Publications supported by CloSer

Conference Papers

2018

  1. Ágnes Kiss, Masoud Naderpour, Jian Liu, N. Asokan, Thomas Schneider. "SoK: Modular and Efficient Private Decision Tree Evaluation". Accepted for the Privacy Enhancing Technologies Symposium (PETS 2019). 
  2. Leonardo Espinosa Leal, Anton Akusok and Kaj-Mikael Björk. "Website classification from webpage renders" Accepted for the International Conference on Extreme Learning Machines (ELM2018)
  3. Anton Akusok and Emil Eirola. "Comparison of Classification Methods for Very High-Dimensional Data in Sparse Random Projection Representation". Accepted for the International Conference on Extreme Learning Machines (ELM2018)
  4. Leonardo Espinosa Leal, Kaj-Mikael Björk, Amaury Lendasse, and Anton Akusok. "A Web Page Classifier Library Based on Random Image Content Analysis Using Deep Learning" PETRA '18 The 11th PErvasive Technologies Related to Assistive Environments Conference, 2018.
  5. Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan. "Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials" [open access technical report, source code]. 3rd Workshop on Security, Privacy, and Identity Management in the Cloud (SECPID), 2018.
  6. Jian Liu; Li Duan; Yong Li; N. Asokan. "Secure Deduplication of Encrypted Data: Refined Model and New Constructions". CT-RSA 2018.
  7. Fritz Alder, Arseny Kurnikov, Andrew Paverd, N. Asokan. "Migrating SGX Enclaves with Persistent State" [open access technical report, source code]. 48th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2018.
  8. Klaudia Krawiecka, Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan. "SafeKeeper: Protecting Web Passwords using Trusted Execution Environments" [open access technical report, source code]. The Web Conference (WWW) 2018 (JuFo 2).
  9. S. Ramezanian, T. Meskanen, V. Niemi. "Privacy Preserving Queries on Directed Graph". NTMS'2018 - Security Track.
  10. S. Ramezanian, T. Meskanen, V. Niemi. "Privacy Preserving Shortest Path Queries on Directed Graph." 2018 22nd Conference of Open Innovations Association (FRUCT). IEEE, 2018.
  11. S. Ramezanian, T. Meskanen, V. Niemi. "Privacy Preserving 2-party Queries on Bipartite Graphs with Private Set Intersection". (Accepted in The 34th ACM/SIGAPP Symposium On Applied Computing)
  12. N. Asokan, T. Nyman, N. Rattanavipanon, A-R. Sadeghi and G. Tsudik. "ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices". IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems – Special Issue ESWEEK 2018, CASES 2018, CODES + ISSS 2018 and EMSOFT 2018, 2018.
  13. F Alder, N Asokan, A Kurnikov, A Paverd, M Steiner. "S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX". arXiv preprint arXiv:1810.06080

2017

  1. Anton Akusok, Emil Eirola, Yoan Miche, Andrey Gritsenko, and Amaury Lendasse “Advanced Query Strategies for Active Learning with Extreme Learning Machine”. In European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN 2017), pp. 105-110. Bruges, Belgium, 2017.
  2. Monshizadeh, Mehrnoosh; Khatri, Vikramajeet; and Kantola, Raimo. “Detection as a service: An SDN application”. In 19th International Conference on Advanced Communication Technology (ICACT), Bongpyeong, pp. 285-290, 2017.
  3. Monshizadeh, Mehrnoosh; Khatri, Vikramajeet; Kantola, Raimo; and Yan, Zheng. “An Orchestrated Security Platform for Internet of Robots”. In proceedings of 12th International Conference, Green, Pervasive, and Cloud Computing (GPC), Cetara, Italy, pp. 298-312, 2017.
  4. Jian Liu, Mika Juuti, Yao Lu, N Asokan, "Oblivious Neural Network Predictions via MiniONN transformations", CCS 2017, Dallas, USA (JuFo 2) [open access technical report]
  5. Ágnes Kiss, Jian Liu, Thomas Schneider, N Asokan, Benny Pinkas, "Private set intersection for unequal set sizes with mobile applications", PETS 2017, Minneapolis, USA, [open access technical report]
  6. Sara Ramezanian, Tommi Meskanen, Masoud Naderpour, Valtteri Niemi,  "Private Membership Test Protocol with Low Communication Complexity", NSS 2017, Helsinki, Finland 
  7. Thomas Nyman, Jan-Erik Ekberg, Lucas Davi, N. Asokan, "CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers"RAID 2017, Atlanta, USA, [open access technical report]
  8. Sandeep Tamrakar, Jian Liu, Andrew Paverd, Jan-Erik Ekberg, Benny Pinkas, N. Asokan, "The Circle Game: Scalable Private Membership Test Using Trusted Hardware", in ACM Asia Conference on Computer and Communications Security (ASIACCS) 2017, Abu Dhabi, UAE, April 2017, (Honorable mention in the best paper competition), [open access technical report]
  9. Anomaly-Based Intrusion Detection using Extreme Learning Machine and Aggregation of Network Traffic Statistics in Probability Space, Buse Gul Atli, Yoan Miche, Aapo Kalliola, Ian Oliver, Silke Holtmanns and Amaury Lendasse, in Cognitive Computation, under review (submitted Oct. 2017).

2016

  1. Luiza Sayfullina, Emil Eirola, Dmitry Komashinsky, Paolo Palumbo, Juha Karhunen, "Android Malware Detection: Building Useful Representations", IEEE International Conference on Machine Learning and Applications (IEEE ICMLA'16), Anaheim, USA, December, 2016.
  2. Anton Akusok, Emil Eirola, Yoan Miche, Ian Oliver, Kaj-Mikael Björk, Andrey Gritsenko, Stephen Baek, Amaury Lendasse, "Incremental ELMVIS for unsupervised learning", International Conference on Extreme Learning Machines (ELM2016), Singapore, December, 2016.

  3. Ibbad Hafeez, Aaron Yi Ding, Lauri Suomalainen, Alexey Kirichenko, Sasu Tarkoma, " Securebox: Toward Safer and Smarter IoT Networks", Cloud Assisted Networking Workshop, ACM CoNEXT, Irvine, December 2016

Journal Papers

  1. Elena Reshetova, Hans Liljestrand, Andrew Paverd, N. Asokan. "Towards Linux kernel memory safety" Software: Practice and Experience, Vol 48, Issue 12, 2018.
  2. Andrew Paverd, Sandeep Tamrakar, Hoang Long Nguyen, Praveen Kumar Pendyala, Thien Duc Nguyen, Elizabeth Stobert, Tommi Gröndahl, N. Asokan, Ahmad-Reza Sadeghi, "OmniShare: Encrypted Cloud Storage for the Multi-Device Era", IEEE Internet Computing, , Volume 22, Issue 4, July 2018 (JuFo 3[open access technical report]
  3. Paolo Palumbo, Luiza Sayfullina, Dmitriy Komashinskiy, Emil Eirola, Juha Karhunen, "A pragmatic android malware detection procedure". Computers & Security, vol. 70, pp. 689-701, 2017.(JuFo 2)
  4. Sara Ramezanian, Tommi Meskanen, Valtteri Niemi. "Privacy Preserving Shortest Path Queries on Directed Graph". (Accepted for publication in the International Journal of Embedded and Real-Time Communication Systems (IJERTCS))
  5. Sara Ramezanian, Tommi Meskanen, Masoud Naderpour, Ville Junnila, Valtteri Niemi. "Private Membership Test Protocol with Low Communication Complexity". Accepted to DCAN 2019.

Book Chapters

  1. Monshizadeh, Mehrnoosh; and Khatri, Vikramajeet. “Mobile Virtual Network Operators (MVNO) Security”. In A Comprehensive Guide to 5G Security, Wiley Publishers, pp. 323-346, ISBN 978-1-119-29304-0, 2017.
  2. Monshizadeh, Mehrnoosh; and Khatri, Vikramajeet. “IoT Security”. In A Comprehensive Guide to 5G Security, Wiley Publishers, pp. 247-266, ISBN 978-1-119-29304-0, 2017.

Public Demos

Publications supported by CloSe

Conference Papers

2016

2015

2014


Journal Papers

Public Demos

Research Reports

  • No labels