Surya Nepal
Surya Nepal
CSIRO’s Data61, Australia
Verified email at
Cited by
Cited by
A survey of emerging threats in cybersecurity
J Jang-Jaccard, S Nepal
Journal of computer and system sciences 80 (5), 973-993, 2014
A survey of trust in social networks
W Sherchan, S Nepal, C Paris
ACM Computing Surveys (CSUR) 45 (4), 1-33, 2013
IoT middleware: A survey on issues and enabling technologies
AH Ngu, M Gutierrez, V Metsis, S Nepal, QZ Sheng
IEEE Internet of Things Journal 4 (1), 1-20, 2016
Strip: A defence against trojan attacks on deep neural networks
Y Gao, C Xu, D Wang, S Chen, DC Ranasinghe, S Nepal
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
Query processing issues in image (multimedia) databases
S Nepal, MV Ramakrishna
Proceedings 15th International Conference on Data Engineering (Cat. No …, 1999
Android HIV: A study of repackaging malware for evading machine-learning detection
X Chen, C Li, D Wang, S Wen, J Zhang, S Nepal, Y Xiang, K Ren
IEEE Transactions on Information Forensics and Security 15, 987-1001, 2019
A service computing manifesto: the next 10 years
A Bouguettaya, M Singh, M Huhns, QZ Sheng, H Dong, Q Yu, AG Neiat, ...
Communications of the ACM 60 (4), 64-72, 2017
Automatic detection of'Goal'segments in basketball videos
S Nepal, U Srinivasan, G Reynolds
Proceedings of the ninth ACM international conference on Multimedia, 261-269, 2001
Deep learning for community detection: progress, challenges and opportunities
F Liu, S Xue, J Wu, C Zhou, W Hu, C Paris, S Nepal, J Yang, PS Yu
arXiv preprint arXiv:2005.08225, 2020
A privacy leakage upper bound constraint-based approach for cost-effective privacy preserving of intermediate data sets in cloud
X Zhang, C Liu, S Nepal, S Pandey, J Chen
IEEE Transactions on Parallel and Distributed Systems 24 (6), 1192-1202, 2012
A survey of android malware detection with deep neural models
J Qiu, J Zhang, W Luo, L Pan, S Nepal, Y Xiang
ACM Computing Surveys (CSUR) 53 (6), 1-36, 2020
Practical backward-secure searchable encryption from symmetric puncturable encryption
SF Sun, X Yuan, JK Liu, R Steinfeld, A Sakzad, V Vo, S Nepal
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Threats to networking cloud and edge datacenters in the Internet of Things
D Puthal, S Nepal, R Ranjan, J Chen
IEEE Cloud Computing 3 (3), 64-71, 2016
A platform for secure monitoring and sharing of generic health data in the Cloud
D Thilakanathan, S Chen, S Nepal, R Calvo, L Alem
Future Generation Computer Systems 35, 102-113, 2014
Internet of Things (IoT) smart and secure service delivery
E Bertino, KKR Choo, D Georgakopolous, S Nepal
ACM Transactions on Internet Technology (TOIT) 16 (4), 1-7, 2016
Using gamification in an online community
SK Bista, S Nepal, N Colineau, C Paris
8th International Conference on Collaborative Computing: Networking …, 2012
Barriers for delivering telehealth in rural Australia: a review based on Australian trials and studies
J Jang-Jaccard, S Nepal, L Alem, J Li
Telemedicine and e-Health 20 (5), 496-504, 2014
Lightweight mutual authentication for IoT and its applications
N Li, D Liu, S Nepal
IEEE Transactions on Sustainable Computing 2 (4), 359-370, 2017
A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud
X Zhang, C Liu, S Nepal, C Yang, W Dou, J Chen
Journal of Computer and System Sciences 80 (5), 1008-1020, 2014
Platform-independent secure blockchain-based voting system
B Yu, JK Liu, A Sakzad, S Nepal, R Steinfeld, P Rimba, MH Au
Information Security: 21st International Conference, ISC 2018, Guildford, UK …, 2018
The system can't perform the operation now. Try again later.
Articles 1–20