A survey of emerging threats in cybersecurity J Jang-Jaccard, S Nepal Journal of computer and system sciences 80 (5), 973-993, 2014 | 975 | 2014 |
A survey of trust in social networks W Sherchan, S Nepal, C Paris ACM Computing Surveys (CSUR) 45 (4), 1-33, 2013 | 850 | 2013 |
IoT middleware: A survey on issues and enabling technologies AH Ngu, M Gutierrez, V Metsis, S Nepal, QZ Sheng IEEE Internet of Things Journal 4 (1), 1-20, 2016 | 822 | 2016 |
Strip: A defence against trojan attacks on deep neural networks Y Gao, C Xu, D Wang, S Chen, DC Ranasinghe, S Nepal Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 552 | 2019 |
Query processing issues in image (multimedia) databases S Nepal, MV Ramakrishna Proceedings 15th International Conference on Data Engineering (Cat. No …, 1999 | 365 | 1999 |
Android HIV: A study of repackaging malware for evading machine-learning detection X Chen, C Li, D Wang, S Wen, J Zhang, S Nepal, Y Xiang, K Ren IEEE Transactions on Information Forensics and Security 15, 987-1001, 2019 | 256 | 2019 |
A service computing manifesto: the next 10 years A Bouguettaya, M Singh, M Huhns, QZ Sheng, H Dong, Q Yu, AG Neiat, ... Communications of the ACM 60 (4), 64-72, 2017 | 239 | 2017 |
Automatic detection of'Goal'segments in basketball videos S Nepal, U Srinivasan, G Reynolds Proceedings of the ninth ACM international conference on Multimedia, 261-269, 2001 | 233 | 2001 |
Deep learning for community detection: progress, challenges and opportunities F Liu, S Xue, J Wu, C Zhou, W Hu, C Paris, S Nepal, J Yang, PS Yu arXiv preprint arXiv:2005.08225, 2020 | 226 | 2020 |
A survey of android malware detection with deep neural models J Qiu, J Zhang, W Luo, L Pan, S Nepal, Y Xiang ACM Computing Surveys (CSUR) 53 (6), 1-36, 2020 | 207 | 2020 |
A privacy leakage upper bound constraint-based approach for cost-effective privacy preserving of intermediate data sets in cloud X Zhang, C Liu, S Nepal, S Pandey, J Chen IEEE Transactions on Parallel and Distributed Systems 24 (6), 1192-1202, 2012 | 200 | 2012 |
Practical backward-secure searchable encryption from symmetric puncturable encryption SF Sun, X Yuan, JK Liu, R Steinfeld, A Sakzad, V Vo, S Nepal Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 196 | 2018 |
Threats to networking cloud and edge datacenters in the Internet of Things D Puthal, S Nepal, R Ranjan, J Chen IEEE Cloud Computing 3 (3), 64-71, 2016 | 195 | 2016 |
A platform for secure monitoring and sharing of generic health data in the Cloud D Thilakanathan, S Chen, S Nepal, R Calvo, L Alem Future Generation Computer Systems 35, 102-113, 2014 | 181 | 2014 |
Internet of Things (IoT) smart and secure service delivery E Bertino, KKR Choo, D Georgakopolous, S Nepal ACM Transactions on Internet Technology (TOIT) 16 (4), 1-7, 2016 | 177 | 2016 |
Using gamification in an online community SK Bista, S Nepal, N Colineau, C Paris 8th International Conference on Collaborative Computing: Networking …, 2012 | 169 | 2012 |
Backdoor attacks and countermeasures on deep learning: A comprehensive review Y Gao, BG Doan, Z Zhang, S Ma, J Zhang, A Fu, S Nepal, H Kim arXiv preprint arXiv:2007.10760, 2020 | 156 | 2020 |
Barriers for delivering telehealth in rural Australia: a review based on Australian trials and studies J Jang-Jaccard, S Nepal, L Alem, J Li Telemedicine and e-Health 20 (5), 496-504, 2014 | 151 | 2014 |
A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud X Zhang, C Liu, S Nepal, C Yang, W Dou, J Chen Journal of Computer and System Sciences 80 (5), 1008-1020, 2014 | 150 | 2014 |
Lightweight mutual authentication for IoT and its applications N Li, D Liu, S Nepal IEEE Transactions on Sustainable Computing 2 (4), 359-370, 2017 | 149 | 2017 |