{"id":794,"date":"2022-04-07T06:01:21","date_gmt":"2022-04-07T06:01:21","guid":{"rendered":"https:\/\/aicybersecuritycenter.com\/?page_id=794"},"modified":"2022-12-12T13:49:51","modified_gmt":"2022-12-12T13:49:51","slug":"conference-papers","status":"publish","type":"page","link":"https:\/\/aicybersecuritycenter.com\/index.php\/conference-papers\/","title":{"rendered":"Conference Papers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"794\" class=\"elementor elementor-794\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7728a168 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7728a168\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8ac6263\" data-id=\"8ac6263\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-767719c elementor-widget elementor-widget-heading\" data-id=\"767719c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.6.1 - 23-03-2022 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Conference Papers (\u6703\u8b70\u8ad6\u6587)<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6ad73d71 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6ad73d71\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-a4aa253\" data-id=\"a4aa253\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-79fcbc2d\" data-id=\"79fcbc2d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e2932e6 elementor-widget elementor-widget-text-editor\" data-id=\"e2932e6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.6.1 - 23-03-2022 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<ul><li>Brij Gupta, Akshat Gaurav, Kwok Tai Chui and Ching-Hsien Hsu*, &#8220;Identity-Based Authentication Technique for IoT Devices&#8221;, IEEE International Conference on Consumer Electronics (ICCE), 2022.<\/li><li>Nithin, Ching-Hsien Hsu, Ren-Hung Hwang, &#8220;Identity-Based Authentication Technique for IoT Devices&#8221;, Taiwan Symposium on CLoud and Services Computing, 2022.<\/li><li>Fadi and Ching-Hsien Hsu, &#8220;Smart Tourism: A Proof of Concept for Cyprus Museum of Modern Arts in the IoT Era&#8221;, Proceedings of International Conference on Artificial Intelligence of Things (ICAIoT 2021), Nicosia, Cyprus | September 3-4, 2021.<\/li><li>Kuthada Mohan Sai, B B Gupta, Ching-Hsien Hsu and Dragan Perakovi\u0107, &#8220;Lightweight Intrusion Detection System In IoT Networks Using Raspberry pi 3b+&#8221;, International Conference on Smart Systems and Advanced Computing (SysCom 2021), 2021.<\/li><li>Akshat Gaurav\u3001B. B. Gupta\u3001\u8a31\u6176\u8ce2(Ching-Hsien Hsu)\u3001Dragan Perakovic\u3001FRANCISCO JOSE GARCIA PENALVO, Deep Learning Based Approach for Secure Web of Things (WoT) , 2021 IEEE International Conference on Communications Workshops (ICC Workshops), Montreal, QC, Canada<\/li><li>Anupama Mishra\u3001B. B. Gupta\u3001Dragan Perakovic\u3001Francisco Jose Garcia Penalvo\u3001\u8a31\u6176\u8ce2(Ching-Hsien Hsu), Classification Based Machine Learning for Detection of DDoS attack in Cloud Computing , 2021 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA,<\/li><li>Anupama Mishra\u3001B. B. Gupta\u3001Dragan Perakovic\u3001Shingo Yamaguchi\u3001\u8a31\u6176\u8ce2(Ching-Hsien Hsu), Entropy based Defensive Mechanism against DDoS Attack in SDN, Cloud enabled Online Social Networks &#8211; IEEE International Conference on Consumer Electronics, Las Vegas, NV, USA<\/li><li>Somya Ranjan Sahoo\u3001B. B. Gupta\u3001Chang Choi\u3001\u8a31\u6176\u8ce2(Ching-Hsien Hsu)\u3001Kwok Tai Chui, Behavioral Analysis to Detect Social Spammer in Online Social Networks , International Conference on Computational Data and Social Networks, Dallas, TX, USA<\/li><li>Wan Ju Lin\u3001Jian-Wen Chen\u3001Che-Lun Hung\u3001\u8a31\u6176\u8ce2(Ching-Hsien Hsu), Classification of Autoclave Temperature via Deep Learning , 2019 IEEE International Conferences on Ubiquitous Computing &amp; Communications (IUCC), \u700b\u967d \u5927\u9678<\/li><li>Zihao Ling(Zihao Ling)\u3001Yingyuan Xi(Yingyuan Xiao)\u3001 Hongya Wan(Hongya Wang)\u3001 Lei Xu(Lei Xu)\u3001\u8a31\u6176\u8ce2(Ching-Hsien Hsu), Extracting Implicit Friends from Heterogeneous Information Network for Social Recommendation , 16th Pacific Rim International Conference on Artificial Intelligence, FIJI<\/li><li>\u8a31\u6176\u8ce2(Robert Hsu)\u3001Gunasekaran(Gunasekaran Manoga\u3001 Parthasara( Parthasarathy Pan\u3001S. Vivekana(S. Vivekanandan), A New Approach For Prediction of Lung Carcinoma Using Back Propagation Neural Network with Decision Tree Classifiers, Paris, France<\/li><li>Akshat Gaurav\u3001B. B. Gupta\u3001\u8a31\u6176\u8ce2(Ching-Hsien Hsu)\u3001Shingo Yamaguchi\u3001Kwok Tai Chui, Fog Layer, based DDoS attack Detection Approach for Internet-of-Things (IoTs) devices &#8211; IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA<\/li><li>Mengsha Wa(Mengsha Wang)\u3001 Yingyuan X( Yingyuan Xiao)\u3001Wenguang Zh(Wenguang Zheng)\u3001Xu Jiao(Xu Jiao)\u3001\u8a31\u6176\u8ce2(Robert Hsu), Tag, based Personalized Music Recommendation &#8211; 2018 15th International Symposium on Pervasive Systems, Algorithms and Networks, Yichang<\/li><li>Satheesh A\u3001Ravikumar R\u3001Elango.N.M\u3001\u8a31\u6176\u8ce2(Robert Hsu), EMAPM: Enterprise Modernization Autonomic Predictive Model in Hybrid Cloud Environments, Kanazawa, Japan<\/li><li>Yingyuan X\u3001 Zhongjing(Zhongjing Bu)\u3001\u8a31\u6176\u8ce2(Robert Hsu)\u3001 Wenxin Zhu(Wenxin Zhu)\u3001Yan Shen, Trust-Aware Recommendation in Social Network, Australia<\/li><li>Akshat Gaurav\u3001B. B. Gupta\u3001\u8a31\u6176\u8ce2(Ching-Hsien Hsu)\u3001Dragan Perakovic\u3001FRANCISCO JOSE GARCIA PENALVO, Filtering of Distributed Denial of Services (DDoS) Attacks in Cloud Computing Environment , 2021 IEEE International Conference on Communications Workshops (ICC Workshops), Montreal, QC, Canada<\/li><li>Syafiq, Anuaru, Shingo Yamaguchi, B. Gupta, \u201cOn Privacy Verification in the IoT Service Based on PN2,\u201d 5<sup>th <\/sup>IEEE GCCE-2016, Kyoto, Japan, Oct, 2016.<\/li><li>Pooja Chaudhary, B. Gupta, Shingo Yamaguchi, \u201cXSS Detection with Automatic View Isolation on Online Social Network\u201d 5<sup>th <\/sup>IEEE GCCE-2016, Kyoto, Japan, Oct, 2016.<\/li><li>Pooja Choudhary, B. Gupta, S. Gupta, \u201cCross-Site Scripting (XSS) Worms in Online Social Network (OSN): Taxonomy and Defensive Mechanisms\u201d, IEEE IndiaCom-2016.<\/li><li>Ankit Kumar Jain, B. Gupta, \u201cComparative Analysis of Features based Machine Learning Approaches for Phishing Detection\u201d, IEEE IndiaCom-2016.<\/li><li>Mohd Anuaruddin Bin Ahmadon, Zhaolong Gou, Shingo Yamaguchi, B. Gupta, \u201cDetection and Update Method for Attack Behavior Models in Intrusion Detection Systems\u201d, IEEE IndiaCom-2016.<\/li><li>Muhammad Syafiq Bin Ab Malek, Mohd Anuaruddin Bin Ahmadon, Shingo Yamaguchi, B. Gupta, \u201cImplementation of Parallel Model Checking for Computer Based Test Security Design,\u201d International Conference on Information and Communication Systems (ICICS 2016), Jordan, 2016.<\/li><li>Mohd Anuaruddin Bin Ahmadon, Muhammad Syafiq Bin Ab Malek, Shingo Yamaguchi, B. Gupta, \u201cA Petri-Net Based Approach for Software Evolution,\u201d International Conference on Information and Communication Systems (ICICS 2016), Jordan, 2016.<\/li><li>Shashank Gupta, B. Gupta, \u201cAlleviating the Proliferation of JavaScript Worms from Online Social Network in Cloud Platforms,\u201d International Conference on Information and Communication Systems (ICICS 2016), Jordan, 2016.<\/li><li>Omkar Badve, B. Gupta, et. al.., \u201cDDoS Detection and Filtering Technique in Cloud Environment Using GARCH Model,\u201d 4<sup>th<\/sup> IEEE GCCE 2015, Osaka, Japan, Oct., 2015.<\/li><li>Gou, S. Yamaguchi, B. B. Gupta, et. al., \u201cA Petri Net-based Framework of Intrusion Detection Systems,\u201d 4<sup>th<\/sup> IEEE GCCE 2015, Osaka, Japan, Oct., 2015.<\/li><li>Shashank Gupta, B. Gupta, \u201cPHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications,\u201d Conf. Computing Frontiers, Italy, 2015: 59:1-59:8<\/li><li>Mishra, B. B. Gupta, \u201cHybrid Solution to Detect and Filter Zero-day Phishing Attacks,\u201d Second International Conference on \u201cEmerging Research in Computing, Information, Communication and Applications\u201d (ERCICA-14), Aug., 2014.<\/li><li>Alomari, S. Manickam, B. B. Gupta, et. al., \u201cDesign, Deployment and use of HTTP-based Botnet (HBB) Testbed,\u201d in proceedings of 16th International conference on Advance Communication Technology (ICACT-2014), Phoenix Park, PyeongChang, South Korea Feb. 16-19, 2014.<\/li><li>Shrivastava, B. B. Gupta, \u201cAn Encapsulated Approach of Forensic Model for digital investigation,\u201d in the proceedings of 3<sup>rd<\/sup> IEEE GCCE-2014, Tokyo, Japan, Oct. 2014.<\/li><li>B. Gupta, R. C. Joshi, Manoj Misra, et al., \u201cAn Integrated Framework for Proactive Detection, Characterization and Response of DDoS Attacks at ISP level,\u201d in proceedings of 3rd IEEE International Conference on Machine Learning and Computing (ICMLC 2011), 2011, pp. 179-183, Singapore.<\/li><li>B. Gupta, R. C. Joshi, M. Misra, et. al., \u201cDetecting a Wide Range of Flooding DDoS Attacks using Linear Prediction Model,\u201d in the proceedings of 2<sup>nd<\/sup> IEEE International Conference on Information and Multimedia Technology (ICIMT 2010), pp. 535-539, December 28-30, 2010, Hong Kong, China.<\/li><li>B. Gupta, R. C. Joshi, Manoj Misra, et. al., \u201cEstimating Number of Zombies in DDoS Attacks using Multiple Regression Analysis,\u201d in the proceedings of IEEE International Conference on Intelligent Information Networks (ICIIN 2011), 2011, pp. 66-70, Dubai, UAE.<\/li><li>B. Gupta, R. C. Joshi, Manoj Misra, \u201cOn Approximating Number of Zombies in a DDoS Attack using Linear Regression Model,\u201d in the proceedings of IEEE International Conference on Intelligent Network and Computing (ICINC-2010), pp. 150-154, Nov. 26-28, 2010, Malaysia.<\/li><li>Anupama Mishra, B. Gupta, R. C. Joshi, \u201cA Comparative study of Distributed Denial of Service Attacks, Intrusion Tolerance and mitigation Techniques,\u201d in the proceedings of 2011 European Intelligence and Security Informatics Conference (EISIC 2011), September 12-14, 2011, DOI: 10.1109\/EISIC.2011.15, Athens, Greece.<\/li><li>K. Agrawal, B.B. Gupta, Satbir Jain, \u201cSVM Based scheme for Predicting Number of Zombies in a DDoS Attack,\u201d in the proceedings of 2011 European Intelligence and Security Informatics Conference (EISIC 2011), September 12-14, 2011, DOI: 10.1109\/EISIC.2011.19, Athens, Greece.<\/li><li>B. Gupta, R. C. Joshi, M. Misra, \u201cDefense Mechanisms against Distributed Denial of Service (DDoS) Attacks,\u201d PhD\/ECR Forum, Fifth International Conference on Intelligent Sensors, Sensor Networks and Information Processing ISSNIP 2009, University of Melbourne, Victoria, Australia.<\/li><li>B. Gupta, S. Sharma, et. al., \u201cDetecting Distributed Denial of Service (DDoS) Attacks using GARCH Model,\u201d in the proceedings of Eighth IEEE International Conference on Innovations in Information Technology (Innovations&#8217;12), March 18 \u2013 20, 2012, Abu-Dhabi, UAE.<\/li><li>B. Gupta, M. Misra, R. C. Joshi, \u201cFVBA: A Combined Statistical Approach for Low Rate Degrading and High Bandwidth Disruptive DDoS Attacks Detection in ISP Domain,\u201d in the proceedings of 16th IEEE International Conference on Networks (ICON-2008), DOI: 10.1109\/ICON.2008.4772654, Dec. 12-14, 2008, New Delhi, India.<\/li><li>B. Gupta, R. C. Joshi, M. Misra, \u201cAn Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain,\u201d in the proceedings of ACM International Conference on Advances in Computer, Communication and Computing (ICAC3-2008), pp. 503-509, Jan. 23-24, 2009, Mumbai, India.<\/li><li>B. Gupta, M. Misra, R. C. Joshi, \u201cAn Integrated Approach to Counter Flooding Based DDoS Attacks in ISP Domain,\u201d in the proceedings of IEEE International Conference on Emerging Trends in Computing (ICETIC-2009), pp. 115-120, Jan. 8-10, 2009, India.<\/li><li>B. Gupta, K. Kumar, R. C. Joshi, M. Misra, \u201cTackling Aggressive Flows using Queue Management Techniques,\u201d in the proceedings of International Conference on Recent advancement and Applications of Computer in Electrical engineering (RACE 2007), March 23-25, 2007, India.<\/li><li>B. Gupta, M. Misra, R. C. Joshi, \u201cA Comprehensive Study of Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms,\u201d in the proceeding of International Conference on Soft Computing and Intelligent Systems (ICSCIS-07), Dec. 27-29, 2007, India, pp. 251-257.<\/li><li>B. Gupta, K. Kumar, K. Singh, R. C. Joshi, \u201cDistributed Approach to Detect DDoS attacks in ISP Domain using Entropy,\u201d in the proceedings of International Conference on Advanced Communication System (ICACS-2007), Jan. 10-12, 2007, India, pp. 101-108.<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-94bad50\" data-id=\"94bad50\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Conference Papers (\u6703\u8b70\u8ad6\u6587) Brij Gupta, Akshat Gaurav, Kwok Tai Chui and Ching-Hsien Hsu*, &#8220;Identity-Based Authentication Technique for IoT Devices&#8221;, IEEE International Conference on Consumer Electronics (ICCE), 2022. Nithin, Ching-Hsien Hsu, Ren-Hung Hwang, &#8220;Identity-Based Authentication Technique for IoT Devices&#8221;, Taiwan Symposium on CLoud and Services Computing, 2022. Fadi and Ching-Hsien Hsu, &#8220;Smart Tourism: A Proof of<a class=\"more-link\" href=\"https:\/\/aicybersecuritycenter.com\/index.php\/conference-papers\/\">Continue reading <span class=\"screen-reader-text\">&#8220;Conference Papers&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":[],"_links":{"self":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages\/794"}],"collection":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/comments?post=794"}],"version-history":[{"count":13,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages\/794\/revisions"}],"predecessor-version":[{"id":1729,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages\/794\/revisions\/1729"}],"wp:attachment":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/media?parent=794"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}