Julian Jang

Orcid: 0000-0002-1002-057X

According to our database1, Julian Jang authored at least 86 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Measuring Technological Convergence in Encryption Technologies with Proximity Indices: A Text Mining and Bibliometric Analysis using OpenAlex.
CoRR, 2024

A Markov Game Model for Evaluating Cybersecurity Attacks on Cloud.
Proceedings of the Advances in Information and Computer Security, 2024

LLM-Resilient Bibliometrics: Factual Consistency Through Entity Triplet Extraction.
Proceedings of Joint Workshop of the 5th Extraction and Evaluation of Knowledge Entities from Scientific Documents (EEKE2024) and the 4th AI + Informetrics (AII2024) co-located with the ( iConference2024), 2024

Automated Identification of Emerging Technologies: Open Data Approach.
Proceedings of Joint Workshop of the 5th Extraction and Evaluation of Knowledge Entities from Scientific Documents (EEKE2024) and the 4th AI + Informetrics (AII2024) co-located with the ( iConference2024), 2024

2023
IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset.
J. Big Data, December, 2023

Blended threat prediction based on knowledge graph embedding in the IoBE.
ICT Express, October, 2023

Matrix Encryption Walks for Lightweight Cryptography.
Cryptogr., July, 2023

Task-Aware Meta Learning-Based Siamese Neural Network for Classifying Control Flow Obfuscated Malware.
Future Internet, June, 2023

Evolving malice scoring models for ransomware detection: An automated approach by utilising genetic programming and cooperative coevolution.
Comput. Secur., June, 2023

A Survey on Cyber Situation-awareness Systems: Framework, Techniques, and Insights.
ACM Comput. Surv., 2023

Network Intrusion Detection in Internet of Blended Environment Using Ensemble of Heterogeneous Autoencoders (E-HAE).
Comput. Syst. Sci. Eng., 2023

Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods.
CoRR, 2023

Reconstruction-based LSTM-Autoencoder for Anomaly-based DDoS Attack Detection over Multivariate Time-Series Data.
CoRR, 2023

Generative Adversarial Networks for Malware Detection: a Survey.
CoRR, 2023

A Comprehensive Survey of Generative Adversarial Networks (GANs) in Cybersecurity Intrusion Detection.
IEEE Access, 2023

Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
A Novel Hybrid Approach for Multi-Dimensional Data Anonymization for Apache Spark.
ACM Trans. Priv. Secur., 2022

Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud.
IEEE Trans. Emerg. Top. Comput., 2022

Artificial Intelligence-Enabled DDoS Detection for Blockchain-Based Smart Transport Systems.
Sensors, 2022

A Ransomware Triage Approach using a Task Memory based on Meta-Transfer Learning Framework.
CoRR, 2022

LSTM-Autoencoder based Anomaly Detection for Indoor Air Quality Time Series Data.
CoRR, 2022

Autoencoder-based Unsupervised Intrusion Detection using Multi-Scale Convolutional Recurrent Networks.
CoRR, 2022

Training a Bidirectional GAN-based One-Class Classifier for Network Intrusion Detection.
CoRR, 2022

Improved Bidirectional GAN-Based Approach for Network Intrusion Detection Using One-Class Classifier.
Comput., 2022

Deep Q-Learning Based Reinforcement Learning Approach for Network Intrusion Detection.
Comput., 2022

A few-shot meta-learning based siamese neural network using entropy features for ransomware classification.
Comput. Secur., 2022

PassImg: A Secure Password Generation and Management Scheme without Storing.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
Entitlement-Based Access Control for Smart Cities Using Blockchain.
Sensors, 2021

Joint Spectral Clustering based on Optimal Graph and Feature Selection.
Neural Process. Lett., 2021

A Game-Theoretic Approach for AI-based Botnet Attack Defence.
CoRR, 2021

Intrusion Detection using Spatial-Temporal features based on Riemannian Manifold.
CoRR, 2021

A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights.
CoRR, 2021

Task-Aware Meta Learning-based Siamese Neural Network for Classifying Obfuscated Malware.
CoRR, 2021

A Markov Game Model for AI-based Cyber Security Attack Mitigation.
CoRR, 2021

Evaluating the effectiveness of shuffle and redundancy MTD techniques in the cloud.
Comput. Secur., 2021

Improving Performance of Autoencoder-Based Network Anomaly Detection on NSL-KDD Dataset.
IEEE Access, 2021

AE-MLP: A Hybrid Deep Learning Approach for DDoS Detection and Classification.
IEEE Access, 2021

MSD-Kmeans: A Hybrid Algorithm for Efficient Detection of Global and Local Outliers.
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021

2020
Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud.
Future Gener. Comput. Syst., 2020

Multi-Loss Siamese Neural Network With Batch Normalization Layer for Malware Detection.
IEEE Access, 2020

Large-Scale Outlier Detection for Low-Cost PM₁₀ Sensors.
IEEE Access, 2020

Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
Scalable Big Data Privacy with MapReduce.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

MSD-Kmeans: A Novel Algorithm for Efficient Detection of Global and Local Outliers.
CoRR, 2019

An Automated Security Analysis Framework and Implementation for Cloud.
CoRR, 2019

Masquerade Attacks Against Security Software Exclusion Lists.
Aust. J. Intell. Inf. Process. Syst., 2019

SparkDA: RDD-Based High-Performance Data Anonymization Technique for Spark Platform.
Proceedings of the Network and System Security - 13th International Conference, 2019

The Inadequacy of Entropy-Based Ransomware Detection.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

An Automated Security Analysis Framework and Implementation for MTD Techniques on Cloud.
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019

Measuring Human Resilience in the Face of the Global Epidemiology of Cyber Attacks.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
Privacy Issues in Big Data Mining Infrastructure, Platforms, and Applications.
Secur. Commun. Networks, 2018

Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Deployment issues for integrated open-source - Based indoor air quality school Monitoring Box (SKOMOBO).
Proceedings of the 2018 IEEE Sensors Applications Symposium, 2018

Large Scale Behavioral Analysis of Ransomware Attacks.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

Comprehensive Security Assessment of Combined MTD Techniques for the Cloud.
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018

2017
Anonymizing k-NN Classification on MapReduce.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

A Secure Server-Based Pseudorandom Number Generator Protocol for Mobile Devices.
Proceedings of the Information Security Practice and Experience, 2017

A Privacy Preserving Platform for MapReduce.
Proceedings of the Applications and Techniques in Information Security, 2017

2016
WebRTC-based video conferencing service for telehealth.
Computing, 2016

Towards privacy-preserving classification in neural networks.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

2014
A survey of emerging threats in cybersecurity.
J. Comput. Syst. Sci., 2014

2013
Data architecture for telehealth services research: A case study of home tele-monitoring.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

Security analysis of mobile applications: A case study of a collaboration tool in healthcare.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

2012
Hardware Security Device Facilitated Trusted Energy Services.
Mob. Networks Appl., 2012

A New Cloud Architecture of Virtual Trusted Platform Modules.
IEICE Trans. Inf. Syst., 2012

Portable key management service for cloud storage.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

2011
A mobile and portable trusted computing platform.
EURASIP J. Wirel. Commun. Netw., 2011

Biometric Enabled Portable Trusted Computing Platform.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
User Authentication for Online Applications Using a USB-Based Trust Device.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010

Trusted Computing Platform in Your Pocket.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

A Cloud Architecture of Virtual Trusted Platform Modules.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Hardware security device facilitated trusted residential energy services.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

2009
Implementing Isolation for Service-Based Applications.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

2008
Trusted Email protocol: Dealing with privacy concerns from malicious email intermediaries.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

2007
Anitya: An Ephemeral Data Management Service and Secure Data Access Protocols for Dynamic Collaborations.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007

A Policy Based Approach to Managing Shared Data in Dynamic Collaborations.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Delivering Promises for Web Services Applications.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Isolation Support for Service-based Applications: A Position Paper.
Proceedings of the Third Biennial Conference on Innovative Data Systems Research, 2007

2006
Establishing a Trust Relationship in Cooperative Information Systems.
Proceedings of the On the Move to Meaningful Internet Systems 2006: CoopIS, 2006

An Event-Driven Workflow Engine for Service-based Business Systems.
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006

2005
A Service-Oriented Workflow Language for Robust Interacting Applications.
Proceedings of the On the Move to Meaningful Internet Systems 2005: CoopIS, 2005

2003
Expressiveness of Workflow Description Languages.
Proceedings of the International Conference on Web Services, ICWS '03, June 23, 2003

Compensation is Not Enough.
Proceedings of the 7th International Enterprise Distributed Object Computing Conference (EDOC 2003), 2003

Just What Could Possibly Go Wrong In B2B Integration?
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

Transactions in Loosely Coupled Distributed Systems.
Proceedings of the Database Technologies 2003, 2003


  Loading...