Yang Xiang

Orcid: 0000-0001-5252-0831

Affiliations:
  • Swinburne University of Technology, School of Software and Electrical Engineering, Hawthorn, VIC, Australia
  • Deakin University, School of Information Technology, Geelong, VIC, Australia
  • Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China (former)
  • Central Queensland University, School of Management and Information Systems, Rockhampton, Australia (former)
  • Deakin University, Geelong, VIC, Australia (PhD)


According to our database1, Yang Xiang authored at least 491 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Survey of Ethereum Smart Contract Security: Attacks and Detection.
Distributed Ledger Technol. Res. Pract., September, 2024

Privacy Protection for Blockchain-Based Healthcare IoT Systems: A Survey.
IEEE CAA J. Autom. Sinica, August, 2024

Abuse-resistant deniable encryption.
Comput. Stand. Interfaces, January, 2024

Fuzzing Android Native System Libraries via Dynamic Data Dependency Graph.
IEEE Trans. Inf. Forensics Secur., 2024

Rethinking Membership Inference Attacks Against Transfer Learning.
IEEE Trans. Inf. Forensics Secur., 2024

Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection.
IEEE Trans. Dependable Secur. Comput., 2024

Demystifying the Evolution of Android Malware Variants.
IEEE Trans. Dependable Secur. Comput., 2024

Public Proofs of Data Replication and Retrievability With User-Friendly Replication.
IEEE Trans. Dependable Secur. Comput., 2024

LocGuard: A Location Privacy Defender for Image Sharing.
IEEE Trans. Dependable Secur. Comput., 2024

The "Code" of Ethics: A Holistic Audit of AI Code Generators.
IEEE Trans. Dependable Secur. Comput., 2024

Online Social Network User Home Location Inference Based on Heterogeneous Networks.
IEEE Trans. Dependable Secur. Comput., 2024

Memorization in deep learning: A survey.
CoRR, 2024

Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-enabled Critical Infrastructure.
CoRR, 2024

How COVID-19 impacts telehealth: an empirical study of telehealth services, users and the use of metaverse.
Connect. Sci., 2024

EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection.
Proceedings of the 33rd USENIX Security Symposium, 2024

Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

SoK: Rowhammer on Commodity Operating Systems.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
SoK: DAG-based Blockchain Systems.
ACM Comput. Surv., December, 2023

A Survey of PPG's Application in Authentication.
Comput. Secur., December, 2023

A Collaborative Stealthy DDoS Detection Method Based on Reinforcement Learning at the Edge of Internet of Things.
IEEE Internet Things J., October, 2023

Lightweight Authentication Scheme for Data Dissemination in Cloud-Assisted Healthcare IoT.
IEEE Trans. Computers, May, 2023

A Lightweight Matrix Factorization for Recommendation With Local Differential Privacy in Big Data.
IEEE Trans. Big Data, February, 2023

QoS-Aware Diversified Service Selection.
IEEE Trans. Serv. Comput., 2023

Location Privacy Protection via Delocalization in 5G Mobile Edge Computing Environment.
IEEE Trans. Serv. Comput., 2023

SAM: Multi-turn Response Selection Based on Semantic Awareness Matching.
ACM Trans. Internet Techn., 2023

Privacy-Preserving and Verifiable Federated Learning Framework for Edge Computing.
IEEE Trans. Inf. Forensics Secur., 2023

How Does Visualisation Help App Practitioners Analyse Android Apps?
IEEE Trans. Dependable Secur. Comput., 2023

Cyber Information Retrieval Through Pragmatics Understanding and Visualization.
IEEE Trans. Dependable Secur. Comput., 2023

Cyber Code Intelligence for Android Malware Detection.
IEEE Trans. Cybern., 2023

Space-Efficient Storage Structure of Blockchain Transactions Supporting Secure Verification.
IEEE Trans. Cloud Comput., 2023

Enhancing OAuth With Blockchain Technologies for Data Portability.
IEEE Trans. Cloud Comput., 2023

Guest Editorial Special Issue on AI and Blockchain-Powered IoT Sustainable Computing.
IEEE Internet Things J., 2023

Scalable and Revocable Attribute-Based Data Sharing With Short Revocation List for IIoT.
IEEE Internet Things J., 2023

Detecting Vulnerability on IoT Device Firmware: A Survey.
IEEE CAA J. Autom. Sinica, 2023

Transparent Registration-Based Encryption through Blockchain.
Distributed Ledger Technol. Res. Pract., 2023

Formal Security Analysis on dBFT Protocol of NEO.
Distributed Ledger Technol. Res. Pract., 2023

Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques.
ACM Comput. Surv., 2023

A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network.
Comput. Stand. Interfaces, 2023

Client-side Gradient Inversion Against Federated Learning from Poisoning.
CoRR, 2023

SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs.
CoRR, 2023

Dynalogue: A Transformer-Based Dialogue System with Dynamic Attention.
Proceedings of the ACM Web Conference 2023, 2023

SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

SigD: A Cross-Session Dataset for PPG-based User Authentication in Different Demographic Groups.
Proceedings of the International Joint Conference on Neural Networks, 2023

Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
Explainable machine learning in cybersecurity: A survey.
Int. J. Intell. Syst., December, 2022

Fuzzing: A Survey for Roadmap.
ACM Comput. Surv., January, 2022

A Keyword-Grouping Inverted Index Based Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data.
IEEE Trans. Sustain. Comput., 2022

FASE: A Fast and Accurate Privacy-Preserving Multi-Keyword Top-k Retrieval Scheme Over Encrypted Cloud Data.
IEEE Trans. Serv. Comput., 2022

Efficient Verification of Edge Data Integrity in Edge Computing Environment.
IEEE Trans. Serv. Comput., 2022

CSEdge: Enabling Collaborative Edge Storage for Multi-Access Edge Computing Based on Blockchain.
IEEE Trans. Parallel Distributed Syst., 2022

Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity.
ACM Trans. Internet Techn., 2022

On the Neural Backdoor of Federated Generative Models in Edge Computing.
ACM Trans. Internet Techn., 2022

Vulnerability Detection in SIoT Applications: A Fuzzing Method on their Binaries.
IEEE Trans. Netw. Sci. Eng., 2022

Social Media Event Prediction using DNN with Feedback Mechanism.
ACM Trans. Manag. Inf. Syst., 2022

Epidemic Heterogeneity and Hierarchy: A Study of Wireless Hybrid Worm Propagation.
IEEE Trans. Mob. Comput., 2022

CSI-Fuzz: Full-Speed Edge Tracing Using Coverage Sensitive Instrumentation.
IEEE Trans. Dependable Secur. Comput., 2022

Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training.
IEEE Trans. Dependable Secur. Comput., 2022

Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks.
IEEE Trans. Dependable Secur. Comput., 2022

CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation.
IEEE Trans. Dependable Secur. Comput., 2022

Backdoor Attack on Machine Learning Based Android Malware Detectors.
IEEE Trans. Dependable Secur. Comput., 2022

DELIA: Distributed Efficient Log Integrity Audit Based on Hierarchal Multi-Party State Channel.
IEEE Trans. Dependable Secur. Comput., 2022

A Game-Theoretical Approach for Mitigating Edge DDoS Attack.
IEEE Trans. Dependable Secur. Comput., 2022

Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples.
IEEE Trans. Cybern., 2022

Inspecting Edge Data Integrity With Aggregate Signature in Distributed Edge Computing Environment.
IEEE Trans. Cloud Comput., 2022

A Physical-Layer Key Generation Approach Based on Received Signal Strength in Smart Homes.
IEEE Internet Things J., 2022

Blockchain Enables Your Bill Safer.
IEEE Internet Things J., 2022

Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey.
IEEE CAA J. Autom. Sinica, 2022

A Hybrid Incentive Mechanism for Decentralized Federated Learning.
Distributed Ledger Technol. Res. Pract., 2022

Machine Learning-based Cyber Attacks Targeting on Controlled Information: A Survey.
ACM Comput. Surv., 2022

Event detection in online social network: Methodologies, state-of-art, and evolution.
Comput. Sci. Rev., 2022

Efficient public-key authenticated deniable encryption schemes.
Comput. Stand. Interfaces, 2022

An Efficient Split Fine-tuning Framework for Edge and Cloud Collaborative Learning.
CoRR, 2022

Nebula-I: A General Framework for Collaboratively Training Deep Learning Models on Low-Bandwidth Cloud Clusters.
CoRR, 2022

FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation.
CoRR, 2022

SoK: An Overview of PPG's Application in Authentication.
CoRR, 2022

Evaluating intrusion sensitivity allocation with supervised learning in collaborative intrusion detection.
Concurr. Comput. Pract. Exp., 2022

Domain adaptation for Windows advanced persistent threat detection.
Comput. Secur., 2022

Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation.
Comput. Secur., 2022

A Comparative Study on the Security of Cryptocurrency Wallets in Android System.
Proceedings of the IEEE International Conference on Trust, 2022

Cross-language Android permission specification.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset.
Proceedings of the Network and System Security - 16th International Conference, 2022

Databox-based Delivery Service via Blockchain.
Proceedings of the IEEE International Conference on Web Services, 2022

No-Label User-Level Membership Inference for ASR Model Auditing.
Proceedings of the Computer Security - ESORICS 2022, 2022

Video is All You Need: Attacking PPG-based Biometric Authentication.
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022

DeDa: A DeFi-enabled Data Sharing and Trading System.
Proceedings of the BSCI 2022: Proceedings of the 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2022

Exploring Unfairness on Proof of Authority: Order Manipulation Attacks and Remedies.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Secure Outsourced Principal Eigentensor Computation for Cyber-Physical-Social Systems.
IEEE Trans. Sustain. Comput., 2021

OSPN: Optimal Service Provisioning with Negotiation for Bag-of-Tasks Applications.
IEEE Trans. Serv. Comput., 2021

Auditing Cache Data Integrity in the Edge Computing Environment.
IEEE Trans. Parallel Distributed Syst., 2021

Anonymous Blockchain-based System for Consortium.
ACM Trans. Manag. Inf. Syst., 2021

A Truthful and Near-Optimal Mechanism for Colocation Emergency Demand Response.
IEEE Trans. Mob. Comput., 2021

Publicly Verifiable Databases With All Efficient Updating Operations.
IEEE Trans. Knowl. Data Eng., 2021

BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability.
IEEE Trans. Inf. Forensics Secur., 2021

Cooperative Assurance of Cache Data Integrity for Mobile Edge Computing.
IEEE Trans. Inf. Forensics Secur., 2021

Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost.
IEEE Trans. Inf. Forensics Secur., 2021

Synthesized Corpora to Evaluate Fuzzing for Green Internet of Things Programs.
IEEE Trans. Green Commun. Netw., 2021

ASBKS: Towards Attribute Set Based Keyword Search Over Encrypted Personal Health Records.
IEEE Trans. Dependable Secur. Comput., 2021

Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models.
IEEE Trans. Dependable Secur. Comput., 2021

Authenticated Medical Documents Releasing with Privacy Protection and Release Control.
IEEE Trans. Dependable Secur. Comput., 2021

Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases.
IEEE Trans. Dependable Secur. Comput., 2021

Sustainable Ensemble Learning Driving Intrusion Detection Model.
IEEE Trans. Dependable Secur. Comput., 2021

Looking Back! Using Early Versions of Android Apps as Attack Vectors.
IEEE Trans. Dependable Secur. Comput., 2021

Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control.
IEEE Trans. Computers, 2021

Zweilous: A Decoupled and Flexible Memory Management Framework.
IEEE Trans. Computers, 2021

The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services.
Proc. Priv. Enhancing Technol., 2021

Vortex-shock and vortex-vortex interactions in the compressible starting jet from two beveled nozzle configurations.
J. Vis., 2021

Privacy-preserving and verifiable online crowdsourcing with worker updates.
Inf. Sci., 2021

Challenge-based collaborative intrusion detection in software-defined networking: an evaluation.
Digit. Commun. Networks, 2021

A Survey of Android Malware Detection with Deep Neural Models.
ACM Comput. Surv., 2021

NatiDroid: Cross-Language Android Permission Specification.
CoRR, 2021

Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network: A Survey.
CoRR, 2021

AC2M: An Automated Consent Management Model for Blockchain Financial Services Platform.
Proceedings of the IEEE International Conference on Smart Data Services, 2021

An Offline Delegatable Cryptocurrency System.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

My Security: An interactive search engine for cybersecurity.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

TAESim: A Testbed for IoT Security Analysis of Trigger-Action Environment.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

IB2P: An image-based privacy-preserving blockchain model for financial services.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

Evaluating Upgradable Smart Contract.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

A Blockchain-Enabled Federated Learning Model for Privacy Preservation: System Design.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing.
IEEE Trans. Sustain. Comput., 2020

EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data.
IEEE Trans. Serv. Comput., 2020

NewMCOS: Towards a Practical Multi-Cloud Oblivious Storage Scheme.
IEEE Trans. Knowl. Data Eng., 2020

DeepPAR and DeepDPA: Privacy Preserving and Asynchronous Deep Learning for Industrial IoT.
IEEE Trans. Ind. Informatics, 2020

Cyber Vulnerability Intelligence for Internet of Things Binary.
IEEE Trans. Ind. Informatics, 2020

Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection.
IEEE Trans. Inf. Forensics Secur., 2020

DeepBalance: Deep-Learning and Fuzzy Oversampling for Vulnerability Detection.
IEEE Trans. Fuzzy Syst., 2020

Authenticated Data Redaction with Fine-Grained Control.
IEEE Trans. Emerg. Top. Comput., 2020

Privacy Protection in Interactive Content Based Image Retrieval.
IEEE Trans. Dependable Secur. Comput., 2020

Data-Driven Cyber Security in Perspective - Intelligent Traffic Analysis.
IEEE Trans. Cybern., 2020

Software Vulnerability Detection Using Deep Neural Networks: A Survey.
Proc. IEEE, 2020

RCBAC: A risk-aware content-based access control model for large-scale text data.
J. Netw. Comput. Appl., 2020

Toward supervised shape-based behavioral authentication on smartphones.
J. Inf. Secur. Appl., 2020

Code analysis for intelligent cyber systems: A data-driven approach.
Inf. Sci., 2020

A Hybrid Key Agreement Scheme for Smart Homes Using the Merkle Puzzle.
IEEE Internet Things J., 2020

CaIAuth: Context-Aware Implicit Authentication When the Screen Is Awake.
IEEE Internet Things J., 2020

A study of data pre-processing techniques for imbalanced biomedical data classification.
Int. J. Bioinform. Res. Appl., 2020

Moving centroid based routing protocol for incompletely predictable cyber devices in Cyber-Physical-Social Distributed Systems.
Future Gener. Comput. Syst., 2020

Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities.
Future Gener. Comput. Syst., 2020

Smart VM co-scheduling with the precise prediction of performance characteristics.
Future Gener. Comput. Syst., 2020

Attacks and defences on intelligent connected vehicles: a survey.
Digit. Commun. Networks, 2020

SoK: Diving into DAG-based Blockchain Systems.
CoRR, 2020

DeFuzz: Deep Learning Guided Directed Fuzzing.
CoRR, 2020

SIAT: A Systematic Inter-Component Communication Analysis Technology for Detecting Threats on Android.
CoRR, 2020

Secure and efficient sharing of authenticated energy usage data with privacy preservation.
Comput. Secur., 2020

BHDA - A Blockchain-Based Hierarchical Data Access Model for Financial Services.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Unmasking Windows Advanced Persistent Threat Execution.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence.
Proceedings of the Network and System Security - 14th International Conference, 2020

ACCTP: Cross Chain Transaction Platform for High-Value Assets.
Proceedings of the Blockchain - ICBC 2020, 2020

BBM: A Blockchain-Based Model for Open Banking via Self-sovereign Identity.
Proceedings of the Blockchain - ICBC 2020, 2020

Security Analysis on dBFT Protocol of NEO.
Proceedings of the Financial Cryptography and Data Security, 2020

What risk? I don't understand. An Empirical Study on Users' Understanding of the Terms Used in Security Texts.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

PPM: A Provenance-Provided Data Sharing Model for Open Banking via Blockchain.
Proceedings of the Australasian Computer Science Week, 2020

Security Analysis on Tangle-Based Blockchain Through Simulation.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
Malicious Attack Propagation and Source Identification
Advances in Information Security 73, Springer, ISBN: 978-3-030-02178-8, 2019

CATE: Cloud-Aided Trustworthiness Evaluation Scheme for Incompletely Predictable Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2019

STC: Exposing Hidden Compromised Devices in Networked Sustainable Green Smart Computing Platforms by Partial Observation.
IEEE Trans. Sustain. Comput., 2019

CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing.
IEEE Trans. Parallel Distributed Syst., 2019

Special Issue on Intelligent Edge Computing for Cyber Physical and Cloud Systems.
ACM Trans. Intell. Syst. Technol., 2019

SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks.
IEEE Trans. Dependable Secur. Comput., 2019

Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2019

Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps.
ACM Trans. Cyber Phys. Syst., 2019

Noise-Resistant Statistical Traffic Classification.
IEEE Trans. Big Data, 2019

Leveraging deep learning to understand health beliefs about the Human Papillomavirus Vaccine from social media.
npj Digit. Medicine, 2019

Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing.
J. Parallel Distributed Comput., 2019

Design of multi-view based email classification for IoT systems via semi-supervised learning.
J. Netw. Comput. Appl., 2019

On exploiting priority relation graph for reliable multi-path communication in mobile social networks.
Inf. Sci., 2019

Data security against receiver corruptions: SOA security for receivers from simulatable DEMs.
Inf. Sci., 2019

Special Issue on Security and Privacy in Machine Learning.
Inf. Sci., 2019

A Key Agreement Scheme for Smart Homes Using the Secret Mismatch Problem.
IEEE Internet Things J., 2019

E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT.
IEEE Internet Things J., 2019

Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges.
IEEE Internet Things J., 2019

IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT.
Future Gener. Comput. Syst., 2019

Multidimensional privacy preservation in location-based services.
Future Gener. Comput. Syst., 2019

Protecting VNF services with smart online behavior anomaly detection method.
Future Gener. Comput. Syst., 2019

An efficient anonymous remote attestation scheme for trusted computing based on improved CPK.
Electron. Commer. Res., 2019

An Overview of Attacks and Defences on Intelligent Connected Vehicles.
CoRR, 2019

The Audio Auditor: Participant-Level Membership Inference in Voice-Based IoT.
CoRR, 2019

Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples.
CoRR, 2019

Foreword to the special issue on security, privacy, and social networks.
Concurr. Comput. Pract. Exp., 2019

Data-Driven Cybersecurity Incident Prediction: A Survey.
IEEE Commun. Surv. Tutorials, 2019

Attribute-Based Information Flow Control.
Comput. J., 2019

A3CM: Automatic Capability Annotation for Android Malware.
IEEE Access, 2019

Predicting the Impact of Android Malicious Samples via Machine Learning.
IEEE Access, 2019

Insider Threat Identification Using the Simultaneous Neural Learning of Multi-Source Logs.
IEEE Access, 2019

An Adaptive Physical Layer Key Extraction Scheme for Smart Homes.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Unsupervised Insider Detection Through Neural Feature Learning and Model Optimisation.
Proceedings of the Network and System Security - 13th International Conference, 2019

Data-Driven Android Malware Intelligence: A Survey.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

A Visualization-Based Analysis on Classifying Android Malware.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

A Truthful FPTAS Mechanism for Emergency Demand Response in Colocation Data Centers.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Deep Learning-Based Vulnerable Function Detection: A Benchmark.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Dynamic Clustering of Stream Short Documents Using Evolutionary Word Relation Network.
Proceedings of the Data Science - 6th International Conference, 2019

An Adaptive Secret Key Establishment Scheme in Smart Home Environments.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

RBAC-GL: A Role-Based Access Control Gasless Architecture of Consortium Blockchain.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Main Enabling Technologies in Industry 4.0 and Cybersecurity Threats.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz Testing.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

An Efficient Supply Chain Architecture Based on Blockchain for High-value Commodities.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

EduCoin: a Secure and Efficient Payment Solution for MOOC Environment.
Proceedings of the IEEE International Conference on Blockchain, 2019

Data Authentication with Privacy Protection.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2018
Robust Reputation-Based Cooperative Spectrum Sensing via Imperfect Common Control Channel.
IEEE Trans. Veh. Technol., 2018

Blind Filtering at Third Parties: An Efficient Privacy-Preserving Framework for Location-Based Services.
IEEE Trans. Mob. Comput., 2018

Cross-Project Transfer Representation Learning for Vulnerable Function Discovery.
IEEE Trans. Ind. Informatics, 2018

Guest Editor's Introduction to the Special Section on Social Network Security.
IEEE Trans. Dependable Secur. Comput., 2018

Rumor Source Identification in Social Networks with Time-Varying Topology.
IEEE Trans. Dependable Secur. Comput., 2018

Security Measurements of Cyber Networks.
Secur. Commun. Networks, 2018

A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing.
Secur. Commun. Networks, 2018

Big network traffic data visualization.
Multim. Tools Appl., 2018

A fog-based privacy-preserving approach for distributed signature-based intrusion detection.
J. Parallel Distributed Comput., 2018

Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networks.
J. Comput. Sci., 2018

Blockchain-based publicly verifiable data deletion scheme for cloud storage.
J. Netw. Comput. Appl., 2018

<i>TouchWB</i>: Touch behavioral user authentication based on web browsing on smartphones.
J. Netw. Comput. Appl., 2018

Garbled role-based access control in the cloud.
J. Ambient Intell. Humaniz. Comput., 2018

A matrix-based cross-layer key establishment protocol for smart homes.
Inf. Sci., 2018

DedupDUM: Secure and scalable data deduplication with dynamic user management.
Inf. Sci., 2018

Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things.
IEEE Internet Things J., 2018

A survey on security control and attack detection for industrial cyber-physical systems.
Neurocomputing, 2018

An over-the-air key establishment protocol using keyless cryptography.
Future Gener. Comput. Syst., 2018

A variant of password authenticated key exchange protocol.
Future Gener. Comput. Syst., 2018

High-Performance Computing for Big Data Processing.
Future Gener. Comput. Syst., 2018

Privacy-preserving machine learning with multiple data providers.
Future Gener. Comput. Syst., 2018

Efficient cache resource aggregation using adaptive multi-level exclusive caching policies.
Future Gener. Comput. Syst., 2018

An iteration-based differentially private social network data release.
Comput. Syst. Sci. Eng., 2018

Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps.
CoRR, 2018

Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones.
CoRR, 2018

Automated Big Traffic Analytics for Cyber Security.
CoRR, 2018

Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks.
CoRR, 2018

Comprehensive analysis of network traffic data.
Concurr. Comput. Pract. Exp., 2018

Detecting and Preventing Cyber Insider Threats: A Survey.
IEEE Commun. Surv. Tutorials, 2018

Twitter spam detection: Survey of new approaches and comparative study.
Comput. Secur., 2018

JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones.
Comput. Secur., 2018

Secure attribute-based data sharing for resource-limited users in cloud computing.
Comput. Secur., 2018

Density-Based Location Preservation for Mobile Crowdsensing With Differential Privacy.
IEEE Access, 2018

Differential Private POI Queries via Johnson-Lindenstrauss Transform.
IEEE Access, 2018

Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing Architecture.
IEEE Access, 2018

Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT.
Proceedings of the Network and System Security - 12th International Conference, 2018

Anomaly-Based Insider Threat Detection Using Deep Autoencoders.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

Who Spread to Whom? Inferring Online Social Networks with User Features.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases.
Proceedings of the Computer Security, 2018

A Data-driven Attack against Support Vectors of SVM.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Keep Calm and Know Where to Focus: Measuring and Predicting the Impact of Android Malware.
Proceedings of the Advanced Data Mining and Applications - 14th International Conference, 2018

Honeypot Frameworks and their Applications: A New Framework
SpringerBriefs on Cyber Security Systems and Networks, Springer, ISBN: 978-981-10-7738-8, 2018

2017
Network Coding Based Converge-Cast Scheme in Wireless Sensor Networks.
Wirel. Pers. Commun., 2017

TC-Release++: An Efficient Timestamp-Based Coherence Protocol for Many-Core Architectures.
IEEE Trans. Parallel Distributed Syst., 2017

Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2017

The Spatial-Temporal Perspective: The Study of the Propagation of Modern Social Worms.
IEEE Trans. Inf. Forensics Secur., 2017

Statistical Features-Based Real-Time Detection of Drifted Twitter Spam.
IEEE Trans. Inf. Forensics Secur., 2017

Fuzzy-Based Information Decomposition for Incomplete and Imbalanced Data Learning.
IEEE Trans. Fuzzy Syst., 2017

Embedded Device Forensics and Security.
ACM Trans. Embed. Comput. Syst., 2017

Attribute-Based Access Control with Constant-Size Ciphertext in Cloud Computing.
IEEE Trans. Cloud Comput., 2017

Fully Reversible Privacy Region Protection for Cloud Video Surveillance.
IEEE Trans. Cloud Comput., 2017

Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks.
IEEE Trans. Computers, 2017

Erratum to: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment.
Multim. Tools Appl., 2017

A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment.
Multim. Tools Appl., 2017

Joint affinity aware grouping and virtual machine placement.
Microprocess. Microsystems, 2017

Parallel compressive sampling matching pursuit algorithm for compressed sensing signal reconstruction with OpenCL.
J. Syst. Archit., 2017

Precise contention-aware performance prediction on virtualized multicore system.
J. Syst. Archit., 2017

A CPS framework based perturbation constrained buffer planning approach in VLSI design.
J. Parallel Distributed Comput., 2017

Crossed Cube Ring: A k-connected virtual backbone for wireless sensor networks.
J. Netw. Comput. Appl., 2017

Using epidemic betweenness to measure the influence of users in complex networks.
J. Netw. Comput. Appl., 2017

A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks.
J. Netw. Comput. Appl., 2017

Geographic spatiotemporal big data correlation analysis via the Hilbert-Huang transformation.
J. Comput. Syst. Sci., 2017

A general framework for secure sharing of personal health records in cloud system.
J. Comput. Syst. Sci., 2017

Secure independent-update concise-expression access control for video on demand in cloud.
Inf. Sci., 2017

FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance.
IACR Cryptol. ePrint Arch., 2017

Associative retrieval in spatial big data based on spreading activation with semantic ontology.
Future Gener. Comput. Syst., 2017

Attribute-based data access control in mobile cloud computing: Taxonomy and open issues.
Future Gener. Comput. Syst., 2017

Investigating the deceptive information in Twitter spam.
Future Gener. Comput. Syst., 2017

Security and privacy in social networks.
Concurr. Comput. Pract. Exp., 2017

Detecting spamming activities in twitter based on deep-learning technique.
Concurr. Comput. Pract. Exp., 2017

The structure of communities in scale-free networks.
Concurr. Comput. Pract. Exp., 2017

MBSA: a lightweight and flexible storage architecture for virtual machines.
Concurr. Comput. Pract. Exp., 2017

Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies.
IEEE Commun. Surv. Tutorials, 2017

Addressing the class imbalance problem in Twitter spam detection using ensemble learning.
Comput. Secur., 2017

Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems.
IEEE Commun. Mag., 2017

A practical cross-datacenter fault-tolerance algorithm in the cloud storage system.
Clust. Comput., 2017

MIPE: a practical memory integrity protection method in a trusted execution environment.
Clust. Comput., 2017

Statistical Twitter Spam Detection Demystified: Performance, Stability and Scalability.
IEEE Access, 2017

My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Privacy Preserving Collaborative Filtering via the Johnson-Lindenstrauss Transform.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

How Spam Features Change in Twitter and the Impact to Machine Learning Based Detection.
Proceedings of the Information Security Practice and Experience, 2017

A Hierarchical VDB Scheme with Scalable Verification and Tampered Record Localization.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Personalized Privacy Preserving Collaborative Filtering.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

A Cross-Layer Key Establishment Model for Wireless Devices in Cyber-Physical Systems.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

POSTER: Vulnerability Discovery with Function Representation Learning from Unlabeled Projects.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Distributed Detection of Zero-Day Network Traffic Flows.
Proceedings of the Data Mining, 2017

Twitter spam detection based on deep learning.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

Modeling User Preferences on Spatiotemporal Topics for Point-of-Interest Recommendation.
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017

2016
A General Collaborative Framework for Modeling and Perceiving Distributed Network Behavior.
IEEE/ACM Trans. Netw., 2016

Password-Authenticated Group Key Exchange: A Cross-Layer Design.
ACM Trans. Internet Techn., 2016

On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2016

Comments and Corrections.
IEEE Trans. Comput. Soc. Syst., 2016

Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing.
IEEE Trans. Computers, 2016

Two-Factor Data Security Protection Mechanism for Cloud Storage System.
IEEE Trans. Computers, 2016

Privacy preserving in cloud computing environment.
Secur. Commun. Networks, 2016

Detection and classification of anomaly intrusion using hierarchy clustering and SVM.
Secur. Commun. Networks, 2016

Certificate-based encryption resilient to key leakage.
J. Syst. Softw., 2016

SEMD: Secure and efficient message dissemination with policy enforcement in VANET.
J. Comput. Syst. Sci., 2016

Spammers Are Becoming "Smarter" on Twitter.
IT Prof., 2016

Trustworthiness-hypercube-based reliable communication in mobile social networks.
Inf. Sci., 2016

Efficient consolidation-aware VCPU scheduling on multicore virtualization platform.
Future Gener. Comput. Syst., 2016

Security and reliability in big data.
Concurr. Comput. Pract. Exp., 2016

Security and privacy in big data.
Concurr. Comput. Pract. Exp., 2016

Privacy Preserving Scheme for Location and Content Protection in Location-Based Services.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Gatekeeping Behavior Analysis for Information Credibility Assessment on Weibo.
Proceedings of the Network and System Security - 10th International Conference, 2016

Statistical Detection of Online Drifting Twitter Spam: Invited Paper.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

An Ensemble Learning Approach for Addressing the Class Imbalance Problem in Twitter Spam Detection.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Fuzzy-Based Feature and Instance Recovery.
Proceedings of the Intelligent Information and Database Systems - 8th Asian Conference, 2016

Comprehensive Analysis of Network Traffic Data.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Dominating Set and Network Coding-Based Routing in Wireless Mesh Networks.
IEEE Trans. Parallel Distributed Syst., 2015

Robust Network Traffic Classification.
IEEE/ACM Trans. Netw., 2015

K-Center: An Approach on the Multi-Source Identification of Information Diffusion.
IEEE Trans. Inf. Forensics Secur., 2015

A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection.
IEEE Trans. Comput. Soc. Syst., 2015

A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid.
IEEE Trans. Cloud Comput., 2015

ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds.
IEEE Trans. Computers, 2015

A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks.
IEEE Trans. Computers, 2015

Verifiable Auditing for Outsourced Database in Cloud Computing.
IEEE Trans. Computers, 2015

FESTAL: Fault-Tolerant Elastic Scheduling Algorithm for Real-Time Tasks in Virtualized Clouds.
IEEE Trans. Computers, 2015

Secure Distributed Deduplication Systems with Improved Reliability.
IEEE Trans. Computers, 2015

Cost-Effective Authentic and Anonymous Data Sharing with Forward Security.
IEEE Trans. Computers, 2015

A Stochastic Time-Domain Model for Burst Data Aggregation in IEEE 802.15.4 Wireless Sensor Networks.
IEEE Trans. Computers, 2015

A Lightweight Virtualization Solution for Android Devices.
IEEE Trans. Computers, 2015

A privacy-preserving location tracking system for smartphones based on cloud storage.
Secur. Commun. Networks, 2015

Detecting stepping stones by abnormal causality probability.
Secur. Commun. Networks, 2015

Dynamic cloud service selection using an adaptive learning mechanism in multi-cloud computing.
J. Syst. Softw., 2015

A strong provably secure IBE scheme without bilinear map.
J. Comput. Syst. Sci., 2015

Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption.
Inf. Sci., 2015

Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks 2014.
Int. J. Distributed Sens. Networks, 2015

A Framework for Cloud-Based Healthcare Services to Monitor Noncommunicable Diseases Patient.
Int. J. Distributed Sens. Networks, 2015

Cloud Computing: Security, Privacy and Practice.
Future Gener. Comput. Syst., 2015

Target coverage through distributed clustering in directional sensor networks.
EURASIP J. Wirel. Commun. Netw., 2015

Fog Computing: Focusing on Mobile Users at the Edge.
CoRR, 2015

Availability, resilience, and fault tolerance of internet and distributed computing systems.
Concurr. Comput. Pract. Exp., 2015

Frontier technologies of trust computing and network security.
Concurr. Comput. Pract. Exp., 2015

AMC: an adaptive multi-level cache algorithm in hybrid storage systems.
Concurr. Comput. Pract. Exp., 2015

Anonymous Credential-Based Access Control Scheme for Clouds.
IEEE Cloud Comput., 2015

Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Enhanced Twitter Sentiment Analysis by Using Feature Selection and Combination.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

The Relation Between Local and Global Influence of Individuals in Scale-Free Networks.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

A Secure and Efficient Data Sharing Framework with Delegated Capabilities in Hybrid Cloud.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

Unknown pattern extraction for statistical network protocol identification.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

Asymmetric self-learning for tackling Twitter Spam Drift.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

6 million spam tweets: A large ground truth for timely Twitter spam detection.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Internet Traffic Classification Using Constrained Clustering.
IEEE Trans. Parallel Distributed Syst., 2014

Securely Outsourcing Attribute-Based Encryption with Checkability.
IEEE Trans. Parallel Distributed Syst., 2014

Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2014

Chameleon Hashing for Secure and Privacy-Preserving Vehicular Communications.
IEEE Trans. Parallel Distributed Syst., 2014

Secure Outsourced Attribute-Based Signatures.
IEEE Trans. Parallel Distributed Syst., 2014

Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2014

Modeling and Analysis on the Propagation Dynamics of Modern Email Malware.
IEEE Trans. Dependable Secur. Comput., 2014

Control Flow-Based Malware VariantDetection.
IEEE Trans. Dependable Secur. Comput., 2014

Are the popular users always important for information dissemination in online social networks?
IEEE Netw., 2014

Editorial: Special Issue on Theory and Applications in Parallel and Distributed Computing Systems.
J. Comput. Syst. Sci., 2014

Internet traffic clustering with side information.
J. Comput. Syst. Sci., 2014

Detection and defense of application-layer DDoS attacks in backbone web traffic.
Future Gener. Comput. Syst., 2014

Cryptography in Cloud Computing.
Future Gener. Comput. Syst., 2014

Modeling the Propagation of Worms in Networks: A Survey.
IEEE Commun. Surv. Tutorials, 2014

An analytical model for optimal spectrum leasing under constraints of quality of service in CRNs.
Comput. Networks, 2014

Enabling Cloud Computing in Emergency Management Systems.
IEEE Cloud Comput., 2014

Detecting replicated nodes in Wireless Sensor Networks using random walks and network division.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning.
Proceedings of the 13th IEEE International Conference on Trust, 2014

On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification.
Proceedings of the Network and System Security - 8th International Conference, 2014

Spam Trapping System: Novel security framework to fight against spam botnets.
Proceedings of the 21st International Conference on Telecommunications, 2014

Security from the transparent computing aspect.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Robustness enhancement of quantization based audio watermarking method using adaptive safe-band.
Proceedings of the IEEE International Conference on Communications, 2014

A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014

Detecting clones in wireless sensor networks using Single Stage Memory Random Walk with Network Division.
Proceedings of the 2014 IEEE Asia Pacific Conference on Circuits and Systems, 2014

2013
Network Traffic Classification Using Correlation Information.
IEEE Trans. Parallel Distributed Syst., 2013

Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior.
IEEE Trans. Parallel Distributed Syst., 2013

Modeling Oscillation Behavior of Network Traffic by Nested Hidden Markov Model with Variable State-Duration.
IEEE Trans. Parallel Distributed Syst., 2013

Modeling Propagation Dynamics of Social Network Worms.
IEEE Trans. Parallel Distributed Syst., 2013

An Effective Network Traffic Classification Method with Unknown Flow Detection.
IEEE Trans. Netw. Serv. Manag., 2013

Novel Z-Domain Precoding Method for Blind Separation of Spatially Correlated Signals.
IEEE Trans. Neural Networks Learn. Syst., 2013

Evolution of cooperation in reputation system by group-based scheme.
J. Supercomput., 2013

Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions.
IEEE Trans. Inf. Forensics Secur., 2013

A Matrix-Based Pairwise Key Establishment Scheme for Wireless Mesh Networks Using Pre Deployment Knowledge.
IEEE Trans. Emerg. Top. Comput., 2013

Malwise - An Effective and Efficient Classification System for Packed and Polymorphic Malware.
IEEE Trans. Computers, 2013

Unsupervised traffic classification using flow statistical properties and IP packet payload.
J. Comput. Syst. Sci., 2013

How to achieve non-repudiation of origin with privacy protection in cloud computing.
J. Comput. Syst. Sci., 2013

Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey.
Int. J. Distributed Sens. Networks, 2013

Robust image retrieval with hidden classes.
Comput. Vis. Image Underst., 2013

Advances in parallel, distributed, embedded, and ubiquitous systems.
Concurr. Comput. Pract. Exp., 2013

A clustering based coscheduling strategy for efficient scientific workflow execution in cloud computing.
Concurr. Comput. Pract. Exp., 2013

Mobile Phone Sensing Systems: A Survey.
IEEE Commun. Surv. Tutorials, 2013

A Markov model of safety message broadcasting for vehicular networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

An Effective Deferentially Private Data Releasing Algorithm for Decision Tree.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Clonewise - Detecting Package-Level Clones Using Machine Learning.
Proceedings of the Security and Privacy in Communication Networks, 2013

Modeling and Analysis for Thwarting Worm Propagation in Email Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013

Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNs.
Proceedings of the Network and System Security - 7th International Conference, 2013

Towards Designing Privacy-Preserving Signature-Based IDS as a Service: A Study and Practice.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Matrix-based pairwise key establishment in wireless mesh networks using deployment knowledge.
Proceedings of IEEE International Conference on Communications, 2013

Network traffic clustering using Random Forest proximities.
Proceedings of IEEE International Conference on Communications, 2013

Zero-Day Traffic Identification.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Detecting Stepping Stones by Abnormal Causality Probability.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Traffic Identification in Semi-known Network Environment.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Robust network traffic identification with unknown applications.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Special issue on security in ubiquitous computing.
Secur. Commun. Networks, 2012

Generating regular expression signatures for network traffic classification in trusted network management.
J. Netw. Comput. Appl., 2012

Semi-supervised and compound classification of network traffic.
Int. J. Secur. Networks, 2012

Locating Defense Positions for Thwarting the Propagation of Topological Worms.
IEEE Commun. Lett., 2012

Advances in network and system security.
Concurr. Comput. Pract. Exp., 2012

CAFS: a novel lightweight cache-based scheme for large-scale intrusion alert fusion.
Concurr. Comput. Pract. Exp., 2012

A QoS-based fine-grained reputation system in the grid environment.
Concurr. Comput. Pract. Exp., 2012

Advances in Network and System Security: Editorial Statement.
Comput. J., 2012

An Analytical Model on the Propagation of Modern Email Worms.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Classification of Correlated Internet Traffic Flows.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Wire - A Formal Intermediate Language for Binary Analysis.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Internet traffic clustering with constraints.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

Software Similarity and Classification.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4471-2908-0, 2012

2011
A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2011

Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics.
IEEE Trans. Inf. Forensics Secur., 2011

Optimistic Fair Exchange with Strong Resolution-Ambiguity.
IEEE J. Sel. Areas Commun., 2011

Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks.
J. Netw. Comput. Appl., 2011

Secure localization with attack detection in wireless sensor networks.
Int. J. Inf. Sec., 2011

Eliminating Errors in Worm Propagation Models.
IEEE Commun. Lett., 2011

Special Section: Trusted computing.
Future Gener. Comput. Syst., 2011

A Graphical Password Based System for Small Mobile Devices
CoRR, 2011

A secure and efficient data aggregation scheme for wireless sensor networks.
Concurr. Comput. Pract. Exp., 2011

Special Issue: Securing Distributed Networks and Systems.
Concurr. Comput. Pract. Exp., 2011

Editorial: Advances in network and system security.
Comput. Secur., 2011

Special issue: Building secure parallel and distributed networks and systems.
Comput. Commun., 2011

Secure Image Retrieval Based on Visual Content and Watermarking Protocol.
Comput. J., 2011

The Microcosmic Model of Worm Propagation.
Comput. J., 2011

Defending against Large-Scale and Coordinated Attacks in the Ubiquitous Environments.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Malware Variant Detection Using Similarity Search over Sets of Control Flow Graphs.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Trust Ticket Deployment: A Notion of a Data Owner's Trust in Cloud Computing.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A novel semi-supervised approach for network traffic clustering.
Proceedings of the 5th International Conference on Network and System Security, 2011

Modeling worms propagation on probability.
Proceedings of the 5th International Conference on Network and System Security, 2011

The Probability Model of Peer-to-Peer Botnet Propagation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

A Hybrid Graphical Password Based System.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

Polymorphic Malware Detection Using Hierarchical Hidden Markov Model.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

Internet Traffic Classification Using Machine Learning: A Token-based Approach.
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011

2010
Defending against the propagation of active worms.
J. Supercomput., 2010

Security in next generation wireless networks.
Secur. Commun. Networks, 2010

Modeling the propagation of Peer-to-Peer worms.
Future Gener. Comput. Syst., 2010

A microscopic competition model and its dynamics analysis on network attacks.
Concurr. Comput. Pract. Exp., 2010

An automatic application signature construction system for unknown traffic.
Concurr. Comput. Pract. Exp., 2010

Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting.
Proceedings of the Public Key Cryptography, 2010

Modeling the propagation of Peer-to-Peer worms under quarantine.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

Fault tolerant scheduling with dynamic number of replicas in heterogeneous system.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010

A Lightweight Intrusion Alert Fusion System.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010

Above the Trust and Security in Cloud Computing: A Notion Towards Innovation.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Automatic Application Signature Construction from Unknown Traffic.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Propagation Modeling of Peer-to-Peer Worms.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the Endhost.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks.
IEEE Trans. Parallel Distributed Syst., 2009

Managing email overload with an automatic nonparametric clustering system.
J. Supercomput., 2009

Network and system security.
J. Netw. Comput. Appl., 2009

An innovative analyser for multi-classifier e-mail classification based on grey list analysis.
J. Netw. Comput. Appl., 2009

Large-scale network intrusion detection based on distributed learning algorithm.
Int. J. Inf. Sec., 2009

Propagation of active worms: A survey.
Comput. Syst. Sci. Eng., 2009

Special Issue: Multi-core Supported Network and System Security.
Concurr. Comput. Pract. Exp., 2009

Spam filtering for network traffic security on a multi-core environment.
Concurr. Comput. Pract. Exp., 2009

Defending Grid Web Services from XDoS Attacks by SOTA.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Modeling the Propagation Process of Topology-Aware Worms: An Innovative Logic Matrix Formulation.
Proceedings of the NPC 2009, 2009

Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks.
Proceedings of the Autonomic and Trusted Computing, 6th International Conference, 2009

2008
Special Issue: Network Attacks and Defense Systems.
Comput. Syst. Sci. Eng., 2008

A cross-authentication model and implementation.
Comput. Syst. Sci. Eng., 2008

Checkpointing schemes for Grid workflow systems.
Concurr. Comput. Pract. Exp., 2008

Detecting and Tracing DDoS Attacks by Intelligent Decision Prototype.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

Multi-Core Defense System (MSDS) for Protecting Computer Infrastructure against DDoS Attacks.
Proceedings of the Ninth International Conference on Parallel and Distributed Computing, 2008

A Multi-core Supported Intrusion Detection System.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008

Using Multi-core to Support Security-Related Applications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2008

Using Multi-Core Processors to Support Network Security Applications.
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008

Protecting web services with Service Oriented Traceback Architecture.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

2007
Defending against Distributed Denial of Service.
Proceedings of the Encyclopedia of Information Ethics and Security, 2007

Pervasive computing at tableside: a wireless web-based ordering system.
Int. J. Pervasive Comput. Commun., 2007

Managing Email Overload with an Automatic Nonparametric Clustering Approach.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2007

Spam Classification Using Adaptive Boosting Algorithm.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
Protecting web applications from DDoS attacks by an active distributed defense system.
Int. J. Web Inf. Syst., 2006

Protecting information infrastructure from DDoS attacks by MADF.
Int. J. High Perform. Comput. Netw., 2006

Performance Optimization of Checkpointing Schemes with Task Duplication.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Optimizing Adaptive Checkpointing Schemes for Grid Workflow Systems.
Proceedings of the Grid and Cooperative Computing Workshops, 2006

Simulation and Analysis of DDoS in Active Defense Environment.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
Intelligent DDoS Packet Filtering in High-Speed Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

A Defense System against DDoS Attacks by Large-Scale IP Traceback.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Distributed Defense Against Distributed Denial-of-Service Attacks.
Proceedings of the Distributed and Parallel Computing, 2005

Mark-aided distributed filtering by using neural network for DDoS defense.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2004
Combating DDoS Attacks in Web-based Services.
Proceedings of the iiWAS'2004, 2004

An Active Distributed Defense System to Protect Web Applications from DDOS Attacks.
Proceedings of the iiWAS'2004, 2004

Toward Pervasive Computing in Restaurant.
Proceedings of the ICETE 2004, 2004

Protect Grids from DDoS Attacks.
Proceedings of the Grid and Cooperative Computing, 2004

Towards Extended Machine Translation Model for Next Generation World Wide Web.
Proceedings of the Grid and Cooperative Computing, 2004

2003
GHIRS: Integration of Hotel Management Systems by Web Services.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...