1. Liu, Y., He, D., Obaidat, M.S., Fellow of IEEE and Fellow of SCS, Kumar, N.,Khan, M.K., Raymond Choo, K.-K., Blockchain-based identity management systems: A review, Journalof Network and Computer Applications (2020), doi: https://doi.org/10.1016/j.jnca.2020.102731.
  2. Marahattaa A, Pirbhulal S, Zhang F, Parizid R M, Choo K-K R and Liu Z. Classification-based and Energy-Efficient Dynamic Task Scheduling Scheme for Virtualized Cloud Data Center. IEEE Transactions on Cloud Computing [In press]. https://doi.org/10.1109/TCC.2019.2918226
  3. Feng Q, He D, Wang H, Xie X and Choo K-K R. SecureNLP: A System for Multi-Party Privacy-Preserving Natural Language Processing. IEEE Transactions on Information Forensics and Security [In press]. https://doi.org/10.1109/TIFS.2020.2997134
  4. Chen B, He D, Kumar N, Wang H and Choo K-K R. A Blockchain-Based Proxy Re-Encryption with Equality Test for Vehicular Communication Systems. IEEE Transactions on Network Science and Engineering [In press]. https://doi.org/10.1109/TNSE.2020.2999551
  5. Md. Farhan Haque and Ram Krishnan. “A Framework Towards Secure Sharing of Structured Cyber Threat Intelligence,” International Conference on Secure Knowledge Management in the Artificial Intelligence Era, 2020, p. 21.
  6. Chakraborty S., Sandhu R., Krishnan R. (2020) On the Feasibility of RBAC to ABAC Policy Mining: A Formal Analysis. In: Sahay S., Goel N., Patil V., Jadliwala M. (eds) Secure Knowledge Management In Artificial Intelligence Era. SKM 2019. Communications in Computer and Information Science, vol 1186. Springer, Singapore, doi: https://doi.org/10.1007/978-981-15-3817-9_9
  7. Talegaon, Samir & Krishnan, Ram. A Formal Specification of Access Control in Android. Secure Knowledge Management In Artificial Intelligence Era, 8th International Conference (SKM 2019), Goa, India, Dec. 2019, doi: 10.1007/978-981-15-3817-9_7. 
  8. Xu L. et al. (2020) KCRS: A Blockchain-Based Key Compromise Resilient Signature System. In: Zheng Z., Dai HN., Tang M., Chen X. (eds) Blockchain and Trustworthy Systems. BlockSys 2019. Communications in Computer and Information Science, vol 1156. Springer, Singapore, doi: https://doi.org/10.1007/978-981-15-2777-7_19
  9. Gabriel C. Fernandez and Shouhuai Xu. A Case Study on Using Deep Learning for Network Intrusion Detection. IEEE Milcom, Nov 2019.
  10. Eric Ficke, Kristin M. Schweitzer, Raymond M. Bateman, and Shouhuai Xu. Analyzing Root Causes of Intrusion Detection False-Negatives: Methodology and Case Study. IEEE Milcom Nov 2019.
  11. Randy Klepetko and Ram Krishnan, Analyzing CNN Model Performance Sensitivity to the Ordering of Non-Natural Data, 4th IEEE International Conference on Computing Communication and Security (ICCCS 2019), Rome, Italy, October 10-12, 2019.
  12. Abdullah Al-Alaj, Ram Krishnan and Ravi Sandhu, SDN-RBAC: An Access Control Model for SDN Controller Applications, In Proceedings of 4th IEEE International Conference on Computing Communication and Security (ICCCS 2019), Rome, Italy, October 10-12, 2019.
  13. Shaikh Mostafa, Bridgette Findley, Na Meng, and Xiaoyin Wang. SAIS: Self-Adaptive Identification of Security Bug Reports, IEEE Transactions on Dependable and Secure Computing (TDSC), Sept. 2019, doi: 10.1109/TDSC.2019.2939132.
  14. D. Zou, S. Wang, S. Xu, Z. Li, and H. Jin. muVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection. IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Sept. 2019, doi: 10.1109/TDSC.2019.2942930.
  15. Alkadi O S, Moustafa N, Turnbull B and Choo K-K R. An Ontological Graph Identification Method for improving Localisation of IP Prefix Hijacking in Network Systems, IEEE Transactions on Information Forensics and Security, August 26, 2019, 11 pages.
  16. Chen H, Pendleton M, Njilla L, Xu S. A survey on ethereum systems security: Vulnerabilities, attacks and defenses. arXiv preprint arXiv:1908.04507. 2019 Aug 13.
  17. Shuvra Chakraborty, Ravi Sandhu and Ram Krishnan, On the Feasibility of Attribute-Based Access Control Policy Mining. In Proceedings of the 20th IEEE Conference on Information Reuse and Integration (IRI), Los Angeles, California, July 30-August 1, 2019, 8 pages, doi: 10.1109/IRI.2019.00047.
  18. Mahmoud Abdelsalam, Ram Krishnan and Ravi Sandhu, Online Malware Detection in Cloud Auto-Scaling Systems Using Shallow Convolutional Neural Networks. In Proceedings 31st Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), Charleston, SC, July 15-17, 2019, 17 pages.
  19. Joy Rahman and Palden Lama, Predicting the End-to-End Tail Latency of Containerized Microservices in the Cloud.  In Proceedings of IEEE International Conference on Cloud Engineering (IC2E), Prague, Czech Republic, June 24-27, 2019, 10 pages.
  20. Zongzong Lin, Wenlian Lu, Shouhuai Xu: Unified Preventive and Reactive Cyber Defense Dynamics Is Still Globally Convergent. IEEE/ACM Transactions on Networking, 27(3): 1098-1111 (2019)
  21. Banerjee S, Odelu V, Das A K, Srinivas J, Kumar N, Chattopadhyay S and Choo K-K R. A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment. IEEE Internet of Things Journal 6(5): 8739–8752, June 17, 2019, 14 pages.
  22. John Heaps, Xiaoyin Wang, Travis Breaux, and Jianwei Niu. Toward Detection of Access Control Models from Source Code via Word Embedding. In SACMAT ’19: Proceedings of The 24th ACM Symposium on Access Control Models & Technologies (SACMAT), June 4–6, 2019, Toronto, Canada, 8 pages, in press.
  23. Mengsu Chen, Felix Fischer, Na Meng, Xiaoyin Wang, Jens Grossklags, How Reliable is the Crowdsourced Knowledge of Security Implementation? Proceedings of International Conference on Software Engineering (ICSE), Montreal, Canada, May 25-31, 2019, 12 pages, to appear.
  24. Zhang X, Choo K-K R and Beebe N 2019. How do I share my IoT forensic experience with the broader community? An automated knowledge sharing IoT forensic platform. IEEE Internet of Things Journal 6(4): 6850–6861, April 22, 2019, 12 pages.
  25. Hongyu Liu, Sam Silvestro Xiaoyin Wang, Lide Duan, Tongping Liu, Causer: Context-Sensitive Overflow Detection, Proceedings of International Symposium on Code Generation and Optimization (CGO), Washington DC, Feb. 16-20, 2019, 11 pages.
  26. R. Garcia-Lebron, D. Myers, S. Xu, and J. Sun. Node Diversification in Complex Networks by Decentralized Coloring. Journal of Complex Networks, 2018
  27. Foyzul Hassan, Rodney Rodriguez, Xiaoyin Wang, RUDSEA: recommending updates of Dockerfiles via software environment analysis, Proceedings of ACM/IEEE Conference on Automated Software Engineering (ASE), Montpelier, France, Sept. 3-7, 2018, 6 pages.
  28. Mahmoud Abdelsalam, Ram Krishnan, Yufei Huang and Ravi Sandhu, Malware Detection in Cloud Infrastructures using Convolutional Neural Networks. In Proceedings 11th IEEE International Conference on Cloud Computing (CLOUD), San Francisco, CA, July 2-7, 2018, 8 pages. Presentation(pdf) 
  29. Maanak Gupta and Ravi Sandhu, Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things. In Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies (SACMAT), Indianapolis, Indiana, June 13-15, 2018, 12 pages. Presentation(pptx) (pdf) 
  30. Guo C, Zhuang R, Jie Y, Choo K-K R and Tang X. Secure Range Search over Encrypted Uncertain IoT Outsourced Data. IEEE Internet of Things Journal 6(2): 1520–1529, June 7, 2018, 10 pages.
  31. Herrera, Joshua and Demir, Mevlut and Prevost, John and Rad, Paul. “Distributed Edge Cloud R-CNN for Real Time Object Detection,” World Automation Congress proceedings, June 2018.
  32. Demir, Mevlut and Wagner, Weslyn and Dandona, Divyaansh and Prevost, John J. “A Comprehensive Solution for Research-Oriented Cloud Computing,” International Conference on Cloud Computing, June 2018.
  33. Alvarado, A., Carmona, G. & Mata, A.  Tópicos Selectos para la Educación en Ciencias, Ingeniería, Tecnología y Matemáticas (CITeM): Una Visión Integradora. ©ECORFAN-México. ISBN 978-607-8534-43-2, April 2018.
  34. Janet L. Losser, Paul Caldarella, Sharon J. Black & P. Elizabeth Pate, Factors affecting service learning implementation: a comparison of novice and veteran teachers, Teachers and Teaching, 24:6, 659-672, April 25 2018, DOI: 10.1080/13540602.2018.1464906
  35. John Charlton, Pang Du, Jin-Hee Cho, Shouhuai Xu, Measuring Relative Accuracy of Malware Detectors in the Absence of Ground Truth. Proceedings of IEEE MILCOM 2018: 450-455
  36. Asma Alshehri, James Benson, Farhan Patwa and Ravi Sandhu, Access Control Model for Virtual Objects (Shadows) Communication for AWS Internet of Things, In Proceedings of the 8th ACM Conference on Data and Application Security and Privacy (CODASPY), Tempe, AZ, March 19-21, 2018. Presentation(pptx) (pdf)
  37. Maanak Gupta, Farhan Patwa and Ravi Sandhu, An Attribute-Based Access Control Model for Secure Big Data Processing in Hadoop Ecosystem. In Proceedings of the 3rd ACM Workshop on Attribute-Based Access Control (ABAC), March 19-21, 2018, Tempe, Arizona. Presentation(pptx) (pdf) 
  38. Smriti Bhatt, Farhan Patwa and Ravi Sandhu,An Access Control Framework for Cloud-Enabled Wearable Internet of Things, In Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing (CIC), San Jose, CA, October 15-17, 2017, 11 pages. Presentation(pptx)(pdf)
  39. Rodriguez, Rodney, Shaikh Mostafa, and Xiaoyin Wang. “Ntapps: A network traffic analyzer of android applications.” In Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, pp. 199-206. ACM, 2017.