Branding/Logomark minus Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 no author result Created with Sketch. Icon/Back Created with Sketch. Match!
Kim-Kwang Raymond Choo
University of Texas at San Antonio
Publications 602
Published in Information Sciences 5.52
Wei Ren10
Estimated H-index: 10
(China University of Geosciences),
Jingjing Hu (China University of Geosciences)+ -3 AuthorsKim-Kwang Raymond Choo41
Estimated H-index: 41
(UTSA: University of Texas at San Antonio)
Abstract Blockchain is well known as a decentralized and distributed public digital ledger, and is currently used by most cryptocurrencies to record transactions. One of the fundamental differences between blockchain and traditional distributed systems is that, blockchain’s decentralization relies on consensus protocols, such as proof of work (PoW). However, new computation systems, such as application specific integrated circuit (ASIC) machines, have recently emerged that are specifically desig...
Published on Oct 1, 2019in Journal of Network and Computer Applications 5.27
Shubhani Aggarwal1
Estimated H-index: 1
(Thapar University),
Rajat Chaudhary5
Estimated H-index: 5
(Thapar University)
+ 3 AuthorsAlbert Y. Zomaya50
Estimated H-index: 50
(USYD: University of Sydney)
Abstract Since the success of Bitcoin, there have been increased focus of studying the application of blockchain in a broad range of applications, such as in solutions facilitating identity privacy and transaction security using a decentralized architecture via different consensus mechanisms (e.g. proof-of-work) between different geo-located IoT devices/nodes in our increasingly digitalized society (e.g. smart city). In this paper, we survey the usage of blockchain technology for smart communiti...
Published on Sep 1, 2019in Computers & Electrical Engineering 2.19
Weizhi Meng10
Estimated H-index: 10
(GU: Guangzhou University),
Lijun Jiang2
Estimated H-index: 2
+ 2 AuthorsChong Jiang (GU: Guangzhou University)
Abstract Mobile devices, such as Android and iOS devices, are an attractive target for cyber-criminals, due to the amount of private data that can be accessed or stored on such devices. As public charging facilities become more commonplace, phone charging attacks are no longer fiction. Juice filming charging (JFC) attack is a particular phone charging threat, which can capture or infer users’ private information by automatically recording screen information from mobile devices during the entire ...
Published on May 1, 2019in Computers & Security 3.06
Rajat Chaudhary5
Estimated H-index: 5
Anish Jindal5
Estimated H-index: 5
+ 3 AuthorsKim-Kwang Raymond Choo4
Estimated H-index: 4
Abstract Tactile Internet is a fairly recent technological trend associated with the Internet-of-Things (IoT) era, with potential applications in a broad range of industrial, societal and business use cases. The real-time machine-to-machine and human-to-machine interactions (e.g., in unmanned vehicles and the underpinning infrastructure within the smart city ecosystem) in the intelligent transportation sector, for example, contribute to the potential utility of Tactile Internet in this particula...
Published on Aug 1, 2019in IEEE Transactions on Information Forensics and Security 6.21
Nour Moustafa6
Estimated H-index: 6
(UNSW: University of New South Wales),
Kim-Kwang Raymond Choo41
Estimated H-index: 41
(UTSA: University of Texas at San Antonio)
+ 1 AuthorsAhmet Camtepe19
Estimated H-index: 19
(CSIRO: Commonwealth Scientific and Industrial Research Organisation)
Current anomaly detection systems (ADSs) apply statistical and machine learning algorithms to discover zero-day attacks, but such algorithms are vulnerable to advanced persistent threat actors. In this paper, we propose an adversarial statistical learning mechanism for anomaly detection, outlier Dirichlet mixture-based ADS (ODM-ADS), which has three new capabilities. First, it can self-adapt against data poisoning attacks that inject malicious instances in the training phase for disrupting the l...
Published on Jul 1, 2019in Information Sciences 5.52
Tehsin Kanwal (CUI: COMSATS Institute of Information Technology), Sayed Ali Asjad Shaukat (CUI: COMSATS Institute of Information Technology)+ 6 AuthorsSamee Ullah Khan35
Estimated H-index: 35
(NDSU: North Dakota State University)
Abstract Preserved privacy and enhanced utility are two competing requirements in data publishing. For maintaining a trade-off between the two; a plethora of research work exist in 1:1 scenario (each individual has a single record) with a single sensitive attribute (SA). However, some practical scenarios i.e., data having 1:M records (an individual can have multiple records) with multiple sensitive attributes (MSAs), have been relatively understudied. In our current interconnected and digitalize...
Published on Jun 24, 2019in Information Systems Frontiers 2.54
Pei Yee Chin (UMS: Universiti Malaysia Sabah), Nina Evans9
Estimated H-index: 9
(UniSA: University of South Australia)
+ 1 AuthorsKim-Kwang Raymond Choo41
Estimated H-index: 41
(UTSA: University of Texas at San Antonio)
There has been an exponential growth use of enterprise social networks for improved communication, connection, collaboration and enhanced knowledge sharing within organizations. However, the intended benefits of this social network deployment have not been fully realized due to the relative low usage among employees. This study provides an insight into the underlying factors deemed likely to influence employees’ enterprise social networks consumptive and contributive use by modifying and extendi...
Published on Jan 1, 2018in IEEE Internet of Things Journal 9.52
Christian Esposito18
Estimated H-index: 18
(University of Naples Federico II),
Aniello Castiglione23
Estimated H-index: 23
(UNISA: University of Salerno)
+ 3 AuthorsKim-Kwang Raymond Choo41
Estimated H-index: 41
(UTSA: University of Texas at San Antonio)
Smart city applications are increasingly popular due to their potential to improve quality of life in an urbanized society, and such applications typically leverage on cloud computing for data and computation offloading from the sensing infrastructure. Despite the capability of achieving scalability and flexibility, the use of cloud computing imposes inherent security and privacy concerns regarding data analysis and exchange, as well as legal implications. For example, data in a smart city appli...
Hamed Haddad Pajouh2
Estimated H-index: 2
Reza Javidan7
Estimated H-index: 7
(SUTECH: Shiraz University of Technology)
+ 2 AuthorsKim-Kwang Raymond Choo41
Estimated H-index: 41
(SUTECH: Shiraz University of Technology)
With increasing reliance on Internet of Things (IoT) devices and services, the capability to detect intrusions and malicious activities within IoT networks is critical for resilience of the network infrastructure. In this paper, we present a novel model for intrusion detection based on two-layer dimension reduction and two-tier classification module, designed to detect malicious activities such as User to Root (U2R) and Remote to Local (R2L) attacks. The proposed model is using component analysi...