| A survey of emerging threats in cybersecurity J Jang-Jaccard, S Nepal Journal of computer and system sciences 80 (5), 973-993, 2014 | 1478 | 2014 |
| Strip: A defence against trojan attacks on deep neural networks Y Gao, C Xu, D Wang, S Chen, DC Ranasinghe, S Nepal Proceedings of the 35th annual computer security applications conference …, 2019 | 1143 | 2019 |
| A survey of trust in social networks W Sherchan, S Nepal, C Paris ACM computing surveys (CSUR) 45 (4), 1-33, 2013 | 1001 | 2013 |
| IoT middleware: A survey on issues and enabling technologies AH Ngu, M Gutierrez, V Metsis, S Nepal, QZ Sheng IEEE Internet of Things Journal 4 (1), 1-20, 2016 | 947 | 2016 |
| A comprehensive survey on community detection with deep learning X Su, S Xue, F Liu, J Wu, J Yang, C Zhou, W Hu, C Paris, S Nepal, D Jin, ... IEEE transactions on neural networks and learning systems 35 (4), 4682-4702, 2022 | 600 | 2022 |
| Android HIV: A study of repackaging malware for evading machine-learning detection X Chen, C Li, D Wang, S Wen, J Zhang, S Nepal, Y Xiang, K Ren IEEE Transactions on Information Forensics and Security 15, 987-1001, 2019 | 394 | 2019 |
| A survey of android malware detection with deep neural models J Qiu, J Zhang, W Luo, L Pan, S Nepal, Y Xiang ACM Computing Surveys (CSUR) 53 (6), 1-36, 2020 | 382 | 2020 |
| Query processing issues in image (multimedia) databases S Nepal, MV Ramakrishna Proceedings 15th International Conference on Data Engineering (Cat. No …, 1999 | 373 | 1999 |
| Deep learning for community detection: progress, challenges and opportunities F Liu, S Xue, J Wu, C Zhou, W Hu, C Paris, S Nepal, J Yang, PS Yu arXiv preprint arXiv:2005.08225, 2020 | 342 | 2020 |
| Backdoor attacks and countermeasures on deep learning: A comprehensive review Y Gao, BG Doan, Z Zhang, S Ma, J Zhang, A Fu, S Nepal, H Kim arXiv preprint arXiv:2007.10760, 2020 | 334 | 2020 |
| End-to-end evaluation of federated learning and split learning for internet of things Y Gao, M Kim, S Abuadbba, Y Kim, C Thapa, K Kim, SA Camtepe, H Kim, ... arXiv preprint arXiv:2003.13376, 2020 | 321 | 2020 |
| A service computing manifesto: the next 10 years A Bouguettaya, M Singh, M Huhns, QZ Sheng, H Dong, Q Yu, AG Neiat, ... Communications of the ACM 60 (4), 64-72, 2017 | 288 | 2017 |
| Practical backward-secure searchable encryption from symmetric puncturable encryption SF Sun, X Yuan, JK Liu, R Steinfeld, A Sakzad, V Vo, S Nepal Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 272 | 2018 |
| Automatic detection of'Goal'segments in basketball videos S Nepal, U Srinivasan, G Reynolds Proceedings of the ninth ACM international conference on Multimedia, 261-269, 2001 | 240 | 2001 |
| Internet of Things (IoT) smart and secure service delivery E Bertino, KKR Choo, D Georgakopolous, S Nepal ACM Transactions on Internet Technology (TOIT) 16 (4), 1-7, 2016 | 237 | 2016 |
| Threats to networking cloud and edge datacenters in the Internet of Things D Puthal, S Nepal, R Ranjan, J Chen IEEE Cloud Computing 3 (3), 64-71, 2016 | 225 | 2016 |
| A platform for secure monitoring and sharing of generic health data in the Cloud D Thilakanathan, S Chen, S Nepal, R Calvo, L Alem Future Generation Computer Systems 35, 102-113, 2014 | 205 | 2014 |
| Lightweight mutual authentication for IoT and its applications N Li, D Liu, S Nepal IEEE Transactions on Sustainable Computing 2 (4), 359-370, 2017 | 201 | 2017 |
| Using gamification in an online community SK Bista, S Nepal, N Colineau, C Paris 8th international conference on collaborative computing: Networking …, 2012 | 200 | 2012 |
| A privacy leakage upper bound constraint-based approach for cost-effective privacy preserving of intermediate data sets in cloud X Zhang, C Liu, S Nepal, S Pandey, J Chen IEEE Transactions on Parallel and Distributed Systems 24 (6), 1192-1202, 2012 | 196 | 2012 |