aicybersecuritycenter

Conference Papers (會議論文)

  • Brij Gupta, Akshat Gaurav, Kwok Tai Chui and Ching-Hsien Hsu*, “Identity-Based Authentication Technique for IoT Devices”, IEEE International Conference on Consumer Electronics (ICCE), 2022.
  • Nithin, Ching-Hsien Hsu, Ren-Hung Hwang, “Identity-Based Authentication Technique for IoT Devices”, Taiwan Symposium on CLoud and Services Computing, 2022.
  • Fadi and Ching-Hsien Hsu, “Smart Tourism: A Proof of Concept for Cyprus Museum of Modern Arts in the IoT Era”, Proceedings of International Conference on Artificial Intelligence of Things (ICAIoT 2021), Nicosia, Cyprus | September 3-4, 2021.
  • Kuthada Mohan Sai, B B Gupta, Ching-Hsien Hsu and Dragan Peraković, “Lightweight Intrusion Detection System In IoT Networks Using Raspberry pi 3b+”, International Conference on Smart Systems and Advanced Computing (SysCom 2021), 2021.
  • Akshat Gaurav、B. B. Gupta、許慶賢(Ching-Hsien Hsu)、Dragan Perakovic、FRANCISCO JOSE GARCIA PENALVO, Deep Learning Based Approach for Secure Web of Things (WoT) , 2021 IEEE International Conference on Communications Workshops (ICC Workshops), Montreal, QC, Canada
  • Anupama Mishra、B. B. Gupta、Dragan Perakovic、Francisco Jose Garcia Penalvo、許慶賢(Ching-Hsien Hsu), Classification Based Machine Learning for Detection of DDoS attack in Cloud Computing , 2021 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA,
  • Anupama Mishra、B. B. Gupta、Dragan Perakovic、Shingo Yamaguchi、許慶賢(Ching-Hsien Hsu), Entropy based Defensive Mechanism against DDoS Attack in SDN, Cloud enabled Online Social Networks – IEEE International Conference on Consumer Electronics, Las Vegas, NV, USA
  • Somya Ranjan Sahoo、B. B. Gupta、Chang Choi、許慶賢(Ching-Hsien Hsu)、Kwok Tai Chui, Behavioral Analysis to Detect Social Spammer in Online Social Networks , International Conference on Computational Data and Social Networks, Dallas, TX, USA
  • Wan Ju Lin、Jian-Wen Chen、Che-Lun Hung、許慶賢(Ching-Hsien Hsu), Classification of Autoclave Temperature via Deep Learning , 2019 IEEE International Conferences on Ubiquitous Computing & Communications (IUCC), 瀋陽 大陸
  • Zihao Ling(Zihao Ling)、Yingyuan Xi(Yingyuan Xiao)、 Hongya Wan(Hongya Wang)、 Lei Xu(Lei Xu)、許慶賢(Ching-Hsien Hsu), Extracting Implicit Friends from Heterogeneous Information Network for Social Recommendation , 16th Pacific Rim International Conference on Artificial Intelligence, FIJI
  • 許慶賢(Robert Hsu)、Gunasekaran(Gunasekaran Manoga、 Parthasara( Parthasarathy Pan、S. Vivekana(S. Vivekanandan), A New Approach For Prediction of Lung Carcinoma Using Back Propagation Neural Network with Decision Tree Classifiers, Paris, France
  • Akshat Gaurav、B. B. Gupta、許慶賢(Ching-Hsien Hsu)、Shingo Yamaguchi、Kwok Tai Chui, Fog Layer, based DDoS attack Detection Approach for Internet-of-Things (IoTs) devices – IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA
  • Mengsha Wa(Mengsha Wang)、 Yingyuan X( Yingyuan Xiao)、Wenguang Zh(Wenguang Zheng)、Xu Jiao(Xu Jiao)、許慶賢(Robert Hsu), Tag, based Personalized Music Recommendation – 2018 15th International Symposium on Pervasive Systems, Algorithms and Networks, Yichang
  • Satheesh A、Ravikumar R、Elango.N.M、許慶賢(Robert Hsu), EMAPM: Enterprise Modernization Autonomic Predictive Model in Hybrid Cloud Environments, Kanazawa, Japan
  • Yingyuan X、 Zhongjing(Zhongjing Bu)、許慶賢(Robert Hsu)、 Wenxin Zhu(Wenxin Zhu)、Yan Shen, Trust-Aware Recommendation in Social Network, Australia
  • Akshat Gaurav、B. B. Gupta、許慶賢(Ching-Hsien Hsu)、Dragan Perakovic、FRANCISCO JOSE GARCIA PENALVO, Filtering of Distributed Denial of Services (DDoS) Attacks in Cloud Computing Environment , 2021 IEEE International Conference on Communications Workshops (ICC Workshops), Montreal, QC, Canada
  • Syafiq, Anuaru, Shingo Yamaguchi, B. Gupta, “On Privacy Verification in the IoT Service Based on PN2,” 5th IEEE GCCE-2016, Kyoto, Japan, Oct, 2016.
  • Pooja Chaudhary, B. Gupta, Shingo Yamaguchi, “XSS Detection with Automatic View Isolation on Online Social Network” 5th IEEE GCCE-2016, Kyoto, Japan, Oct, 2016.
  • Pooja Choudhary, B. Gupta, S. Gupta, “Cross-Site Scripting (XSS) Worms in Online Social Network (OSN): Taxonomy and Defensive Mechanisms”, IEEE IndiaCom-2016.
  • Ankit Kumar Jain, B. Gupta, “Comparative Analysis of Features based Machine Learning Approaches for Phishing Detection”, IEEE IndiaCom-2016.
  • Mohd Anuaruddin Bin Ahmadon, Zhaolong Gou, Shingo Yamaguchi, B. Gupta, “Detection and Update Method for Attack Behavior Models in Intrusion Detection Systems”, IEEE IndiaCom-2016.
  • Muhammad Syafiq Bin Ab Malek, Mohd Anuaruddin Bin Ahmadon, Shingo Yamaguchi, B. Gupta, “Implementation of Parallel Model Checking for Computer Based Test Security Design,” International Conference on Information and Communication Systems (ICICS 2016), Jordan, 2016.
  • Mohd Anuaruddin Bin Ahmadon, Muhammad Syafiq Bin Ab Malek, Shingo Yamaguchi, B. Gupta, “A Petri-Net Based Approach for Software Evolution,” International Conference on Information and Communication Systems (ICICS 2016), Jordan, 2016.
  • Shashank Gupta, B. Gupta, “Alleviating the Proliferation of JavaScript Worms from Online Social Network in Cloud Platforms,” International Conference on Information and Communication Systems (ICICS 2016), Jordan, 2016.
  • Omkar Badve, B. Gupta, et. al.., “DDoS Detection and Filtering Technique in Cloud Environment Using GARCH Model,” 4th IEEE GCCE 2015, Osaka, Japan, Oct., 2015.
  • Gou, S. Yamaguchi, B. B. Gupta, et. al., “A Petri Net-based Framework of Intrusion Detection Systems,” 4th IEEE GCCE 2015, Osaka, Japan, Oct., 2015.
  • Shashank Gupta, B. Gupta, “PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications,” Conf. Computing Frontiers, Italy, 2015: 59:1-59:8
  • Mishra, B. B. Gupta, “Hybrid Solution to Detect and Filter Zero-day Phishing Attacks,” Second International Conference on “Emerging Research in Computing, Information, Communication and Applications” (ERCICA-14), Aug., 2014.
  • Alomari, S. Manickam, B. B. Gupta, et. al., “Design, Deployment and use of HTTP-based Botnet (HBB) Testbed,” in proceedings of 16th International conference on Advance Communication Technology (ICACT-2014), Phoenix Park, PyeongChang, South Korea Feb. 16-19, 2014.
  • Shrivastava, B. B. Gupta, “An Encapsulated Approach of Forensic Model for digital investigation,” in the proceedings of 3rd IEEE GCCE-2014, Tokyo, Japan, Oct. 2014.
  • B. Gupta, R. C. Joshi, Manoj Misra, et al., “An Integrated Framework for Proactive Detection, Characterization and Response of DDoS Attacks at ISP level,” in proceedings of 3rd IEEE International Conference on Machine Learning and Computing (ICMLC 2011), 2011, pp. 179-183, Singapore.
  • B. Gupta, R. C. Joshi, M. Misra, et. al., “Detecting a Wide Range of Flooding DDoS Attacks using Linear Prediction Model,” in the proceedings of 2nd IEEE International Conference on Information and Multimedia Technology (ICIMT 2010), pp. 535-539, December 28-30, 2010, Hong Kong, China.
  • B. Gupta, R. C. Joshi, Manoj Misra, et. al., “Estimating Number of Zombies in DDoS Attacks using Multiple Regression Analysis,” in the proceedings of IEEE International Conference on Intelligent Information Networks (ICIIN 2011), 2011, pp. 66-70, Dubai, UAE.
  • B. Gupta, R. C. Joshi, Manoj Misra, “On Approximating Number of Zombies in a DDoS Attack using Linear Regression Model,” in the proceedings of IEEE International Conference on Intelligent Network and Computing (ICINC-2010), pp. 150-154, Nov. 26-28, 2010, Malaysia.
  • Anupama Mishra, B. Gupta, R. C. Joshi, “A Comparative study of Distributed Denial of Service Attacks, Intrusion Tolerance and mitigation Techniques,” in the proceedings of 2011 European Intelligence and Security Informatics Conference (EISIC 2011), September 12-14, 2011, DOI: 10.1109/EISIC.2011.15, Athens, Greece.
  • K. Agrawal, B.B. Gupta, Satbir Jain, “SVM Based scheme for Predicting Number of Zombies in a DDoS Attack,” in the proceedings of 2011 European Intelligence and Security Informatics Conference (EISIC 2011), September 12-14, 2011, DOI: 10.1109/EISIC.2011.19, Athens, Greece.
  • B. Gupta, R. C. Joshi, M. Misra, “Defense Mechanisms against Distributed Denial of Service (DDoS) Attacks,” PhD/ECR Forum, Fifth International Conference on Intelligent Sensors, Sensor Networks and Information Processing ISSNIP 2009, University of Melbourne, Victoria, Australia.
  • B. Gupta, S. Sharma, et. al., “Detecting Distributed Denial of Service (DDoS) Attacks using GARCH Model,” in the proceedings of Eighth IEEE International Conference on Innovations in Information Technology (Innovations’12), March 18 – 20, 2012, Abu-Dhabi, UAE.
  • B. Gupta, M. Misra, R. C. Joshi, “FVBA: A Combined Statistical Approach for Low Rate Degrading and High Bandwidth Disruptive DDoS Attacks Detection in ISP Domain,” in the proceedings of 16th IEEE International Conference on Networks (ICON-2008), DOI: 10.1109/ICON.2008.4772654, Dec. 12-14, 2008, New Delhi, India.
  • B. Gupta, R. C. Joshi, M. Misra, “An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain,” in the proceedings of ACM International Conference on Advances in Computer, Communication and Computing (ICAC3-2008), pp. 503-509, Jan. 23-24, 2009, Mumbai, India.
  • B. Gupta, M. Misra, R. C. Joshi, “An Integrated Approach to Counter Flooding Based DDoS Attacks in ISP Domain,” in the proceedings of IEEE International Conference on Emerging Trends in Computing (ICETIC-2009), pp. 115-120, Jan. 8-10, 2009, India.
  • B. Gupta, K. Kumar, R. C. Joshi, M. Misra, “Tackling Aggressive Flows using Queue Management Techniques,” in the proceedings of International Conference on Recent advancement and Applications of Computer in Electrical engineering (RACE 2007), March 23-25, 2007, India.
  • B. Gupta, M. Misra, R. C. Joshi, “A Comprehensive Study of Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms,” in the proceeding of International Conference on Soft Computing and Intelligent Systems (ICSCIS-07), Dec. 27-29, 2007, India, pp. 251-257.
  • B. Gupta, K. Kumar, K. Singh, R. C. Joshi, “Distributed Approach to Detect DDoS attacks in ISP Domain using Entropy,” in the proceedings of International Conference on Advanced Communication System (ICACS-2007), Jan. 10-12, 2007, India, pp. 101-108.