Frank Jiang

Orcid: 0000-0003-3765-561X

Affiliations:
  • Deakin University, Faculty of Science, Engineering and Built Environment, Geelong, Australia
  • University of Technology Sydney, Australia (former)
  • Guangxi Normal University, Faculty of Electronic Engineering, Guilin, China (former)
  • University of New South Wales, Sydney, Australia (former)


According to our database1, Frank Jiang authored at least 109 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
MEAs-Filter: a novel filter framework utilizing evolutionary algorithms for cardiovascular diseases diagnosis.
Health Inf. Sci. Syst., December, 2024

Ransomware early detection: A survey.
Comput. Networks, February, 2024

A hybrid cyber defense framework for reconnaissance attack in industrial control systems.
Comput. Secur., January, 2024

State-of-the-art authentication and verification schemes in VANETs: A survey.
Veh. Commun., 2024

Zero-Ran Sniff: A zero-day ransomware early detection method based on zero-shot learning.
Comput. Secur., 2024

CGAN-based cyber deception framework against reconnaissance attacks in ICS.
Comput. Networks, 2024

A privacy-preserving location data collection framework for intelligent systems in edge computing.
Ad Hoc Networks, 2024

DEMO: Adaptive Fuzz Testing for Automotive ECUs: A Modular Testbed Approach for Enhanced Vulnerability Detection.
Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos, 2024

Bio-CEC: A Secure and Efficient Cloud-Edge Collaborative Biometrics System using Cancelable Biometrics.
Proceedings of the IEEE International Conference on Web Services, 2024

Novel CAN Bus Fuzzing Framework for Finding Vulnerabilities in Automotive Systems.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

Secure Data Provenance in Internet of Vehicles with Verifiable Credentials for Security and Privacy.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

Secure Data Provenance in Internet of Vehicles with Data Plausibility for Security and Trust.
Proceedings of the IEEE World AI IoT Congress, 2024

2023
Improved reinforcement learning-based real-time energy scheduling for prosumer with elastic loads in smart grid.
Knowl. Based Syst., November, 2023

Zero trust cybersecurity: Critical success factors and A maturity assessment framework.
Comput. Secur., October, 2023

Performance Evaluation of a Novel Intrusion Detection System in Next Generation Networks.
IEEE Trans. Netw. Serv. Manag., September, 2023

Differential privacy in edge computing-based smart city Applications:Security issues, solutions and future directions.
Array, September, 2023

Hybrid cyber defense strategies using Honey-X: A survey.
Comput. Networks, July, 2023

Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks.
IEEE Trans. Inf. Forensics Secur., 2023

A reputation mechanism based Deep Reinforcement Learning and blockchain to suppress selfish node attack motivation in Vehicular Ad-Hoc Network.
Future Gener. Comput. Syst., 2023

Current Status and Trends of Engineering Entrepreneurship Education in Australian Universities.
CoRR, 2023

Secure Data Provenance for Internet of Vehicles with Verifiable Credentials.
Proceedings of the 14th IEEE Annual Ubiquitous Computing, 2023

Revolutionizing Virtual Shopping Experiences: A Blockchain-Based Metaverse UAV Delivery Solution.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

A Federated Multi-Modal Learning Framework Powered by Distributed Ledgers for Cyber-safe and Efficient UAV Delivery Systems.
Proceedings of the IEEE International Conference on Data Mining, 2023

TBAF: A Two-Stage Biometric-Assisted Authentication Framework in Edge-Integrated UAV Delivery System.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

Securing Smart UAV Delivery Systems Using Zero Trust Principle-Driven Blockchain Architecture.
Proceedings of the IEEE International Conference on Blockchain, 2023

BDFL: A Blockchain-Enabled FL Framework for Edge-based Smart UAV Delivery Systems.
Proceedings of the Third International Symposium on Advanced Security on Software and Systems, 2023

Multi-Featured Anomaly Detection for Mobile Edge Computing Based UAV Delivery Systems.
Proceedings of the 2023 Australasian Computer Science Week, 2023

2022
Blockchain for Cybersecurity: Systematic Literature Review and Classification.
J. Comput. Inf. Syst., November, 2022

Solving the last mile problem in logistics: A mobile edge computing and blockchain-based unmanned aerial vehicle delivery system.
Concurr. Comput. Pract. Exp., 2022

An Improved SLIC Algorithm for Segmentation of Microscopic Cell Images.
Biomed. Signal Process. Control., 2022

A quantum inspired differential evolution algorithm with multiple mutation strategies.
Proceedings of the IEEE International Conference on Trust, 2022

A New Zero-Trust Aided Smart Key Authentication Scheme in IoV.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

The First International Workshop on Cryptographic Security and Information Hiding Technology for IoT System (CSIHTIS 2022): Preface.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

Towards Improving the Adoption and Usage of National Digital Identity Systems.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Demo: Dynamic Suppression of Selfish Node Attack Motivation in the Process of VANET Communication.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

A Scheme to Improve the Security of IoT Communication.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Continuous Authentication for UAV Delivery Systems Under Zero-Trust Security Framework.
Proceedings of the IEEE International Conference on Edge Computing and Communications, 2022

2021
Effective Quarantine and Recovery Scheme Against Advanced Persistent Threat.
IEEE Trans. Syst. Man Cybern. Syst., 2021

Image stitching by feature positioning and seam elimination.
Multim. Tools Appl., 2021

LSTM Android Malicious Behavior Analysis Based on Feature Weighting.
KSII Trans. Internet Inf. Syst., 2021

Energy-aware decision-making for dynamic task migration in MEC-based unmanned aerial vehicle delivery system.
Concurr. Comput. Pract. Exp., 2021

A neuron image segmentation method based Deep Boltzmann Machine and CV model.
Comput. Medical Imaging Graph., 2021

EEG-based emotion recognition via capsule network with channel-wise attention and LSTM models.
CCF Trans. Pervasive Comput. Interact., 2021

Social Spammer Detection Based on Semi-Supervised Learning.
Proceedings of the 20th IEEE International Conference on Trust, 2021

A Blockchain Scheme Based on DAG Structure Security Solution for IIoT.
Proceedings of the 20th IEEE International Conference on Trust, 2021

A Novel Security Framework for Edge Computing based UAV Delivery System.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Evaluating the Current State of Application Programming Interfaces for Verifiable Credentials.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Federated Learning with Extreme Label Skew: A Data Extension Approach.
Proceedings of the International Joint Conference on Neural Networks, 2021

An Edge based Federated Learning Framework for Person Re-identification in UAV Delivery Service.
Proceedings of the 2021 IEEE International Conference on Web Services, 2021

A Blockchain-aided Self-Sovereign Identity Framework for Edge-based UAV Delivery System.
Proceedings of the 21st IEEE/ACM International Symposium on Cluster, 2021

2020
UAV Swarm Mission Planning in Dynamic Environment Using Consensus-Based Bundle Algorithm.
Sensors, 2020

Applications of Distributed Ledger Technologies to the Internet of Things: A Survey.
ACM Comput. Surv., 2020

VoterChoice: A ransomware detection honeypot with multiple voting framework.
Concurr. Comput. Pract. Exp., 2020

Review: Responsible use of technology to combat Cyberbullying among adolescents.
Australas. J. Inf. Syst., 2020

A New Markov Decision Process Based Behavioral Prediction System for Airborne Crews.
IEEE Access, 2020

A Scheme of Intelligent Traffic Light System Based on Distributed Security Architecture of Blockchain Technology.
IEEE Access, 2020

EEG-Based Emotion Classification Using Spiking Neural Networks.
IEEE Access, 2020

Avoiding Geographic Regions in Tor.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A Feedback-Driven Lightweight Reputation Scheme for IoV.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A New Social User Anomaly Behavior Detection System Based on Blockchain and Smart Contract.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2020

Biologically Inspired Smart Contract: A Blockchain-Based DDoS Detection System.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2020

A New Facial Expression Recognition Scheme Based on Parallel Double Channel Convolutional Neural Network.
Proceedings of the Intelligent Information and Database Systems - 12th Asian Conference, 2020

2019
Fast template matching based on deformable best-buddies similarity measure.
Multim. Tools Appl., 2019

A dual privacy-preservation scheme for cloud-based eHealth systems.
J. Inf. Secur. Appl., 2019

Cyber security insights into self-proclaimed virtual world hackers.
CoRR, 2019

Static malware clustering using enhanced deep embedding method.
Concurr. Comput. Pract. Exp., 2019

An Improved Authentication Scheme for Internet of Vehicles Based on Blockchain Technology.
IEEE Access, 2019

A New Improved Convolutional Neural Network Flower Image Recognition Model.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

BlockMeds: A Blockchain-Based Online Prescription System with Privacy Protection.
Proceedings of the Service-Oriented Computing - ICSOC 2019 Workshops, 2019

An Efficient Dynamic Group-Based Batch Verification Scheme for Vehicular Sensor Networks.
Proceedings of the Future Network Systems and Security - 5th International Conference, 2019

Quorum Chain-Based Malware Detection in Android Smart Devices.
Proceedings of the Future Network Systems and Security - 5th International Conference, 2019

2018
Single Image Rain Removal via a Simplified Residual Dense Network.
IEEE Access, 2018

Mapping Functions Driven Robust Retinal Vessel Segmentation via Training Patches.
IEEE Access, 2018

A Double-Image Encryption Scheme Based on Amplitude-Phase Encoding and Discrete Complex Random Transformation.
IEEE Access, 2018

Application of System Calls in Abnormal User Behavioral Detection in Social Networks.
Proceedings of the Service-Oriented Computing - ICSOC 2018 Workshops, 2018

Classification of Cardiovascular Disease via A New SoftMax Model.
Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2018

2017
Constrained NMF-based semi-supervised learning for social media spammer detection.
Knowl. Based Syst., 2017

A new binary hybrid particle swarm optimization with wavelet mutation.
Knowl. Based Syst., 2017

Dynamic power allocation for a multiuser transmitter with hybrid energy sources.
EURASIP J. Wirel. Commun. Netw., 2017

Deformable Template Matching Using Proposal-Based Best-Buddies Similarity.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Road Vehicle Alert System Using IOT.
Proceedings of the 25th International Conference on Systems Engineering, 2017

2016
Quality and robustness improvement for real world industrial systems using a fuzzy particle swarm optimization.
Eng. Appl. Artif. Intell., 2016

User Preference-Based Spamming Detection with Coupled Behavioral Analysis.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

A novel method of cervical cell image segmentation via region merging and SLIC.
Proceedings of the Seventh Symposium on Information and Communication Technology, 2016

Robust retinal vessel segmentation via clustering-based patch mapping functions.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

Coupled behavioral analysis for user preference-based email spamming.
Proceedings of the 2016 International Conference on Behavioral, 2016

Classifying sybil in MSNs using C4.5.
Proceedings of the 2016 International Conference on Behavioral, 2016

2015
A Gradient Learning Optimization for Dynamic Power Management.
Proceedings of the 2015 IEEE International Conference on Systems, 2015

Intelligent Sybil Attack Detection on Abnormal Connectivity Behavior in Mobile Social Networks.
Proceedings of the Knowledge Management in Organizations - 10th International Conference, 2015

Effectively Predicting Whether and When a Topic Will Become Prevalent in a Social Network.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Multi-qudit information splitting with multiple controllers.
Quantum Inf. Process., 2014

Binary Hybrid Particle Swarm Optimization with Wavelet Mutation.
Proceedings of the Knowledge and Systems Engineering, 2014

A New Coupled Metric Learning for Real-time Anomalies Detection with High-Frequency Field Programmable Gate Arrays.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014

Application on self-provisioning of communication network service using fuzzy particle swarm optimization.
Proceedings of the 13th International Conference on Control Automation Robotics & Vision, 2014

Automated generation of ham rules for Vietnamese spam filtering.
Proceedings of the Seventh IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2014

2013
Agent-Based Self-Adaptable Context-Aware Network Vulnerability Assessment.
IEEE Trans. Netw. Serv. Manag., 2013

LOARP: A Low Overhead Routing Protocol for Underwater Acoustic Sensor Networks.
J. Networks, 2013

Cooperative multi-target tracking in passive sensor-based networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

2012
A Real-Time NetFlow-based Intrusion Detection System with Improved BBNN and High-Frequency Field Programmable Gate Arrays.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Evolving Block-Based Neural Network and Field Programmable Gate Arrays for Host-Based Intrusion Detection System.
Proceedings of the Fourth International Conference on Knowledge and Systems Engineering, 2012

Self-provisioning of network services with quantum-inspired reinforcement learning and adaptation.
Proceedings of 9th IEEE International Conference on Networking, Sensing and Control, 2012

An immunology-inspired multi-engine anomaly detection system with hybrid particle swarm optimisations.
Proceedings of the FUZZ-IEEE 2012, 2012

Threshold-Based Image Segmentation through an Improved Particle Swarm Optimisation.
Proceedings of the 2012 International Conference on Digital Image Computing Techniques and Applications, 2012

Intelligent fuzzy particle swarm optimization with cross-mutated operation.
Proceedings of the IEEE Congress on Evolutionary Computation, 2012

A hypoglycemic episode diagnosis system based on neural networks for Type 1 diabetes mellitus.
Proceedings of the IEEE Congress on Evolutionary Computation, 2012

2011
Hybrid Fuzzy Logic-Based Particle Swarm Optimization for Flow shop Scheduling Problem.
Int. J. Comput. Intell. Appl., 2011

Permutation flow shop scheduling: Fuzzy particle swarm optimization approach.
Proceedings of the FUZZ-IEEE 2011, 2011

A distributed smart routing scheme for terrestrial sensor networks with hybrid Neural Rough Sets.
Proceedings of the FUZZ-IEEE 2011, 2011

A Bio-inspired Host-Based Multi-engine Detection System with Sequential Pattern Recognition.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011


  Loading...