A survey of emerging threats in cybersecurity J Jang-Jaccard, S Nepal Journal of computer and system sciences 80 (5), 973-993, 2014 | 1236 | 2014 |
A survey of trust in social networks W Sherchan, S Nepal, C Paris ACM Computing Surveys (CSUR) 45 (4), 1-33, 2013 | 924 | 2013 |
IoT middleware: A survey on issues and enabling technologies AH Ngu, M Gutierrez, V Metsis, S Nepal, QZ Sheng IEEE Internet of Things Journal 4 (1), 1-20, 2016 | 901 | 2016 |
Strip: A defence against trojan attacks on deep neural networks Y Gao, C Xu, D Wang, S Chen, DC Ranasinghe, S Nepal Proceedings of the 35th annual computer security applications conference …, 2019 | 827 | 2019 |
A comprehensive survey on community detection with deep learning X Su, S Xue, F Liu, J Wu, J Yang, C Zhou, W Hu, C Paris, S Nepal, D Jin, ... IEEE Transactions on Neural Networks and Learning Systems, 2022 | 394 | 2022 |
Query processing issues in image (multimedia) databases S Nepal, MV Ramakrishna Proceedings 15th International Conference on Data Engineering (Cat. No …, 1999 | 369 | 1999 |
Android HIV: A study of repackaging malware for evading machine-learning detection X Chen, C Li, D Wang, S Wen, J Zhang, S Nepal, Y Xiang, K Ren IEEE Transactions on Information Forensics and Security 15, 987-1001, 2019 | 314 | 2019 |
A survey of android malware detection with deep neural models J Qiu, J Zhang, W Luo, L Pan, S Nepal, Y Xiang ACM Computing Surveys (CSUR) 53 (6), 1-36, 2020 | 297 | 2020 |
Deep learning for community detection: progress, challenges and opportunities F Liu, S Xue, J Wu, C Zhou, W Hu, C Paris, S Nepal, J Yang, PS Yu arXiv preprint arXiv:2005.08225, 2020 | 291 | 2020 |
A service computing manifesto: the next 10 years A Bouguettaya, M Singh, M Huhns, QZ Sheng, H Dong, Q Yu, AG Neiat, ... Communications of the ACM 60 (4), 64-72, 2017 | 252 | 2017 |
Automatic detection of'Goal'segments in basketball videos S Nepal, U Srinivasan, G Reynolds Proceedings of the ninth ACM international conference on Multimedia, 261-269, 2001 | 237 | 2001 |
Backdoor attacks and countermeasures on deep learning: A comprehensive review Y Gao, BG Doan, Z Zhang, S Ma, J Zhang, A Fu, S Nepal, H Kim arXiv preprint arXiv:2007.10760, 2020 | 233 | 2020 |
Practical backward-secure searchable encryption from symmetric puncturable encryption SF Sun, X Yuan, JK Liu, R Steinfeld, A Sakzad, V Vo, S Nepal Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 231 | 2018 |
End-to-end evaluation of federated learning and split learning for internet of things Y Gao, M Kim, S Abuadbba, Y Kim, C Thapa, K Kim, SA Camtepe, H Kim, ... arXiv preprint arXiv:2003.13376, 2020 | 223 | 2020 |
Internet of Things (IoT) smart and secure service delivery E Bertino, KKR Choo, D Georgakopolous, S Nepal ACM Transactions on Internet Technology (TOIT) 16 (4), 1-7, 2016 | 214 | 2016 |
Threats to networking cloud and edge datacenters in the Internet of Things D Puthal, S Nepal, R Ranjan, J Chen IEEE Cloud Computing 3 (3), 64-71, 2016 | 209 | 2016 |
A privacy leakage upper bound constraint-based approach for cost-effective privacy preserving of intermediate data sets in cloud X Zhang, C Liu, S Nepal, S Pandey, J Chen IEEE Transactions on Parallel and Distributed Systems 24 (6), 1192-1202, 2012 | 201 | 2012 |
Using gamification in an online community SK Bista, S Nepal, N Colineau, C Paris 8th International Conference on Collaborative Computing: Networking …, 2012 | 188 | 2012 |
A platform for secure monitoring and sharing of generic health data in the Cloud D Thilakanathan, S Chen, S Nepal, R Calvo, L Alem Future Generation Computer Systems 35, 102-113, 2014 | 184 | 2014 |
Lightweight mutual authentication for IoT and its applications N Li, D Liu, S Nepal IEEE Transactions on Sustainable Computing 2 (4), 359-370, 2017 | 176 | 2017 |