Publications
publications by categories in reversed chronological order. generated by jekyll-scholar.
2023
-
Deep Reinforcement Learning for Energy-Efficient Task Offloading in Cooperative Vehicular Edge NetworksIn 2023 IEEE 21st International Conference on Industrial Informatics (INDIN), 2023
-
FedCime: An Efficient Federated Learning Approach For Clients in Mobile Edge ComputingIn 2023 IEEE International Conference on Edge Computing and Communications (EDGE), 2023
2022
-
CANBERT: A Language-based Intrusion Detection Model for In-vehicle NetworksIn 2022 21st IEEE International Conference on Machine Learning and Applications (ICMLA), 2022
2021
-
Dynamic load sharing in memory constrained devices: a surveyIn 2021 IEEE 7th World Forum on Internet of Things (WF-IoT), Jun 2021
-
Covid vaccine sentiment analysis by geographic regionIn 2021 IEEE International Conference on Big Data (Big Data), Jun 2021
-
Detecting network traffic intrusions on memory constrained embedded systemsIn 2021 IEEE International Symposium on Technologies for Homeland Security (HST), Jun 2021
2019
2018
-
Trace-based data provenance for cyber-physical systemsHoward University, Jun 2018
-
Design patterns for the industrial Internet of ThingsIn 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS), Jun 2018
-
Anomaly-based intrusion detection of IoT device sensor data using provenance graphsIn 1st International Workshop on Security and Privacy for the Internet-of-Things, Jun 2018
2017
-
Towards a provenance collection framework for internet of things devicesIn 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), Jun 2017
-
Towards a Provenance-Aware Internet of Things (IoT) SystemJun 2017
2016
-
A policy-driven framework for document classification and enterprise securityIn 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), Jun 2016
2015
-
A Hybrid Approach to Improving Cloud Data SecurityIn Proceedings of the International Conference on Security and Management (SAM), Jun 2015
-
Cloud service security & application vulnerabilityIn SoutheastCon 2015, Jun 2015
-
Cloud service security & application vulnerabilityIn SoutheastCon 2015, Jun 2015
2013
-
A Self-Protecting Security Framework for CDA DocumentsIn Proceedings of the International Conference on Security and Management (SAM), Jun 2013
-
Lessons learned: Porting java applications to androidIn Proceedings of the International Conference on Software Engineering Research and Practice (SERP), Jun 2013