2025
Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI.
CoRR, January, 2025
Data Duplication: A Novel Multi-Purpose Attack Paradigm in Machine Unlearning.
CoRR, January, 2025
AFed: Algorithmic Fair Federated Learning.
CoRR, January, 2025
ROSIN: Robust Semantic Image Hiding Network.
Knowl. Based Syst., 2025
2024
Distributed Learning in Intelligent Transportation Systems: A Survey.
Inf., September, 2024
PPFed: A Privacy-Preserving and Personalized Federated Learning Framework.
IEEE Internet Things J., June, 2024
Public and Private Blockchain Infusion: A Novel Approach to Federated Learning.
IEEE Internet Things J., May, 2024
Blockchain-Based Gradient Inversion and Poisoning Defense for Federated Learning.
IEEE Internet Things J., May, 2024
Location-Based Real-Time Updated Advising Method for Traffic Signal Control.
IEEE Internet Things J., April, 2024
Blockchain-Empowered Multiagent Systems: Advancing IoT Security and Transaction Efficiency.
IEEE Internet Things J., April, 2024
Privacy and Fairness in Federated Learning: On the Perspective of Tradeoff.
ACM Comput. Surv., February, 2024
A two-stage model extraction attack on GANs with a small collected dataset.
Comput. Secur., February, 2024
Graph neural networks: a survey on the links between privacy and security.
Artif. Intell. Rev., February, 2024
Machine Unlearning: A Survey.
ACM Comput. Surv., January, 2024
High-Frequency Matters: Attack and Defense for Image-Processing Model Watermarking.
IEEE Trans. Serv. Comput., 2024
Inversion-Guided Defense: Detecting Model Stealing Attacks by Output Inverting.
IEEE Trans. Inf. Forensics Secur., 2024
Defending Against Label-Only Attacks via Meta-Reinforcement Learning.
IEEE Trans. Inf. Forensics Secur., 2024
Boosting the Transferability of Adversarial Attacks With Frequency-Aware Perturbation.
IEEE Trans. Inf. Forensics Secur., 2024
Boosting Model Inversion Attacks With Adversarial Examples.
IEEE Trans. Dependable Secur. Comput., 2024
BASS: A Blockchain-Based Asynchronous SignSGD Architecture for Efficient and Secure Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2024
Attribute-Based Membership Inference Attacks and Defenses on GANs.
IEEE Trans. Dependable Secur. Comput., 2024
A location-based advising method in teacher-student frameworks.
Knowl. Based Syst., 2024
Privacy preservation in deep reinforcement learning: A training perspective.
Knowl. Based Syst., 2024
A federated advisory teacher-student framework with simultaneous learning agents.
Knowl. Based Syst., 2024
Fair Federated Learning with Opposite GAN.
Knowl. Based Syst., 2024
Topology modification against membership inference attack in Graph Neural Networks.
Knowl. Based Syst., 2024
A realistic model extraction attack against graph neural networks.
Knowl. Based Syst., 2024
Defending against gradient inversion attacks in federated learning via statistical machine unlearning.
Knowl. Based Syst., 2024
Supplement data in federated learning with a generator transparent to clients.
Inf. Sci., 2024
Proactive image manipulation detection via deep semi-fragile watermark.
Neurocomputing, 2024
A GNN-based teacher-student framework with multi-advice.
Expert Syst. Appl., 2024
Disentangling different levels of GAN fingerprints for task-specific forensics.
Comput. Stand. Interfaces, 2024
When deep learning meets watermarking: A survey of application, attacks and defenses.
Comput. Stand. Interfaces, 2024
Large Language Model Federated Learning with Blockchain and Unlearning for Cross-Organizational Collaboration.
CoRR, 2024
Vertical Federated Unlearning via Backdoor Certification.
CoRR, 2024
Defending Against Neural Network Model Inversion Attacks via Data Poisoning.
CoRR, 2024
Large Language Models Merging for Enhancing the Link Stealing Attack on Graph Neural Networks.
CoRR, 2024
Machine Unlearning on Pre-trained Models by Residual Feature Alignment Using LoRA.
CoRR, 2024
New Emerged Security and Privacy of Pre-trained Model: a Survey and Outlook.
CoRR, 2024
Zero-shot Class Unlearning via Layer-wise Relevance Analysis and Neuronal Path Perturbation.
CoRR, 2024
When Machine Unlearning Meets Retrieval-Augmented Generation (RAG): Keep Secret or Forget Knowledge?
CoRR, 2024
Evaluating of Machine Unlearning: Robustness Verification Without Prior Modifications.
CoRR, 2024
The Emerged Security and Privacy of LLM Agent: A Survey with Case Studies.
CoRR, 2024
QUEEN: Query Unlearning against Model Extraction.
CoRR, 2024
Large Language Models for Link Stealing Attacks Against Graph Neural Networks.
CoRR, 2024
Update Selective Parameters: Federated Machine Unlearning Based on Model Explanation.
CoRR, 2024
Towards Efficient Target-Level Machine Unlearning Based on Essential Graph.
CoRR, 2024
Really Unlearned? Verifying Machine Unlearning via Influential Sample Pairs.
CoRR, 2024
Don't Forget Too Much: Towards Machine Unlearning on Feature Level.
CoRR, 2024
Linkage on Security, Privacy and Fairness in Federated Learning: New Balances and New Perspectives.
CoRR, 2024
Knowledge Distillation in Federated Learning: a Survey on Long Lasting Challenges and New Solutions.
CoRR, 2024
Unique Security and Privacy Threats of Large Language Model: A Comprehensive Survey.
CoRR, 2024
Federated TrustChain: Blockchain-Enhanced LLM Training and Unlearning.
CoRR, 2024
Federated Learning with Blockchain-Enhanced Machine Unlearning: A Trustworthy Approach.
CoRR, 2024
Class Machine Unlearning for Complex Data via Concepts Inference and Data Poisoning.
CoRR, 2024
How Does a Deep Learning Model Architecture Impact Its Privacy? A Comprehensive Study of Privacy Attacks on CNNs and Transformers.
Proceedings of the 33rd USENIX Security Symposium, 2024
When Fairness Meets Privacy: Exploring Privacy Threats in Fair Binary Classifiers via Membership Inference Attacks.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Machine Unlearning via Null Space Calibration.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
2023
Privacy and evolutionary cooperation in neural-network-based game theory.
Knowl. Based Syst., December, 2023
A Game-Theoretic Federated Learning Framework for Data Quality Improvement.
IEEE Trans. Knowl. Data Eng., November, 2023
Model-Based Self-Advising for Multi-Agent Learning.
IEEE Trans. Neural Networks Learn. Syst., October, 2023
Revisiting model fairness via adversarial examples.
Knowl. Based Syst., October, 2023
Balancing Learning Model Privacy, Fairness, and Accuracy With Early Stopping Criteria.
IEEE Trans. Neural Networks Learn. Syst., September, 2023
Time-Driven and Privacy-Preserving Navigation Model for Vehicle-to-Vehicle Communication Systems.
IEEE Trans. Veh. Technol., July, 2023
Privacy Data Diffusion Modeling and Preserving in Online Social Network.
IEEE Trans. Knowl. Data Eng., June, 2023
Evolution of cooperation in malicious social networks with differential privacy mechanisms.
Neural Comput. Appl., June, 2023
Differentially Private Crowdsourcing With the Public and Private Blockchain.
IEEE Internet Things J., May, 2023
Learning Games for Defending Advanced Persistent Threats in Cyber Systems.
IEEE Trans. Syst. Man Cybern. Syst., April, 2023
A Robust Game-Theoretical Federated Learning Framework With Joint Differential Privacy.
IEEE Trans. Knowl. Data Eng., April, 2023
Adversarial Attacks Against Deep Generative Models on Data: A Survey.
IEEE Trans. Knowl. Data Eng., April, 2023
Privacy Data Propagation and Preservation in Social Media: A Real-World Case Study.
IEEE Trans. Knowl. Data Eng., April, 2023
Sparse representation for heterogeneous information networks.
Neurocomputing, March, 2023
Fairness in graph-based semi-supervised learning.
Knowl. Inf. Syst., February, 2023
Label-Only Model Inversion Attacks: Attack With the Least Information.
IEEE Trans. Inf. Forensics Secur., 2023
FedRecovery: Differentially Private Machine Unlearning for Federated Learning Frameworks.
IEEE Trans. Inf. Forensics Secur., 2023
A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems.
IEEE Trans. Inf. Forensics Secur., 2023
Label-Only Membership Inference Attacks and Defenses in Semantic Segmentation Models.
IEEE Trans. Dependable Secur. Comput., 2023
Making DeepFakes More Spurious: Evading Deep Face Forgery Detection via Trace Removal Attack.
IEEE Trans. Dependable Secur. Comput., 2023
CIFair: Constructing continuous domains of invariant features for image fair classifications.
Knowl. Based Syst., 2023
Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity.
ACM Comput. Surv., 2023
Privacy Intelligence: A Survey on Image Privacy in Online Social Networks.
ACM Comput. Surv., 2023
Reinforcement Unlearning.
CoRR, 2023
FD-MIA: Efficient Attacks on Fairness-enhanced Models.
CoRR, 2023
Generative Adversarial Networks Unlearning.
CoRR, 2023
Privacy and Fairness in Federated Learning: on the Perspective of Trade-off.
CoRR, 2023
Low-frequency Image Deep Steganography: Manipulate the Frequency Distribution to Hide Secrets with Tenacious Robustness.
CoRR, 2023
High-frequency Matters: An Overwriting Attack and defense for Image-processing Neural Network Watermarking.
CoRR, 2023
New challenges in reinforcement learning: a survey of security and privacy.
Artif. Intell. Rev., 2023
Robust Audio Anti-Spoofing with Fusion-Reconstruction Learning on Multi-Order Spectrograms.
Proceedings of the 24th Annual Conference of the International Speech Communication Association, 2023
Towards Robust Gan-Generated Image Detection: A Multi-View Completion Representation.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Protect Trajectory Privacy in Food Delivery with Differential Privacy and Multi-agent Reinforcement Learning.
Proceedings of the Advanced Information Networking and Applications, 2023
2022
Desynchronization-attack-resilient audio watermarking mechanism for stereo signals using the linear correlation between channels.
World Wide Web, 2022
Time-optimal and privacy preserving route planning for carpool policy.
World Wide Web, 2022
Maximizing User Service Satisfaction for Delay-Sensitive IoT Applications in Edge Computing.
IEEE Trans. Parallel Distributed Syst., 2022
Service Provisioning for Multi-source IoT Applications in Mobile Edge Computing.
ACM Trans. Sens. Networks, 2022
Near Optimal Learning-Driven Mechanisms for Stable NFV Markets in Multitier Cloud Networks.
IEEE/ACM Trans. Netw., 2022
Request Reliability Augmentation With Service Function Chain Requirements in Mobile Edge Computing.
IEEE Trans. Mob. Comput., 2022
More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence.
IEEE Trans. Knowl. Data Eng., 2022
The Dynamic Privacy-Preserving Mechanisms for Online Dynamic Social Networks.
IEEE Trans. Knowl. Data Eng., 2022
Fairness in Semi-Supervised Learning: Unlabeled Data Help to Reduce Discrimination.
IEEE Trans. Knowl. Data Eng., 2022
Recognizing Very Small Face Images Using Convolution Neural Networks.
IEEE Trans. Intell. Transp. Syst., 2022
Recognizing Palm Vein in Smartphones Using RGB Images.
IEEE Trans. Ind. Informatics, 2022
One Parameter Defense - Defending Against Data Inference Attacks via Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2022
Differentially Private Multi-Agent Planning for Logistic-Like Problems.
IEEE Trans. Dependable Secur. Comput., 2022
Differential Advising in Multiagent Reinforcement Learning.
IEEE Trans. Cybern., 2022
Energy-Aware Collaborative Service Caching in a 5G-Enabled MEC With Uncertain Payoffs.
IEEE Trans. Commun., 2022
Image fairness in deep learning: problems, models, and challenges.
Neural Comput. Appl., 2022
Data forwarding: A new VoteRank and Assortativity based approach to improve propagation time in social networks.
J. High Speed Networks, 2022
Multi-agent reinforcement learning via knowledge transfer with differentially private noise.
Int. J. Intell. Syst., 2022
More than Privacy: Adopting Differential Privacy in Game-theoretic Mechanism Design.
ACM Comput. Surv., 2022
How Does a Deep Learning Model Architecture Impact Its Privacy?
CoRR, 2022
Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It.
CoRR, 2022
Label-only Model Inversion Attack: The Attack that Requires the Least Information.
CoRR, 2022
Private-encoder: Enforcing privacy in latent space for human face images.
Concurr. Comput. Pract. Exp., 2022
From distributed machine learning to federated learning: In the view of data privacy and security.
Concurr. Comput. Pract. Exp., 2022
Correlated data in differential privacy: Definition and analysis.
Concurr. Comput. Pract. Exp., 2022
Fairness and privacy preservation for facial images: GAN-based methods.
Comput. Secur., 2022
Visual privacy attacks and defenses in deep learning: a survey.
Artif. Intell. Rev., 2022
Privacy-Preserving in Double Deep-Q-Network with Differential Privacy in Continuous Spaces.
Proceedings of the AI 2021: Advances in Artificial Intelligence, 2022
2021
Can Steering Wheel Detect Your Driving Fatigue?
IEEE Trans. Veh. Technol., 2021
Effective Quarantine and Recovery Scheme Against Advanced Persistent Threat.
IEEE Trans. Syst. Man Cybern. Syst., 2021
Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks.
IEEE Trans. Netw. Sci. Eng., 2021
Game Theoretical Adversarial Deep Learning With Variational Adversaries.
IEEE Trans. Knowl. Data Eng., 2021
A Differentially Private Game Theoretic Approach for Deceiving Cyber Adversaries.
IEEE Trans. Inf. Forensics Secur., 2021
Authenticated Medical Documents Releasing with Privacy Protection and Release Control.
IEEE Trans. Dependable Secur. Comput., 2021
Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control.
IEEE Trans. Computers, 2021
Non-Linear-Echo Based Anti-Collusion Mechanism for Audio Signals.
IEEE ACM Trans. Audio Speech Lang. Process., 2021
Desynchronization Attacks Resilient Watermarking Method Based on Frequency Singular Value Coefficient Modification.
IEEE ACM Trans. Audio Speech Lang. Process., 2021
DP-Image: Differential Privacy for Image Data in Feature Space.
CoRR, 2021
Near Optimal and Dynamic Mechanisms Towards a Stable NFV Market in Multi-Tier Cloud Networks.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
2020
An Identity-Based and Revocable Data-Sharing Scheme in VANETs.
IEEE Trans. Veh. Technol., 2020
GAN-Driven Personalized Spatial-Temporal Private Data Sharing in Cyber-Physical Social Systems.
IEEE Trans. Netw. Sci. Eng., 2020
A Semantic Web-Based Recommendation Framework of Educational Resources in E-Learning.
Technol. Knowl. Learn., 2020
Correlated Differential Privacy: Feature Selection in Machine Learning.
IEEE Trans. Ind. Informatics, 2020
Familial Clustering for Weakly-Labeled Android Malware Using Hybrid Representation Learning.
IEEE Trans. Inf. Forensics Secur., 2020
Differentially Private Malicious Agent Avoidance in Multiagent Advising Learning.
IEEE Trans. Cybern., 2020
Blockchain for secure location verification.
J. Parallel Distributed Comput., 2020
Prediction optimization of diffusion paths in social networks using integration of ant colony and densest subgraph algorithms.
J. High Speed Networks, 2020
Network sparse representation: Decomposition, dimensionality-reduction and reconstruction.
Inf. Sci., 2020
A study of data pre-processing techniques for imbalanced biomedical data classification.
Int. J. Bioinform. Res. Appl., 2020
Differentially private model publishing in cyber physical systems.
Future Gener. Comput. Syst., 2020
Private collaborative filtering under untrusted recommender server.
Future Gener. Comput. Syst., 2020
Security and privacy in 6G networks: New areas and new challenges.
Digit. Commun. Networks, 2020
Differential Advising in Multi-Agent Reinforcement Learning.
CoRR, 2020
Fairness Constraints in Semi-supervised Learning.
CoRR, 2020
Privacy Intelligence: A Survey on Image Sharing on Online Social Networks.
CoRR, 2020
Channel Correlation Based Robust Audio Watermarking Mechanism for Stereo Signals.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020
Service Provisioning for IoT Applications with Multiple Sources in Mobile Edge Computing.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020
Secure Balance Planning of Off-blockchain Payment Channel Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
2019
Malicious Attack Propagation and Source Identification
Advances in Information Security 73, Springer, ISBN: 978-3-030-02178-8, 2019
STC: Exposing Hidden Compromised Devices in Networked Sustainable Green Smart Computing Platforms by Partial Observation.
IEEE Trans. Sustain. Comput., 2019
Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach.
IEEE Trans. Inf. Forensics Secur., 2019
E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT.
IEEE Internet Things J., 2019
Greedily assemble tandem repeats for next generation sequences.
Int. J. High Perform. Comput. Netw., 2019
Edge-based stochastic network model reveals structural complexity of edges.
Future Gener. Comput. Syst., 2019
A blockchain-based location privacy-preserving crowdsensing system.
Future Gener. Comput. Syst., 2019
A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
ACM Comput. Surv., 2019
Static malware clustering using enhanced deep embedding method.
Concurr. Comput. Pract. Exp., 2019
Adversaries or allies? Privacy and deep learning in big data era.
Concurr. Comput. Pract. Exp., 2019
Novel Multi-Keyword Search on Encrypted Data in the Cloud.
IEEE Access, 2019
Improving Recommender Systems Accuracy in Social Networks Using Popularity.
Proceedings of the 20th International Conference on Parallel and Distributed Computing, 2019
MFE-HAR: multiscale feature engineering for human activity recognition using wearable sensors.
Proceedings of the MobiQuitous 2019, 2019
GAN-DP: Generative Adversarial Net Driven Differentially Privacy-Preserving Big Data Publishing.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Null Model and Community Structure in Heterogeneous Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Simultaneously Advising via Differential Privacy in Cloud Servers Environment.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Protecting Privacy-Sensitive Locations in Trajectories with Correlated Positions.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Data Authentication with Privacy Protection.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019
2018
Privacy of Things: Emerging Challenges and Opportunities in Wireless Internet of Things.
IEEE Wirel. Commun., 2018
Malware Propagations in Wireless Ad Hoc Networks.
IEEE Trans. Dependable Secur. Comput., 2018
Rumor Source Identification in Social Networks with Time-Varying Topology.
IEEE Trans. Dependable Secur. Comput., 2018
A Hybrid Privacy Protection Scheme in Cyber-Physical Social Networks.
IEEE Trans. Comput. Soc. Syst., 2018
Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networks.
J. Comput. Sci., 2018
Answering differentially private queries for continual datasets release.
Future Gener. Comput. Syst., 2018
An iteration-based differentially private social network data release.
Comput. Syst. Sci. Eng., 2018
Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks.
CoRR, 2018
Twitter spam detection: Survey of new approaches and comparative study.
Comput. Secur., 2018
Human-Driven Edge Computing and Communication: Part 2.
IEEE Commun. Mag., 2018
Density-Based Location Preservation for Mobile Crowdsensing With Differential Privacy.
IEEE Access, 2018
Differential Private POI Queries via Johnson-Lindenstrauss Transform.
IEEE Access, 2018
Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing Architecture.
IEEE Access, 2018
A Differential Game Approach to Patch Injection.
IEEE Access, 2018
Location Privacy and Its Applications: A Systematic Study.
IEEE Access, 2018
Traffic Flow Prediction for Road Intersection Safety.
Proceedings of the 2018 IEEE SmartWorld, 2018
Hiding RFID in the Image Matching Based Access Control to a Smart Building.
Proceedings of the 2018 IEEE SmartWorld, 2018
Integrating Ant Colony Algorithm and Node Centrality to Improve Prediction of Information Diffusion in Social Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018
SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control.
Proceedings of the Network and System Security - 12th International Conference, 2018
Who Spread to Whom? Inferring Online Social Networks with User Features.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Improving Data Utility through Game Theory in Personalized Differential Privacy.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
FBI: Friendship Learning-Based User Identification in Multiple Social Networks.
Proceedings of the IEEE Global Communications Conference, 2018
Using Adversarial Noises to Protect Privacy in Deep Learning Era.
Proceedings of the IEEE Global Communications Conference, 2018
Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases.
Proceedings of the Computer Security, 2018
A Data-driven Attack against Support Vectors of SVM.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Location Privacy in Mobile Applications
Springer, ISBN: 978-981-13-1704-0, 2018
2017
Differential Privacy and Applications
Advances in Information Security 69, Springer, ISBN: 978-3-319-62002-2, 2017
Invisible Hand: A Privacy Preserving Mobile Crowd Sensing Framework Based on Economic Models.
IEEE Trans. Veh. Technol., 2017
Differentially Private Data Publishing and Analysis: A Survey.
IEEE Trans. Knowl. Data Eng., 2017
Statistical Features-Based Real-Time Detection of Drifted Twitter Spam.
IEEE Trans. Inf. Forensics Secur., 2017
Fuzzy-Based Information Decomposition for Incomplete and Imbalanced Data Learning.
IEEE Trans. Fuzzy Syst., 2017
Using epidemic betweenness to measure the influence of users in complex networks.
J. Netw. Comput. Appl., 2017
FogRoute: DTN-Based Data Dissemination Model in Fog Computing.
IEEE Internet Things J., 2017
The structure of communities in scale-free networks.
Concurr. Comput. Pract. Exp., 2017
Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies.
IEEE Commun. Surv. Tutorials, 2017
A secure search protocol for low cost passive RFID tags.
Comput. Networks, 2017
Human-Driven Edge Computing and Communication: Part 1.
IEEE Commun. Mag., 2017
My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017
Privacy Preserving Collaborative Filtering via the Johnson-Lindenstrauss Transform.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
On-Street Car Parking Prediction in Smart City: A Multi-source Data Analysis in Sensor-Cloud Environment.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017
Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Personalized Privacy Preserving Collaborative Filtering.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Flow Entry Sharing in Protection Design for Software Defined Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Differentially private query learning: From data publishing to model publishing.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
TRA: tandem repeat assembler for next generation sequences.
Proceedings of the Australasian Computer Science Week Multiconference, 2017
2016
Silence is Golden: Enhancing Privacy of Location-Based Services by Content Broadcasting and Active Caching in Wireless Vehicular Networks.
IEEE Trans. Veh. Technol., 2016
PPM-HDA: Privacy-Preserving and Multifunctional Health Data Aggregation With Fault Tolerance.
IEEE Trans. Inf. Forensics Secur., 2016
On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2016
Comments and Corrections.
IEEE Trans. Comput. Soc. Syst., 2016
A Feasible IP Traceback Framework through Dynamic Deterministic Packet Marking.
IEEE Trans. Computers, 2016
Query verification schemes for cloud-hosted databases: a brief survey.
Int. J. Parallel Emergent Distributed Syst., 2016
Privacy-preserving topic model for tagging recommender systems.
Knowl. Inf. Syst., 2016
Discovery of stop regions for understanding repeat travel behaviors of moving objects.
J. Comput. Syst. Sci., 2016
Spammers Are Becoming "Smarter" on Twitter.
IT Prof., 2016
Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing.
Entropy, 2016
K-Source: Multiple source selection for traffic offloading in mobile social networks.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016
Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing.
Proceedings of the Network and System Security - 10th International Conference, 2016
String matching query verification on cloud-hosted databases.
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016
Analysis of the Spreading Influence Variations for Online Social Users under Attacks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Studying the Global Spreading Influence and Local Connections of Users in Online Social Networks.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
2015
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-18108-0, 2015
Mining streams of short text for analysis of world-wide event evolutions.
World Wide Web, 2015
Privacy preserving data release for tagging recommender systems.
Web Intell., 2015
Robust Network Traffic Classification.
IEEE/ACM Trans. Netw., 2015
Correlated Differential Privacy: Hiding Information in Non-IID Data Set.
IEEE Trans. Inf. Forensics Secur., 2015
K-Center: An Approach on the Multi-Source Identification of Information Diffusion.
IEEE Trans. Inf. Forensics Secur., 2015
Secure Tag Search in RFID Systems Using Mobile Readers.
IEEE Trans. Dependable Secur. Comput., 2015
Robust Histogram Shape-Based Method for Image Watermarking.
IEEE Trans. Circuits Syst. Video Technol., 2015
A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection.
IEEE Trans. Comput. Soc. Syst., 2015
A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks.
IEEE Trans. Computers, 2015
Zero Knowledge Grouping Proof Protocol for RFID EPC C1G2 Tags.
IEEE Trans. Computers, 2015
Detecting stepping stones by abnormal causality probability.
Secur. Commun. Networks, 2015
Special issue on recent advances in network and information security - security and communication networks journal.
Secur. Commun. Networks, 2015
Modeling malicious activities in cyber space.
IEEE Netw., 2015
A survey of recommendation techniques based on offline data processing.
Concurr. Comput. Pract. Exp., 2015
Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy.
Comput. Commun., 2015
Mobility Increases the Risk of Malware Propagations in Wireless Networks.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
The Relation Between Local and Global Influence of Individuals in Scale-Free Networks.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015
Asymmetric self-learning for tackling Twitter Spam Drift.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
6 million spam tweets: A large ground truth for timely Twitter spam detection.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
A Data as a Product Model for Future Consumption of Big Stream Data in Clouds.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015
2014
Modelling personal preferences for Top-N movie recommendations.
Web Intell. Agent Syst., 2014
To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks.
IEEE Trans. Parallel Distributed Syst., 2014
Internet Traffic Classification Using Constrained Clustering.
IEEE Trans. Parallel Distributed Syst., 2014
A Robust Grouping Proof Protocol for RFID EPC C1G2 Tags.
IEEE Trans. Inf. Forensics Secur., 2014
Modeling and Analysis on the Propagation Dynamics of Modern Email Malware.
IEEE Trans. Dependable Secur. Comput., 2014
Control Flow-Based Malware VariantDetection.
IEEE Trans. Dependable Secur. Comput., 2014
Patchwork-Based Audio Watermarking Method Robust to De-synchronization Attacks.
IEEE ACM Trans. Audio Speech Lang. Process., 2014
Privacy preserving collaborative filtering for KNN attack resisting.
Soc. Netw. Anal. Min., 2014
The maximum imputation framework for neighborhood-based collaborative filtering.
Soc. Netw. Anal. Min., 2014
Distributed Denial of Service (DDoS) detection by traffic pattern analysis.
Peer-to-Peer Netw. Appl., 2014
Are the popular users always important for information dissemination in online social networks?
IEEE Netw., 2014
Internet traffic clustering with side information.
J. Comput. Syst. Sci., 2014
An effective privacy preserving algorithm for neighborhood-based collaborative filtering.
Future Gener. Comput. Syst., 2014
Detection and defense of application-layer DDoS attacks in backbone web traffic.
Future Gener. Comput. Syst., 2014
Modeling the Propagation of Worms in Networks: A Survey.
IEEE Commun. Surv. Tutorials, 2014
Deferentially Private Tagging Recommendation Based on Topic Model.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014
On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification.
Proceedings of the Network and System Security - 8th International Conference, 2014
2013
Network Traffic Classification Using Correlation Information.
IEEE Trans. Parallel Distributed Syst., 2013
Modeling Propagation Dynamics of Social Network Worms.
IEEE Trans. Parallel Distributed Syst., 2013
An Effective Network Traffic Classification Method with Unknown Flow Detection.
IEEE Trans. Netw. Serv. Manag., 2013
Multidimensional Routing Protocol in Human-Associated Delay-Tolerant Networks.
IEEE Trans. Mob. Comput., 2013
Trust, security and privacy for pervasive applications.
J. Supercomput., 2013
Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions.
IEEE Trans. Inf. Forensics Secur., 2013
Secure RFID Tag Ownership Transfer Based on Quadratic Residues.
IEEE Trans. Inf. Forensics Secur., 2013
Lazy Collaborative Filtering for Data Sets With Missing Values.
IEEE Trans. Cybern., 2013
Malwise - An Effective and Efficient Classification System for Packed and Polymorphic Malware.
IEEE Trans. Computers, 2013
A learning method for Top-N recommendations with incomplete data.
Soc. Netw. Anal. Min., 2013
Unsupervised traffic classification using flow statistical properties and IP packet payload.
J. Comput. Syst. Sci., 2013
Robust image retrieval with hidden classes.
Comput. Vis. Image Underst., 2013
A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems.
Ad Hoc Networks, 2013
Offline grouping proof protocol for RFID systems.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013
Privacy Preserving for Tagging Recommender Systems.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013
An Effective Deferentially Private Data Releasing Algorithm for Decision Tree.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Privacy Protected Data Forwarding in Human Associated Delay Tolerant Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Recommendation Techniques Based on Off-Line Data Processing a Multifaceted Survey.
Proceedings of the Ninth International Conference on Semantics, Knowledge and Grids, 2013
RFID tags - Grouping proof with forward security.
Proceedings of the 2013 IEEE International Conference on RFID-Technologies and Applications, 2013
Top-N Recommendations by Learning User Preference Dynamics.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013
Modeling and Analysis for Thwarting Worm Propagation in Email Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013
Anonymous Data Forwarding in Human Associated Delay Tolerant Networks.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013
A general cloud firewall framework with dynamic resource allocation.
Proceedings of IEEE International Conference on Communications, 2013
A dynamical Deterministic Packet Marking scheme for DDoS traceback.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Secure ownership transfer in multi-tag/multi-owner passive RFID systems.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Zero-Day Traffic Identification.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
Detecting Stepping Stones by Abnormal Causality Probability.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
Traffic Identification in Semi-known Network Environment.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013
Robust network traffic identification with unknown applications.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Differential privacy for neighborhood-based collaborative filtering.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013
AdaM: adaptive-maximum imputation for neighborhood-based collaborative filtering.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013
2012
Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient.
IEEE Trans. Parallel Distributed Syst., 2012
A Dual-Channel Time-Spread Echo Method for Audio Watermarking.
IEEE Trans. Inf. Forensics Secur., 2012
Robust Patchwork-Based Embedding and Decoding Scheme for Digital Audio Watermarking.
IEEE Trans. Speech Audio Process., 2012
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures.
J. Netw. Comput. Appl., 2012
Generating regular expression signatures for network traffic classification in trusted network management.
J. Netw. Comput. Appl., 2012
M-Dimension: Multi-characteristics based routing protocol in human associated delay-tolerant networks with improved performance over one dimensional classic models.
J. Netw. Comput. Appl., 2012
Semi-supervised and compound classification of network traffic.
Int. J. Secur. Networks, 2012
Locating Defense Positions for Thwarting the Propagation of Topological Worms.
IEEE Commun. Lett., 2012
Advances in network and system security.
Concurr. Comput. Pract. Exp., 2012
CAFS: a novel lightweight cache-based scheme for large-scale intrusion alert fusion.
Concurr. Comput. Pract. Exp., 2012
A minimum disclosure approach to authentication and privacy in RFID systems.
Comput. Networks, 2012
Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics.
Comput. J., 2012
Advances in Network and System Security: Editorial Statement.
Comput. J., 2012
Learning User Preference Patterns for Top-N Recommendations.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012
A secure tag ownership transfer scheme in a closed loop RFID system.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference Workshops, 2012
An Analytical Model on the Propagation of Modern Email Worms.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Classification of Correlated Internet Traffic Flows.
Proceedings of the 11th IEEE International Conference on Trust, 2012
AMDD: Exploring Entropy Based Anonymous Multi-dimensional Data Detection for Network Optimization in Human Associated DTNs.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Improving Top-N Recommendations with User Consuming Profiles.
Proceedings of the PRICAI 2012: Trends in Artificial Intelligence, 2012
A secure search protocol based on Quadratic Residues for EPC Class-1 Gen-2 UHF RFID tags.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012
Why it is Hard to Fight against Cyber Criminals?
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
DDoS discrimination by Linear Discriminant Analysis (LDA).
Proceedings of the International Conference on Computing, Networking and Communications, 2012
The efficient imputation method for neighborhood-based collaborative filtering.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012
Learning Rating Patterns for Top-N Recommendations.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012
2011
Traceback of DDoS Attacks Using Entropy Variations.
IEEE Trans. Parallel Distributed Syst., 2011
Effective Pseudonoise Sequence and Decoding Function for Imperceptibility and Robustness Enhancement in Time-Spread Echo-Based Audio Watermarking.
IEEE Trans. Multim., 2011
Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics.
IEEE Trans. Inf. Forensics Secur., 2011
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks.
J. Netw. Comput. Appl., 2011
Eliminating Errors in Worm Propagation Models.
IEEE Commun. Lett., 2011
Special Section: Trusted computing.
Future Gener. Comput. Syst., 2011
A mobile agent-based routing algorithm and some theoretical analysis.
Comput. Syst. Sci. Eng., 2011
Special Issue: Securing Distributed Networks and Systems.
Concurr. Comput. Pract. Exp., 2011
Editorial: Advances in network and system security.
Comput. Secur., 2011
Special issue: Building secure parallel and distributed networks and systems.
Comput. Commun., 2011
Secure Image Retrieval Based on Visual Content and Watermarking Protocol.
Comput. J., 2011
The Microcosmic Model of Worm Propagation.
Comput. J., 2011
MAR: Message-aware routing for opportunistic wireless ad hoc networks.
Proceedings of the Australasian Telecommunication Networks and Applications Conference, 2011
The Probability Model of Peer-to-Peer Botnet Propagation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011
2010
Using the k-core decomposition to analyze the static structure of large-scale software systems.
J. Supercomput., 2010
Sharable file searching in unstructured Peer-to-peer systems.
J. Supercomput., 2010
A locality aware cache diffusion system.
J. Supercomput., 2010
Security in next generation wireless networks.
Secur. Commun. Networks, 2010
Dynamic Addressing in Wireless Sensor Networks without Location Awareness.
J. Inf. Sci. Eng., 2010
Spectral shape descriptor using spherical harmonics.
Integr. Comput. Aided Eng., 2010
A microscopic competition model and its dynamics analysis on network attacks.
Concurr. Comput. Pract. Exp., 2010
CALD: Surviving Various Application-Layer DDoS Attacks That Mimic Flash Crowd.
Proceedings of the Fourth International Conference on Network and System Security, 2010
Getting the Real-Time Precise Round-Trip Time for Stepping Stone Detection.
Proceedings of the Fourth International Conference on Network and System Security, 2010
Efficient Web Browsing with Perfect Anonymity Using Page Prefetching.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2010
A Lightweight Intrusion Alert Fusion System.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010
A Quick-Response Real-Time Stepping Stone Detection Scheme.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010
S-Kcore: A Social-aware Kcore Decomposition Algorithm in Pocket Switched Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
OST: A Transaction Based Online Social Trust Model for Social Network and File Sharing Security.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
2009
Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks.
IEEE Trans. Parallel Distributed Syst., 2009
Network and system security.
J. Netw. Comput. Appl., 2009
An innovative analyser for multi-classifier e-mail classification based on grey list analysis.
J. Netw. Comput. Appl., 2009
A Mobile Learning Model for Universities -Re-blending the Current Learning Environment.
Int. J. Interact. Mob. Technol., 2009
E-Learning over Mobile Phone Technology: Best Practices and Guidelines.
Int. J. Interact. Mob. Technol., 2009
Reducing the bandwidth requirements of P2P keyword indexing.
Int. J. High Perform. Comput. Netw., 2009
Effective metric for detecting distributed denial-of-service attacks based on information divergence.
IET Commun., 2009
Chaos theory based detection against network mimicking DDoS attacks.
IEEE Commun. Lett., 2009
A parallel information retrieval method for e-commerce.
Comput. Syst. Sci. Eng., 2009
Adjacency cache: an efficient P2P web cache indexing and lookup system.
Comput. Syst. Sci. Eng., 2009
Special Issue: Multi-core Supported Network and System Security.
Concurr. Comput. Pract. Exp., 2009
I/O scheduling and performance analysis on multi-core platforms.
Concurr. Comput. Pract. Exp., 2009
Spam filtering for network traffic security on a multi-core environment.
Concurr. Comput. Pract. Exp., 2009
Defending Grid Web Services from XDoS Attacks by SOTA.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
Discriminating DDoS Flows from Flash Crowds Using Information Distance.
Proceedings of the Third International Conference on Network and System Security, 2009
Distinguishing DDoS Attacks from Flash Crowds Using Probability Metrics.
Proceedings of the Third International Conference on Network and System Security, 2009
Reliable Downloading Algorithms for BitTorrent-like Systems.
Proceedings of the NPC 2009, 2009
Effective DDoS Attacks Detection Using Generalized Entropy Metric.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009
Minimizing the Limitations of GL Analyser of Fusion Based Email Classification.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009
A Resource Allocation Method for Computational Grids Based on On-line Reverse Auction.
Proceedings of the Fourth ChinaGrid Annual Conference, ChinaGrid 2009, Yantai, Shandong, 2009
MVGL Analyser for Multi-classifier Based Spam Filtering System.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009
2008
Information theory based detection against network behavior mimicking DDoS attacks.
IEEE Commun. Lett., 2008
Special Issue: Network Attacks and Defense Systems.
Comput. Syst. Sci. Eng., 2008
Entropy-Based Collaborative Detection of DDOS Attacks on Community Networks.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008
Detecting and Tracing DDoS Attacks by Intelligent Decision Prototype.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008
Multi-Core Defense System (MSDS) for Protecting Computer Infrastructure against DDoS Attacks.
Proceedings of the Ninth International Conference on Parallel and Distributed Computing, 2008
Multi-classifier Classification of Spam Email on a Ubiquitous Multi-core Architecture.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008
Using Multi-core to Support Security-Related Applications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2008
An Operational Approach to Validate the Path of BGP.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2008
Reducing Cache Lookup and Publish Overhead through Locality Awareness in P2P Web Caching.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008
Using Multi-Core Processors to Support Network Security Applications.
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008
Keynote III: Detection and traceback of DDoS attacks.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008
Image retrieval based on semantics of intra-region color properties.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008
Protecting web services with Service Oriented Traceback Architecture.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008
Email Categorization Using (2+1)-Tier Classification Algorithms.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008
2007
Defending against Distributed Denial of Service.
Proceedings of the Encyclopedia of Information Ethics and Security, 2007
An effective non-parametric method for globally clustering genes from expression profiles.
Medical Biol. Eng. Comput., 2007
Pervasive computing at tableside: a wireless web-based ordering system.
Int. J. Pervasive Comput. Commun., 2007
An Enhanced Parallel Downloading Algorithm for BT.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2007
A Resource-Search and Routing Algorithm within PCDN Autonomy Area.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007
Email Categorization Using Multi-stage Classification Technique.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007
Managing Email Overload with an Automatic Nonparametric Clustering Approach.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2007
Novel Data Management Algorithms in Peer-to-Peer Content Distribution Networks.
Proceedings of the Knowledge Science, 2007
Architecture of Adaptive Spam Filtering Based on Machine Learning Algorithms.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007
A Parallel Downloading Algorithm for Redundant Networks.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007
A Composite Descriptor for Shape Retrieval.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
Dynamic Feature Selection for Spam Filtering Using Support Vector Machine.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
Adjacency Cache: Fast Web Cache Indexing and Lookup.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
2006
Protecting web applications from DDoS attacks by an active distributed defense system.
Int. J. Web Inf. Syst., 2006
Developing wikis to foster web-based learning communities: an iterative approach.
Int. J. Web Based Communities, 2006
Protecting information infrastructure from DDoS attacks by MADF.
Int. J. High Perform. Comput. Netw., 2006
A solution for fault tolerance in replicated database systems.
Int. J. Comput. Sci. Eng., 2006
Frequency distribution of TATA Box and extension sequences on human promoters.
BMC Bioinform., 2006
Lease Based Addressing for Event-Driven Wireless Sensor Networks.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006
2005
An IT Bachelor Degree Using Modern Technologies to Illustrate Core Concepts and Principles and Building Generic Skills.
Educ. Inf. Technol., 2005
A Sensor Enabled Multi-Agent Infrastructure for Applications Integration.
Proceedings of the Soft Computing as Transdisciplinary Science and Technology, 2005
A Reactive Framework for Supporting Knowledge Management.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2005
Technologies and Considerations for Developing Internet and Multiplayer Computer Games: A Tutorial.
Proceedings of the Parallel and Distributed Processing and Applications, 2005
A Mesh Based Anycast Routing Protocol for Ad Hoc Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Intelligent DDoS Packet Filtering in High-Speed Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2005
A Defense System against DDoS Attacks by Large-Scale IP Traceback.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
A Parallel Euler Approach for Large-Scale Biological Sequence Assembly.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Employing Wikis for Online Collaboration in the E-Learning Environment: Case Study.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
The Multifaceted and Ever-Changing Directions of Information Security - Australia Get Ready!
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Security in the Online E-Learning Environment.
Proceedings of the 5th IEEE International Conference on Advanced Learning Technologies, 2005
Clock Synchronization State Graphs Based on Clock Precision Difference.
Proceedings of the Distributed and Parallel Computing, 2005
An Efficient Reliable Architecture for Application Layer Anycast Service.
Proceedings of the Distributed and Parallel Computing, 2005
Distributed Defense Against Distributed Denial-of-Service Attacks.
Proceedings of the Distributed and Parallel Computing, 2005
Mark-aided distributed filtering by using neural network for DDoS defense.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005
An Innovative Spam Filtering Model Based on Support Vector Machine.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005
Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
Understanding Transition towards Information Security Culture Change.
Proceedings of the 3rd Australian Information Security Management Conference, 2005
Spam Filtering based on Preference Ranking.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005
Distributed network systems - from concepts to implementations.
Network theory and applications 15, Springer, ISBN: 978-0-387-23839-5, 2005
2004
Delay Control and Parallel Admission Algorithms for Real-Time Anycast Flow.
J. Supercomput., 2004
A reactive system architecture for building fault-tolerant distributed applications.
J. Syst. Softw., 2004
Guest Editors' Introduction.
Int. J. Comput. Process. Orient. Lang., 2004
Optimal Multicast Tree Routing for Cluster Computing in Hypercube Interconnection Networks.
IEICE Trans. Inf. Syst., 2004
An analysis of update ordering in distributed replication systems.
Future Gener. Comput. Syst., 2004
Advanced services for Clusters and Internet computing.
Future Gener. Comput. Syst., 2004
A Novel Middleware Based Web Database Model.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004
Minicast: A Multicast-Anycast Protocol for Message Delivery.
Proceedings of the Parallel and Distributed Processing and Applications, 2004
Combating DDoS Attacks in Web-based Services.
Proceedings of the iiWAS'2004, 2004
Load Balance Algorithms for Anycast.
Proceedings of the iiWAS'2004, 2004
An Active Distributed Defense System to Protect Web Applications from DDOS Attacks.
Proceedings of the iiWAS'2004, 2004
A Self-Learning System for Identifying Harmful Network Information.
Proceedings of the iiWAS'2004, 2004
From e-Learning to Virtual Learning Community: Bridging the Gap.
Proceedings of the Advances in Web-Based Learning, 2004
Improving the Performance of Equalization and a Fast Start-Up Technique for Communication Systems.
Proceedings of the ICETE 2004, 2004
Toward Pervasive Computing in Restaurant.
Proceedings of the ICETE 2004, 2004
A Fast and Robust Method Applied in Telecommunication Systems.
Proceedings of the International Conference on Artificial Intelligence, 2004
Protect Grids from DDoS Attacks.
Proceedings of the Grid and Cooperative Computing, 2004
The Cost of Recovery Protocols in Web-based Database Systems.
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004
2003
Self-Adaptive Clock Synchronization for Computational Grid.
J. Comput. Sci. Technol., 2003
Decision Analysis of Statistically Detecting Distributed Denial-of-Service Flooding Attacks.
Int. J. Inf. Technol. Decis. Mak., 2003
Cultural Issues in Online Learning - Is Blended Learning a Possible Solution?
Int. J. Comput. Process. Orient. Lang., 2003
Fault-Tolerant Servers for Anycast Communication.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003
Exploring the Foundations of Practicing Online Collaboration.
Proceedings of the Advances in Web-Based Learning, 2003
Cultural Issues Relating to Teaching IT Professional Ethics Online: Lessons Learned.
Proceedings of the Advances in Web-Based Learning, 2003
Improving the Performance of Equalization in Communication Systems.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003
A Load Balancing Algorithm for Web Based Server Grids.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003
GHIRS: Integration of Hotel Management Systems by Web Services.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003
Large-Scale Biological Sequence Assembly and Alignment by Using Computing Grid.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003
An Adaptive Information Grid Architecture for Recommendation System.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003
Towards an Interactive Architecture for Web-Based Databases.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003
Self-Adaptive Clock Synchronization Based on Clock Precision Difference.
Proceedings of the Computer Science 2003, 2003
2002
A token-based independent update protocol for managing replicated objects.
Comput. Syst. Sci. Eng., 2002
Optimal Multicast Tree Routing for Cluster Computing in Hypercube Interconnection Networks.
Proceedings of the International Symposium on Parallel Architectures, 2002
An Efficient Algorithm for Application-Layer Anycasting.
Proceedings of the Distributed Communities on the Web, 4th International Workshop, 2002
2001
The design and implementation of an active replication scheme for distributing services in a cluster of workstations.
J. Syst. Softw., 2001
The Development of a Mobile Decision Support System.
J. Interconnect. Networks, 2001
The Design and Implementation of a Traffic Accident Analysis System.
Proceedings of the Engineering of Intelligent Systems, 2001
Automating the Construction of Replicated Objects in a Cluster of Workstations.
Proceedings of the First IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2001), 2001
2000
An architecture for resolving networking partitioning.
Proceedings of the ISCA 15th International Conference Computers and Their Applications, 2000
1999
Replication Techniques in Distributed Systems.
Parallel Distributed Comput. Pract., 1999
Detecting and tolerating failures in a loosely integrated heterogeneous database system.
Comput. Commun., 1999
Managing Replicated Remote Procedure Call Transactions.
Comput. J., 1999
A Tool for Constructing Service Replication Systems.
Proceedings of the TOOLS 1999: 31st International Conference on Technology of Object-Oriented Languages and Systems, 1999
The Design and Simulation of a Hybrid Replication Control Protocol.
Proceedings of the 1999 International Symposium on Parallel Architectures, 1999
The Design and Application of Sensors Implemented in Java.
Proceedings of the 17th IASTED International Conference on Applied Informatics, 1999
1998
Primary-Backup Object Replications in Java.
Proceedings of the TOOLS 1998: 27th International Conference on Technology of Object-Oriented Languages and Systems, 1998
1997
Fault-tolerant servers for the RHODOS system.
J. Syst. Softw., 1997
A tool for layered analysing and understanding of distributed programs.
Comput. Commun., 1997
An Architecture for Building Reliable Distributed Object-Based Systems.
Proceedings of the TOOLS 1997: 24th International Conference on Technology of Object-Oriented Languages and Systems, 1997
Using Sensors to Detect Failures in a Loosely Integrated Heterogeneous Database System.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1997
1996
A system for managing remote procedure call transactions.
J. Syst. Softw., 1996
Supporting fault-tolerant and open distributed processing using RPC.
Comput. Commun., 1996
A tool for assisting the understanding of distributed programs.
Proceedings of the ACM SIGCSE 1st Australasian Conference on Computer Science Education, 1996
1994
A rapid prototyping system for distributed information system applications.
J. Syst. Softw., 1994
1993
The design and implementation of a distributed program monitor.
J. Syst. Softw., 1993
A Layered Distributed Program Debugger.
Proceedings of the Fifth IEEE Symposium on Parallel and Distributed Processing, 1993
1991
On the Management of Remote Procedure Call Transactions.
Proceedings of the Advances in Computing and Information, 1991
1990
PM: a system for prototyping and monitoring remote procedure call programs.
ACM SIGSOFT Softw. Eng. Notes, 1990
A Model of Execution Time Estimating for RPC-Oriented Programs.
Proceedings of the Advances in Computing and Information, 1990