Authors
|
Title
|
Gerhard Dueck, Kenneth B. Kent, Mark Thom, Daryl Maier, Mark Stoodley |
Generic Ahead-of-Time Compilation for Eclipse OMR |
Hao Hu, Maria Patrou, Kenneth B. Kent, Michael Dawson |
Utilize Underlying Hardware Features for Node.js |
Taees Eimouri, Kenneth B.Kent, Aleksandar Micic |
Optimizing the JVM Object Model Using Object Splitting |
Panagiotis Patros, Kenneth B. Kent, Michael Dawson |
Reducing Garbage Collection Interference on Clouds |
Aaron G. Graham, Jean-Philippe Legault, Dr. Kenneth B. Kent, Daryl Maier, James Kingdon |
Language Runtimes on Embedded Architectures |
Scott Young, Kenneth B. Kent, Gerhard Dueck, Charlie Gracie |
Cold Object Segregation |
Maxim Uzun, Kenneth B. Kent, Michael Dawson |
Post-mortem Debugging with Promises for Node.js |
Ratinder Kaur, Yan Li, Junaid Iqbal, Hugo Gonzalez, Natalia Stakhanova |
Security Assessment of HCE-NFC enabled E-Wallet Banking Android Apps |
Michael Flawn, Scott Young, Kenneth Kent, Gerhard Dueck, Charlie Gracie |
Implementing a Heap over Multiple Virtual Memory Areas in OMR |
Abhijit Taware, Gerhard Dueck, Kenneth Kent, Charlie Gracie |
Garbage collection of cold regions |
J. Zhu, P. Patros, K.B. Kent, M. Dawson, S.A. MacKay |
Node.js Scalability Investigation in Clouds |
Konstantin Nasartschuk, Kenneth B. Kent, Aleksandar Micic |
Feasibility of Internal Object Pools for Reduced Memory Management |
Beibei Li, Rongxing Lu, Raymond Choo, Wei Wang, Sheng Luo |
On Reliability Analysis of Smart Grids under Topology Attacks: A Stochastic Petri Net Approach |
Jun Shao, Rongxing Lu, Yunguo Guan, Guiyi Wei |
Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud |
Nafiseh Izadi Yekta, Rongxing Lu |
Achieving Communication-Efficient Privacy-Preserving Query for Fog-Enhanced IoT |
Wei Guo, Jun Shao, Rongxing Lu, Yining Liu, Ali Ghorbani |
A Privacy-Preserving Online Medical Pre-diagnostic Scheme in Cloud Environment |
Xue Yang, Rongxing Lu, Jun Shao, Xiaohu Tang, Ali A. Ghorbani |
Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud |
Deepigha Shree Vittal Babu, Rongxing Lu |
Achieve Efficient and Privacy Preserving Range Query over Encrypted Data in Cloud |
Puya Memarzia, Virendra Bhavsar, Suprio Ray |
Dataset Skew Resilience in Main Memory Parallel Hash Joins |
Deepigha Shree Vittal Babu and Rongxing Lu |
Achieve Efficient and Privacy Preserving Range Query over Encrypted Data in Cloud |
Arash Habibi Lashkari, Andi Fitriah A. Kadir, Laya Taheri, Ali A. Ghorbani |
Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification |
Hassan Mahdikhani, Rongxing Lu |
iHOM: How to Enrich SQL Queries in CryptDB |
Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali A. Ghorbani |
The Next Generation of Robust Linux Memory Acquisition Techniques via Consequential Timestamp Dumps |
Mahsa Kiani, Virendrakumar C. Bhavsar, Harold Boley |
Quantifying Simplicity of Generalized Trees |
Xi Tao, Wei Song |
Efficient Task Allocation for Mobile Crowdsensing Based on Evolutionary Computing |
Andi Fitriah A. Kadir, Natalia Stakhanova, Ali A. Ghorbani |
Android Financial Malware Detection Through Network Flow Analysis |
Junaid Iqbal, Ratinder Kaur, Natalia Stakhanova |
Detection and Prevention of Changes in the DOM Tree |
Ratinder Kaur, Hugo Gonzalez, Ghazale Amel Zendehdel, Alina Matyukhina, Natalia Stakhanova |
Security Vulnerabilities in E-Health Devices |
Rasoul Shahsavarifar, David Bremner |
Novel Approximation for Halfspace depth |
Milton King, Paul Cook |
Leveraging distributed representations and lexico-syntactic fixedness for token-level prediction of the idiomaticity of English verb-noun combinations |
Puya Memarzia, Virendra Bhavsar, Suprio Ray |
Dataset Skew Resilience in Main Memory Parallel Hash Joins |
Iman Sharafaldin, Arash Habibi Lashkari, and Ali A. Ghorbani |
Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization |
Samaneh Mahdavifar, Mohammad Rasool Fatemi, Dima Alhadidi, Ali A. Ghorbani |
Android Malware Categorization Using a Semi-Supervised Deep Learning Architecture Based on Ladder Networks |
Andi Fitriah A. Kadir, Natalia Stakhanova, Ali A. Ghorbani |
Android Financial Malware Detection Through Network Flow Analysis |
Alina Matyukhina, Mila Dalla Preda, Celine Perley , Natalia Stakhanova |
Attacking developer’s identity in open-source projects |
Alina Matyukhina, Shlomi Linoy, Nguyen Cong Van, Rongxing Lu, Natalia Stakhanova |
Identifying smart contract users by analyzing their coding style |
Samaneh Mahdavifar, Ali A. Ghorbani |
Towards a Deep Learning-Based Expert System for Detecting Phishing Attacks |
Rasoul Shahsavarifar, David Bremner |
Novel Approximation for Halfspace depth |
Ali Hakimi Parizi, Paul Cook |
Do Character-level Language Models Capture knowledge of Multiword Expression Compositionality? |
Yoann S.M. Arseneau, Suprio Ray, Bradford G. Nickerson |
Memory Efficient Spatio-Textual Search with Concurrent Updates |
Samaneh Mahdavifar, Mohammad Rasool Fatemi, Dima Alhadidi |
Android Malware Categorization Using a Semi-Supervised Deep Learning Architecture Based on Ladder Networks |
Naghmeh Shahverdi, David Bremner |
Symmetry in Integer Linear Programming |
Ali Hakimi Parizi, Paul Cook |
Do Character-level Language Models Capture Knowledge of Multiword Expression Compositionality? |