2025
Attack-data independent defence mechanism against adversarial attacks on ECG signal.
Comput. Networks, 2025
2024
The route based emergency message dissemination scheme using multihop wireless network for VANETs.
Telecommun. Syst., December, 2024
Quantum deep learning-based anomaly detection for enhanced network security.
Quantum Mach. Intell., June, 2024
State-of-the-art authentication and verification schemes in VANETs: A survey.
Veh. Commun., 2024
Probing the Robustness of Vision-Language Pretrained Models: A Multimodal Adversarial Attack Approach.
CoRR, 2024
Quantum Federated Learning Experiments in the Cloud with Data Encoding.
CoRR, 2024
LabelGen: An Anomaly Label Generative Framework for Enhanced Graph Anomaly Detection.
IEEE Access, 2024
The Value of Strong Identity and Access Management for ICS/OT Security.
Proceedings of the 21st Annual International Conference on Privacy, Security and Trust, 2024
ConDGAD: Multi-augmentation Contrastive Learning for Dynamic Graph Anomaly Detection.
Proceedings of the Pattern Recognition - 27th International Conference, 2024
TrustMIS: Trust-Enhanced Inference Framework for Medical Image Segmentation.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024
Towards Blockchain Services Marketplace for More Efficient Blockchain Development.
Proceedings of the 9th IEEE International Conference on Data Science in Cyberspace, 2024
Backdoor Attacks and Generative Model Fairness: Current Trends and Future Research Directions.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024
CryptGraph: An Efficient Privacy-Enhancing Solution for Accurate Shortest Path Retrieval in Cloud Environments.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
A Data-Encoding Approach to Quantum Federated Learning: Experimenting with Cloud Challenges.
Proceedings of the 8th Asia-Pacific Workshop on Networking, 2024
Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology Environments.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Interrelated feature selection from health surveys using domain knowledge graph.
Health Inf. Sci. Syst., December, 2023
A Survey of PPG's Application in Authentication.
Comput. Secur., December, 2023
Security and privacy problems in voice assistant applications: A survey.
Comput. Secur., November, 2023
Trustworthy Sensor Fusion Against Inaudible Command Attacks in Advanced Driver-Assistance Systems.
IEEE Internet Things J., October, 2023
Novel entanglement compression for QKD protocols using isometric tensors.
Sci. China Inf. Sci., August, 2023
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism.
IEEE Trans. Inf. Forensics Secur., 2023
Cyber Code Intelligence for Android Malware Detection.
IEEE Trans. Cybern., 2023
A Multi-Objective Clustering Evolutionary Algorithm for Multi-Workflow Computation Offloading in Mobile Edge Computing.
IEEE Trans. Cloud Comput., 2023
Resource-saving quantum key distribution based on three-photon matrix product states.
Quantum Inf. Process., 2023
A Brief Survey of Machine Learning and Deep Learning Techniques for E-Commerce Research.
J. Theor. Appl. Electron. Commer. Res., 2023
VulMatch: Binary-level Vulnerability Detection Through Signature.
CoRR, 2023
Trustworthy Sensor Fusion against Inaudible Command Attacks in Advanced Driver-Assistance System.
CoRR, 2023
Bit Flipping Key Encapsulation for the Post-Quantum Era.
IEEE Access, 2023
An Empirical Study of AI Model's Performance for Electricity Load Forecasting with Extreme Weather Conditions.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023
SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
TOTPAuth: A Time-based One Time Password Authentication Proof-of-Concept against Metaverse User Identity Theft.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
SigD: A Cross-Session Dataset for PPG-based User Authentication in Different Demographic Groups.
Proceedings of the International Joint Conference on Neural Networks, 2023
Quantum Autoencoder Frameworks for Network Anomaly Detection.
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Knowledge-Based Nonlinear to Linear Dataset Transformation for Chronic Illness Classification.
Proceedings of the Health Information Science - 12th International Conference, 2023
Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication.
Proceedings of the Computer Security - ESORICS 2023, 2023
ForTrac: a Secure NFT-based Forward Traceability System for Providing Data Accuracy and Completeness.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023
An Analysis of Important Factors Affecting the Success of Blockchain Smart Contract Security Vulnerability Scanning Tools.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023
SoK: On Efficacy of the BGF Decoder for QC-MDPC-based Quantum-Safe Cryptosystems.
Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop, 2023
EnSpeciVAT: Enhanced SpecieVAT for Cluster Tendency Identification in Graphs.
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023
2022
Blockchain-Based Audio Watermarking Technique for Multimedia Copyright Protection in Distribution Networks.
ACM Trans. Multim. Comput. Commun. Appl., 2022
JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers.
IEEE Trans. Dependable Secur. Comput., 2022
An improved quantum network communication model based on compressed tensor network states.
Quantum Inf. Process., 2022
Dynamic and compressed quantum many-body state secret sharing based on site-independent matrix product states.
Quantum Inf. Process., 2022
Learning multi-level and multi-scale deep representations for privacy image classification.
Multim. Tools Appl., 2022
Towards enhanced PDF maldocs detection with feature engineering: design challenges.
Multim. Tools Appl., 2022
Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey.
IEEE CAA J. Autom. Sinica, 2022
Machine Learning-based Cyber Attacks Targeting on Controlled Information: A Survey.
ACM Comput. Surv., 2022
FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation.
CoRR, 2022
SoK: An Overview of PPG's Application in Authentication.
CoRR, 2022
Trustworthy blockchain-based medical Internet of thing for minimal invasive surgery training simulator.
Concurr. Comput. Pract. Exp., 2022
Domain adaptation for Windows advanced persistent threat detection.
Comput. Secur., 2022
Forward Traceability for Product Authenticity Using Ethereum Smart Contracts.
Proceedings of the Network and System Security - 16th International Conference, 2022
InstaVarjoLive: An Edge-Assisted 360 Degree Video Live Streaming for Virtual Reality Testbed.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022
Towards Privacy-Preserving Neural Architecture Search.
Proceedings of the IEEE Symposium on Computers and Communications, 2022
Automated Knowledge Graph Construction for Healthcare Domain.
Proceedings of the Health Information Science - 11th International Conference, 2022
No-Label User-Level Membership Inference for ASR Model Auditing.
Proceedings of the Computer Security - ESORICS 2022, 2022
Video is All You Need: Attacking PPG-based Biometric Authentication.
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022
EvAnGCN: Evolving Graph Deep Neural Network Based Anomaly Detection in Blockchain.
Proceedings of the Advanced Data Mining and Applications - 18th International Conference, 2022
Cyber Attack Detection in IoT Networks with Small Samples: Implementation And Analysis.
Proceedings of the Advanced Data Mining and Applications - 18th International Conference, 2022
2021
A novel cloud workflow scheduling algorithm based on stable matching game theory.
J. Supercomput., 2021
Data congestion in VANETs: research directions and new trends through a bibliometric analysis.
J. Supercomput., 2021
Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases.
IEEE Trans. Dependable Secur. Comput., 2021
Private and Trustworthy Distributed Lending Model Using Hyperledger Besu.
SN Comput. Sci., 2021
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services.
Proc. Priv. Enhancing Technol., 2021
Deep learning algorithms for cyber security applications: A survey.
J. Comput. Secur., 2021
SolGuard: Preventing external call issues in smart contract-based multi-agent robotic systems.
Inf. Sci., 2021
Multipath TCP Meets Transfer Learning: A Novel Edge-Based Learning for Industrial IoT.
IEEE Internet Things J., 2021
Improving malicious PDF classifier with feature engineering: A data-driven approach.
Future Gener. Comput. Syst., 2021
A Survey of Android Malware Detection with Deep Neural Models.
ACM Comput. Surv., 2021
The importance of selecting clustering parameters in VANETs: A survey.
Comput. Sci. Rev., 2021
ECG-Adv-GAN: Detecting ECG Adversarial Examples with Conditional Generative Adversarial Networks.
CoRR, 2021
Energy-aware decision-making for dynamic task migration in MEC-based unmanned aerial vehicle delivery system.
Concurr. Comput. Pract. Exp., 2021
Microwave Link Failures Prediction via LSTM-based Feature Fusion Network.
Proceedings of the International Joint Conference on Neural Networks, 2021
ECG-Adv-GAN: Detecting ECG Adversarial Examples with Conditional Generative Adversarial Networks.
Proceedings of the 20th IEEE International Conference on Machine Learning and Applications, 2021
Detecting and Controlling the Occurrence of Data Congestion in a High-density VANETs Environment.
Proceedings of the 29th Conference of Open Innovations Association, 2021
Containers' Privacy and Data Protection via Runtime Scanning Methods.
Proceedings of the Broadband Communications, Networks, and Systems, 2021
Digital Twin for Cybersecurity: Towards Enhancing Cyber Resilience.
Proceedings of the Broadband Communications, Networks, and Systems, 2021
2020
Privacy Protection in Interactive Content Based Image Retrieval.
IEEE Trans. Dependable Secur. Comput., 2020
Data-Driven Cyber Security in Perspective - Intelligent Traffic Analysis.
IEEE Trans. Cybern., 2020
Analysis of weighted quantum secret sharing based on matrix product states.
Quantum Inf. Process., 2020
High-capacity (2, 3) threshold quantum secret sharing based on asymmetric quantum lossy channels.
Quantum Inf. Process., 2020
Gathering Intelligence on Student Information Behavior Using Data Mining.
Libr. Trends, 2020
Code analysis for intelligent cyber systems: A data-driven approach.
Inf. Sci., 2020
An efficient voting based decentralized revocation protocol for vehicular ad hoc networks.
Digit. Commun. Networks, 2020
VoterChoice: A ransomware detection honeypot with multiple voting framework.
Concurr. Comput. Pract. Exp., 2020
Software Vulnerability Analysis and Discovery Using Deep Learning Techniques: A Survey.
IEEE Access, 2020
Opportunistic Tracking in Cyber-Physical Systems.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Unmasking Windows Advanced Persistent Threat Execution.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Security Evaluation of Smart Contract-Based On-chain Ethereum Wallets.
Proceedings of the Network and System Security - 14th International Conference, 2020
Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network.
Proceedings of the Network and System Security - 14th International Conference, 2020
2019
Noise-Resistant Statistical Traffic Classification.
IEEE Trans. Big Data, 2019
Automatic extraction and integration of behavioural indicators of malware for protection of cyber-physical networks.
Future Gener. Comput. Syst., 2019
Cyber security insights into self-proclaimed virtual world hackers.
CoRR, 2019
Security Analysis Methods on Ethereum Smart Contract Vulnerabilities: A Survey.
CoRR, 2019
The Audio Auditor: Participant-Level Membership Inference in Voice-Based IoT.
CoRR, 2019
Editorial: Recent advances in machine learning for cybersecurity.
Concurr. Comput. Pract. Exp., 2019
Protean Authentication Scheme - A Time-Bound Dynamic KeyGen Authentication Technique for IoT Edge Nodes in Outdoor Deployments.
IEEE Access, 2019
A3CM: Automatic Capability Annotation for Android Malware.
IEEE Access, 2019
Predicting the Impact of Android Malicious Samples via Machine Learning.
IEEE Access, 2019
Data-Driven Android Malware Intelligence: A Survey.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
A Visualization-Based Analysis on Classifying Android Malware.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Multiple Energy Harvesting Devices Enabled Joint Computation Offloading and Dynamic Resource Allocation for Mobile-Edge Computing Systems.
Proceedings of the 2019 IEEE International Conference on Web Services, 2019
Domain-Adversarial Graph Neural Networks for Text Classification.
Proceedings of the 2019 IEEE International Conference on Data Mining, 2019
Attainable Hacks on Keystore Files in Ethereum Wallets - A Systematic Analysis.
Proceedings of the Future Network Systems and Security - 5th International Conference, 2019
Password Strength Estimators Trained on the Leaked Password Lists.
Proceedings of the Applications and Techniques in Information Security, 2019
Cloud Forensics Investigations Relationship: A Model And Instrument.
Proceedings of the Australasian Conference on Information Systems, 2019
2018
Cross-Project Transfer Representation Learning for Vulnerable Function Discovery.
IEEE Trans. Ind. Informatics, 2018
Exploring Feature Coupling and Model Coupling for Image Source Identification.
IEEE Trans. Inf. Forensics Secur., 2018
A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement.
Quantum Inf. Process., 2018
Big network traffic data visualization.
Multim. Tools Appl., 2018
Identifying items for moderation in a peer assessment framework.
Knowl. Based Syst., 2018
Object localisation through clustering unreliable ultrasonic range sensors.
Int. J. Sens. Networks, 2018
Automated Big Traffic Analytics for Cyber Security.
CoRR, 2018
Comprehensive analysis of network traffic data.
Concurr. Comput. Pract. Exp., 2018
Intelligent agents defending for an IoT world: A review.
Comput. Secur., 2018
High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space.
Sci. China Inf. Sci., 2018
A Quantitative Approach to Design Special Purpose Systems to Measure Hacking Skills.
Proceedings of the IEEE International Conference on Teaching, 2018
A Scalable and Efficient PKI Based Authentication Protocol for VANETs.
Proceedings of the 28th International Telecommunication Networks and Applications Conference, 2018
Identifying Drawbacks in Malicious PDF Detectors.
Proceedings of the Future Network Systems and Security - 4th International Conference, 2018
Keep Calm and Know Where to Focus: Measuring and Predicting the Impact of Android Malware.
Proceedings of the Advanced Data Mining and Applications - 14th International Conference, 2018
Honeypot Frameworks and their Applications: A New Framework
SpringerBriefs on Cyber Security Systems and Networks, Springer, ISBN: 978-981-10-7738-8, 2018
2017
Cyber security attacks to modern vehicular systems.
J. Inf. Secur. Appl., 2017
Visualization of big data security: a case study on the KDD99 cup data set.
Digit. Commun. Networks, 2017
A Testbed for Security Analysis of Modern Vehicle Systems.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Portguard - an authentication tool for securing ports in an IoT gateway.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017
Online peer marking with aggregation functions.
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017
POSTER: Vulnerability Discovery with Function Representation Learning from Unlabeled Projects.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Distributed Detection of Zero-Day Network Traffic Flows.
Proceedings of the Data Mining, 2017
Security analysis of modern mission critical android mobile applications.
Proceedings of the Australasian Computer Science Week Multiconference, 2017
Visual representation of penetration testing actions and skills in a technical tree model.
Proceedings of the Australasian Computer Science Week Multiconference, 2017
2016
Investigating Security Vulnerabilities in Modern Vehicle Systems.
Proceedings of the Applications and Techniques in Information Security, 2016
Comprehensive Analysis of Network Traffic Data.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
2015
Enhanced Twitter Sentiment Analysis by Using Feature Selection and Combination.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015
2014
Privacy preserving collaborative filtering for KNN attack resisting.
Soc. Netw. Anal. Min., 2014
Privacy Preserving in Location Data Release: A Differential Privacy Approach.
Proceedings of the PRICAI 2014: Trends in Artificial Intelligence, 2014
Generating Repudiable, Memorizable, and Privacy Preserving Security Questions Using the Propp Theory of Narrative.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014
2013
Developing an Empirical Algorithm for Protecting Text-Based CAPTCHAs against Segmentation Attacks.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Developing a Cloud Computing Based Approach for Forensic Analysis Using OCR.
Proceedings of the Seventh International Conference on IT Security Incident Management and IT Forensics, 2013
2012
Hypothesis Generation and Testing in Event Profiling for Digital Forensic Investigations.
Int. J. Digit. Crime Forensics, 2012
Using Hypothesis Generation in Event Profiling for Digital Forensic Investigations.
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012
2010
Testing Digital Forensic Software Tools Used in Expert Testimony.
Proceedings of the Handbook of Research on Computational Forensics, 2010
Dynamic Addressing in Wireless Sensor Networks without Location Awareness.
J. Inf. Sci. Eng., 2010
Using Relationship-Building in Event Profiling for Digital Forensic Investigations.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
2009
Robust performance testing for digital forensic tools.
Digit. Investig., 2009
Robust Correctness Testing for Digital Forensic Tools.
Proceedings of the Forensics in Telecommunications, 2009
2008
Teaching Digital Forensics to Undergraduate Students.
IEEE Secur. Priv., 2008
Measure of Integrity Leakage in Live Forensic Context.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
2007
A Lower Bound on Effective Performance Testing for Digital Forensic Tools.
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007
An Effective and Efficient Testing Methodology for Correctness Testing for File Recovery Tools.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
2006
Lease Based Addressing for Event-Driven Wireless Sensor Networks.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006
2005
Reproducibility of Digital Evidence in Forensic Investigations.
Proceedings of the Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, 2005