What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Robin Doss
Google Scholar
ORCID:
0000-0001-6143-6850
24
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
RansoGuard: A RNN-based framework leveraging pre-attack sensitive APIs for early ransomware detection.
Mingcan Cen
Frank Jiang
Robin Doss
2025
conf/acns
sf SEBioID: Secure and Efficient Biometric Identification with Two-Party Computation.
Fuyi Wang
Jinzhi Ouyang
Leo Yu Zhang
Lei Pan
Shengshan Hu
Robin Doss
Jianying Zhou
2025
conf/uss
CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization.
Derui Wang
Kristen Moore
Diksha Goel
Minjune Kim
Gang Li
Yang Li
Robin Doss
Minhui Xue
Bo Li
Seyit Camtepe
Liming Zhu
2024
journals/compsec
Zero-Ran Sniff: A zero-day ransomware early detection method based on zero-shot learning.
Mingcan Cen
Xizhen Deng
Frank Jiang
Robin Doss
2024
journals/compsec
A hybrid cyber defense framework for reconnaissance attack in industrial control systems.
Xingsheng Qin
Frank Jiang
Chengzu Dong
Robin Doss
2024
journals/compsec
Examining usable security features and user perceptions of Physical Authentication Devices.
Ashish Nanda
Jongkil Jay Jeong
Syed Wajid Ali Shah
Mohammad Reza Nosouhi
Robin Doss
2024
conf/asiaccs
POSTER: Addressing the Privacy by Use Challenges in Verifiable Credential based Digital Wallets.
Jongkil Jay Jeong
Lu-Xing Yang
Robin Doss
Praveen Gauravaram
Zoe Wang
Mohamed Abdelrazek
Ashish Nanda
Keerthivasan Viswanathan
2024
conf/wisa
Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection.
Manu Jo Varghese
Frank Jiang
Abdur Rakib
Robin Doss
Adnan Anwar
2024
conf/dsn
Advancing NDN Security for IoT: Harnessing Machine Learning to Detect Attacks.
Sai Gautam Mandapati
Chathurika Ranaweera
Robin Doss
2024
conf/dsn
Novel CAN Bus Fuzzing Framework for Finding Vulnerabilities in Automotive Systems.
Manu Jo Varghese
Adnan Anwar
Frank Jiang
Robin Doss
2024
conf/dsn
Secure Data Provenance in Internet of Vehicles with Verifiable Credentials for Security and Privacy.
Anuj Nepal
Robin Doss
Frank Jiang
2023
journals/tifs
Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks.
Keshav Sood
Mohammad Reza Nosouhi
Dinh Duc Nha Nguyen
Frank Jiang
Morshed Chowdhury
Robin Doss
2023
journals/tifs
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism.
Mohammad Reza Nosouhi
Syed W. Shah
Lei Pan
Yevhen Zolotavkin
Ashish Nanda
Praveen Gauravaram
Robin Doss
2023
conf/acns
WiP: Towards Zero Trust Authentication in Critical Industrial Infrastructures with PRISM.
Fuyi Wang
Yanping Wang
Leo Yu Zhang
Yuval Hertzog
Michael Loewy
Dominique Valladolid
Julio Medeiros
Muna Al-Hawawreh
Robin Doss
2023
conf/asiapkc
SoK: On Efficacy of the BGF Decoder for QC-MDPC-based Quantum-Safe Cryptosystems.
Syed Wajid Ali Shah
Mohammad Reza Nosouhi
Lei Pan
Robin Doss
2022
journals/compsec
Traceability in supply chains: A Cyber security analysis.
Naeem Firdous Syed
Syed W. Shah
Rolando Trujillo-Rasua
Robin Doss
2022
journals/tifs
Towards Spoofing Resistant Next Generation IoT Networks.
Mohammad Reza Nosouhi
Keshav Sood
Marthie Grobler
Robin Doss
2021
journals/compsec
Secure and privacy-preserving structure in opportunistic networks.
Samaneh Rashidibajgan
Thomas Hupperich
Robin Doss
Anna Förster
2021
journals/compsec
LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA).
Syed W. Shah
Naeem Firdous Syed
Arash Shaghaghi
Adnan Anwar
Zubair A. Baig
Robin Doss
2019
journals/compsec
Privacy-preserving history-based routing in Opportunistic Networks.
Samaneh Rashidibajgan
Robin Doss
2018
journals/compsec
Packet integrity defense mechanism in OppNets.
Asma'a Ahmad
Robin Doss
Majeed Alajeely
Sarab F. Al Rubeaai
Dua'a Ahmad
2017
journals/compsec
Defense against packet collusion attacks in opportunistic networks.
Majeed Alajeely
Robin Doss
Asma'a Ahmad
Vicky H. Mak-Hau
2014
journals/tifs
A Robust Grouping Proof Protocol for RFID EPC C1G2 Tags.
Saravanan Sundaresan
Robin Doss
Selwyn Piramuthu
Wanlei Zhou
2013
journals/tifs
Secure RFID Tag Ownership Transfer Based on Quadratic Residues.
Robin Doss
Wanlei Zhou
Shui Yu
Coauthors
Abdur Rakib
(1)
Adnan Anwar
(3)
Anna Förster
(1)
Anuj Nepal
(1)
Arash Shaghaghi
(1)
Ashish Nanda
(3)
Asma'a Ahmad
(2)
Bo Li
(1)
Chathurika Ranaweera
(1)
Chengzu Dong
(1)
Derui Wang
(1)
Diksha Goel
(1)
Dinh Duc Nha Nguyen
(1)
Dominique Valladolid
(1)
Dua'a Ahmad
(1)
Frank Jiang
(7)
Fuyi Wang
(2)
Gang Li
(1)
Jianying Zhou
(1)
Jinzhi Ouyang
(1)
Jongkil Jay Jeong
(2)
Julio Medeiros
(1)
Keerthivasan Viswanathan
(1)
Keshav Sood
(2)
Kristen Moore
(1)
Lei Pan
(3)
Leo Yu Zhang
(2)
Liming Zhu
(1)
Lu-Xing Yang
(1)
Majeed Alajeely
(2)
Manu Jo Varghese
(2)
Marthie Grobler
(1)
Michael Loewy
(1)
Mingcan Cen
(2)
Minhui Xue
(1)
Minjune Kim
(1)
Mohamed Abdelrazek
(1)
Mohammad Reza Nosouhi
(5)
Morshed Chowdhury
(1)
Muna Al-Hawawreh
(1)
Naeem Firdous Syed
(2)
Praveen Gauravaram
(2)
Robin Doss
(24)
Rolando Trujillo-Rasua
(1)
Sai Gautam Mandapati
(1)
Samaneh Rashidibajgan
(2)
Sarab F. Al Rubeaai
(1)
Saravanan Sundaresan
(1)
Selwyn Piramuthu
(1)
Seyit Camtepe
(1)
Shengshan Hu
(1)
Shui Yu
(1)
Syed W. Shah
(3)
Syed Wajid Ali Shah
(2)
Thomas Hupperich
(1)
Vicky H. Mak-Hau
(1)
Wanlei Zhou
(2)
Xingsheng Qin
(1)
Xizhen Deng
(1)
Yang Li
(1)
Yanping Wang
(1)
Yevhen Zolotavkin
(1)
Yuval Hertzog
(1)
Zoe Wang
(1)
Zubair A. Baig
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to