Jun Zhang
Orcid: 0000-0002-2189-7801Affiliations:
- Swinburne University of Technology, School of Software and Electrical Engineering, Hawthorn, Australia
- Deakin University, School of Information Technology, Geelong, VIC, Australia (2011 - 2017)
- University of Wollongong, NSW, Australia (PhD 2011)
According to our database1,
Jun Zhang
authored at least 174 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE CAA J. Autom. Sinica, August, 2024
IEEE Internet Things J., March, 2024
Guest Editorial Special Section on Security, Privacy and Trust for Consumer Smart Devices.
IEEE Trans. Consumer Electron., February, 2024
Comput. Stand. Interfaces, 2024
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
J. Inf. Secur. Appl., November, 2023
Comput. Secur., November, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Making DeepFakes More Spurious: Evading Deep Face Forgery Detection via Trace Removal Attack.
IEEE Trans. Dependable Secur. Comput., 2023
ACM Comput. Surv., 2023
A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network.
Comput. Stand. Interfaces, 2023
Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives.
IEEE Commun. Surv. Tutorials, 2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
SigD: A Cross-Session Dataset for PPG-based User Authentication in Different Demographic Groups.
Proceedings of the International Joint Conference on Neural Networks, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the Third International Symposium on Advanced Security on Software and Systems, 2023
2022
CSEdge: Enabling Collaborative Edge Storage for Multi-Access Edge Computing Based on Blockchain.
IEEE Trans. Parallel Distributed Syst., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey.
IEEE CAA J. Autom. Sinica, 2022
ACM Comput. Surv., 2022
Event detection in online social network: Methodologies, state-of-art, and evolution.
Comput. Sci. Rev., 2022
CoRR, 2022
Trustworthy blockchain-based medical Internet of thing for minimal invasive surgery training simulator.
Concurr. Comput. Pract. Exp., 2022
SDCCP: Control the network using software-defined networking and end-to-end congestion control.
Concurr. Comput. Pract. Exp., 2022
Comput. Secur., 2022
Proceedings of the Network and System Security - 16th International Conference, 2022
Attention Distraction: Watermark Removal Through Continual Learning with Selective Forgetting.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services.
Proc. Priv. Enhancing Technol., 2021
Neural Comput. Appl., 2021
ACM Comput. Surv., 2021
Information flow based defensive chain for data leakage detection and prevention: a survey.
CoRR, 2021
CoRR, 2021
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021
2020
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Fuzzy Syst., 2020
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Cybern., 2020
Proc. IEEE, 2020
IEEE Internet Things J., 2020
A study of data pre-processing techniques for imbalanced biomedical data classification.
Int. J. Bioinform. Res. Appl., 2020
Digit. Commun. Networks, 2020
CoRR, 2020
Software Vulnerability Analysis and Discovery Using Deep Learning Techniques: A Survey.
IEEE Access, 2020
Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020
Proceedings of the Network and System Security - 14th International Conference, 2020
2019
CoRR, 2019
Concurr. Comput. Pract. Exp., 2019
Concurr. Comput. Pract. Exp., 2019
IEEE Commun. Surv. Tutorials, 2019
IEEE Access, 2019
Insider Threat Identification Using the Simultaneous Neural Learning of Multi-Source Logs.
IEEE Access, 2019
Unsupervised Insider Detection Through Neural Feature Learning and Model Optimisation.
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
2018
IEEE Trans. Ind. Informatics, 2018
IEEE Trans. Inf. Forensics Secur., 2018
A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement.
Quantum Inf. Process., 2018
Future Gener. Comput. Syst., 2018
IEEE Commun. Surv. Tutorials, 2018
JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones.
Comput. Secur., 2018
High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space.
Sci. China Inf. Sci., 2018
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018
Call Attention to Rumors: Deep Attention Based Recurrent Neural Networks for Early Rumor Detection.
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2018
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-Scale Recommendation Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Keep Calm and Know Where to Focus: Measuring and Predicting the Impact of Android Malware.
Proceedings of the Advanced Data Mining and Applications - 14th International Conference, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Fuzzy Syst., 2017
J. Sensors, 2017
Future Gener. Comput. Syst., 2017
Digit. Commun. Networks, 2017
Call Attention to Rumors: Deep Attention Based Recurrent Neural Networks for Early Rumor Detection.
CoRR, 2017
Concurr. Comput. Pract. Exp., 2017
Addressing the class imbalance problem in Twitter spam detection using ensemble learning.
Comput. Secur., 2017
Statistical Twitter Spam Detection Demystified: Performance, Stability and Scalability.
IEEE Access, 2017
Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
POSTER: Vulnerability Discovery with Function Representation Learning from Unlabeled Projects.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the Data Mining, 2017
Proceedings of the Australasian Computer Science Week Multiconference, 2017
2016
Proceedings of the International Workshop on Big Data and Information Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the Intelligent Information and Database Systems - 8th Asian Conference, 2016
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Comput. Soc. Syst., 2015
J. Sensors, 2015
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Dependable Secur. Comput., 2014
Soc. Netw. Anal. Min., 2014
A noisy-smoothing relevance feedback method for content-based medical image retrieval.
Multim. Tools Appl., 2014
On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification.
Proceedings of the Network and System Security - 8th International Conference, 2014
2013
IEEE Trans. Parallel Distributed Syst., 2013
IEEE Trans. Parallel Distributed Syst., 2013
IEEE Trans. Netw. Serv. Manag., 2013
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Trans. Cybern., 2013
Unsupervised traffic classification using flow statistical properties and IP packet payload.
J. Comput. Syst. Sci., 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013
2012
Int. J. Secur. Networks, 2012
A New Re-Ranking Method Using Enhanced Pseudo-Relevance Feedback for Content-Based Medical Image Retrieval.
IEICE Trans. Inf. Syst., 2012
IEICE Trans. Inf. Syst., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012
2011
Comput. J., 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
2010
Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol.
Inf. Sci., 2010
Int. J. Model. Identif. Control., 2010
Comput. Electr. Eng., 2010
Proceedings of the 13th IEEE International Conference on Computational Science and Engineering, 2010
2009
IEEE Trans. Image Process., 2009
Signal Process., 2009
Editorial.
J. Softw., 2009
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009
Proceedings of the International Conference on Image Processing, 2009
2007
Proceedings of the Advances in Multimedia Information Processing, 2007
An Unified Framework Based on p-Norm for Feature Aggregation in Content-Based Image Retrieval.
Proceedings of the Ninth IEEE International Symposium on Multimedia, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007