Wanlei Zhou
Orcid: 0000-0002-1680-2521Affiliations:
- City University of Macau, Institute of Data Science, Macau
- University of Technology Sydney, School of Computer Science, NSW, Australia
- Deakin University, Melbourne Burwood Campus, VIC, Australia (1994 - 2018)
- National University of Singapore, Singapore (1992 - 1994)
- Australian National University, Canberra, Australia (PhD 1991)
According to our database1,
Wanlei Zhou
authored at least 466 papers
between 1990 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Inf., September, 2024
IEEE Internet Things J., June, 2024
IEEE Internet Things J., May, 2024
IEEE Internet Things J., May, 2024
IEEE Internet Things J., April, 2024
Blockchain-Empowered Multiagent Systems: Advancing IoT Security and Transaction Efficiency.
IEEE Internet Things J., April, 2024
ACM Comput. Surv., February, 2024
Comput. Secur., February, 2024
Artif. Intell. Rev., February, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Boosting the Transferability of Adversarial Attacks With Frequency-Aware Perturbation.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Knowl. Based Syst., 2024
Knowl. Based Syst., 2024
Knowl. Based Syst., 2024
Defending against gradient inversion attacks in federated learning via statistical machine unlearning.
Knowl. Based Syst., 2024
Inf. Sci., 2024
Neurocomputing, 2024
Comput. Stand. Interfaces, 2024
When deep learning meets watermarking: A survey of application, attacks and defenses.
Comput. Stand. Interfaces, 2024
CoRR, 2024
CoRR, 2024
Update Selective Parameters: Federated Machine Unlearning Based on Model Explanation.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Linkage on Security, Privacy and Fairness in Federated Learning: New Balances and New Perspectives.
CoRR, 2024
Knowledge Distillation in Federated Learning: a Survey on Long Lasting Challenges and New Solutions.
CoRR, 2024
CoRR, 2024
Federated Learning with Blockchain-Enhanced Machine Unlearning: A Trustworthy Approach.
CoRR, 2024
CoRR, 2024
How Does a Deep Learning Model Architecture Impact Its Privacy? A Comprehensive Study of Privacy Attacks on CNNs and Transformers.
Proceedings of the 33rd USENIX Security Symposium, 2024
When Fairness Meets Privacy: Exploring Privacy Threats in Fair Binary Classifiers via Membership Inference Attacks.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
2023
Knowl. Based Syst., December, 2023
IEEE Trans. Knowl. Data Eng., November, 2023
IEEE Trans. Neural Networks Learn. Syst., October, 2023
Knowl. Based Syst., October, 2023
Balancing Learning Model Privacy, Fairness, and Accuracy With Early Stopping Criteria.
IEEE Trans. Neural Networks Learn. Syst., September, 2023
Time-Driven and Privacy-Preserving Navigation Model for Vehicle-to-Vehicle Communication Systems.
IEEE Trans. Veh. Technol., July, 2023
IEEE Trans. Knowl. Data Eng., June, 2023
Evolution of cooperation in malicious social networks with differential privacy mechanisms.
Neural Comput. Appl., June, 2023
IEEE Internet Things J., May, 2023
IEEE Trans. Syst. Man Cybern. Syst., April, 2023
A Robust Game-Theoretical Federated Learning Framework With Joint Differential Privacy.
IEEE Trans. Knowl. Data Eng., April, 2023
IEEE Trans. Knowl. Data Eng., April, 2023
IEEE Trans. Knowl. Data Eng., April, 2023
Neurocomputing, March, 2023
IEEE Trans. Inf. Forensics Secur., 2023
FedRecovery: Differentially Private Machine Unlearning for Federated Learning Frameworks.
IEEE Trans. Inf. Forensics Secur., 2023
A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems.
IEEE Trans. Inf. Forensics Secur., 2023
Label-Only Membership Inference Attacks and Defenses in Semantic Segmentation Models.
IEEE Trans. Dependable Secur. Comput., 2023
Making DeepFakes More Spurious: Evading Deep Face Forgery Detection via Trace Removal Attack.
IEEE Trans. Dependable Secur. Comput., 2023
CIFair: Constructing continuous domains of invariant features for image fair classifications.
Knowl. Based Syst., 2023
Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity.
ACM Comput. Surv., 2023
ACM Comput. Surv., 2023
CoRR, 2023
Low-frequency Image Deep Steganography: Manipulate the Frequency Distribution to Hide Secrets with Tenacious Robustness.
CoRR, 2023
High-frequency Matters: An Overwriting Attack and defense for Image-processing Neural Network Watermarking.
CoRR, 2023
Artif. Intell. Rev., 2023
Robust Audio Anti-Spoofing with Fusion-Reconstruction Learning on Multi-Order Spectrograms.
Proceedings of the 24th Annual Conference of the International Speech Communication Association, 2023
Towards Robust Gan-Generated Image Detection: A Multi-View Completion Representation.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Protect Trajectory Privacy in Food Delivery with Differential Privacy and Multi-agent Reinforcement Learning.
Proceedings of the Advanced Information Networking and Applications, 2023
2022
Desynchronization-attack-resilient audio watermarking mechanism for stereo signals using the linear correlation between channels.
World Wide Web, 2022
World Wide Web, 2022
Maximizing User Service Satisfaction for Delay-Sensitive IoT Applications in Edge Computing.
IEEE Trans. Parallel Distributed Syst., 2022
ACM Trans. Sens. Networks, 2022
Near Optimal Learning-Driven Mechanisms for Stable NFV Markets in Multitier Cloud Networks.
IEEE/ACM Trans. Netw., 2022
Request Reliability Augmentation With Service Function Chain Requirements in Mobile Edge Computing.
IEEE Trans. Mob. Comput., 2022
More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence.
IEEE Trans. Knowl. Data Eng., 2022
IEEE Trans. Knowl. Data Eng., 2022
IEEE Trans. Knowl. Data Eng., 2022
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Ind. Informatics, 2022
One Parameter Defense - Defending Against Data Inference Attacks via Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Cybern., 2022
Energy-Aware Collaborative Service Caching in a 5G-Enabled MEC With Uncertain Payoffs.
IEEE Trans. Commun., 2022
Neural Comput. Appl., 2022
Data forwarding: A new VoteRank and Assortativity based approach to improve propagation time in social networks.
J. High Speed Networks, 2022
Multi-agent reinforcement learning via knowledge transfer with differentially private noise.
Int. J. Intell. Syst., 2022
ACM Comput. Surv., 2022
Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It.
CoRR, 2022
CoRR, 2022
Concurr. Comput. Pract. Exp., 2022
From distributed machine learning to federated learning: In the view of data privacy and security.
Concurr. Comput. Pract. Exp., 2022
Concurr. Comput. Pract. Exp., 2022
Comput. Secur., 2022
Artif. Intell. Rev., 2022
Privacy-Preserving in Double Deep-Q-Network with Differential Privacy in Continuous Spaces.
Proceedings of the AI 2021: Advances in Artificial Intelligence, 2022
2021
IEEE Trans. Syst. Man Cybern. Syst., 2021
Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks.
IEEE Trans. Netw. Sci. Eng., 2021
IEEE Trans. Knowl. Data Eng., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Authenticated Medical Documents Releasing with Privacy Protection and Release Control.
IEEE Trans. Dependable Secur. Comput., 2021
Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control.
IEEE Trans. Computers, 2021
IEEE ACM Trans. Audio Speech Lang. Process., 2021
Desynchronization Attacks Resilient Watermarking Method Based on Frequency Singular Value Coefficient Modification.
IEEE ACM Trans. Audio Speech Lang. Process., 2021
Near Optimal and Dynamic Mechanisms Towards a Stable NFV Market in Multi-Tier Cloud Networks.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
2020
IEEE Trans. Veh. Technol., 2020
GAN-Driven Personalized Spatial-Temporal Private Data Sharing in Cyber-Physical Social Systems.
IEEE Trans. Netw. Sci. Eng., 2020
A Semantic Web-Based Recommendation Framework of Educational Resources in E-Learning.
Technol. Knowl. Learn., 2020
IEEE Trans. Ind. Informatics, 2020
Familial Clustering for Weakly-Labeled Android Malware Using Hybrid Representation Learning.
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Cybern., 2020
Prediction optimization of diffusion paths in social networks using integration of ant colony and densest subgraph algorithms.
J. High Speed Networks, 2020
Network sparse representation: Decomposition, dimensionality-reduction and reconstruction.
Inf. Sci., 2020
A study of data pre-processing techniques for imbalanced biomedical data classification.
Int. J. Bioinform. Res. Appl., 2020
Future Gener. Comput. Syst., 2020
Future Gener. Comput. Syst., 2020
Digit. Commun. Networks, 2020
CoRR, 2020
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020
Service Provisioning for IoT Applications with Multiple Sources in Mobile Edge Computing.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
2019
Advances in Information Security 73, Springer, ISBN: 978-3-030-02178-8, 2019
STC: Exposing Hidden Compromised Devices in Networked Sustainable Green Smart Computing Platforms by Partial Observation.
IEEE Trans. Sustain. Comput., 2019
Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach.
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Internet Things J., 2019
Int. J. High Perform. Comput. Netw., 2019
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade.
ACM Comput. Surv., 2019
Concurr. Comput. Pract. Exp., 2019
Concurr. Comput. Pract. Exp., 2019
Proceedings of the 20th International Conference on Parallel and Distributed Computing, 2019
MFE-HAR: multiscale feature engineering for human activity recognition using wearable sensors.
Proceedings of the MobiQuitous 2019, 2019
GAN-DP: Generative Adversarial Net Driven Differentially Privacy-Preserving Big Data Publishing.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019
2018
Privacy of Things: Emerging Challenges and Opportunities in Wireless Internet of Things.
IEEE Wirel. Commun., 2018
IEEE Trans. Dependable Secur. Comput., 2018
IEEE Trans. Dependable Secur. Comput., 2018
IEEE Trans. Comput. Soc. Syst., 2018
Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networks.
J. Comput. Sci., 2018
Future Gener. Comput. Syst., 2018
Comput. Syst. Sci. Eng., 2018
Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks.
CoRR, 2018
Comput. Secur., 2018
Density-Based Location Preservation for Mobile Crowdsensing With Differential Privacy.
IEEE Access, 2018
IEEE Access, 2018
Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing Architecture.
IEEE Access, 2018
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the 2018 IEEE SmartWorld, 2018
Integrating Ant Colony Algorithm and Node Centrality to Improve Prediction of Information Diffusion in Social Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018
SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control.
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases.
Proceedings of the Computer Security, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
Advances in Information Security 69, Springer, ISBN: 978-3-319-62002-2, 2017
Invisible Hand: A Privacy Preserving Mobile Crowd Sensing Framework Based on Economic Models.
IEEE Trans. Veh. Technol., 2017
IEEE Trans. Knowl. Data Eng., 2017
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Fuzzy Syst., 2017
J. Netw. Comput. Appl., 2017
IEEE Internet Things J., 2017
Concurr. Comput. Pract. Exp., 2017
Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies.
IEEE Commun. Surv. Tutorials, 2017
My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
On-Street Car Parking Prediction in Smart City: A Multi-source Data Analysis in Sensor-Cloud Environment.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017
Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
Proceedings of the Australasian Computer Science Week Multiconference, 2017
2016
Silence is Golden: Enhancing Privacy of Location-Based Services by Content Broadcasting and Active Caching in Wireless Vehicular Networks.
IEEE Trans. Veh. Technol., 2016
PPM-HDA: Privacy-Preserving and Multifunctional Health Data Aggregation With Fault Tolerance.
IEEE Trans. Inf. Forensics Secur., 2016
On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Computers, 2016
Int. J. Parallel Emergent Distributed Syst., 2016
Knowl. Inf. Syst., 2016
Discovery of stop regions for understanding repeat travel behaviors of moving objects.
J. Comput. Syst. Sci., 2016
Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing.
Entropy, 2016
K-Source: Multiple source selection for traffic offloading in mobile social networks.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016
Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing.
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016
Analysis of the Spreading Influence Variations for Online Social Users under Attacks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Studying the Global Spreading Influence and Local Connections of Users in Online Social Networks.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
2015
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-18108-0, 2015
World Wide Web, 2015
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Dependable Secur. Comput., 2015
IEEE Trans. Circuits Syst. Video Technol., 2015
IEEE Trans. Comput. Soc. Syst., 2015
A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks.
IEEE Trans. Computers, 2015
IEEE Trans. Computers, 2015
Secur. Commun. Networks, 2015
Special issue on recent advances in network and information security - security and communication networks journal.
Secur. Commun. Networks, 2015
Concurr. Comput. Pract. Exp., 2015
Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy.
Comput. Commun., 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
The Relation Between Local and Global Influence of Individuals in Scale-Free Networks.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015
2014
Web Intell. Agent Syst., 2014
To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks.
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Inf. Forensics Secur., 2014
IEEE Trans. Dependable Secur. Comput., 2014
IEEE Trans. Dependable Secur. Comput., 2014
IEEE ACM Trans. Audio Speech Lang. Process., 2014
Soc. Netw. Anal. Min., 2014
Soc. Netw. Anal. Min., 2014
Peer-to-Peer Netw. Appl., 2014
Are the popular users always important for information dissemination in online social networks?
IEEE Netw., 2014
An effective privacy preserving algorithm for neighborhood-based collaborative filtering.
Future Gener. Comput. Syst., 2014
Future Gener. Comput. Syst., 2014
IEEE Commun. Surv. Tutorials, 2014
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014
On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification.
Proceedings of the Network and System Security - 8th International Conference, 2014
2013
IEEE Trans. Parallel Distributed Syst., 2013
IEEE Trans. Parallel Distributed Syst., 2013
IEEE Trans. Netw. Serv. Manag., 2013
IEEE Trans. Mob. Comput., 2013
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Trans. Cybern., 2013
Malwise - An Effective and Efficient Classification System for Packed and Polymorphic Malware.
IEEE Trans. Computers, 2013
Soc. Netw. Anal. Min., 2013
Unsupervised traffic classification using flow statistical properties and IP packet payload.
J. Comput. Syst. Sci., 2013
A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems.
Ad Hoc Networks, 2013
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Ninth International Conference on Semantics, Knowledge and Grids, 2013
Proceedings of the 2013 IEEE International Conference on RFID-Technologies and Applications, 2013
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013
2012
IEEE Trans. Parallel Distributed Syst., 2012
IEEE Trans. Inf. Forensics Secur., 2012
IEEE Trans. Speech Audio Process., 2012
J. Netw. Comput. Appl., 2012
Generating regular expression signatures for network traffic classification in trusted network management.
J. Netw. Comput. Appl., 2012
M-Dimension: Multi-characteristics based routing protocol in human associated delay-tolerant networks with improved performance over one dimensional classic models.
J. Netw. Comput. Appl., 2012
Int. J. Secur. Networks, 2012
IEEE Commun. Lett., 2012
Concurr. Comput. Pract. Exp., 2012
Comput. Networks, 2012
Comput. J., 2012
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference Workshops, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
AMDD: Exploring Entropy Based Anonymous Multi-dimensional Data Detection for Network Optimization in Human Associated DTNs.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the PRICAI 2012: Trends in Artificial Intelligence, 2012
A secure search protocol based on Quadratic Residues for EPC Class-1 Gen-2 UHF RFID tags.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Proceedings of the International Conference on Computing, Networking and Communications, 2012
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012
2011
IEEE Trans. Parallel Distributed Syst., 2011
Effective Pseudonoise Sequence and Decoding Function for Imperceptibility and Robustness Enhancement in Time-Spread Echo-Based Audio Watermarking.
IEEE Trans. Multim., 2011
IEEE Trans. Inf. Forensics Secur., 2011
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks.
J. Netw. Comput. Appl., 2011
A mobile agent-based routing algorithm and some theoretical analysis.
Comput. Syst. Sci. Eng., 2011
Concurr. Comput. Pract. Exp., 2011
Comput. Commun., 2011
Comput. J., 2011
Proceedings of the Australasian Telecommunication Networks and Applications Conference, 2011
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011
2010
Using the k-core decomposition to analyze the static structure of large-scale software systems.
J. Supercomput., 2010
J. Inf. Sci. Eng., 2010
Integr. Comput. Aided Eng., 2010
Concurr. Comput. Pract. Exp., 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the Algorithms and Architectures for Parallel Processing, 2010
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
OST: A Transaction Based Online Social Trust Model for Social Network and File Sharing Security.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
2009
Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks.
IEEE Trans. Parallel Distributed Syst., 2009
An innovative analyser for multi-classifier e-mail classification based on grey list analysis.
J. Netw. Comput. Appl., 2009
A Mobile Learning Model for Universities -Re-blending the Current Learning Environment.
Int. J. Interact. Mob. Technol., 2009
Int. J. Interact. Mob. Technol., 2009
Int. J. High Perform. Comput. Netw., 2009
Effective metric for detecting distributed denial-of-service attacks based on information divergence.
IET Commun., 2009
IEEE Commun. Lett., 2009
A parallel information retrieval method for e-commerce.
Comput. Syst. Sci. Eng., 2009
Adjacency cache: an efficient P2P web cache indexing and lookup system.
Comput. Syst. Sci. Eng., 2009
Concurr. Comput. Pract. Exp., 2009
Concurr. Comput. Pract. Exp., 2009
Concurr. Comput. Pract. Exp., 2009
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of the NPC 2009, 2009
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009
A Resource Allocation Method for Computational Grids Based on On-line Reverse Auction.
Proceedings of the Fourth ChinaGrid Annual Conference, ChinaGrid 2009, Yantai, Shandong, 2009
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009
2008
IEEE Commun. Lett., 2008
Special Issue: Network Attacks and Defense Systems.
Comput. Syst. Sci. Eng., 2008
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008
Multi-Core Defense System (MSDS) for Protecting Computer Infrastructure against DDoS Attacks.
Proceedings of the Ninth International Conference on Parallel and Distributed Computing, 2008
Multi-classifier Classification of Spam Email on a Ubiquitous Multi-core Architecture.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008
Proceedings of the Algorithms and Architectures for Parallel Processing, 2008
Proceedings of the Algorithms and Architectures for Parallel Processing, 2008
Reducing Cache Lookup and Publish Overhead through Locality Awareness in P2P Web Caching.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008
2007
Proceedings of the Encyclopedia of Information Ethics and Security, 2007
An effective non-parametric method for globally clustering genes from expression profiles.
Medical Biol. Eng. Comput., 2007
Int. J. Pervasive Comput. Commun., 2007
An Enhanced Parallel Downloading Algorithm for BT.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2007
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2007
Proceedings of the Knowledge Science, 2007
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
2006
Protecting web applications from DDoS attacks by an active distributed defense system.
Int. J. Web Inf. Syst., 2006
Int. J. Web Based Communities, 2006
Int. J. High Perform. Comput. Netw., 2006
Int. J. Comput. Sci. Eng., 2006
BMC Bioinform., 2006
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006
2005
An IT Bachelor Degree Using Modern Technologies to Illustrate Core Concepts and Principles and Building Generic Skills.
Educ. Inf. Technol., 2005
Proceedings of the Soft Computing as Transdisciplinary Science and Technology, 2005
A Reactive Framework for Supporting Knowledge Management.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2005
Technologies and Considerations for Developing Internet and Multiplayer Computer Games: A Tutorial.
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
The Multifaceted and Ever-Changing Directions of Information Security - Australia Get Ready!
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Proceedings of the 5th IEEE International Conference on Advanced Learning Technologies, 2005
Proceedings of the Distributed and Parallel Computing, 2005
Proceedings of the Distributed and Parallel Computing, 2005
Proceedings of the Distributed and Parallel Computing, 2005
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
Understanding Transition towards Information Security Culture Change.
Proceedings of the 3rd Australian Information Security Management Conference, 2005
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005
Distributed network systems - from concepts to implementations.
Network theory and applications 15, Springer, ISBN: 978-0-387-23839-5, 2005
2004
J. Supercomput., 2004
J. Syst. Softw., 2004
Optimal Multicast Tree Routing for Cluster Computing in Hypercube Interconnection Networks.
IEICE Trans. Inf. Syst., 2004
Future Gener. Comput. Syst., 2004
Future Gener. Comput. Syst., 2004
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004
Proceedings of the Parallel and Distributed Processing and Applications, 2004
Combating DDoS Attacks in Web-based Services.
Proceedings of the iiWAS'2004, 2004
Load Balance Algorithms for Anycast.
Proceedings of the iiWAS'2004, 2004
An Active Distributed Defense System to Protect Web Applications from DDOS Attacks.
Proceedings of the iiWAS'2004, 2004
A Self-Learning System for Identifying Harmful Network Information.
Proceedings of the iiWAS'2004, 2004
Proceedings of the Advances in Web-Based Learning, 2004
Improving the Performance of Equalization and a Fast Start-Up Technique for Communication Systems.
Proceedings of the ICETE 2004, 2004
Toward Pervasive Computing in Restaurant.
Proceedings of the ICETE 2004, 2004
A Fast and Robust Method Applied in Telecommunication Systems.
Proceedings of the International Conference on Artificial Intelligence, 2004
Proceedings of the Grid and Cooperative Computing, 2004
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004
2003
J. Comput. Sci. Technol., 2003
Decision Analysis of Statistically Detecting Distributed Denial-of-Service Flooding Attacks.
Int. J. Inf. Technol. Decis. Mak., 2003
Int. J. Comput. Process. Orient. Lang., 2003
Fault-Tolerant Servers for Anycast Communication.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003
Proceedings of the Advances in Web-Based Learning, 2003
Proceedings of the Advances in Web-Based Learning, 2003
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003
Proceedings of the Computer Science 2003, 2003
2002
A token-based independent update protocol for managing replicated objects.
Comput. Syst. Sci. Eng., 2002
Optimal Multicast Tree Routing for Cluster Computing in Hypercube Interconnection Networks.
Proceedings of the International Symposium on Parallel Architectures, 2002
Proceedings of the Distributed Communities on the Web, 4th International Workshop, 2002
2001
The design and implementation of an active replication scheme for distributing services in a cluster of workstations.
J. Syst. Softw., 2001
Proceedings of the Engineering of Intelligent Systems, 2001
Proceedings of the First IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2001), 2001
2000
An architecture for resolving networking partitioning.
Proceedings of the ISCA 15th International Conference Computers and Their Applications, 2000
1999
Parallel Distributed Comput. Pract., 1999
Detecting and tolerating failures in a loosely integrated heterogeneous database system.
Comput. Commun., 1999
Proceedings of the TOOLS 1999: 31st International Conference on Technology of Object-Oriented Languages and Systems, 1999
Proceedings of the 1999 International Symposium on Parallel Architectures, 1999
The Design and Application of Sensors Implemented in Java.
Proceedings of the 17th IASTED International Conference on Applied Informatics, 1999
1998
Proceedings of the TOOLS 1998: 27th International Conference on Technology of Object-Oriented Languages and Systems, 1998
1997
Comput. Commun., 1997
Proceedings of the TOOLS 1997: 24th International Conference on Technology of Object-Oriented Languages and Systems, 1997
Using Sensors to Detect Failures in a Loosely Integrated Heterogeneous Database System.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1997
1996
Comput. Commun., 1996
Proceedings of the ACM SIGCSE 1st Australasian Conference on Computer Science Education, 1996
1994
J. Syst. Softw., 1994
1993
J. Syst. Softw., 1993
Proceedings of the Fifth IEEE Symposium on Parallel and Distributed Processing, 1993
1991
Proceedings of the Advances in Computing and Information, 1991
1990
ACM SIGSOFT Softw. Eng. Notes, 1990
Proceedings of the Advances in Computing and Information, 1990