Y. Fei, G. Gong, C. Gongye, K. Mandal, R. Rohit, T. Xu, Y. Yi, and N. Zidaric, “Correlation Power Analysis and Higher-order Masking Implementation of WAGE,” Selected Areas in Cryptography (SAC) 2020, Halifax, NS, 2020.
K. Mandal and G. Gong, “Can LWC and PEC be Friends?: Evaluating Lightweight Ciphers in Privacy-enhancing Cryptography,” NIST Lightweight Cryptography Workshop 2020, Gaithersburg, MD, 2020.
F. Shoeleh, M. Erfani, D.-P. Le, and A. A. Ghorbani, "Ensemble of Hierarchical Temporal Memory for Anomaly Detection," 2020 IEEE Seventh International Conference on Data Science and Advanced Analytics (DSAA), Sydney, Australia, pp. 50-59, 2020.
S. Hakak, S. Ray, W. Z. Khan, and E. Scheme, “A Framework for Edge-Assisted Healthcare Data Analytics using Federated Learning” IEEE International Conference on Big Data (IEEE BigData 2020) - International Workshop on DASH 2020: Data Analytics for Smart Health, Atlanta, GA, Dec. 2020.
S. Hakak, W. Z. Khan, S. Bhattacharya, G. T. Reddy, and K.-K. R. Choo “Propagation of Fake News Using Social Media: Mitigation and Research Challenges”, Ninth International Conference on Computational Data and Social Networks, Dallas, TX, pp. 345-353, Dec. 2020.
G. Kaur, A. H. Lashkari, A. Rahali, L. Taheri, and F. Gagnon, "DIDroid: Android Malware Classification and Characterization Using Deep Image Learning," 2020 the tenth International Conference on Communication and Network Security (ICCNS 2020), Tokyo, Japan, Nov. 2020.
A. H. Lashkari, G. Kaur, and A. Rahali, “DIDarknet: A Contemporary Approach to Detect and Characterize the Darknet Encrypted Traffic using Deep Image Learning,” 2020 the tenth International Conference on Communication and Network Security (ICCNS 2020), Tokyo, Japan, Nov. 2020.
D.-P. Le, "Synthetic Data Generation and Evaluation," 2020 Serene-risc Workshop (Online), Oct. 2020.
M. Erfani, F. Shoeleh, and A. A. Ghorbani, “Financial Fraud Detection using Deep Support Vector Data Description,” IEEE International Conference on Big Data (Big Data), Atlanta, GA, USA , pp. 2274-2282, Dec. 2020.
S. Mahdavifar, A. F. A. Kadir, R. Fatemi, D. Alhadidi, and A. A. Ghorbani, “Dynamic Android Malware Category Classification Using Semi-Supervised Deep Learning,” IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC), Calgary, AB, pp. 515-522, Aug. 2020.
G. Kaur, A. H. Lashkari, and A. Rahali, "Intrusion Traffic Detection and Characterization using Deep Image Learning," 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Calgary, AB, pp. 55-62, Aug. 2020.
M. MontazeriShatoori, L. Davidson, G. Kaur, and A. H. Lashkari, "Detection of DoH Tunnels using Time-series Classification of Encrypted Traffic," 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, Calgary, AB, pp. 63-70, Aug. 2020.
H. Mahdikhani, R. Lu, Y. Zheng, and A. Ghorbani, "Achieving Efficient and Privacy-Preserving Range Query in Fog-enhanced IoT with Bloom Filter," ICC 2020 - 2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, pp. 1-6, Jun. 2020.
D.-P. Le, G. Yang, and A. A. Ghorbani, "A New Multisignature Scheme with Public Key Aggregation for Blockchain," 2019 17th International Conference on Privacy, Security and Trust (PST), Fredericton, NB, pp. 1-7, 2019.
S. Linoy, H. Mahdikhani, S. Ray, R. Lu, N. Stakhanova, and A. Ghorbani, “Scalable Privacy-Preserving Query Processing Over Ethereum Blockchain,” 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, pp. 398-404, 2019.
X. Zhang, R. Lu, J. Shao, H. Zhu, and A. A. Ghorbani, "Achieve Secure and Efficient Skyline Computation for Worker Selection in Mobile Crowdsensing," 2019 11th International Conference on Wireless Communications and Signal Processing (WCSP), Xi'an, China, pp. 1-6, 2019.
H. Azimy and A. Ghorbani, "Competitive Selfish Mining," 2019 17th International Conference on Privacy, Security and Trust (PST), Fredericton, NB, pp. 1-8, 2019.
X. Zhang, A. H. Lashkari, N. Maleki, J. F. Mudge, and A. A. Ghorbani, "Probabilistic Classification for Industrial Cyber Risk Using Deep Neural Network," 2019 International Conference on Security and Management (SAM'19), Las Vegas, NV, pp. 208-215, Nov. 2019.
I. Sharafaldin, A. H. Lashkari, S. Hakak, and A. A. Ghorbani, “Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy,” 2019 International Carnahan Conference on Security Technology Chennai (ICCST), India, pp. 1-8, Oct. 2019.
K. Boakye-Boateng and A. H. Lashkari, "Securing GOOSE: The Return of One-Time Pads," 2019 International Carnahan Conference on Security Technology (ICCST), Chennai, India, Oct. 2019.
A. H. Lashkari, L. Taheri, A. Fitriah, and A. Ghorbani, "Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification," 2018 International Carnahan Conference on Security Technology (ICCST), Montreal, PQ, pp. 1-7, 2018.
S. S. Hasanabadi, A. H. Lashkari, and A. A. Ghorbani, "The Next Generation of Robust Linux Memory Acquisition Technique via Sequential Memory Dumps at Designated Time Intervals," 2018 International Carnahan Conference on Security Technology (ICCST), Montreal, PQ, pp. 1-6, 2018.
N. Yekta and R. Lu, "XRQuery: Achieving Communication-Efficient Privacy-Preserving Query for Fog-Enhanced IoT," 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, pp. 1-6, 2018.
M. Wen, D. Yao, B. Li, and R. Lu, "State Estimation Based Energy Theft Detection Scheme with Privacy Preservation in Smart Grid," 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, pp. 1-6, 2018.
C. Huang, D. Liu, J. Ni, R. Lu, and X. Shen, "Reliable and Privacy-Preserving Selective Data Aggregation for Fog-Based IoT," 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, pp. 1-6, 2018.
I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, "Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization," Fourth International Conference on Information Systems Security and Privacy (ICISSP), Portugal, pp. 108-116, Jan. 2018.
H. Mahdikhani and R. Lu, "Achieving Privacy-Preserving Multi Dot-Product Query in Fog Computing-Enhanced IoT," GLOBECOM 2017 - 2017 IEEE Global Communications Conference, Singapore, pp. 1-6, 2017.
A. H. Lashkari, A. F. A. Kadir, H. Gonzalez, K. F. Mbah, and A. A. Ghorbani, "Towards a Network-Based Framework for Android Malware Detection and Characterization," 2017. 15th Annual Conference on Privacy, Security and Trust (PST), Calgary, AB, pp. 233-23309, 2017.
B. Li, R. Lu, and G. Xiao, "HMM-Based Fast Detection of False Data Injections in Advanced Metering Infrastructure," GLOBECOM 2017 - 2017 IEEE Global Communications Conference, Singapore, pp. 1-6, 2017.
S. Zhang, H. Li, Y. Dai, M. He, and R. Lu, "EPP-DMM: an Efficient and Privacy-Protected Delegation Scheme for Matrix Multiplication," GLOBECOM 2017 - 2017 IEEE Global Communications Conference, Singapore, pp. 1-6, 2017.
N. I. Yekta and R. Lu, "PQuery: Achieving Privacy-Preserving Query with Communication Efficiency in Internet of Things," 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), Toronto, ON, pp. 1-5, 2017.
Q. Kong, M. Ma, and R. Lu, "Achieving Secure CoMP Joint Transmission Handover in LTE-A Vehicular Networks", 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), Toronto, ON, pp. 1-5, 2017.
A. H. Lashkari, G. D. Gil, J. E. Keenan, K. F. Mbah, and A. A. Ghorbani, "A New Evaluation framework for Network Traffic base Botnet Detection Methods," Seventh International Conference on Communication and Network Security (ICCNS 2017), Japan, pp. 59-66, 2017.
A. Gharib and A. Ghorbani, "DNA-Droid: A Real-Time Android Ransomware Detection Framework," International Conference on Network and System Security (NSS 2017), Helsinki, Finland, pp. 184-198, 2017.
A. H. Lashkari, A. Seo, G. D. Gil, and A. Ghorbani, "CIC-AB: Online Ad Blocker for Browsers," 2017 International Carnahan Conference on Security Technology (ICCST), Madrid, Spain, pp. 1-7, 2017.
I. Sharafaldin, A. Gharib, A. H. Lashkari, and A. A. Ghorbani, "BotViz: A Memory Forensic-Based Botnet Detection and Visualization Approach," 2017 International Carnahan Conference on Security Technology (ICCST), Madrid, Spain, pp. 1-8, 2017.
F. Wang, H. Zhu, R. Lu, F. Liu, C. Huang, and H. Li, "Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications," SecureComm 2017: Security and Privacy in Communication Networks, Niagara Falls, pp. 339-355, Oct. 2017.
R. Lu, "How to Achieve Efficient Range Query over Encrypted Data in Cloud", 2nd International Workshop on Mobile Communications and Networking (IWMCN), 2017, Waterloo, ON, Sep. 2017.
X. Zhang, A. H. Lashkari, and A. A. Ghorbani, "A Lightweight Online Advertising Classification System Using Lexical-based Features," 14th International Conference on Security and Cryptography (SECRYPT 2017), Madrid, Spain, pp. 486-494, Jul. 2017.
S. Chen, R. Lu, and J. Zhang, "A Flexible Privacy-preserving Framework for Singular Value Decomposition under Internet of Things Environment," 11th IFIP WG 11.11 International Conference on Trust Management, Göteborg, Sweden, Jun. 2017.
A. H. Lashkari, G. Draper-Gil, M. S. I. Mamun, and A. A. Ghorbani, "Characterization of Tor Traffic Using Time-Based Features," Third International Conference on Information System Security and Privacy, SCITEPRESS, Porto, Portugal, pp. 253-262, Feb. 2017.
A. Gharib, I. Sharafaldin, A. H. Lashkari, and A, A. Ghorbani, "An Evaluation Framework for Intrusion Detection Dataset," 2016. International Conference on Information Science and Security (ICISS), Pattaya, Thailand, pp. 1-6, 2016.
H. Gonzalez, N. Stakhanova, and A. A. Ghorbani, "Measuring code reuse in Android apps," 2016. 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, pp. 187-195, 2016.
H. H. Jazi and A. A. Ghorbani, "Dynamic graph-based malware classifier," 2016. 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, pp. 112-120, 2016.
M. S. I. Mamun, M. A. Rathore, A. H. Lashkari, N. Stakhanova, and A. A. Ghorbani, "Detecting Malicious URLs Using Lexical Analysis". 10th International Conference on Network and System Security (NSS 2016), Taipei, Taiwan, pp. 467-482, 2016.
R. Killam, N. Stakhanova, and P. Cook, "Android malware classification through linguistic analysis of string literals." First Workshop on Text Analytics for Cybersecurity and Online Safety (TA-COS 2016), Portorož, Slovenia, 2016.
G. D. Gil, A. H. Lashkari, M. Mamun, and A. A. Ghorbani, "Characterization of Encrypted and VPN Traffic Using Time-Related Features," Proceedings of the Second International Conference on Information Systems Security and Privacy (ICISSP 2016), Rome, Italy, pp. 407-414, 2016.