 - [c120]Naga Vemprala, Charles Zhechao Liu, Rachael Ruizhu Xiong, Kim-Kwang Raymond Choo:
Using Social Media Data to Improve Situational Awareness during Emergent Events. AMCIS 2018 - [c119]Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo, Amritraj Singh:
Empirical vulnerability analysis of automated smart contracts security testing on blockchains. CASCON 2018: 103-113 - [c118]Reza M. Parizi, Liang Guo, Yao Bian, Ali Dehghantanha, Kim-Kwang Raymond Choo:
CyberPDF: Smart and Secure Coordinate-based Automated Health PDF Data Batch Extraction. CHASE 2018: 106-111 - [c117]Alekha Kumar Mishra, Mohammad S. Obaidat, Deepak Puthal, Asis Kumar Tripathy, Kim-Kwang Raymond Choo:
Graph-Based Symmetric Crypto-System for Data Confidentiality. GLOBECOM 2018: 1-6 - [c116]Kim-Kwang Raymond Choo, Ali Dehghantanha:
Introduction to the Minitrack on Cyber Threat Intelligence and Analytics. HICSS 2018: 1-3 - [c115]William Bradley Glisson, Kim-Kwang Raymond Choo:
Introduction to the Minitrack on Cyber-of-Things: Cyber Crimes, Cyber Security and Cyber Forensics. HICSS 2018: 1-2 - [c114]Charles Zhechao Liu, Mohsen M. Jozani, Kim-Kwang Raymond Choo:
Canalization or Increased Diffusion? An Empirical Analysis on the Impact of the Recommendation System in the Mobile App Market. HICSS 2018: 1-10 - [c113]Mandrita Banerjee, Junghee Lee, Qian Chen, Kim-Kwang Raymond Choo:
Blockchain-Based Security Layer for Identification and Isolation of Malicious Things in IoT: A Conceptual Design. ICCCN 2018: 1-6 - [c112]Guanghai Cui, Yizhi Ren, Shengwen Tian, Ting Wu, Kim-Kwang Raymond Choo:
Evolution of Resource Sharing Cooperation Based on Reciprocity in Social Networks. ICCCN 2018: 1-9 - [c111]Jia-Hao Xu, Zhen Wang, Guanghai Cui, Yizhi Ren, Hong Ding, Kim-Kwang Raymond Choo:
An Extended Exploration to the Epidemic Containment Game. ICCCN 2018: 1-7 - [c110]Jaryn Shen, Kim-Kwang Raymond Choo, Qingkai Zeng:
Multi-item Passphrases: A Self-adaptive Approach Against Offline Guessing Attacks. ICDF2C 2018: 204-221 - [c109]Nour Moustafa, Benjamin P. Turnbull, Kim-Kwang Raymond Choo:
Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks. ICII 2018: 139-145 - [c108]Jianguo Jiang, Jiuming Chen, Kim-Kwang Raymond Choo, Kunying Liu, Chao Liu, Min Yu, Prasant Mohapatra:
Prediction and Detection of Malicious Insiders' Motivation Based on Sentiment Profile on Webpages and Emails. MILCOM 2018: 1-6 - [c107]Xiaoyan Yang, Han Jiang, Mengbo Hou, Zhihua Zheng, Qiuliang Xu, Kim-Kwang Raymond Choo:
A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity. NSS 2018: 111-124 - [c106]Aniello Castiglione, Kim-Kwang Raymond Choo, Maria De Marsico, Alessio Mecca:
Walking on the Cloud: Gait Recognition, a Wearable Solution. NSS 2018: 174-186 - [c105]Amber Umair, Priyadarsi Nanda, Xiangjian He, Kim-Kwang Raymond Choo:
User Relationship Classification of Facebook Messenger Mobile Data using WEKA. NSS 2018: 337-348 - [c104]Niken Dwi Wahyu Cahyani, Ben Martini, Kim-Kwang Raymond Choo, Helen Ashman:
An Approach to Enhance Understanding of Digital Forensics Technical Terms in the Presentation Phase of a Digital Investigation Using Multimedia Presentations. SecureComm (2) 2018: 488-506 - [c103]Niken Dwi Wahyu Cahyani, Ben Martini, Kim-Kwang Raymond Choo, Helen Ashman:
Event Reconstruction of Indonesian E-Banking Services on Windows Phone Devices. SecureComm (2) 2018: 507-521 - [c102]Mark J. Carman, Mark Koerber, Jiuyong Li, Kim-Kwang Raymond Choo, Helen Ashman:
Manipulating Visibility of Political and Apolitical Threads on Reddit via Score Boosting. TrustCom/BigDataSE 2018: 184-190 - [c101]Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Towards Better Ocular Recognition for Secure Real-World Applications. TrustCom/BigDataSE 2018: 277-282 - [c100]William Ledbetter, William Bradley Glisson, Todd McDonald, Todd R. Andel, George Grispos, Kim-Kwang Raymond Choo:
Digital Blues: An Investigation Into the Use of Bluetooth Protocols. TrustCom/BigDataSE 2018: 498-503 - [c99]Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Yang Yang, Yinghui Zhang:
PUSC: Privacy-Preserving User-Centric Skyline Computation Over Multiple Encrypted Domains. TrustCom/BigDataSE 2018: 958-963 - [c98]Yuyin Qian, Peng Zeng, Zuming Shen, Kim-Kwang Raymond Choo:
A Lightweight Path Authentication Protocol for RFID-Based Supply Chains. TrustCom/BigDataSE 2018: 1297-1302 - [c97]Yizhi Ren, Mengjin Jiang, Ye Yao, Ting Wu, Zhen Wang, Mengkun Li, Kim-Kwang Raymond Choo:
Node Immunization in Networks with Uncertainty. TrustCom/BigDataSE 2018: 1392-1397 - [c96]Feipeng Yan, Ming Xu, Tong Qiao, Ting Wu, Xue Yang, Ning Zheng, Kim-Kwang Raymond Choo:
Identifying WeChat Red Packets and Fund Transfers Via Analyzing Encrypted Network Traffic. TrustCom/BigDataSE 2018: 1426-1432 - [c95]Nicholas Mata, Nicole Beebe, Kim-Kwang Raymond Choo:
Are Your Neighbors Swingers or Kinksters? Feeld App Forensic Analysis. TrustCom/BigDataSE 2018: 1433-1439 - [c94]Taylor Cloyd, Trey Osborn, Brian Ellingboe, William Bradley Glisson, Kim-Kwang Raymond Choo:
Browser Analysis of Residual Facebook Data. TrustCom/BigDataSE 2018: 1440-1445 - [c93]Arnoud Goudbeek, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
A Forensic Investigation Framework for Smart Home Environment. TrustCom/BigDataSE 2018: 1446-1451 - 2017
- [c92]Charles Zhechao Liu, Mohsen M. Jozani, Kim-Kwang Raymond Choo:
The Effect of the Recommendation System in the Mobile App Market. AMCIS 2017 - [c91]Shalabh Saini, George Grispos, Charles Zhechao Liu, Kim-Kwang Raymond Choo:
Back to Pen and Paper: Recovering Assessment Questions from Computer-Based Examination Applications. AMCIS 2017 - [c90]Kim-Kwang Raymond Choo:
Research Challenges and Opportunities in Big Forensic Data. MIST@CCS 2017: 79-80 - [c89]George Grispos, William Bradley Glisson, Kim-Kwang Raymond Choo:
Medical Cyber-Physical Systems Development: A Forensics-Driven Approach. CHASE 2017: 108-113 - [c88]Jannatul Fardous, Jia Tina Du, Kim-Kwang Raymond Choo, Songshan (Sam) Huang:
Investigating Mobile Social Media Users? Behaviors in Tourism Collaborative Information Seeking. CHIIR 2017: 395-397 - [c87]Bofeng Pan, Peng Zeng, Kim-Kwang Raymond Choo:
An Efficient Data Aggregation Scheme in Privacy-Preserving Smart Grid Communications with a High Practicability. CISIS 2017: 677-688 - [c86]William Bradley Glisson, Kim-Kwang Raymond Choo:
Introduction to Cyber-of-Things: Cyber-crimes and Cyber-Security Minitrack. HICSS 2017: 1-3 - [c85]Alireza Heravi, Deepa Mani, Kim-Kwang Raymond Choo, Sameera Mubarak:
Making Decisions about Self-Disclosure in Online Social Networks. HICSS 2017: 1-10 - [c84]Jianguo Jiang, Jiuming Chen, Kim-Kwang Raymond Choo, Chao Liu, Kunying Liu, Min Yu:
A Visualization Scheme for Network Forensics Based on Attribute Oriented Induction Based Frequent Item Mining and Hyper Graph. ICDF2C 2017: 130-143 - [c83]Cory Smith, Glenn Dietrich, Kim-Kwang Raymond Choo:
Identification of Forensic Artifacts in VMWare Virtualized Computing. ATCS/SePrIoT@SecureComm 2017: 85-103 - [c82]Chaz Vidal, Kim-Kwang Raymond Choo:
Situational Crime Prevention and the Mitigation of Cloud Computing Threats. ATCS/SePrIoT@SecureComm 2017: 218-233 - [c81]Dustin Mink, William Bradley Glisson, Ryan Benton, Kim-Kwang Raymond Choo:
Manipulating the Five V's in the Next Generation Air Transportation System. ATCS/SePrIoT@SecureComm 2017: 271-282 - [c80]Jianguo Jiang, Jiuming Chen, Kim-Kwang Raymond Choo, Chao Liu, Kunying Liu, Min Yu, Yongjian Wang:
A Deep Learning Based Online Malicious URL and DNS Detection Scheme. SecureComm 2017: 438-448 - [c79]Michael Bewong, Jixue Liu, Lin Liu, Jiuyong Li, Kim-Kwang Raymond Choo:
A Relative Privacy Model for Effective Privacy Preservation in Transactional Data. TrustCom/BigDataSE/ICESS 2017: 394-401 - [c78]Daniel Jacobs, Kim-Kwang Raymond Choo, M. Tahar Kechadi, Nhien-An Le-Khac:
Volkswagen Car Entertainment System Forensics. TrustCom/BigDataSE/ICESS 2017: 699-705 - [c77]Wybren van der Meer, Kim-Kwang Raymond Choo, M. Tahar Kechadi, Nhien-An Le-Khac:
Investigation and Automating Extraction of Thumbnails Produced by Image Viewers. TrustCom/BigDataSE/ICESS 2017: 1076-1081 - 2016
- [c76]Yanjiang Yang, Haibin Cai, Zhuo Wei, Haibing Lu, Kim-Kwang Raymond Choo:
Towards Lightweight Anonymous Entity Authentication for IoT Applications. ACISP (1) 2016: 265-280 - [c75]Yong Yu, Yannan Li, Man Ho Au, Willy Susilo, Kim-Kwang Raymond Choo, Xinpeng Zhang:
Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy. ACISP (1) 2016: 389-405 - [c74]Masood Mansoori, Ian Welch, Kim-Kwang Raymond Choo, Roy A. Maxion:
Application of HAZOP to the Design of Cyber Security Experiments. AINA 2016: 790-799 - [c73]Masood Mansoori, Yuichi Hirose, Ian Welch, Kim-Kwang Raymond Choo:
Empirical Analysis of Impact of HTTP Referer on Malicious Website Behaviour and Delivery. AINA 2016: 941-948 - [c72]Dustin Mink, Alec Yasinsac, Kim-Kwang Raymond Choo, William Bradley Glisson:
Next Generation Aircraft Architecture and Digital Forensic. AMCIS 2016 - [c71]Opeyemi A. Osanaiye, Kim-Kwang Raymond Choo, Mqhele E. Dlodlo:
Change-point cloud DDoS detection using packet inter-arrival time. CEEC 2016: 204-209 - [c70]Siyuan Chen, Peng Zeng, Kim-Kwang Raymond Choo, Qin Wang:
An Efficient Ring Signature Scheme Based on Syndrome Decoding Problem. CIS 2016: 228-232 - [c69]Jianhua Ma, Kim-Kwang Raymond Choo, Hui-Huang Hsu, Qun Jin, William Liu, Kevin I-Kai Wang, Yufeng Wang, Xiaokang Zhou:
Perspectives on Cyber Science and Technology for Cyberization and Cyber-Enabled Worlds. DASC/PiCom/DataCom/CyberSciTech 2016: 1-9 - [c68]Christian Esposito, Aniello Castiglione, Francesco Palmieri, Massimo Ficco, Kim-Kwang Raymond Choo:
A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things. DASC/PiCom/DataCom/CyberSciTech 2016: 376-383 - [c67]Hafiz Abdur Rehman Amjad, Umer Naeem, Muhammad Adeel Zaffar, Muhammad Fareed Zaffar, Kim-Kwang Raymond Choo:
Improving Security Awareness in the Government Sector. DG.O 2016: 1-7 - [c66]William Bradley Glisson, Kim-Kwang Raymond Choo:
Introduction to the Cybercrimes, Cyber-Physical Innovations, and Emerging Investigation Challenges Minitrack. HICSS 2016: 5478 - [c65]Abdullah Azfar, Kim-Kwang Raymond Choo, Lin Liu:
An Android Social App Forensics Adversary Model. HICSS 2016: 5597-5606 - [c64]Niken Dwi Wahyu Cahyani, Ben Martini, Kim-Kwang Raymond Choo:
Using Multimedia Presentations to Enhance the Judiciary's Technical Understanding of Digital Forensic Concepts: An Indonesian Case Study. HICSS 2016: 5617-5626 - [c63]Md. Zakirul Alam Bhuiyan, Guojun Wang, Kim-Kwang Raymond Choo:
Secured Data Collection for a Cloud-Enabled Structural Health Monitoring System. HPCC/SmartCity/DSS 2016: 1226-1231 - [c62]Siyuan Chen, Peng Zeng, Kim-Kwang Raymond Choo:
A Provably Secure Blind Signature Based on Coding Theory. ICPADS 2016: 376-382 - [c61]Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman, Zheng Xu, William Bradley Glisson, Kim-Kwang Raymond Choo:
The role of mobile forensics in terrorism investigations involving the use of cloud apps. MobiMedia 2016: 199-204 - [c60]Chao Lin, Fei Zhu, Wei Wu, Kaitai Liang, Kim-Kwang Raymond Choo:
A New Transitive Signature Scheme. NSS 2016: 156-167 - [c59]Xiong Li, Jianwei Niu, Kim-Kwang Raymond Choo:
A Robust Authentication Protocol with Privacy Protection for Wireless Sensor Networks. RFIDSec 2016: 30-44 - [c58]Cristina Alcaraz, Javier López, Kim-Kwang Raymond Choo:
Dynamic Restoration in Interconnected RBAC-based Cyber-physical Control Systems. SECRYPT 2016: 19-27 - [c57]Mark J. Carman, Kim-Kwang Raymond Choo:
Tinder Me Softly - How Safe Are You Really on Tinder? SecureComm 2016: 271-286 - [c56]Lorena González-Manzano, José María de Fuentes, Kim-Kwang Raymond Choo:
ase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical Environments. SecureComm 2016: 412-428 - [c55]Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda, Mohd Taufik Abdullah, Wee-Chiat Chai:
A Closer Look at Syncany Windows and Ubuntu Clients' Residual Artefacts. SpaCCS Workshops 2016: 342-357 - [c54]Jian Peng, Kim-Kwang Raymond Choo, Helen Ashman:
Astroturfing Detection in Social Media: Using Binary n-Gram Analysis for Authorship Attribution. Trustcom/BigDataSE/ISPA 2016: 121-128 - [c53]Xiaoyan Yang, Han Jiang, Qiuliang Xu, Mengbo Hou, Xiaochao Wei, Minghao Zhao, Kim-Kwang Raymond Choo:
A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol. Trustcom/BigDataSE/ISPA 2016: 670-677 - 2015
- [c52]Niken Dwi Wahyu Cahyani, Ben Martini, Kim-Kwang Raymond Choo:
Using Multimedia Presentations to Improve Digital Forensic Understanding: A Pilot Study. ACIS 2015: 40 - [c51]Alireza Heravi, Sameera Mubarak, Kim-Kwang Raymond Choo:
Online Social Networking Has a Greater Effect on Others than on Me: A Third-Person Effect Perspective. ACIS 2015: 91 - [c50]Abdullah Azfar, Kim-Kwang Raymond Choo, Lin Liu:
Forensic Taxonomy of Popular Android mHealth Apps. AMCIS 2015 - [c49]Christie Pei-Yee Chin, Kim-Kwang Raymond Choo, Nina Evans:
Enterprise Social Networks: A Successful Implementation within a Telecommunication Company. AMCIS 2015 - [c48]Kim-Kwang Raymond Choo, Jody Farnden, Ben Martini:
Privacy Risks in Mobile Dating Apps. AMCIS 2015 - [c47]Kim-Kwang Raymond Choo, Alireza Heravi, Deepa Mani, Sameera Mubarak:
Employees' Intended Information Security Behaviour in Real Estate Organisations: a Protection Motivation Perspective. AMCIS 2015 - [c46]Nurul Hidayah Ab Rahman, Kim-Kwang Raymond Choo:
Factors Influencing the Adoption of Cloud Incident Handling Strategy: A Preliminary Study in Malaysia. AMCIS 2015 - [c45]Deepa Mani, Alireza Heravi, Kim-Kwang Raymond Choo, Sameera Mubarak:
Information Privacy Concerns of Real Estate Customers and Information Security in the Real Estate Industry: an Empirical Analysis. AISC 2015: 53-56 - [c44]Yanjiang Yang, Joseph K. Liu, Kaitai Liang, Kim-Kwang Raymond Choo, Jianying Zhou:
Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data. ESORICS (2) 2015: 146-166 - [c43]Christian D'Orazio, Kim-Kwang Raymond Choo:
A Generic Process to Identify Vulnerabilities and Design Weaknesses in iOS Healthcare Apps. HICSS 2015: 5175-5184 - [c42]Shangqi Lai, Joseph K. Liu, Kim-Kwang Raymond Choo, Kaitai Liang:
Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN. ICICS 2015: 467-477 - [c41]Yanjiang Yang, Jiqiang Lu, Kim-Kwang Raymond Choo, Joseph K. Liu:
On Lightweight Security Enforcement in Cyber-Physical Systems. LightSec 2015: 97-112 - [c40]Christie Pei-Yee Chin, Nina Evans, Kim-Kwang Raymond Choo, Felix B. Tan:
What Influences Employees to Use Enterprise Social Networks? A Socio-Technical Perspective. PACIS 2015: 54 - [c39]Ala' F. A. Aburumman, Wei Jye Seo, Md. Rafiqul Islam, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering. SecureComm 2015: 649-664 - [c38]Jason Walls, Kim-Kwang Raymond Choo:
A Review of Free Cloud-Based Anti-Malware Apps for Android. TrustCom/BigDataSE/ISPA (1) 2015: 1053-1058 - [c37]Ming Di Leom, Christian Javier D'Orazio, Gaye Deegan, Kim-Kwang Raymond Choo:
Forensic Collection and Analysis of Thumbnails in Android. TrustCom/BigDataSE/ISPA (1) 2015: 1059-1066 - [c36]Kin Suntana Tep, Ben Martini, Ray Hunt, Kim-Kwang Raymond Choo:
A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management. TrustCom/BigDataSE/ISPA (1) 2015: 1073-1080 - [c35]Felix Immanuel, Ben Martini, Kim-Kwang Raymond Choo:
Android Cache Taxonomy and Forensic Process. TrustCom/BigDataSE/ISPA (1) 2015: 1094-1101 - 2014
- [c34]Deepa Mani, Sameera Mubarak, Kim-Kwang Raymond Choo:
Understanding the Information Security Awareness Process in Real Estate Organizations Using the SECI Model. AMCIS 2014 - [c33]Samuel O'Malley, Kim-Kwang Raymond Choo:
Bridging the Air Gap: Inaudible Data Exfiltration by Insiders. AMCIS 2014 - [c32]Darren Quick, Christopher Tassone, Kim-Kwang Raymond Choo:
Forensic Analysis of Windows Thumbcache files. AMCIS 2014 - [c31]Ya Gao, Peng Zeng, Kim-Kwang Raymond Choo:
Multi-sender Broadcast Authentication in Wireless Sensor Networks. CIS 2014: 633-637 - [c30]Doone Jones, Kim-Kwang Raymond Choo:
Should there be a New Body of Law for Cyber Space? ECIS 2014 - [c29]Ben Martini, Kim-Kwang Raymond Choo:
Building the Next Generation of Cyber Security Professionals. ECIS 2014 - [c28]Christian D'Orazio, Aswami Ariffin, Kim-Kwang Raymond Choo:
iOS Anti-forensics: How Can We Securely Conceal, Delete and Insert Data? HICSS 2014: 4838-4847 - [c27]Abdullah Azfar, Kim-Kwang Raymond Choo, Lin Liu:
A Study of Ten Popular Android Mobile VoIP Applications: Are the Communications Encrypted? HICSS 2014: 4858-4867 - [c26]Quang Do, Ben Martini, Kim-Kwang Raymond Choo:
Enhancing User Privacy on Android Mobile Devices via Permissions Removal. HICSS 2014: 5070-5079 - [c25]Quang Do, Ben Martini, Jonathan Looi, Yu Wang, Kim-Kwang Raymond Choo:
Windows Event Forensic Process. IFIP Int. Conf. Digital Forensics 2014: 87-100 - [c24]Mengmeng Ge, Kim-Kwang Raymond Choo:
A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks. NSS 2014: 462-475 - [c23]Ala' F. A. Aburumman, Kim-Kwang Raymond Choo:
A Domain-Based Multi-cluster SIP Solution for Mobile Ad Hoc Network. SecureComm (2) 2014: 267-281 - [c22]Ben Martini, Kim-Kwang Raymond Choo:
Remote Programmatic vCloud Forensics: A Six-Step Collection Process and a Proof of Concept. TrustCom 2014: 935-942 - [c21]Quang Do, Ben Martini, Kim-Kwang Raymond Choo:
Enforcing File System Permissions on Android External Storage: Android File System Permissions (AFP) Prototype and ownCloud. TrustCom 2014: 949-954 - 2013
- [c20]Aswami Ariffin, Christian D'Orazio, Kim-Kwang Raymond Choo, Jill Slay:
iOS Forensics: How Can We Recover Deleted Image Files with Timestamp in a Forensically Sound Manner? ARES 2013: 375-382 - [c19]Aswami Ariffin, Kim-Kwang Raymond Choo, Jill Slay:
Digital Camcorder Forensics. AISC 2013: 39-48 - [c18]Aswami Ariffin, Jill Slay, Kim-Kwang Raymond Choo:
Data Recovery from Proprietary Formatted Cctv Hard Disks. IFIP Int. Conf. Digital Forensics 2013: 213-223 - 2010
- [c17]Joseph Chee Ming Teo, Kim-Kwang Raymond Choo:
Security Improvements to Anonymous ID-Based Group Key Agreement for Wireless Networks. ITNG 2010: 732-737 - 2007
- [c16]Sherman S. M. Chow, Kim-Kwang Raymond Choo:
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension. ISC 2007: 203-220 - [c15]Raphael C.-W. Phan, Kim-Kwang Raymond Choo, Swee-Huay Heng:
Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication. ProvSec 2007: 169-177 - [c14]Byoungcheon Lee, Kim-Kwang Raymond Choo, Jeongmo Yang, Seungjae Yoo:
Secret Signatures: How to Achieve Business Privacy Efficiently? WISA 2007: 30-47 - 2006
- [c13]Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria:
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys. ACISP 2006: 371-382 - [c12]Qiang Tang, Kim-Kwang Raymond Choo:
Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks. ACNS 2006: 162-177 - [c11]Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond Choo:
Formal analysis of secure contracting protocol for e-tendering. ACSW 2006: 155-164 - [c10]Kim-Kwang Raymond Choo:
Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting. CSFW 2006: 297-308 - 2005
- [c9]Kim-Kwang Raymond Choo, Yvonne Hitchcock:
Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. ACISP 2005: 429-442 - [c8]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock:
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. ASIACRYPT 2005: 585-604 - [c7]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock:
Errors in Computational Complexity Proofs for Protocols. ASIACRYPT 2005: 624-643 - [c6]Wai-Ki Richard Au, Kim-Kwang Raymond Choo, Mark Looi:
A Secure Anonymous Authorisation Architecture for E-Commerce. EEE 2005: 106-111 - [c5]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock:
On Session Key Construction in Provably-Secure Key Establishment Protocols. Mycrypt 2005: 116-131 - [c4]Colin Boyd, Kim-Kwang Raymond Choo:
Security of Two-Party Identity-Based Key Agreement. Mycrypt 2005: 229-243 - 2004
- [c3]Richard Au, Harikrishna Vasanta, Kim-Kwang Raymond Choo, Mark Looi:
A user-centric anonymous authorisation framework in e-commerce environment. ICEC 2004: 138-147 - [c2]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland:
Complementing Computational Protocol Analysis with Formal Specifications. Formal Aspects in Security and Trust 2004: 129-144 - [c1]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland:
On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. SCN 2004: 351-366
Parts in Books or Collections
- 2020
- [p49]Nhien-An Le-Khac, Kim-Kwang Raymond Choo:
The Increasing Importance of Digital Forensics and Investigations in Law Enforcement, Government and Commercial Sectors. Cyber and Digital Forensic Investigations 2020: 1-4 - [p48]Xiaolu Zhang, Timothy T. Yuen, Kim-Kwang Raymond Choo:
Experiential Learning in Digital Forensics. Digital Forensic Education 2020: 1-9 - [p47]William O'Sullivan, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
Defending IoT Devices from Malware. Cyber and Digital Forensic Investigations 2020: 5-29 - [p46]Alexander Hilgenberg, Trung Q. Duong, Nhien-An Le-Khac, Kim-Kwang Raymond Choo:
Digital Forensic Investigation of Internet of Thing Devices: A Proposed Model and Case Studies. Cyber and Digital Forensic Investigations 2020: 31-49 - [p45]Cian Young, Robert McArdle, Nhien-An Le-Khac, Kim-Kwang Raymond Choo:
Forensic Investigation of Ransomware Activities - Part 1. Cyber and Digital Forensic Investigations 2020: 51-77 - [p44]Christopher Boyton, Nhien-An Le-Khac, Kim-Kwang Raymond Choo, Anca Jurcut:
Forensic Investigation of Ransomware Activities - Part 2. Cyber and Digital Forensic Investigations 2020: 79-108 - [p43]Richard Gomm, Ryan Brooks, Kim-Kwang Raymond Choo, Nhien-An Le-Khac, Kien Wooi Hew:
CCTV Forensics in the Big Data Era: Challenges and Approaches. Cyber and Digital Forensic Investigations 2020: 109-139 - [p42]Lars Standare, Darren R. Hayes, Nhien-An Le-Khac, Kim-Kwang Raymond Choo:
Forensic Investigation of PayPal Accounts. Cyber and Digital Forensic Investigations 2020: 141-174 - [p41]Sebastian Schlepphorst, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
Digital Forensic Approaches for Cloud Service Models: A Survey. Cyber and Digital Forensic Investigations 2020: 175-199 - [p40]Neil Redmond, Le-Nam Tran, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
Long Term Evolution Network Security and Real-Time Data Extraction. Cyber and Digital Forensic Investigations 2020: 201-220 - [p39]Andrew Kinder, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
Towards an Automated Process to Categorise Tor's Hidden Services. Cyber and Digital Forensic Investigations 2020: 221-246 - [p38]Cornelis Leendert van Veldhuizen, Madhusanka Liyanage, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
The Bitcoin-Network Protocol from a Forensic Perspective. Cyber and Digital Forensic Investigations 2020: 247-275 - [p37]Nhien-An Le-Khac, Kim-Kwang Raymond Choo:
So, What's Next? Cyber and Digital Forensic Investigations 2020: 277-278 - [p36]Xiaolu Zhang, Kim-Kwang Raymond Choo:
The Way Forward. Digital Forensic Education 2020: 305-307 - [p35]Reza M. Parizi, Ali Dehghantanha, Amin Azmoodeh, Kim-Kwang Raymond Choo:
Blockchain in Cybersecurity Realm: An Overview. Blockchain Cybersecurity, Trust and Privacy 2020: 1-5 - [p34]Kevin Tiba, Reza M. Parizi, Qi Zhang, Ali Dehghantanha, Hadis Karimipour, Kim-Kwang Raymond Choo:
Secure Blockchain-Based Traffic Load Balancing Using Edge Computing and Reinforcement Learning. Blockchain Cybersecurity, Trust and Privacy 2020: 99-128 - [p33]Amritraj Singh, Reza M. Parizi, Meng Han, Ali Dehghantanha, Hadis Karimipour, Kim-Kwang Raymond Choo:
Public Blockchains Scalability: An Examination of Sharding and Segregated Witness. Blockchain Cybersecurity, Trust and Privacy 2020: 203-232 - 2019
- [p32]Liangli Ma, Jinyi Guo, Wei Ren, Yi Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa:
A watermark-based in situ access-control model for image big data. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 67-87 - [p31]Rongyue Zheng, Jianlin Jiang, Xiaohan Hao, Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa:
Blockchain-based security and access control for BIM big data. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 89-119 - [p30]Lin Mu, Jun Song, Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa:
Security of marine-information system. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 121-134 - [p29]Pooneh Nikkhah Bahrami, Ali Dehghantanha, Tooska Dargahi, Reza M. Parizi, Kim-Kwang Raymond Choo, Hamid H. S. Javadi, Lizhe Wang, Fatos Xhafa, Wei Ren:
A layered security architecture based on cyber kill chain against advanced persistent threats. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 135-155 - [p28]Ana Nieto, Ruben Rios, Javier López, Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa:
Privacy-aware digital forensics. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 157-195 - [p27]Fatos Xhafa, Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo:
A survey of trust, trustworthiness and trustworthy computing: concepts, models and challenges. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 197-211 - [p26]Shuaishuai Zhu, Xu An Wang, Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa:
Dynamic public opinion evolvement modeling and supervision in social networks. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 239-262 - [p25]Muhammad Shahroz Nadeem, Virginia N. L. Franqueira, Xiaojun Zhai, Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa:
Privacy verification of PhotoDNA based on machine learning. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 263-280 - [p24]Xiaojing Gao, Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa:
Chaos-based communication systems. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 281-302 - [p23]Amin Azmoodeh, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Big Data and Internet of Things Security and Forensics: Challenges and Opportunities. Handbook of Big Data and IoT Security 2019: 1-4 - [p22]Yee-Yang Teing, Sajad Homayoun, Ali Dehghantanha, Kim-Kwang Raymond Choo, Reza M. Parizi, Mohammad Hammoudeh, Gregory Epiphaniou:
Private Cloud Storage Forensics: Seafile as a Case Study. Handbook of Big Data and IoT Security 2019: 73-127 - [p21]Paul J. Taylor, Henry Mwiki, Ali Dehghantanha, Alex Akinbi, Kim-Kwang Raymond Choo, Mohammad Hammoudeh, Reza M. Parizi:
Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study. Handbook of Big Data and IoT Security 2019: 153-177 - [p20]Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo, Mohammad Hammoudeh, Gregory Epiphaniou:
Security in Online Games: Current Implementations and Challenges. Handbook of Big Data and IoT Security 2019: 367-384 - 2017
- [p19]Man Ho Au, Kim-Kwang Raymond Choo:
Mobile Security and Privacy. Mobile Security and Privacy 2017: 1-4 - [p18]Kim-Kwang Raymond Choo, Ali Dehghantanha:
Contemporary Digital Forensics Investigations of Cloud and Mobile Applications. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 1-6 - [p17]Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda:
Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 21-39 - [p16]C. Chia, Kim-Kwang Raymond Choo, Dennis D. Fehrenbacher:
How Cyber-Savvy are Older Mobile Device Users? Mobile Security and Privacy 2017: 67-83 - [p15]Francesco Schiliro, Kim-Kwang Raymond Choo:
The Role of Mobile Devices in Enhancing the Policing System to Improve Efficiency and Effectiveness. Mobile Security and Privacy 2017: 85-99 - [p14]Bernard Chukwuemeka Ogazi-Onyemaechi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Performance of Android Forensics Data Recovery Tools. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 91-110 - [p13]Lek Christopher, Kim-Kwang Raymond Choo, Ali Dehghantanha:
Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 111-129 - [p12]Nurul Hidayah Ab Rahman, Gary C. Kessler, Kim-Kwang Raymond Choo:
Implications of Emerging Technologies to Incident Handling and Digital Forensic Strategies: A Routine Activity Theory. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 131-146 - [p11]Aswami Ariffin, Kim-Kwang Raymond Choo, Zahri Yunos:
Forensic Readiness: A Case Study on Digital CCTV Systems Antiforensics. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 147-162 - [p10]Christopher Tassone, Ben Martini, Kim-Kwang Raymond Choo:
Forensic Visualization: Survey and Future Research Directions. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 163-184 - [p9]Jason Walls, Kim-Kwang Raymond Choo:
A Study of the Effectiveness Abs Reliability of Android Free Anti-Mobile Malware Apps. Mobile Security and Privacy 2017: 167-203 - [p8]Seyed Hossein Mohtasebi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 205-246 - 2015
- [p7]Ryan K. L. Ko, Kim-Kwang Raymond Choo:
Cloud security ecosystem. The Cloud Security Ecosystem 2015: 1-14 - [p6]Nina Viktoria Juliadotter, Kim-Kwang Raymond Choo:
CATRA: Conceptual cloud attack taxonomy and risk assessment framework. The Cloud Security Ecosystem 2015: 37-81 - [p5]Ben Martini, Quang Do, Kim-Kwang Raymond Choo:
Conceptual evidence collection and analysis methodology for Android devices. The Cloud Security Ecosystem 2015: 285-307 - [p4]Ben Martini, Quang Do, Kim-Kwang Raymond Choo:
Mobile cloud forensics: An analysis of seven popular Android apps. The Cloud Security Ecosystem 2015: 309-345 - [p3]Nurul Hidayah Ab Rahman, Kim-Kwang Raymond Choo:
Integrating digital forensic practices in cloud incident handling: A conceptual Cloud Incident Handling Model. The Cloud Security Ecosystem 2015: 383-400 - [p2]Chaz Vidal, Kim-Kwang Raymond Choo:
Cloud security and forensic readiness: The current state of an IaaS provider. The Cloud Security Ecosystem 2015: 401-428 - [p1]Mohammad Shariati, Ali Dehghantanha, Ben Martini, Kim-Kwang Raymond Choo:
Ubuntu One investigation: Detecting evidences on client machines. The Cloud Security Ecosystem 2015: 429-446
Editorship
- 2024
- [e36]Sokratis K. Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Maria Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha K. Kalutarage, Naoto Yanai:
Computer Security. ESORICS 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II. Lecture Notes in Computer Science 14399, Springer 2024, ISBN 978-3-031-54128-5 [contents] - 2023
- [e35]Keke Gai, Kim-Kwang Raymond Choo:
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, BSCI 2023, Melbourne, VIC, Australia, July 10-14, 2023. ACM 2023 [contents] - [e34]Guojun Wang, Kim-Kwang Raymond Choo, Jie Wu, Ernesto Damiani:
Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers. Communications in Computer and Information Science 1768, Springer 2023, ISBN 978-981-99-0271-2 [contents] - 2022
- [e33]Keke Gai, Kim-Kwang Raymond Choo:
BSCI 2022: Proceedings of the 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure, Nagasaki, Japan, May 30, 2022. ACM 2022, ISBN 978-1-4503-9175-7 [contents] - [e32]Debasis Giri, Kim-Kwang Raymond Choo, Saminathan Ponnusamy, Weizhi Meng, Sedat Akleylek, Santi Prasad Maity:
Proceedings of the Seventh International Conference on Mathematics and Computing - ICMC 2021, Shibpur, India, . Advances in Intelligent Systems and Computing 1412, Springer 2022, ISBN 978-981-16-6889-0 [contents] - [e31]Kim-Kwang Raymond Choo, Tommy H. Morris, Gilbert L. Peterson, Eric S. Imsand:
National Cyber Summit (NCS) Research Track 2021, Huntsville, AL, USA, September 28-30, 2021. Lecture Notes in Networks and Systems 310, Springer 2022, ISBN 978-3-030-84613-8 [contents] - [e30]Guojun Wang, Kim-Kwang Raymond Choo, Ryan K. L. Ko, Yang Xu, Bruno Crispo:
Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers. Communications in Computer and Information Science 1557, Springer 2022, ISBN 978-981-19-0467-7 [contents] - 2021
- [e29]Jemal H. Abawajy, Kim-Kwang Raymond Choo, Zheng Xu, Mohammed Atiquzzaman:
2020 International Conference on Applications and Techniques in Cyber Intelligence - Applications and Techniques in Cyber Intelligence (ATCI 2020), Fuyang, China, 20-22 June, 2020. Advances in Intelligent Systems and Computing 1244, Springer 2021, ISBN 978-3-030-53979-5 [contents] - [e28]Keke Gai, Kim-Kwang Raymond Choo:
BSCI '21: Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure, Virtual Event, Hong Kong, June 7, 2021. ACM 2021, ISBN 978-1-4503-8400-1 [contents] - [e27]Kim-Kwang Raymond Choo, Tommy H. Morris, Gilbert L. Peterson, Eric S. Imsand:
National Cyber Summit (NCS) Research Track 2020, Huntsville, AL, USA, June 2-4, 2020. Advances in Intelligent Systems and Computing 1271, Springer 2021, ISBN 978-3-030-58702-4 [contents] - 2020
- [e26]Haojun Huang, Lizhe Wang, Yulei Wu, Kim-Kwang Raymond Choo:
Blockchains for Network Security: Principles, technologies and applications. Institution of Engineering and Technology 2020, ISBN 9781785618741 [contents] - [e25]Kim-Kwang Raymond Choo, Ali Dehghantanha:
Handbook of Big Data Privacy. Springer 2020, ISBN 978-3-030-38556-9 [contents] - [e24]Xiaolu Zhang, Kim-Kwang Raymond Choo:
Digital Forensic Education, An Experiential Learning Approach. Studies in Big Data 61, Springer 2020, ISBN 978-3-030-23546-8 [contents] - [e23]Nhien-An Le-Khac, Kim-Kwang Raymond Choo:
Cyber and Digital Forensic Investigations, A Law Enforcement Practitioner's Perspective. Studies in Big Data 74, Springer 2020, ISBN 978-3-030-47130-9 [contents] - [e22]Keke Gai, Kim-Kwang Raymond Choo, Jiamou Liu:
BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, co-located with AsiaCCS 2020, Taipei, Taiwan, October 6, 2020. ACM 2020, ISBN 978-1-4503-7610-5 [contents] - [e21]Zheng Xu, Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi, Mohammad Hammoudeh:
Cyber Security Intelligence and Analytics, CSIA 2019, Shenyang, China, 21-22 February 2019. Advances in Intelligent Systems and Computing 928, Springer 2020, ISBN 978-3-030-15234-5 [contents] - [e20]Sriram Chellappan, Kim-Kwang Raymond Choo, NhatHai Phan:
Computational Data and Social Networks - 9th International Conference, CSoNet 2020, Dallas, TX, USA, December 11-13, 2020, Proceedings. Lecture Notes in Computer Science 12575, Springer 2020, ISBN 978-3-030-66045-1 [contents] - [e19]Kim-Kwang Raymond Choo, Thomas H. Morris, Gilbert L. Peterson:
National Cyber Summit, NCS 2019, Research Track, Huntsville, AL, USA, 4-6 June, 2019. Advances in Intelligent Systems and Computing 1055, Springer 2020, ISBN 978-3-030-31238-1 [contents] - [e18]Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi:
Blockchain Cybersecurity, Trust and Privacy. Advances in Information Security 79, Springer 2020, ISBN 978-3-030-38180-6 [contents] - [e17]Leslie F. Sikos, Kim-Kwang Raymond Choo:
Data Science in Cybersecurity and Cyberthreat Intelligence. Intelligent Systems Reference Library 177, Springer 2020, ISBN 978-3-030-38787-7 [contents] - 2019
- [e16]Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa:
Security and Privacy for Big Data, Cloud Computing and Applications. Institution of Engineering and Technology 2019, ISBN 9781785617485 [contents] - [e15]Ali Dehghantanha, Kim-Kwang Raymond Choo:
Handbook of Big Data and IoT Security. Springer 2019, ISBN 978-3-030-10542-6 [contents] - [e14]Keke Gai, Kim-Kwang Raymond Choo, Debiao He, Sheng Wen:
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, BSCI 2019, Auckland, New Zealand, July 8, 2019. ACM 2019, ISBN 978-1-4503-6786-8 [contents] - [e13]Guojun Wang, Abdulmotaleb El-Saddik, Xuejia Lai, Gregorio Martínez Pérez, Kim-Kwang Raymond Choo:
Smart City and Informatization - 7th International Conference, iSCI 2019, Guangzhou, China, November 12-15, 2019, Proceedings. Communications in Computer and Information Science 1122, Springer 2019, ISBN 978-981-15-1300-8 [contents] - [e12]Christian Esposito, Jiman Hong, Kim-Kwang Raymond Choo:
Pervasive Systems, Algorithms and Networks - 16th International Symposium, I-SPAN 2019, Naples, Italy, September 16-20, 2019, Proceedings. Communications in Computer and Information Science 1080, Springer 2019, ISBN 978-3-030-30142-2 [contents] - [e11]James J. Park, Vincenzo Loia, Kim-Kwang Raymond Choo, Gangman Yi:
Advanced Multimedia and Ubiquitous Engineering - MUE/FutureTech 2018, Salerno, Italy, 23-25 April 2018. Lecture Notes in Electrical Engineering 518, Springer 2019, ISBN 978-981-13-1327-1 [contents] - [e10]Songqing Chen, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, Aziz Mohaisen:
Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 304, Springer 2019, ISBN 978-3-030-37227-9 [contents] - [e9]Songqing Chen, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, Aziz Mohaisen:
Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 305, Springer 2019, ISBN 978-3-030-37230-9 [contents] - 2017
- [e8]Man Ho Allen Au, Kim-Kwang Raymond Choo:
Mobile Security and Privacy - Advances, Challenges and Future Research Directions. Elsevier 2017, ISBN 978-0-12-804629-6 [contents] - [e7]Kim-Kwang Raymond Choo, Ali Dehghantanha:
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications. Elsevier 2017, ISBN 978-0-12-805303-4 [contents] - [e6]Man Ho Allen Au, Arcangelo Castiglione, Kim-Kwang Raymond Choo, Francesco Palmieri, Kuan-Ching Li:
Green, Pervasive, and Cloud Computing - 12th International Conference, GPC 2017, Cetara, Italy, May 11-14, 2017, Proceedings. Lecture Notes in Computer Science 10232, 2017, ISBN 978-3-319-57185-0 [contents] - [e5]Shadi Ibrahim, Kim-Kwang Raymond Choo, Zheng Yan, Witold Pedrycz:
Algorithms and Architectures for Parallel Processing - 17th International Conference, ICA3PP 2017, Helsinki, Finland, August 21-23, 2017, Proceedings. Lecture Notes in Computer Science 10393, Springer 2017, ISBN 978-3-319-65481-2 [contents] - [e4]James Jong Hyuk Park, Shu-Ching Chen, Kim-Kwang Raymond Choo:
Advanced Multimedia and Ubiquitous Engineering - MUE/FutureTech 2017, Seoul, Korea, 22-24 May 2017. Lecture Notes in Electrical Engineering 448, 2017, ISBN 978-981-10-5040-4 [contents] - [e3]Guojun Wang, Mohammed Atiquzzaman, Zheng Yan, Kim-Kwang Raymond Choo:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - 10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017, Proceedings. Lecture Notes in Computer Science 10656, Springer 2017, ISBN 978-3-319-72388-4 [contents] - [e2]Guojun Wang, Mohammed Atiquzzaman, Zheng Yan, Kim-Kwang Raymond Choo:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings. Lecture Notes in Computer Science 10658, Springer 2017, ISBN 978-3-319-72394-5 [contents] - 2015
- [e1]Ryan Kok Leong Ko, Kim-Kwang Raymond Choo:
The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues. Elsevier 2015, ISBN 978-0-12-801595-7 [contents]
Informal and Other Publications
- 2024
- [i78]Zhiyu Zhu, Huaming Chen, Xinyi Wang, Jiayu Zhang, Zhibo Jin, Kim-Kwang Raymond Choo, Jun Shen, Dong Yuan:
GE-AdvGAN: Improving the transferability of adversarial samples by gradient editing-based adversarial generative model. CoRR abs/2401.06031 (2024) - [i77]Yanli Li, Jehad Ibrahim, Huaming Chen, Dong Yuan, Kim-Kwang Raymond Choo:
Holistic Evaluation Metrics: Use Case Sensitive Evaluation Metrics for Federated Learning. CoRR abs/2405.02360 (2024) - [i76]Tianxiu Xie, Keke Gai, Jing Yu, Liehuang Zhu, Kim-Kwang Raymond Choo:
A2-DIDM: Privacy-preserving Accumulator-enabled Auditing for Distributed Identity of DNN Model. CoRR abs/2405.04108 (2024) - [i75]Xiaoxiao Chi, Xuyun Zhang, Yan Wang, Lianyong Qi, Amin Beheshti, Xiaolong Xu, Kim-Kwang Raymond Choo, Shuo Wang, Hongsheng Hu:
Shadow-Free Membership Inference Attacks: Recommender Systems Are More Vulnerable Than You Thought. CoRR abs/2405.07018 (2024) - [i74]Ryan Pavlich, Nima Ebadi, Richard Tarbell, Billy Linares, Adrian Tan, Rachael Humphreys, Jayanta Kumar Das, Rambod Ghandiparsi, Hannah Haley, Jerris George, Rocky Slavin, Kim-Kwang Raymond Choo, Glenn Dietrich, Anthony Rios:
Beyond Text-to-SQL for IoT Defense: A Comprehensive Framework for Querying and Classifying IoT Threats. CoRR abs/2406.17574 (2024) - [i73]Falguni Roy, Xiaofeng Ding, Kim-Kwang Raymond Choo, Pan Zhou:
A Deep Dive into Fairness, Bias, Threats, and Privacy in Recommender Systems: Insights and Future Research. CoRR abs/2409.12651 (2024) - 2023
- [i72]Mohamed Amine Ferrag, Burak Kantarci, Lucas C. Cordeiro, Mérouane Debbah, Kim-Kwang Raymond Choo:
Poisoning Attacks in Federated Edge Learning for Digital Twin 6G-enabled IoTs: An Anticipatory Study. CoRR abs/2303.11745 (2023) - [i71]Richard Tarbell, Kim-Kwang Raymond Choo, Glenn Dietrich, Anthony Rios:
Towards Understanding the Generalization of Medical Text-to-SQL Models and Datasets. CoRR abs/2303.12898 (2023) - [i70]Mohamed Amine Ferrag, Othmane Friha, Burak Kantarci, Norbert Tihanyi, Lucas C. Cordeiro, Mérouane Debbah, Djallel Hamouda, Muna Al-Hawawreh, Kim-Kwang Raymond Choo:
Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses. CoRR abs/2306.10309 (2023) - [i69]Jianyi Zhang, Xu Ji, Zhangchi Zhao, Xiali Hei, Kim-Kwang Raymond Choo:
Ethical Considerations and Policy Implications for Large Language Models: Guiding Responsible Development and Deployment. CoRR abs/2308.02678 (2023) - [i68]Hongsheng Hu, Xuyun Zhang, Zoran Salcic, Lichao Sun, Kim-Kwang Raymond Choo, Gillian Dobbie:
Source Inference Attacks: Beyond Membership Inference Attacks in Federated Learning. CoRR abs/2310.00222 (2023) - [i67]Zhiyu Zhu, Huaming Chen, Jiayu Zhang, Xinyi Wang, Zhibo Jin, Minhui Xue, Dongxiao Zhu, Kim-Kwang Raymond Choo:
MFABA: A More Faithful and Accelerated Boundary-based Attribution Method for Deep Neural Networks. CoRR abs/2312.13630 (2023) - [i66]Jessica Liu, Huaming Chen, Jun Shen, Kim-Kwang Raymond Choo:
FairCompass: Operationalising Fairness in Machine Learning. CoRR abs/2312.16726 (2023) - 2022
- [i65]Yuexin Xiang, Yuchen Lei, Ding Bao, Wei Ren, Tiantian Li, Qingqing Yang, Wenmao Liu, Tianqing Zhu, Kim-Kwang Raymond Choo:
BABD: A Bitcoin Address Behavior Dataset for Address Behavior Pattern Analysis. CoRR abs/2204.05746 (2022) - [i64]Eugene Chang, Paul D'Arcy, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
Forensic Artefact Discovery and Attribution from Android Cryptocurrency Wallet Applications. CoRR abs/2205.14611 (2022) - [i63]Peiying Zhang, Ning Chen, Shibao Li, Kim-Kwang Raymond Choo, Chunxiao Jiang:
Multi-Domain Virtual Network Embedding Algorithm based on Horizontal Federated Learning. CoRR abs/2205.14665 (2022) - [i62]Neelu Jyoti Ahuja, Adarsh Kumar, Monika Thapliyal, Sarthika Dutt, Tanesh Kumar, Diego Augusto de Jesus Pacheco, Charalambos Konstantinou, Kim-Kwang Raymond Choo:
Blockchain for Unmanned Underwater Drones: Research Issues, Challenges, Trends and Future Directions. CoRR abs/2210.06540 (2022) - 2021
- [i61]Christos Xenofontos, Ioannis Zografopoulos, Charalambos Konstantinou, Alireza Jolfaei, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
Consumer, Commercial and Industrial IoT (In)Security: Attack Taxonomy and Case Studies. CoRR abs/2105.06612 (2021) - [i60]George Grispos, Talon Flynn, William Bradley Glisson, Kim-Kwang Raymond Choo:
Investigating Protected Health Information Leakage from Android Medical Applications. CoRR abs/2105.07360 (2021) - [i59]Yuexin Xiang, Tiantian Li, Wei Ren, Tianqing Zhu, Kim-Kwang Raymond Choo:
A Lightweight Privacy-Preserving Scheme Using Label-based Pixel Block Mixing for Image Classification in Deep Learning. CoRR abs/2105.08876 (2021) - [i58]Sidra Zafar, Mohsin Nazir, Taimur Bakhshi, Hasan Ali Khattak, Sarmadullah Khan, Muhammad Bilal, Kim-Kwang Raymond Choo, Kyung-Sup Kwak, Aneeqa Sabah:
A Systematic Review of Bio-Cyber Interface Technologies and Security Issues for Internet of Bio-Nano Things. CoRR abs/2106.14273 (2021) - [i57]George Grispos, Frank Tursi, Kim-Kwang Raymond Choo, William Mahoney, William Bradley Glisson:
A Digital Forensics Investigation of a Smart Scale IoT Ecosystem. CoRR abs/2109.05518 (2021) - 2020
- [i56]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Wei Zheng, Kim-Kwang Raymond Choo, Robert H. Deng:
VerifyTL: Secure and Verifiable Collaborative Transfer Learning. CoRR abs/2005.08997 (2020) - [i55]Yulei Wu, Hong-Ning Dai, Hao Wang, Kim-Kwang Raymond Choo:
Blockchain-based Privacy Preservation for 5G-enabled Drone Communications. CoRR abs/2009.03164 (2020) - [i54]Yuexin Xiang, Wei Ren, Tiantian Li, Xianghan Zheng, Tianqing Zhu, Kim-Kwang Raymond Choo:
Efficiently Constructing Adversarial Examples by Feature Watermarking. CoRR abs/2009.05107 (2020) - [i53]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
Pocket Diagnosis: Secure Federated Learning against Poisoning Attack in the Cloud. CoRR abs/2009.10918 (2020) - [i52]Ehsan Nowroozi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo:
A Survey of Machine Learning Techniques in Adversarial Image Forensics. CoRR abs/2010.09680 (2020) - [i51]Yi Ding, Fuyuan Tan, Zhen Qin, Mingsheng Cao, Kim-Kwang Raymond Choo, Zhiguang Qin:
DeepKeyGen: A Deep Learning-based Stream Cipher Generator for Medical Image Encryption and Decryption. CoRR abs/2012.11097 (2020) - 2019
- [i50]Charith Perera, Mahmoud Barhamgi, Suparna De, Tim Baarslag, Massimo Vecchio, Kim-Kwang Raymond Choo:
Designing Sensing as a Service (S2aaS) Ecosystem for Internet of Things. CoRR abs/1904.05023 (2019) - [i49]Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Blockchain-enabled Authentication Handover with Efficient Privacy Protection in SDN-based 5G Networks. CoRR abs/1905.03193 (2019) - [i48]Fran Casino, Kim-Kwang Raymond Choo, Constantinos Patsakis:
HEDGE: Efficient Traffic Classification of Encrypted and Compressed Packets. CoRR abs/1905.11873 (2019) - [i47]Sajad Homayoun, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo:
A Blockchain-based Framework for Detecting Malicious Mobile Applications in App Stores. CoRR abs/1906.04951 (2019) - [i46]Reza M. Parizi, Sajad Homayoun, Abbas Yazdinejad, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains. CoRR abs/1906.04953 (2019) - 2018
- [i45]Alan Roder, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study. CoRR abs/1804.08649 (2018) - [i44]Giovanni Pau, Mario Collotta, Vincenzo Maniscalco, Kim-Kwang Raymond Choo:
A fuzzy-PSO system for indoor localization based on visible light communications. CoRR abs/1805.09248 (2018) - [i43]Zijian Bao, Wenbo Shi, Debiao He, Kim-Kwang Raymond Choo:
IoTChain: A Three-Tier Blockchain-based IoT Security Architecture. CoRR abs/1806.02008 (2018) - [i42]Arie Kouwen, Mark Scanlon, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
Digital forensic investigation of two-way radio communication equipment and services. CoRR abs/1807.08264 (2018) - [i41]Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo:
CloudMe Forensics: A Case of Big-Data Investigation. CoRR abs/1807.10218 (2018) - [i40]Opeyemi A. Osanaiye, Kim-Kwang Raymond Choo, Ali Dehghantanha, Zheng Xu, Mqhele E. Dlodlo:
Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing. CoRR abs/1807.10443 (2018) - [i39]Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study. CoRR abs/1807.10445 (2018) - [i38]Dennis Kiwia, Ali Dehghantanha, Kim-Kwang Raymond Choo, Jim Slaughter:
A Cyber Kill Chain Based Taxonomy of Banking Trojans for Evolutionary Computational Intelligence. CoRR abs/1807.10446 (2018) - [i37]Mohammad Shariati, Ali Dehghantanha, Ben Martini, Kim-Kwang Raymond Choo:
Ubuntu One Investigation: Detecting Evidences on Client Machines. CoRR abs/1807.10448 (2018) - [i36]Gregory Epiphaniou, Petros Karadimas, Dhouha Kbaier Ben Ismail, Haider M. Al-Khateeb, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks. CoRR abs/1808.01202 (2018) - [i35]William Ledbetter, William Bradley Glisson, Todd McDonald, Todd R. Andel, George Grispos, Kim-Kwang Raymond Choo:
Digital Blues: An Investigation into the Use of Bluetooth Protocols. CoRR abs/1808.02153 (2018) - [i34]Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo, Amritraj Singh:
Empirical Vulnerability Analysis of Automated Smart Contracts Security Testing on Blockchains. CoRR abs/1809.02702 (2018) - [i33]Yudi Zhang, Debiao He, Xinyi Huang, Ding Wang, Kim-Kwang Raymond Choo:
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography. IACR Cryptol. ePrint Arch. 2018: 814 (2018) - [i32]Quang Do, Ben Martini, Kim-Kwang Raymond Choo:
The Role of the Adversary Model in Applied Security Research. IACR Cryptol. ePrint Arch. 2018: 1189 (2018) - 2017
- [i31]Seyed Hossein Mohtasebi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud. CoRR abs/1706.08042 (2017) - [i30]Lek Christopher, Kim-Kwang Raymond Choo, Ali Dehghantanha:
Honeypots for employee information security awareness and education training: A conceptual EASY training model. CoRR abs/1706.08043 (2017) - [i29]Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda:
Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine. CoRR abs/1706.08879 (2017) - [i28]Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda:
Forensic Investigation of P2P Cloud Storage: BitTorrent Sync as a Case Study. CoRR abs/1707.04715 (2017) - [i27]George Grispos, William Bradley Glisson, Kim-Kwang Raymond Choo:
Medical Cyber-Physical Systems Development: A Forensics-Driven Approach. CoRR abs/1708.05374 (2017) - [i26]Wybren van der Meer, Kim-Kwang Raymond Choo, Nhien-An Le-Khac, M. Tahar Kechadi:
Investigation and Automating Extraction of Thumbnails Produced by Image viewers. CoRR abs/1708.09051 (2017) - [i25]Bernard Chukwuemeka Ogazi-Onyemaechi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Performance of Android Forensics Data Recovery Tools. CoRR abs/1709.05144 (2017) - [i24]Dongqing Xu, Debiao He, Kim-Kwang Raymond Choo, Jianhua Chen:
Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error. IACR Cryptol. ePrint Arch. 2017: 360 (2017) - 2016
- [i23]Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda:
Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies. CoRR abs/1603.05369 (2016) - [i22]Alireza Heravi, Sameera Mubarak, Kim-Kwang Raymond Choo:
Online Social Networking Has a Greater Effect on Others than on Me: A Third-Person Effect Perspective. CoRR abs/1605.04723 (2016) - [i21]Niken Dwi Wahyu Cahyani, Ben Martini, Kim-Kwang Raymond Choo:
Using Multimedia Presentations to Improve Digital Forensic Understanding: A Pilot Study. CoRR abs/1606.01425 (2016) - 2015
- [i20]Abdullah Azfar, Kim-Kwang Raymond Choo, Lin Liu:
Forensic Taxonomy of Popular Android mHealth Apps. CoRR abs/1505.02905 (2015) - [i19]Jody Farnden, Ben Martini, Kim-Kwang Raymond Choo:
Privacy Risks in Mobile Dating Apps. CoRR abs/1505.02906 (2015) - [i18]Nurul Hidayah Ab Rahman, Kim-Kwang Raymond Choo:
Factors Influencing the Adoption of Cloud Incident Handling Strategy: A Preliminary Study in Malaysia. CoRR abs/1505.02908 (2015) - [i17]Ben Martini, Quang Do, Kim-Kwang Raymond Choo:
Conceptual evidence collection and analysis methodology for Android devices. CoRR abs/1506.05527 (2015) - [i16]Ben Martini, Quang Do, Kim-Kwang Raymond Choo:
Mobile Cloud Forensics: An Analysis of Seven Popular Android Apps. CoRR abs/1506.05533 (2015) - [i15]Junghyun Nam, Kim-Kwang Raymond Choo, Sangchul Han, Moonseong Kim, Juryon Paik, Dongho Won:
Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation. CoRR abs/1509.06813 (2015) - [i14]Quang Do, Ben Martini, Kim-Kwang Raymond Choo:
A Forensically Sound Adversary Model for Mobile Devices. CoRR abs/1509.06815 (2015) - 2014
- [i13]Kim-Kwang Raymond Choo, Junghyun Nam, Dongho Won:
A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols. IACR Cryptol. ePrint Arch. 2014: 358 (2014) - 2013
- [i12]Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won:
On the security of a password-only authenticated three-party key exchange protocol. IACR Cryptol. ePrint Arch. 2013: 540 (2013) - [i11]Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won:
An Offline Dictionary Attack against a Three-Party Key Exchange Protocol. IACR Cryptol. ePrint Arch. 2013: 666 (2013) - 2008
- [i10]Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo, Lihua Wang:
Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol. IACR Cryptol. ePrint Arch. 2008: 1 (2008) - 2007
- [i9]Sherman S. M. Chow, Kim-Kwang Raymond Choo:
Strongly-Secure Identity-based Key Agreement and Anonymous Extension. IACR Cryptol. ePrint Arch. 2007: 18 (2007) - [i8]Kim-Kwang Raymond Choo:
A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model. IACR Cryptol. ePrint Arch. 2007: 188 (2007) - [i7]Shengbao Wang, Zhenfu Cao, ZhaoHui Cheng, Kim-Kwang Raymond Choo:
Perfect Forward Secure Identity-Based Authenticated Key Agreement Protocol in the Escrow Mode. IACR Cryptol. ePrint Arch. 2007: 313 (2007) - 2006
- [i6]Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo:
New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles). IACR Cryptol. ePrint Arch. 2006: 446 (2006) - 2005
- [i5]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock:
On Session Key Construction in Provably-Secure Key Establishment Protocols: Revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-Based Protocols. IACR Cryptol. ePrint Arch. 2005: 206 (2005) - [i4]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock:
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. IACR Cryptol. ePrint Arch. 2005: 270 (2005) - [i3]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock:
Errors in Computational Complexity Proofs for Protocols. IACR Cryptol. ePrint Arch. 2005: 351 (2005) - 2004
- [i2]Kim-Kwang Raymond Choo:
Revisit Of McCullagh-Barreto Two-Party ID-Based Authenticated Key Agreement Protocols. IACR Cryptol. ePrint Arch. 2004: 343 (2004) - [i1]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland:
On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. IACR Cryptol. ePrint Arch. 2004: 345 (2004)
Coauthor Index
aka: Niken Dwi Wahyu Cahyani
aka: Christian Javier D'Orazio
aka: William Bradley Glisson
aka: Paul Rad
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint