Jay Dave, V. Laxmi, Parvez Faruki, M. Gaur, Bhavya Shah
{"title":"Bloom Filter Based Privacy Preserving Deduplication System","authors":"Jay Dave, V. Laxmi, Parvez Faruki, M. Gaur, Bhavya Shah","doi":"10.1007/978-981-13-7561-3_2","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_2","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124144066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Naderi, P. Vinod, M. Conti, Saeed Parsa, M. Alaeiyan
{"title":"Malware Signature Generation Using Locality Sensitive Hashing","authors":"H. Naderi, P. Vinod, M. Conti, Saeed Parsa, M. Alaeiyan","doi":"10.1007/978-981-13-7561-3_9","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_9","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122314309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Parvez Faruki, B. Buddhadev, Bhavya Shah, A. Zemmari, V. Laxmi, M. Gaur
{"title":"DroidDivesDeep: Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks","authors":"Parvez Faruki, B. Buddhadev, Bhavya Shah, A. Zemmari, V. Laxmi, M. Gaur","doi":"10.1007/978-981-13-7561-3_10","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_10","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130448938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sukanta Dey, Abhishek Kumar, Mehul Sawarkar, P. Singh, Sukumar Nandi
{"title":"EvadePDF: Towards Evading Machine Learning Based PDF Malware Classifiers","authors":"Sukanta Dey, Abhishek Kumar, Mehul Sawarkar, P. Singh, Sukumar Nandi","doi":"10.1007/978-981-13-7561-3_11","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_11","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131130642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bad Signature Identification in a Batch Using Error Detection Codes","authors":"Apurva S. Kittur, Swapnil Kauthale, A. R. Pais","doi":"10.1007/978-981-13-7561-3_4","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_4","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123369814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unsupervised Person Re-ID in Surveillance Feed Using Re-ranking","authors":"M. Singh, V. Laxmi, N. Nain","doi":"10.1007/978-981-13-7561-3_14","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_14","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123491105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Threshold Ring Signature with Message Block Sharing","authors":"Swati Rawal, Sahadeo Padhye","doi":"10.1007/978-981-13-7561-3_19","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_19","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127782180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy String Matching Algorithm for Spam Detection in Twitter","authors":"Alok Kumar, M. Singh, A. R. Pais","doi":"10.1007/978-981-13-7561-3_21","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_21","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121105082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IP Traceback in Dynamic Networks","authors":"Sangita Roy, H. Chawla, A. Sairam","doi":"10.1007/978-981-13-7561-3_12","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_12","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115008172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Opportunistic Data Exchange Using Smart Devices in 5G/LTE-A Networks","authors":"S. Tetarave, S. Tripathy","doi":"10.1007/978-981-13-7561-3_1","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_1","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"129 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130054185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}