| 
       Authors 
       | 
      
       Title 
       | 
    
    
      | Gerhard Dueck, Kenneth B. Kent, Mark Thom, Daryl Maier, Mark Stoodley | 
      Generic Ahead-of-Time Compilation for Eclipse OMR | 
    
    
      | Hao Hu, Maria Patrou, Kenneth B. Kent, Michael Dawson | 
      Utilize Underlying Hardware Features for Node.js | 
    
    
      | Taees Eimouri, Kenneth B.Kent, Aleksandar Micic | 
      Optimizing the JVM Object Model Using Object Splitting | 
    
    
      | Panagiotis Patros, Kenneth B. Kent, Michael Dawson | 
      Reducing Garbage Collection Interference on Clouds | 
    
    
      | Aaron G. Graham, Jean-Philippe Legault, Dr. Kenneth B. Kent, Daryl Maier, James Kingdon | 
      Language Runtimes on Embedded Architectures | 
    
    
      | Scott Young, Kenneth B. Kent, Gerhard Dueck, Charlie Gracie | 
      Cold Object Segregation | 
    
    
      | Maxim Uzun, Kenneth B. Kent, Michael Dawson | 
      Post-mortem Debugging with Promises for Node.js | 
    
    
      | Ratinder Kaur, Yan Li, Junaid Iqbal, Hugo Gonzalez, Natalia Stakhanova | 
      Security Assessment of HCE-NFC enabled E-Wallet Banking Android Apps | 
    
    
      | Michael Flawn, Scott Young, Kenneth Kent, Gerhard Dueck, Charlie Gracie | 
      Implementing a Heap over Multiple Virtual Memory Areas in OMR | 
    
    
      | Abhijit Taware, Gerhard Dueck, Kenneth Kent, Charlie Gracie | 
      Garbage collection of cold regions | 
    
    
      | J. Zhu, P. Patros, K.B. Kent, M. Dawson, S.A. MacKay | 
      Node.js Scalability Investigation in Clouds | 
    
    
      | Konstantin Nasartschuk, Kenneth B. Kent, Aleksandar Micic | 
      Feasibility of Internal Object Pools for Reduced Memory Management | 
    
    
      | Beibei Li, Rongxing Lu, Raymond Choo, Wei Wang, Sheng Luo  | 
      On Reliability Analysis of Smart Grids under Topology Attacks: A Stochastic Petri Net Approach  | 
    
    
      | Jun Shao, Rongxing Lu, Yunguo Guan, Guiyi Wei | 
      Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud  | 
    
    
      | Nafiseh Izadi Yekta, Rongxing Lu  | 
      Achieving Communication-Efficient Privacy-Preserving Query for Fog-Enhanced IoT  | 
    
    
      | Wei Guo, Jun Shao, Rongxing Lu, Yining Liu, Ali Ghorbani | 
      A Privacy-Preserving Online Medical Pre-diagnostic Scheme in Cloud Environment  | 
    
    
      | Xue Yang, Rongxing Lu, Jun Shao, Xiaohu Tang, Ali A. Ghorbani  | 
      Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud  | 
    
    
      | Deepigha Shree Vittal Babu, Rongxing Lu | 
      Achieve Efficient and Privacy Preserving Range Query over Encrypted Data in Cloud | 
    
    
      | Puya Memarzia, Virendra Bhavsar, Suprio Ray | 
      Dataset Skew Resilience in Main Memory Parallel Hash Joins | 
    
    
      | Deepigha Shree Vittal Babu and Rongxing Lu | 
      Achieve Efficient and Privacy Preserving Range Query over Encrypted Data in Cloud  | 
    
    
      | Arash Habibi Lashkari, Andi Fitriah A. Kadir, Laya Taheri, Ali A. Ghorbani | 
      Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification | 
    
    
      | Hassan Mahdikhani, Rongxing Lu | 
      iHOM: How to Enrich SQL Queries in CryptDB | 
    
    
      | Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali A. Ghorbani | 
      The Next Generation of Robust Linux Memory Acquisition Techniques via Consequential Timestamp Dumps | 
    
    
      | Mahsa Kiani, Virendrakumar C. Bhavsar, Harold Boley | 
      Quantifying Simplicity of Generalized Trees | 
    
    
      | Xi Tao, Wei Song | 
      Efficient Task Allocation for Mobile Crowdsensing Based on Evolutionary Computing | 
    
    
      | Andi Fitriah A. Kadir, Natalia Stakhanova, Ali A. Ghorbani | 
      Android Financial Malware Detection  Through Network Flow Analysis  | 
    
    
      | Junaid Iqbal,  Ratinder Kaur, Natalia  Stakhanova | 
      Detection and Prevention of Changes in the DOM Tree | 
    
    
      | Ratinder Kaur, Hugo Gonzalez, Ghazale Amel Zendehdel, Alina Matyukhina, Natalia Stakhanova | 
      Security Vulnerabilities in E-Health Devices | 
    
    
      | Rasoul Shahsavarifar, David Bremner | 
      Novel Approximation for Halfspace depth | 
    
    
      | Milton King, Paul Cook | 
      Leveraging distributed representations and lexico-syntactic fixedness for token-level prediction of the idiomaticity of English verb-noun combinations | 
    
    
      | Puya Memarzia, Virendra Bhavsar, Suprio Ray | 
      Dataset Skew Resilience in Main Memory Parallel Hash Joins | 
    
    
      | Iman Sharafaldin, Arash Habibi Lashkari, and Ali A. Ghorbani | 
      Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization | 
    
    
      | Samaneh Mahdavifar, Mohammad Rasool Fatemi, Dima Alhadidi, Ali A. Ghorbani | 
      Android Malware Categorization Using a Semi-Supervised Deep Learning Architecture Based on Ladder Networks | 
    
    
      | Andi Fitriah A. Kadir, Natalia Stakhanova, Ali A. Ghorbani | 
      Android Financial Malware Detection  Through Network Flow Analysis | 
    
    
      | Alina Matyukhina, Mila Dalla Preda, Celine Perley , Natalia Stakhanova | 
      Attacking developer’s identity in open-source projects | 
    
    
      | Alina Matyukhina, Shlomi Linoy, Nguyen Cong Van, Rongxing Lu, Natalia Stakhanova | 
      Identifying smart contract users by analyzing their coding style | 
    
    
      | Samaneh Mahdavifar, Ali A. Ghorbani | 
      Towards a Deep Learning-Based Expert System for Detecting Phishing Attacks | 
    
    
      | Rasoul Shahsavarifar, David Bremner | 
      Novel Approximation for Halfspace depth | 
    
    
      | Ali Hakimi Parizi, Paul Cook | 
      Do Character-level Language Models Capture knowledge of Multiword Expression Compositionality? | 
    
    
      | Yoann S.M. Arseneau, Suprio Ray, Bradford G. Nickerson | 
      Memory Efficient Spatio-Textual Search with Concurrent Updates | 
    
    
      | Samaneh Mahdavifar, Mohammad Rasool Fatemi, Dima Alhadidi | 
      Android Malware Categorization Using a Semi-Supervised Deep Learning Architecture Based on Ladder Networks | 
    
    
      | Naghmeh Shahverdi, David Bremner | 
      Symmetry in Integer Linear Programming   | 
    
    
      | Ali Hakimi Parizi, Paul Cook | 
      Do Character-level Language Models Capture Knowledge of Multiword Expression Compositionality? |