| DependSys-2020: 12 regular + 8 short | ||||
| Paper ID | Title | Authors | First author email | Type |
| 1570668261 | Cognitive Privacy: AI-enabled Privacy using EEG Signals in the Internet of Things | Francesco Schiliro, Nour Moustafa, Amin Beheshti | francesco.schiliro@hdr.mq.edu.au | Regular |
| 1570680619 | A scalable Blockchain based system for super resolution images manipulation | Antonio Rapuano, Gerardo Iovane, Marta Chinnici | arapuano@unisa.it | Regular |
| 1570679675 | A secret sharing scheme based on game theory and BP neural network | Qiuxian Li, Quanxing Zhou, Qixin Pan, Lingyun Wang, Hongfa Ding | qiuxianLL@163.com | Regular |
| 1570680893 | Free Chain: Enabling Freedom of Expression through Public Blockchains | Israa Alsarsour, Qutaibah Malluhi, Yongge Wang | ia1205702@qu.edu.qa | Regular |
| 1570682025 | Access Control Method based on a Mutual Trust Mechanism in the Edge Computing Environment | Weijin Jiang, Sijian Lv, Yongxia Sun, Liang Guo | jwjnudt@163.com | Regular |
| 1570680895 | Implementing a solution for monitoring SLA violations in Cloud | Andreea Floricu, Razvan Buzatu, Catalin Negru, Florin Pop, Aniello Castiglione | florin.pop@cs.pub.ro | Regular |
| 1570675753 | Dependable Wildlife DTN: Wearable Animal Resource Optimization for Sustainable Long-term Monitoring | Keijiro Nakagawa, Daisuk´e Shimotoku, Junya Kawase, Hill Hiroki Kobayashi | kenakaga@csis.u-tokyo.co.jp | Regular |
| 1570675831 | Real-Time Fault Detection and Diagnosis of CPS Faults in DEVS | Joseph Boi-Ukeme, Cristina Ruiz-Martin, Gabriel Wainer | joseph.boiukeme@carleton.ca | Regular |
| 1570680174 | Modeling and Analysis of Malware Propagation for Cluster-based Wireless Sensor Networks | Xuejin Zhu, Jie Huang, Chunyang Qi, Xiaowen Wang | xuejinzhu@seu.edu.cn | Regular |
| 1570680891 | HBD-Authority: Streaming Access Control Model for Hadoop | Congwei Chen, Marwa A. Elsayed, Mohammad Zulkernine | 14cc66@queensu.ca | Regular |
| 1570680900 | Physical Fingerprinting of Ultrasonic Sensor and Applications to Sensor Security | Eric Cheek, Dhimant Khuttan, Raghu Changalvala, Hafiz Malik | echeek@umich.edu | Regular |
| 1570680928 | An Ensemble Feature Selection Method for IoT IDS | Alaa Alhowaide, Izzat Alsmadi, Jian Tang | azalhowaide@mun.ca | Regular |
| 1570669461 | Investigating Root Causes of Authentication Failures Using a SAML and OIDC Observatory | Jim Basney, Phuong Cao, Terry Fleury | jbasney@illinois.edu | Short |
| 1570675820 | A new agent-based modeling simulation for compression using the echolocation system in dolphins | Khaldoon Dhou, Christopher Cruzen | khaldoondhou@gmail.com | Short |
| 1570680675 | Network Virtualization Proof of Concept for Remote Management of Multi-Tenant Infrastructure | Stephen Ugwuanyi, ukRameez Asif, James Irvine | stephen.ugwuanyi@strath.ac.uk | Short |
| 1570680797 | An attack tree template based on feature diagram hierarchy | Rajesh Kumar, Hima Siva Kalyan Reddy | rajesh.k@pilani.bits-pilani.ac.in | Short |
| 1570680800 | Privacy Preservation of Aggregated Data Using Virtual Battery in the Smart Grid | Fawaz Kserawi, Qutaibah m. Malluhi | fawaz@qu.edu.qa | Short |
| 1570680873 | Google Apps Biased Rating Prediction Using Text Features and Tree Based Ensemble Learning | Saima Sadiq, Muhammad Umer, Saleem Ullah, Michele Nappi, Aniello Castiglione | cosc18151010@kfueit.edu.pk | Short |
| 1570680884 | A novel approach for predictive maintenance combing GAF encoding strategies and deep networks | Antonino Ferraro, Antonio Galli, Vincenzo Moscato, Giancarlo Speri | antonino.ferraro@unibg.it | Short |
| 1570680911 | LoRaWAN v1.1 Security: Are We in the Clear Yet? | Sumesh J. Philip, James M. McQuillan, Oluwatoba Adegbite | sjphil3@ilstu.edu | Short |