Research Opportunities


Research Publications

  • Xiaotian Wang, Matthew Davis, Junjie Zhang, and Vance Saunders. "Mission-Aware Vulnerability Assessment for Cyber-Physical Systems." in Proceedings of the 1st IEEE International Workshop on Trustworthy Software Systems (TrustSoft’15), Helsinki, Finland, 2015.
  • Jianfeng Li, Jing Tao, Xiaobo Ma, Junjie Zhang, and Xiaohong Guan, “Modeling Repeating Behaviors in Packet Arrivals: Detection and Measurement”, in Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM'15), HONG KONG, China, 2015. (R) 
  • Yu Li, Rui Dai, and Junjie Zhang, "Morphing Communications of Cyber-Physical Systems Towards Moving Target Defense", In Proceedings of the 2014 IEEE International Conference on Communications (ICC’14), Jun. 2014. (R) 
  • D. Doran and S. Gokhale. “Web Robot Detection Techniques: Overview and Limitations”, Data Mining and Knowledge Discovery, vol. 22, pp. 183-210, 2011
  • Sagar Sharma, Keke Chen, and Amit Sheth, "Towards Practical Privacy-Preserving Analytics for IoT and Cloud Based Healthcare Systems" ", IEEE Internet Computing, accepted in 2017, online 2018
  • Keke Chen and Shumin Guo, “RASP-Boost: Practical Confidential Classifier Learning in the Cloud”, IEEE Transactions on Cloud Computing, 2015.
  • V. Muppavarapu and S. M. Chung, “Semantic-based Access Control for Data Resources in Open Grid Services Architecture - Data Access and Integration (OGSA-DAI),” International Journal of Grid and High Performance Computing, Vol. 6, No. 2, IGI Global, 2014, pp. 1–23. 
  • S. M. Park and S. M. Chung, “Privacy-Preserving Attribute-Based Access Control for Grid Computing,” International Journal of Grid and Utility Computing, Vol. 5, No. 4, Inderscience, 2014, pp. 286–296
  • Giovani Abuaitah*, Bin Wang, “A Taxonomy of Sensor Network Anomalies and Their Detection Approaches.” Technological Breakthroughs in Modern Wireless Sensor Applications. Edited by Kavian/Sharif, IGI Global 2015. (R)
  • Yue Dang*, Bin Wang, Ryan Brant*, Zhiping Zhang, Maha Alqallaf*, Zhiqiang Wu, “Anomaly Detection for Data Streams in Large-Scale Distributed Heterogeneous Computing Environments,” Proceedings of International Conference on Cyber Warfare and Security (ICCWS), 2017.

Conference

  • Nikhil George and Prabhaker Mateti, Keeping the Android User Aware of Past and Present Network Tra_c, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 7 pp. Sep 13 - 16, 2017, Manipal, Karnataka, India.
  • Karthik M. Rao, PS Aiyyappan, and Prabhaker Mateti, Adding Continuous Proactive Forensics to Android, 2nd International Conference on Applied Soft computing and Communication Networks (ACN 2017), Sep 13 - 16, 2017, Manipal, Karnataka, India