Surya Nepal
#140,102
Most Influential Person Now
Researcher
Surya Nepal's AcademicInfluence.com Rankings
Surya Nepalcomputer-science Degrees
Computer Science
#6671
World Rank
#7031
Historical Rank
Computational Linguistics
#1199
World Rank
#1213
Historical Rank
Machine Learning
#2242
World Rank
#2270
Historical Rank
Artificial Intelligence
#2509
World Rank
#2550
Historical Rank

Download Badge
Computer Science
Why Is Surya Nepal Influential?
(Suggest an Edit or Addition)Surya Nepal's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- A survey of trust in social networks (2013) (616)
- IoT Middleware: A Survey on Issues and Enabling Technologies (2017) (562)
- A survey of emerging threats in cybersecurity (2014) (485)
- STRIP: a defence against trojan attacks on deep neural networks (2019) (386)
- Internet of Things (IoT) (2016) (281)
- Query processing issues in image (multimedia) databases (1999) (278)
- Automatic detection of 'Goal' segments in basketball videos (2001) (186)
- Deep Learning for Community Detection: Progress, Challenges and Opportunities (2020) (169)
- A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud (2013) (168)
- Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection (2018) (161)
- Threats to Networking Cloud and Edge Datacenters in the Internet of Things (2016) (155)
- A platform for secure monitoring and sharing of generic health data in the Cloud (2014) (147)
- Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption (2018) (128)
- A service computing manifesto (2017) (122)
- A Comprehensive Survey on Community Detection with Deep Learning (2021) (117)
- Barriers for delivering telehealth in rural australia: a review based on Australian trials and studies. (2014) (113)
- Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud (2015) (104)
- A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud (2014) (100)
- A Survey of Android Malware Detection with Deep Neural Models (2020) (97)
- Lightweight Mutual Authentication for IoT and Its Applications (2017) (97)
- IoTChain: Establishing Trust in the Internet of Things Ecosystem Using Blockchain (2018) (96)
- End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things (2020) (90)
- An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud (2013) (89)
- Using gamification in an online community (2012) (89)
- A Declarative Recommender System for Cloud Infrastructure Services Selection (2012) (89)
- A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud (2015) (88)
- An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures (2016) (87)
- Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review (2020) (86)
- An ontology-based system for Cloud infrastructure services' discovery (2012) (84)
- TrustStore: Making Amazon S3 Trustworthy with Services Composition (2010) (83)
- STrust: A Trust Model for Social Networks (2011) (83)
- Cross-Target Stance Classification with Self-Attention Networks (2018) (80)
- A service computing manifesto: the next 10 years (2017) (80)
- A dynamic prime number based efficient security mechanism for big sensing data streams (2017) (78)
- Platform-independent Secure Blockchain-Based Voting System (2018) (78)
- Secure Data Sharing in the Cloud (2014) (76)
- Trustworthy Processing of Healthcare Big Data in Hybrid Clouds (2015) (75)
- Reputation Propagation in Composite Services (2009) (73)
- The Next Grand Challenges: Integrating the Internet of Things and Data Science (2018) (72)
- DLSeF: A Dynamic Key-Length-Based Efficient Real-Time Security Verification Model for Big Data Stream (2017) (69)
- DIaaS: Data Integrity as a Service in the Cloud (2011) (68)
- A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream (2015) (67)
- Security, Privacy and Trust in Cloud Systems (2013) (63)
- WebRTC-based video conferencing service for telehealth (2014) (62)
- Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training? (2020) (60)
- Gamification for Online Communities: A Case Study for Delivering Government Services (2014) (55)
- Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples (2019) (54)
- Backdoor Attacks Against Transfer Learning With Pre-Trained Deep Learning Models (2020) (52)
- A Secure Verifiable Ranked Choice Online Voting System Based on Homomorphic Encryption (2018) (50)
- Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing (2019) (49)
- SEEN: A Selective Encryption Method to Ensure Confidentiality for Big Sensing Data Streams (2019) (45)
- DPBSV -- An Efficient and Secure Scheme for Big Sensing Data Stream (2015) (44)
- End-to-End Service Support for Mashups (2010) (44)
- A fuzzy object query language (FOQL) for image databases (1999) (43)
- A Multi-Vocal Review of Security Orchestration (2019) (42)
- SMARTSHIELD: Automatic Smart Contract Protection Made Easy (2020) (42)
- Statistical Twitter Spam Detection Demystified: Performance, Stability and Scalability (2017) (40)
- A MapReduce Based Approach of Scalable Multidimensional Anonymization for Big Data Privacy Preservation on Cloud (2013) (39)
- A Secure Big Data Stream Analytics Framework for Disaster Management on the Cloud (2016) (39)
- Consistency for Web Services Applications (2005) (39)
- A test-bed for the evaluation of business process prediction techniques (2011) (35)
- A trust model-based analysis of social networks (2013) (34)
- IoT Device Identification via Network-Flow Based Fingerprinting and Learning (2019) (33)
- A Survey of MPEG-1 Audio, Video and Semantic Analysis Techniques (2005) (33)
- A lightweight authentication scheme for vehicular ad hoc networks based on MSR (2019) (33)
- SDN Enabled Secure IoT Architecture (2019) (32)
- Blockchain voting: Publicly verifiable online voting protocol without trusted tallying authorities (2020) (32)
- Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on Cloud (2013) (32)
- Proof-of-QoS: QoS based blockchain consensus protocol (2019) (32)
- Scheduling Real-Time Security Aware Tasks in Fog Networks (2019) (32)
- Privacy Preservation over Big Data in Cloud Systems (2014) (30)
- Security and Performance Considerations in ROS 2: A Balancing Act (2018) (30)
- Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks (2019) (30)
- Trusting the Social Web: issues and challenges (2013) (30)
- Building Trust Communities Using Social Trust (2011) (30)
- A Fuzzy Trust Management Framework for Service Web (2010) (29)
- An Infrastructure Service Recommendation System for Cloud Applications with Real-time QoS Requirement Constraints (2017) (28)
- Design of a multi-site multi-state clinical trial of home monitoring of chronic disease in the community in Australia (2014) (28)
- Impact of At-Home Telemonitoring on Health Services Expenditure and Hospital Admissions in Patients With Chronic Conditions: Before and After Control Intervention Analysis (2017) (28)
- Reputation Management for Composite Services in Service-Oriented Systems (2011) (27)
- Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy (2021) (27)
- MPHC: Preserving Privacy for Workflow Execution in Hybrid Clouds (2013) (27)
- Cloud Computing and Scientific Applications - Big Data, Scalable Analytics, and Beyond (2013) (27)
- SaC‐FRAPP: a scalable and cost‐effective framework for privacy preservation over big data on cloud (2013) (26)
- A survey of recent methods on deriving topics from Twitter: algorithm to evaluation (2020) (26)
- Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks (2018) (26)
- A framework for telehealth program evaluation. (2014) (26)
- Secure and Controlled Sharing of Data in Distributed Computing (2013) (25)
- Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing (2020) (25)
- Privacy Preserving Location-Aware Personalized Web Service Recommendations (2018) (25)
- A3CM: Automatic Capability Annotation for Android Malware (2019) (24)
- A Synchronized Shared Key Generation Method for Maintaining End-to-End Security of Big Data Streams (2017) (24)
- RT-SANE: Real Time Security Aware Scheduling on the Network Edge (2017) (23)
- Developing Dependable and Secure Cloud Applications (2016) (23)
- PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses (2020) (23)
- Privacy-Aware Scheduling SaaS in High Performance Computing Environments (2017) (23)
- Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference (2021) (23)
- KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels (2018) (22)
- A behaviour-based trust model for service web (2010) (22)
- Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain (2020) (22)
- Mirror, Mirror, on the Web, Which Is the Most Reputable Service of Them All? - A Domain-Aware and Reputation-Aware Method for Service Recommendation (2013) (22)
- DAVE: a system for quality driven adaptive video delivery (2003) (21)
- A mobile and portable trusted computing platform (2011) (21)
- A Service-Oriented Workflow Language for Robust Interacting Applications (2005) (21)
- Privacy-protected statistics publication over social media user trajectory streams (2017) (21)
- Decentralized Voting: A Self-tallying Voting System Using a Smart Contract on the Ethereum Blockchain (2018) (21)
- ConTaaS: An Approach to Internet-Scale Contextualisation for Developing Efficient Internet of Things Applications (2017) (20)
- Online Multiple Workflow Scheduling under Privacy and Deadline in Hybrid Cloud Environment (2014) (20)
- Privacy-Preserving Layer over MapReduce on Cloud (2012) (20)
- WSLA+: Web Service Level Agreement Language for Collaborations (2008) (20)
- Managing Multimedia Semantics (2005) (20)
- Using time-sensitive interactions to improve topic derivation in twitter (2016) (20)
- Secure Connectivity for Intra-cloud and Inter-cloud Communication (2011) (20)
- A Trust Ontology for Semantic Services (2010) (19)
- Ethical considerations in an online community: the balancing act (2013) (19)
- Expressing and Reasoning about Service Contracts in Service-Oriented Computing (2006) (19)
- Fuzzy Extractors for Biometric Identification (2017) (19)
- A Secure Storage Service in the Hybrid Cloud (2011) (19)
- Engagement and Cooperation in Social Networks: Do Benefits and Rewards Help? (2012) (19)
- Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones (2018) (19)
- Facilitating Secure Sharing of Personal Health Data in the Cloud (2016) (18)
- SafeProtect: Controlled Data Sharing With User-Defined Policies in Cloud-Based Collaborative Environment (2016) (18)
- Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices (2014) (18)
- A Cloud Architecture of Virtual Trusted Platform Modules (2010) (18)
- A Distributed Approach for Negotiating Resource Contributions in Dynamic Collaboration (2007) (18)
- A Novel Equitable Trustworthy Mechanism for Service Recommendation in the Evolving Service Ecosystem (2014) (18)
- Edge-based semantic classification of sports video sequences (2003) (18)
- A social trust based friend recommender for online communities “invited paper” (2013) (18)
- An internet of things service roadmap (2021) (18)
- Isolation Support for Service-based Applications: A Position Paper (2006) (17)
- A Tag-Based Data Model for Privacy-Preserving Medical Applications (2006) (17)
- Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models (2019) (17)
- A Conflict Neighbouring Negotiation Algorithm for Resource Services in Dynamic Collaborations (2008) (17)
- A note on resource orchestration for cloud computing (2015) (17)
- An Event-Driven Workflow Engine for Service-based Business Systems (2006) (17)
- TruXy: Trusted Storage Cloud for Scientific Workflows (2017) (16)
- Interaction-Based Recommendations for Online Communities (2015) (16)
- Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training (2018) (16)
- Incorporating Tweet Relationships into Topic Derivation (2015) (16)
- Privacy-Preserving User Profile Matching in Social Networks (2020) (16)
- Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution (2020) (16)
- Building Secure SRAM PUF Key Generators on Resource Constrained Devices (2019) (16)
- Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things (2020) (15)
- The design of an online community for welfare recipients (2012) (15)
- Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things (2021) (15)
- Trust Extension Device: Providing Mobility and Portability of Trust in Cooperative Information Systems (2007) (15)
- A Trust Prediction Model for Service Web (2011) (15)
- DRAMDig: A Knowledge-assisted Tool to Uncover DRAM Address Mapping (2020) (14)
- Galaxy + Hadoop: Toward a Collaborative and Scalable Image Processing Toolbox in Cloud (2013) (14)
- Role of Edge Detection in Video Semantics (2003) (14)
- IoT and Big Data: An Architecture with Data Flow and Security Issues (2017) (14)
- LogProv: Logging events as provenance of big data analytics pipelines with trustworthiness (2016) (14)
- Blockchain-Based Secure and Lightweight Authentication for Internet of Things (2022) (14)
- An empirical study of SMS one-time password authentication in Android apps (2019) (14)
- ReputationNet: Reputation-Based Service Recommendation for e-Science (2015) (14)
- Data-Driven Android Malware Intelligence: A Survey (2019) (14)
- Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel Networks (2019) (14)
- Modeling Availability in Clouds for Mobile Computing (2012) (14)
- Deriving Topics in Twitter by Exploiting Tweet Interactions (2015) (14)
- ReputationNet: A Reputation Engine to Enhance ServiceMap by Recommending Trusted Services (2012) (14)
- Yet Another Performance Testing Framework (2008) (13)
- Protecting and Analysing Health Care Data on Cloud (2014) (13)
- Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication (2017) (13)
- A Trusted System for Sharing Patient Electronic Medical Records in Autonomous Distributed Health Care Systems (2007) (13)
- DLSeF (2016) (13)
- A Cryptographically Enforced Access Control with a Flexible User Revocation on Untrusted Cloud Storage (2016) (13)
- Incentivising Resource Sharing in Edge Computing Applications (2017) (13)
- Social Media for Government Services (2015) (12)
- Still Hammerable and Exploitable: on the Effectiveness of Software-only Physical Kernel Isolation (2018) (12)
- SRec: a social behaviour based recommender for online communities (2012) (12)
- Generating Semantic Adversarial Examples via Feature Manipulation (2020) (12)
- Multi-Client Cloud-Based Symmetric Searchable Encryption (2021) (12)
- Learning Influence Probabilities and Modelling Influence Diffusion in Twitter (2019) (12)
- Data Abstraction and Visualisation in Next Step: Experiences from a Government Services Delivery Trial (2013) (12)
- Privacy-Aware Autonomous Valet Parking: Towards Experience Driven Approach (2021) (12)
- Privacy Preserving User Based Web Service Recommendations (2018) (12)
- Geometric Range Search on Encrypted Data With Forward/Backward Security (2020) (11)
- Efficient Algorithms for Social Network Coverage and Reach (2015) (11)
- Domain-aware reputable service recommendation in heterogeneous manufacturing service ecosystem (2015) (11)
- Privacy Preserving Location Recommendations (2017) (11)
- Digital Twins and Cyber Security – solution or challenge? (2021) (11)
- Internet of Things (IoT) and Cloud Computing Enabled Disaster Management (2018) (11)
- Behavior‐Based Propagation of Trust in Social Networks with Restricted and Anonymous Participation (2015) (11)
- Impact of transport policies on energy use and emissions (2006) (11)
- TweetRipple: Understanding Your Twitter Audience and the Impact of Your Tweets (2016) (11)
- Model-driven provisioning of application services in hybrid computing environments (2013) (11)
- A Verifiable Ranked Choice Internet Voting System (2017) (10)
- Trusted Email protocol: Dealing with privacy concerns from malicious email intermediaries (2008) (10)
- An Infrastructure Virtualisation SOA for VNO-based Business Models (2007) (10)
- Protecting the location privacy of mobile social media users (2016) (10)
- User, Usage and Usability: Redefining Human Centric Cyber Security (2021) (10)
- Context-Aware Trust Management System for IoT Applications with Multiple Domains (2019) (10)
- A snapshot of trusted personal devices applicable to transaction processing (2010) (10)
- STRIP (2019) (9)
- Interaction Based Content Recommendation in Online Communities (2013) (9)
- An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption (2017) (9)
- Caring for the Last 3%: Telehealth Potential and Broadband Implications for Remote Australia (2012) (9)
- Next step: an online community to support parents in their transition to work (2013) (9)
- An Ontology-Driven Approach to Automating the Process of Integrating Security Software Systems (2019) (9)
- Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves (2021) (9)
- Trusted Computing Platform in Your Pocket (2010) (9)
- What and With Whom? Identifying Topics in Twitter Through Both Interactions and Text (2020) (8)
- COLUMN: Blue Skies TrustChain: Establishing Trust in the IoT-based Applications Ecosystem Using Blockchain (2018) (8)
- A Cloud Infrastructure Service Recommendation System for Optimizing Real-time QoS Provisioning Constraints (2015) (8)
- User-Controlled Collaborations in the Context of Trust Extended Environments (2007) (8)
- CATTmew: Defeating Software-Only Physical Kernel Isolation (2018) (8)
- Automated Interpretation and Integration of Security Tools Using Semantic Knowledge (2019) (8)
- Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks (2017) (8)
- A heuristic for combining fuzzy results in multimedia databases (2002) (8)
- Big Data and Cloud (2011) (8)
- HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios (2020) (8)
- Cooperative Data Management Services Based on Accountable Contract (2008) (8)
- TREVERSE: TRial-and-Error Lightweight Secure ReVERSE Authentication With Simulatable PUFs (2018) (8)
- Building Sensor-Based Big Data Cyberinfrastructures (2015) (8)
- Facilitating Dynamic Collaborations with eContract Services (2008) (8)
- Testbed evaluation of Lightweight Authentication Protocol (LAUP) for 6LoWPAN wireless sensor networks (2018) (8)
- Anitya: An Ephemeral Data Management Service and Secure Data Access Protocols for Dynamic Collaborations (2007) (7)
- Self Protecting Data Sharing Using Generic Policies (2015) (7)
- Dynamic Business Collaborations Through Contract Services (2011) (7)
- Time-Sensitive Topic Derivation in Twitter (2015) (7)
- User-Centered Attestation for Layered and Decentralised Systems (2018) (7)
- Recognising Agreement and Disagreement between Stances with Reason Comparing Networks (2019) (7)
- MEDUSA: Malware Detection Using Statistical Analysis of System's Behavior (2018) (7)
- Establishing a Trust Relationship in Cooperative Information Systems (2006) (7)
- Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World (2022) (7)
- OblivSketch: Oblivious Network Measurement as a Cloud Service (2021) (7)
- Crowdsensing and privacy in smart city applications (2018) (7)
- Diverse Multimedia Layout Generation with Multi Choice Learning (2021) (7)
- Adversarial Detection by Latent Style Transformations (2020) (7)
- Issues on the Compatibility of Web Service Contracts (2012) (7)
- Twitter Content Eliciting User Engagement: A Case Study on Australian Organisations (2017) (7)
- Cost-Effective Authenticated Data Redaction With Privacy Protection in IoT (2021) (7)
- Finding Flaws from Password Authentication Code in Android Apps (2019) (7)
- Gamification on the Social Web (2015) (7)
- Matrix Inter-joint Factorization - A New Approach for Topic Derivation in Twitter (2015) (7)
- Implementing a Portable Trusted Environment (2009) (7)
- Data architecture for telehealth services research: A case study of home tele-monitoring (2013) (7)
- Service-Oriented Computing – ICSOC 2013 Workshops (2013) (7)
- Architecture-Centric Support for Integrating Security Tools in a Security Orchestration Platform (2020) (7)
- Compcrypt–Lightweight ANS-Based Compression and Encryption (2021) (6)
- Impact of remittances on economic performance in consideration of institutional quality (2020) (6)
- Exploiting the Remote Server Access Support of CoAP Protocol (2019) (6)
- An association based approach to propagate social trust in social networks (2012) (6)
- P2DPI: Practical and Privacy-Preserving Deep Packet Inspection (2021) (6)
- Generic Multi-keyword Ranked Search on Encrypted Cloud Data (2019) (6)
- Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs (2021) (6)
- Towards a Security Enhanced Virtualised Network Infrastructure for Internet of Medical Things (IoMT) (2020) (6)
- Peeler: Profiling Kernel-Level Events to Detect Ransomware (2021) (6)
- A Performance Evaluation of Public Cloud Using TPC-C (2012) (6)
- Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing (2019) (6)
- DAN: Dual-View Representation Learning for Adapting Stance Classifiers to New Domains (2020) (6)
- Securely and Efficiently Outsourcing Decision Tree Inference (2022) (6)
- Bootstrapping Trust in a "Trusted" Virtualized Platform (2019) (6)
- Modeling social worm propagation for advanced persistent threats (2021) (6)
- Checking conformance between business processes and Web service contract in service oriented applications (2006) (6)
- Portable key management service for cloud storage (2012) (6)
- Self-Improving Autonomic Systems for Antifragile Cyber Defence: Challenges and Opportunities (2019) (6)
- Cloud Docs: Secure Scalable Document Sharing on Public Clouds (2015) (6)
- Towards Quality-Assured Data Delivery in Cloud-Based IoT Platforms for Smart Cities (2017) (6)
- Context-sensitive user interfaces for semantic services (2012) (6)
- AWaRE - Towards Distributed Self-Management for Resilient Cyber Systems (2018) (6)
- A Contract Language for Service-Oriented Dynamic Collaborations (2008) (6)
- DeepiSign: invisible fragile watermark to protect the integrity and authenticity of CNN (2021) (5)
- Proactive Antifragility: A New Paradigm for Next-Generation Cyber Defence at the Edge (2019) (5)
- Social Networking and Dental Care: State of the Art and Analysis of the Impact on Dentists, Dental Practices and their Patients (2013) (5)
- A Service-Oriented User Interface for the Next Generation Web (2011) (5)
- Adaptive video highlights for wired and wireless platforms (2003) (5)
- Privacy-protected place of activity mining on big location data (2017) (5)
- A new privacy‐preserving authentication protocol for anonymous web browsing (2018) (5)
- Compatibility of Service Contracts in Service-Oriented Ap (2006) (5)
- An Improved Lightweight RFID Authentication Protocol for Internet of Things (2018) (5)
- Privacy-protected social media user trajectories calibration (2016) (5)
- Token-Modification Adversarial Attacks for Natural Language Processing: A Survey (2021) (5)
- The importance of social identity on password formulations (2020) (5)
- What risk? I don't understand. An Empirical Study on Users' Understanding of the Terms Used in Security Texts (2020) (5)
- SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh (2021) (5)
- Detecting Hardware-Assisted Virtualization With Inconspicuous Features (2021) (5)
- Virtual Storage Services for Dynamic Collaborations (2007) (5)
- An Approach to Checking Compatibility of Service Contracts in Service-Oriented Applications (2009) (5)
- Single-feature query by multi-examples in image databases (2000) (5)
- Designing for reflection and collaboration to support a transition from welfare to work (2013) (5)
- A unified monitoring framework for distributed information system management (2012) (5)
- Dual-Mediation Paths Linking Corporate Social Responsibility to Employee’s Job Performance: A Multilevel Approach (2021) (5)
- Transformer-Based Language Models for Software Vulnerability Detection (2022) (4)
- Intelligent Anomaly Detection for Large Network Traffic With Optimized Deep Clustering (ODC) Algorithm (2021) (4)
- Guest Editorial: Cloud Computing and Scientific Applications (CCSA) - Big Data Analysis in the Cloud (2016) (4)
- Multifaceted Visualisation of Annotated Social Media Data (2014) (4)
- Can pre-trained Transformers be used in detecting complex sensitive sentences? - A Monsanto case study (2021) (4)
- Cybersecurity threats in cloud computing (2013) (4)
- Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for the Internet of Things? (2021) (4)
- Querying Streaming XML Big Data with Multiple Filters on Cloud (2013) (4)
- Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services (2020) (4)
- FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation (2021) (4)
- Characterizing Malicious URL Campaigns (2021) (4)
- Can Cultural Intelligence Affect Employee’s Innovative Behavior? Evidence From Chinese Migrant Workers in South Korea (2020) (4)
- Towards End-to-End QoS and Cost-Aware Resource Scaling in Cloud-Based IoT Data Processing Pipelines (2018) (4)
- NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions (2021) (4)
- Security analysis of mobile applications: A case study of a collaboration tool in healthcare (2013) (4)
- Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks (2017) (4)
- Towards Risk-Aware Cost-Optimal Resource Allocation for Cloud Applications (2019) (4)
- Supporting tele-assistance and tele-monitoring in safety-critical environments (2013) (4)
- PART-GAN: Privacy-Preserving Time-Series Sharing (2020) (4)
- HoneyCode: Automating Deceptive Software Repositories with Deep Generative Models (2021) (4)
- Privacy-Preserving Collaborative Analytics on Medical Time Series Data (2022) (4)
- Evaluation of Federated Learning in Phishing Email Detection (2020) (4)
- The Human Touch of Government Services (2013) (4)
- Fine with “1234”? An Analysis of SMS One-Time Password Randomness in Android Apps (2021) (4)
- SDN-Enabled Secure IoT Architecture (2021) (3)
- A Logic for Secure Stratified Systems and its Application to Containerized Systems (2019) (3)
- Four Layer Schema for Image Modeling (1998) (3)
- Exploiting Users' Rating Behaviour to Enhance the Robustness of Social Recommendation (2017) (3)
- DeepFake Disrupter: The Detector of DeepFake Is My Friend (2022) (3)
- Next Step: An Online Community for Delivering Human Services (2015) (3)
- Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular Approach (2019) (3)
- Improving the Matching Process of Dental Care Recommendation Systems by using Subjective criteria for both patients and Dentists (2014) (3)
- Keep Calm and Know Where to Focus: Measuring and Predicting the Impact of Android Malware (2018) (3)
- OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning (2020) (3)
- Spatio-temporal Modelling and Querying Video Databases Using High-level Concepts (2002) (3)
- A Government-Run Online Community to Support Recipients of Welfare Payments (2018) (3)
- WS-CCDL: A Framework for Web Service Collaborative Context Definition Language for Dynamic Collaborations (2008) (3)
- Monitoring of Chronic Disease in the community: Australian Telehealth Study on Organisational Challenges and Economic Impact (2016) (3)
- Towards IoT Security Automation and Orchestration (2020) (3)
- A Smart User Interface for Service-Oriented Web (2010) (3)
- Exploiting Heterogeneity for Opportunistic Resource Scaling in Cloud-Hosted Applications (2019) (3)
- Towards Resource and Contract Heterogeneity Aware Rescaling for Cloud-Hosted Applications (2018) (3)
- Multi-feature query by multiple examples in image databases (2001) (3)
- Improving dental care recommendation systems using trust and social networks (2014) (3)
- Social Media for Government Services: An Introduction (2015) (3)
- P-STM: Privacy-Protected Social Tie Mining of Individual Trajectories (2019) (3)
- Secure Sharing of Electronic Patient Records (2006) (3)
- ADSL: An Embedded Domain-Specific Language for Constraint-Based Distributed Self-Management (2018) (3)
- A Service-Oriented Architecture to enable virtual storage services: a dynamic collaboration context (2009) (3)
- RAIDER: Reinforcement-aided Spear Phishing Detector (2021) (3)
- Towards Web Phishing Detection Limitations and Mitigation (2022) (3)
- GhostKnight: Breaching Data Integrity via Speculative Execution (2020) (3)
- Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN (2021) (3)
- Analysing and Using Subjective Criteria to Improve Dental Care Recommendation Systems (2015) (2)
- Vulnerability Database as a Service for IoT (2020) (2)
- A Retrospective and Futurespective of Rowhammer Attacks and Defenses on DRAM (2022) (2)
- Preserving Privacy for Distributed Genome-Wide Analysis Against Identity Tracing Attacks (2022) (2)
- TrustVis: A Trust Visualisation Service for Online Communities (2012) (2)
- A Secure Access and Accountability Framework for Provisioning Services in Named Data Networks (2021) (2)
- P-GENT: Privacy-Preserving Geocoding of Non-Geotagged Tweets (2018) (2)
- Guest Editorial: Special Issue on Clouds for Social Computing (2014) (2)
- Service Trust Management for E-Government Applications (2014) (2)
- TeleHammer : A Stealthy Cross-Boundary Rowhammer Technique (2019) (2)
- KEY MANAGEMENT SERVICE: ENABLING SECURE SHARING AND DELETING OF DOCUMENTS ON PUBLIC CLOUDS (2016) (2)
- A Trust Enhanced Email Application Using Trusted Computing (2009) (2)
- A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity OS (2018) (2)
- TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing (2022) (2)
- FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning (2020) (2)
- Optimizing Secure Decision Tree Inference Outsourcing (2021) (2)
- Results of the Australian CSIRO National Multi-site Trial of At-home Telemonitoring for the Management of Chronic Disease (2016) (2)
- Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks (2020) (2)
- Issues and Challenges in Web Service Management Systems (2012) (2)
- Improving Dental Care Recommendation Systems Using Patient and Dentist Profiling (2014) (2)
- A Multidimensional Approach for Describing Video Semantics (2008) (2)
- Certificate-Based Anonymous Authentication With Efficient Aggregation for Wireless Medical Sensor Networks (2022) (2)
- Compact-LWE-MQ^{H}: Public Key Encryption without Hardness Assumptions (2020) (2)
- Biometric Enabled Portable Trusted Computing Platform (2011) (2)
- A Policy Based Approach to Managing Shared Data in Dynamic Collaborations (2007) (2)
- An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation (2020) (2)
- An Innovative Approach to Derive Trust from Social Networks and to Improve the Matching in Dental Care Recommendation Systems (2016) (2)
- TeleHammer: A Formal Model of Implicit Rowhammer (2019) (1)
- Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs (2022) (1)
- Low Temperature Photoluminescence in Some Common Polymers (2018) (1)
- Managing Web Services: An Application in Bioinformatics (2010) (1)
- Robust Training Using Natural Transformation (2021) (1)
- Similarity Query Processing in Image Databases (technical Report, February 2000) (2000) (1)
- Security and Privacy for a Sustainable Internet of Things (2020) (1)
- An evaluation measure for query processing in CBIR systems (2000) (1)
- Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy (2021) (1)
- SOAC-Net: A Model to Manage Service-Based Business Process Authorization (2012) (1)
- Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity (2020) (1)
- Secure and Conditional Resource Coordination for Successful Collaborations (2008) (1)
- A New Cloud Architecture of Virtual Trusted Platform Modules (2012) (1)
- Semantic based retrieval model for digital audio and video (2001) (1)
- ShieldDB: An Encrypted Document Database With Padding Countermeasures (2020) (1)
- Local Differential Privacy for Federated Learning in Industrial Settings (2022) (1)
- Modelling direct messaging networks with multiple recipients for cyber deception (2021) (1)
- Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks (2018) (1)
- A Practical Authentication Protocol for Anonymous Web Browsing (2017) (1)
- Catering to Your Concerns (2018) (1)
- Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation (2021) (1)
- ARA-Assessor: Application-Aware Runtime Risk Assessment for Cloud-Based Business Continuity (2017) (1)
- OCTOPUS: Overcoming Performance and Privatization Bottlenecks in Distributed Learning (2021) (1)
- Orchestration or Automation: Authentication Flaw Detection in Android Apps (2022) (1)
- Guest editorial: Special issue on data intensive cloud computing (2015) (1)
- Editorial (2012) (1)
- Making sense of video content (2003) (1)
- Design by a CBIR System Supporting High Level Concepts (2002) (1)
- ANS-based compression and encryption with 128-bit security (2022) (1)
- Robust digital signature revisited (2020) (1)
- TS5: A Trust Enhanced Secure Cloud Storage Service (2011) (1)
- Integrity Fingerprinting of DNN with Double Black-box Design and Verification (2022) (1)
- Blockchain – ICBC 2019 (2019) (1)
- BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability (2021) (1)
- Confined Gradient Descent: Privacy-preserving Optimization for Federated Learning (2021) (1)
- Know Your Members' Trust (2013) (1)
- Are Android Apps Being Protected Well Against Attacks? (2020) (1)
- Emergent Semantics: An Overview (2005) (1)
- User Authentication for Online Applications Using a USB-Based Trust Device (2010) (1)
- A Secure Big Data Stream Analytics Framework for Disaster Management on the Cloud (2016) (1)
- Towards Secure Edge-assisted Image Sharing for Timely Disaster Situation Awareness (2020) (0)
- Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments (2020) (0)
- CLAE : a Lightweight AEAD Scheme of Resisting Side Channel Attacks (2019) (0)
- Message from the IEEE TrustCom 2019 Program Chairs (2017) (0)
- Can a Government Use Social Media to Support Disadvantaged Citizens? (2016) (0)
- Design and Implementation of Three Fish Cipher Algorithm Blocks Using FPGA (2017) (0)
- A Secure Big Data Streams Analytics Farmework for Disater Management on Cloud (2016) (0)
- Towards Self-Improving Hybrid Elasticity Control of Cloud-based Software Systems (2020) (0)
- A Heuristic Algorithm for Combining Fuzzy Results in Multimedia Databases (2002) (0)
- A research prototype image retrieval system (1998) (0)
- Benchmarking for End-to-End QoS Sustainability in Cloud-Hosted Data Processing Pipelines (2019) (0)
- Impact of Subjective Aspects in the Matching of Dentists and Patients in Dental Care Recommendation Systems (2016) (0)
- A Needle in a Haystack: Finding a Suitable Lightweight IoT Authentication Protocol and Improving Its Usability (2020) (0)
- Automatic Camouflaging Worm Detection Over Internet (2012) (0)
- Why Is It Difficult for Welfare Recipients to Return to Work? A Case Study through a Collaborative Online Community (2016) (0)
- A Light-Weight PaaS Cloud Framework for Scientific Applications (2015) (0)
- Political Stability and FDI in Nepal (2018) (0)
- Guest Editorial: Selected Papers from IEEE IEEE/EAI CollaborateCom 2013 (2014) (0)
- Two-Factor Decryption: A Better Way to Protect Data Security and Privacy (2020) (0)
- Towards Decentralized Operationalization of Zero Trust Architecture (2022) (0)
- Security is the Weakest Link: Prevalent Culture of Victim Blaming in Cyberattacks (2019) (0)
- A Behavioural Network Traffic Novelty Detection for the Internet of Things Infrastructures (2020) (0)
- 2019 IEEE International Congress on Internet of Things: message from the chairs (2019) (0)
- Scheduling Real Tim Security Aware Tasks in Fog Networks (2021) (0)
- Editorial: Human-Centric Security and Privacy (2022) (0)
- TRUM 2013: The Role and Importance of Trust in User Modelling (2013) (0)
- A Note on Quality of Service Issues in Smart Cities (2019) (0)
- PAIRS: Privacy-Aware Identification and Recommendation of Spatio-Friends (2018) (0)
- Editorial (2018) (0)
- DeepiSign (0)
- Introduction to the 3rd International Workshop on Cloud Computing and Scientific Applications (CCSA'13) (2013) (0)
- Enhanced Packet Delivery Techniques Using Packet Hiding Schemes on Jamming Attacks (2018) (0)
- Transaction / Regular Paper Title (2012) (0)
- Verification Of Content Against Dithering Auditors Using CPVPA (2020) (0)
- On the Neural Backdoor of Federated Generative Models in Edge Computing (2021) (0)
- LogProv: Logging events as provenance of big data analytics pipelines with trustworthiness (2016) (0)
- Introduction to the Special Section on Advances in Internet-based Collaborative Technologies (2019) (0)
- OblivShare: Towards Privacy-Preserving File Sharing with Oblivious Expiration Control (2021) (0)
- AuraEN: Autonomous Resource Allocation for Cloud-Hosted Data Processing Pipelines (2020) (0)
- Assessing Social License to Operate from the Public Discourse on Social Media (2020) (0)
- Guest Editors' Introduction to the Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems (2021) (0)
- The Joint Effects of Tweet Content Similarity and Tweet Interactions for Topic Derivation (2017) (0)
- Guest editorial: Special issue on data intensive cloud computing (2015) (0)
- Defending Adversarial Attacks via Semantic Feature Manipulation (2020) (0)
- A Cryptographically Enforced Access Control with a Flexible User Revocation on Untrusted Cloud Storage (2016) (0)
- Maximizing the System Lifetime of Query Based Wireless Sensor Network: QOS Control Algorithm (2012) (0)
- Business Process Engine Simulator (2012) (0)
- A Defence Against Input-Agnostic Backdoor Attacks on Deep Neural Networks (2020) (0)
- A Privacy-Preserving Semantic Annotation Framework Using Online Social Media (2018) (0)
- Can the Multi-Incoming Smart Meter Compressed Streams be Re-Compressed? (2020) (0)
- A blueprint for leveraging the tremendous opportunities the IoT has to offer (2021) (0)
- HaS-Net: A Heal and Select Mechanism to Securely Train DNNs against Backdoor Attacks (2021) (0)
- Guest Editorial: Special Issue on Services Computing for COVID-19 and Future Pandemics (2022) (0)
- PBCP: A Process-based Bussiness Collaboration Platform (2016) (0)
- Forward-Secure Edge Authentication for Graphs (2021) (0)
- Contributors (2019) (0)
- PASOAC-Net: A Petri-Net Model to Manage Authorization in Service-Based Business Process (2012) (0)
- Privacy-Preserving Data Generation and Sharing Using Identification Sanitizer (2020) (0)
- End-to-end security framework for big sensing data streams (2017) (0)
- Sensitive gazetteer discovery and protection for mobile social media users (2017) (0)
- Integrating care for the chronically ill using at home telehealth monitoring (2014) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Surya Nepal?
Surya Nepal is affiliated with the following schools: