Jun Zhang

Orcid: 0000-0002-2189-7801

Affiliations:
  • Swinburne University of Technology, School of Software and Electrical Engineering, Hawthorn, Australia
  • Deakin University, School of Information Technology, Geelong, VIC, Australia (2011 - 2017)
  • University of Wollongong, NSW, Australia (PhD 2011)


According to our database1, Jun Zhang authored at least 174 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy Protection for Blockchain-Based Healthcare IoT Systems: A Survey.
IEEE CAA J. Autom. Sinica, August, 2024

IoTFuzz: Automated Discovery of Violations in Smart Homes With Real Environment.
IEEE Internet Things J., March, 2024

Guest Editorial Special Section on Security, Privacy and Trust for Consumer Smart Devices.
IEEE Trans. Consumer Electron., February, 2024

Disentangling different levels of GAN fingerprints for task-specific forensics.
Comput. Stand. Interfaces, 2024

Memorization in deep learning: A survey.
CoRR, 2024

Private Knowledge Sharing in Distributed Learning: A Survey.
CoRR, 2024

Deceptive Waves: Embedding Malicious Backdoors in PPG Authentication.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024

EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection.
Proceedings of the 33rd USENIX Security Symposium, 2024

2023
A Survey of PPG's Application in Authentication.
Comput. Secur., December, 2023

Analysis of hybrid attack and defense based on block withholding strategy.
J. Inf. Secur. Appl., November, 2023

Security and privacy problems in voice assistant applications: A survey.
Comput. Secur., November, 2023

Cyber Information Retrieval Through Pragmatics Understanding and Visualization.
IEEE Trans. Dependable Secur. Comput., 2023

Making DeepFakes More Spurious: Evading Deep Face Forgery Detection via Trace Removal Attack.
IEEE Trans. Dependable Secur. Comput., 2023

Cyber Code Intelligence for Android Malware Detection.
IEEE Trans. Cybern., 2023

Privacy Intelligence: A Survey on Image Privacy in Online Social Networks.
ACM Comput. Surv., 2023

A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network.
Comput. Stand. Interfaces, 2023

Client-side Gradient Inversion Against Federated Learning from Poisoning.
CoRR, 2023

model-based script synthesis for fuzzing.
CoRR, 2023

SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs.
CoRR, 2023

VulMatch: Binary-level Vulnerability Detection Through Signature.
CoRR, 2023

Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives.
IEEE Commun. Surv. Tutorials, 2023

SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

SigD: A Cross-Session Dataset for PPG-based User Authentication in Different Demographic Groups.
Proceedings of the International Joint Conference on Neural Networks, 2023

Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication.
Proceedings of the Computer Security - ESORICS 2023, 2023

WinkFuzz: Model-based Script Synthesis for Fuzzing.
Proceedings of the Third International Symposium on Advanced Security on Software and Systems, 2023

2022
CSEdge: Enabling Collaborative Edge Storage for Multi-Access Edge Computing Based on Blockchain.
IEEE Trans. Parallel Distributed Syst., 2022

JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers.
IEEE Trans. Dependable Secur. Comput., 2022

Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks.
IEEE Trans. Dependable Secur. Comput., 2022

CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation.
IEEE Trans. Dependable Secur. Comput., 2022

Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey.
IEEE CAA J. Autom. Sinica, 2022

Machine Learning-based Cyber Attacks Targeting on Controlled Information: A Survey.
ACM Comput. Surv., 2022

Event detection in online social network: Methodologies, state-of-art, and evolution.
Comput. Sci. Rev., 2022

FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation.
CoRR, 2022

SoK: An Overview of PPG's Application in Authentication.
CoRR, 2022

Trustworthy blockchain-based medical Internet of thing for minimal invasive surgery training simulator.
Concurr. Comput. Pract. Exp., 2022

SDCCP: Control the network using software-defined networking and end-to-end congestion control.
Concurr. Comput. Pract. Exp., 2022

Domain adaptation for Windows advanced persistent threat detection.
Comput. Secur., 2022

A Survey on IoT Vulnerability Discovery.
Proceedings of the Network and System Security - 16th International Conference, 2022

Attention Distraction: Watermark Removal Through Continual Learning with Selective Forgetting.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Automated Binary Analysis: A Survey.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022

No-Label User-Level Membership Inference for ASR Model Auditing.
Proceedings of the Computer Security - ESORICS 2022, 2022

Video is All You Need: Attacking PPG-based Biometric Authentication.
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022

2021
Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases.
IEEE Trans. Dependable Secur. Comput., 2021

The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services.
Proc. Priv. Enhancing Technol., 2021

Deep neural-based vulnerability discovery demystified: data, model and performance.
Neural Comput. Appl., 2021

A Survey of Android Malware Detection with Deep Neural Models.
ACM Comput. Surv., 2021

Information flow based defensive chain for data leakage detection and prevention: a survey.
CoRR, 2021

Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network: A Survey.
CoRR, 2021

My Security: An interactive search engine for cybersecurity.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

TAESim: A Testbed for IoT Security Analysis of Trigger-Action Environment.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

2020
Cyber Vulnerability Intelligence for Internet of Things Binary.
IEEE Trans. Ind. Informatics, 2020

Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection.
IEEE Trans. Inf. Forensics Secur., 2020

DeepBalance: Deep-Learning and Fuzzy Oversampling for Vulnerability Detection.
IEEE Trans. Fuzzy Syst., 2020

Privacy Protection in Interactive Content Based Image Retrieval.
IEEE Trans. Dependable Secur. Comput., 2020

Data-Driven Cyber Security in Perspective - Intelligent Traffic Analysis.
IEEE Trans. Cybern., 2020

Software Vulnerability Detection Using Deep Neural Networks: A Survey.
Proc. IEEE, 2020

AI-driven data security and privacy.
J. Netw. Comput. Appl., 2020

Code analysis for intelligent cyber systems: A data-driven approach.
Inf. Sci., 2020

A Hybrid Key Agreement Scheme for Smart Homes Using the Merkle Puzzle.
IEEE Internet Things J., 2020

A study of data pre-processing techniques for imbalanced biomedical data classification.
Int. J. Bioinform. Res. Appl., 2020

Security and privacy in 6G networks: New areas and new challenges.
Digit. Commun. Networks, 2020

DeFuzz: Deep Learning Guided Directed Fuzzing.
CoRR, 2020

Privacy Intelligence: A Survey on Image Sharing on Online Social Networks.
CoRR, 2020

Software Vulnerability Analysis and Discovery Using Deep Learning Techniques: A Survey.
IEEE Access, 2020

Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Unmasking Windows Advanced Persistent Threat Execution.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Protecting IP of Deep Neural Networks with Watermarking: A New Label Helps.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence.
Proceedings of the Network and System Security - 14th International Conference, 2020

2019
Noise-Resistant Statistical Traffic Classification.
IEEE Trans. Big Data, 2019

An Overview of Attacks and Defences on Intelligent Connected Vehicles.
CoRR, 2019

The Audio Auditor: Participant-Level Membership Inference in Voice-Based IoT.
CoRR, 2019

Video denoising for security and privacy in fog computing.
Concurr. Comput. Pract. Exp., 2019

Editorial: Recent advances in machine learning for cybersecurity.
Concurr. Comput. Pract. Exp., 2019

Data-Driven Cybersecurity Incident Prediction: A Survey.
IEEE Commun. Surv. Tutorials, 2019

A3CM: Automatic Capability Annotation for Android Malware.
IEEE Access, 2019

Predicting the Impact of Android Malicious Samples via Machine Learning.
IEEE Access, 2019

Insider Threat Identification Using the Simultaneous Neural Learning of Multi-Source Logs.
IEEE Access, 2019

Unsupervised Insider Detection Through Neural Feature Learning and Model Optimisation.
Proceedings of the Network and System Security - 13th International Conference, 2019

Data-Driven Android Malware Intelligence: A Survey.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

A Visualization-Based Analysis on Classifying Android Malware.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Deep Learning-Based Vulnerable Function Detection: A Benchmark.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

2018
Cross-Project Transfer Representation Learning for Vulnerable Function Discovery.
IEEE Trans. Ind. Informatics, 2018

Exploring Feature Coupling and Model Coupling for Image Source Identification.
IEEE Trans. Inf. Forensics Secur., 2018

A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement.
Quantum Inf. Process., 2018

Big network traffic data visualization.
Multim. Tools Appl., 2018

Recent advances in security and privacy in Social Big Data.
Future Gener. Comput. Syst., 2018

Automated Big Traffic Analytics for Cyber Security.
CoRR, 2018

Comprehensive analysis of network traffic data.
Concurr. Comput. Pract. Exp., 2018

Detecting and Preventing Cyber Insider Threats: A Survey.
IEEE Commun. Surv. Tutorials, 2018

JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones.
Comput. Secur., 2018

High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space.
Sci. China Inf. Sci., 2018

Deep-learnt features for Twitter spam detection.
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018

Call Attention to Rumors: Deep Attention Based Recurrent Neural Networks for Early Rumor Detection.
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2018

Anomaly-Based Insider Threat Detection Using Deep Autoencoders.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

Who Spread to Whom? Inferring Online Social Networks with User Features.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-Scale Recommendation Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

A Data-driven Attack against Support Vectors of SVM.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Keep Calm and Know Where to Focus: Measuring and Predicting the Impact of Android Malware.
Proceedings of the Advanced Data Mining and Applications - 14th International Conference, 2018

2017
Statistical Features-Based Real-Time Detection of Drifted Twitter Spam.
IEEE Trans. Inf. Forensics Secur., 2017

Fuzzy-Based Information Decomposition for Incomplete and Imbalanced Data Learning.
IEEE Trans. Fuzzy Syst., 2017

Recent Advances in Security and Privacy for Wireless Sensor Networks 2016.
J. Sensors, 2017

Investigating the deceptive information in Twitter spam.
Future Gener. Comput. Syst., 2017

Visualization of big data security: a case study on the KDD99 cup data set.
Digit. Commun. Networks, 2017

Call Attention to Rumors: Deep Attention Based Recurrent Neural Networks for Early Rumor Detection.
CoRR, 2017

Detecting spamming activities in twitter based on deep-learning technique.
Concurr. Comput. Pract. Exp., 2017

Addressing the class imbalance problem in Twitter spam detection using ensemble learning.
Comput. Secur., 2017

Statistical Twitter Spam Detection Demystified: Performance, Stability and Scalability.
IEEE Access, 2017

Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Noisy Smoothing Image Source Identification.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

POSTER: Vulnerability Discovery with Function Representation Learning from Unlabeled Projects.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Distributed Detection of Zero-Day Network Traffic Flows.
Proceedings of the Data Mining, 2017

Twitter spam detection based on deep learning.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

2016
Comments and Corrections.
IEEE Trans. Comput. Soc. Syst., 2016

Spammers Are Becoming "Smarter" on Twitter.
IT Prof., 2016

Security and reliability in big data.
Concurr. Comput. Pract. Exp., 2016

Flow-based traffic retrieval using statistical features.
Proceedings of the International Workshop on Big Data and Information Security, 2016

Statistical Detection of Online Drifting Twitter Spam: Invited Paper.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Fuzzy-Based Feature and Instance Recovery.
Proceedings of the Intelligent Information and Database Systems - 8th Asian Conference, 2016

Comprehensive Analysis of Network Traffic Data.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Robust Network Traffic Classification.
IEEE/ACM Trans. Netw., 2015

Camera Model Identification With Unknown Models.
IEEE Trans. Inf. Forensics Secur., 2015

A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection.
IEEE Trans. Comput. Soc. Syst., 2015

Recent Advances in Security and Privacy for Wireless Sensor Networks.
J. Sensors, 2015

Enhanced Twitter Sentiment Analysis by Using Feature Selection and Combination.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

Asymmetric self-learning for tackling Twitter Spam Drift.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Robust Traffic Classification with Mislabelled Training Samples.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

6 million spam tweets: A large ground truth for timely Twitter spam detection.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Internet Traffic Classification Using Constrained Clustering.
IEEE Trans. Parallel Distributed Syst., 2014

Modeling and Analysis on the Propagation Dynamics of Modern Email Malware.
IEEE Trans. Dependable Secur. Comput., 2014

The maximum imputation framework for neighborhood-based collaborative filtering.
Soc. Netw. Anal. Min., 2014

Medical image retrieval based on unclean image bags.
Multim. Tools Appl., 2014

A noisy-smoothing relevance feedback method for content-based medical image retrieval.
Multim. Tools Appl., 2014

Internet traffic clustering with side information.
J. Comput. Syst. Sci., 2014

On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
Network Traffic Classification Using Correlation Information.
IEEE Trans. Parallel Distributed Syst., 2013

Modeling Propagation Dynamics of Social Network Worms.
IEEE Trans. Parallel Distributed Syst., 2013

An Effective Network Traffic Classification Method with Unknown Flow Detection.
IEEE Trans. Netw. Serv. Manag., 2013

Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions.
IEEE Trans. Inf. Forensics Secur., 2013

Lazy Collaborative Filtering for Data Sets With Missing Values.
IEEE Trans. Cybern., 2013

Unsupervised traffic classification using flow statistical properties and IP packet payload.
J. Comput. Syst. Sci., 2013

Robust image retrieval with hidden classes.
Comput. Vis. Image Underst., 2013

Clonewise - Detecting Package-Level Clones Using Machine Learning.
Proceedings of the Security and Privacy in Communication Networks, 2013

Network traffic clustering using Random Forest proximities.
Proceedings of IEEE International Conference on Communications, 2013

Zero-Day Traffic Identification.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Traffic Identification in Semi-known Network Environment.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Robust network traffic identification with unknown applications.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

AdaM: adaptive-maximum imputation for neighborhood-based collaborative filtering.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Semi-supervised and compound classification of network traffic.
Int. J. Secur. Networks, 2012

A New Re-Ranking Method Using Enhanced Pseudo-Relevance Feedback for Content-Based Medical Image Retrieval.
IEICE Trans. Inf. Syst., 2012

QDFA: Query-Dependent Feature Aggregation for Medical Image Retrieval.
IEICE Trans. Inf. Syst., 2012

Classification of Correlated Internet Traffic Flows.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Internet traffic clustering with constraints.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

The efficient imputation method for neighborhood-based collaborative filtering.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

2011
Secure Image Retrieval Based on Visual Content and Watermarking Protocol.
Comput. J., 2011

A novel semi-supervised approach for network traffic clustering.
Proceedings of the 5th International Conference on Network and System Security, 2011

2010
Guest Editorial.
J. Networks, 2010

Guest Editorial.
J. Networks, 2010

Guest Editorial.
J. Multim., 2010

Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol.
Inf. Sci., 2010

Real-time gait classification based on fuzzy associative memory.
Int. J. Model. Identif. Control., 2010

Series feature aggregation for content-based image retrieval.
Comput. Electr. Eng., 2010

Medical Image Retrieval with Query-Dependent Feature Fusion Based on One-Class SVM.
Proceedings of the 13th IEEE International Conference on Computational Science and Engineering, 2010

2009
Content Based Image Retrieval Using Unclean Positive Examples.
IEEE Trans. Image Process., 2009

Local aggregation function learning based on support vector machines.
Signal Process., 2009

Editorial.
J. Softw., 2009

Editorial.
J. Multim., 2009

Watermarking protocol for protecting user's right in content based image retrieval.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

Image retrieval using noisy query.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

Image retrieval based on bag of images.
Proceedings of the International Conference on Image Processing, 2009

2007
Watermarking protocol of secure verification.
J. Electronic Imaging, 2007

Design of Secure Watermarking Scheme for Watermarking Protocol.
Proceedings of the Advances in Multimedia Information Processing, 2007

An Unified Framework Based on p-Norm for Feature Aggregation in Content-Based Image Retrieval.
Proceedings of the Ninth IEEE International Symposium on Multimedia, 2007

A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007


  Loading...