Yang Xiang
Orcid: 0000-0001-5252-0831Affiliations:
- Swinburne University of Technology, School of Software and Electrical Engineering, Hawthorn, VIC, Australia
- Deakin University, School of Information Technology, Geelong, VIC, Australia
- Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China (former)
- Central Queensland University, School of Management and Information Systems, Rockhampton, Australia (former)
- Deakin University, Geelong, VIC, Australia (PhD)
According to our database1,
Yang Xiang
authored at least 491 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
-
on d-nb.info
-
on nsclab.org
On csauthors.net:
Bibliography
2024
Distributed Ledger Technol. Res. Pract., September, 2024
IEEE CAA J. Autom. Sinica, August, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-enabled Critical Infrastructure.
CoRR, 2024
How COVID-19 impacts telehealth: an empirical study of telehealth services, users and the use of metaverse.
Connect. Sci., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
A Collaborative Stealthy DDoS Detection Method Based on Reinforcement Learning at the Edge of Internet of Things.
IEEE Internet Things J., October, 2023
Lightweight Authentication Scheme for Data Dissemination in Cloud-Assisted Healthcare IoT.
IEEE Trans. Computers, May, 2023
A Lightweight Matrix Factorization for Recommendation With Local Differential Privacy in Big Data.
IEEE Trans. Big Data, February, 2023
Location Privacy Protection via Delocalization in 5G Mobile Edge Computing Environment.
IEEE Trans. Serv. Comput., 2023
ACM Trans. Internet Techn., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Space-Efficient Storage Structure of Blockchain Transactions Supporting Secure Verification.
IEEE Trans. Cloud Comput., 2023
IEEE Trans. Cloud Comput., 2023
Guest Editorial Special Issue on AI and Blockchain-Powered IoT Sustainable Computing.
IEEE Internet Things J., 2023
Scalable and Revocable Attribute-Based Data Sharing With Short Revocation List for IIoT.
IEEE Internet Things J., 2023
IEEE CAA J. Autom. Sinica, 2023
Distributed Ledger Technol. Res. Pract., 2023
Distributed Ledger Technol. Res. Pract., 2023
Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques.
ACM Comput. Surv., 2023
A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network.
Comput. Stand. Interfaces, 2023
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
SigD: A Cross-Session Dataset for PPG-based User Authentication in Different Demographic Groups.
Proceedings of the International Joint Conference on Neural Networks, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
2022
Int. J. Intell. Syst., December, 2022
A Keyword-Grouping Inverted Index Based Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data.
IEEE Trans. Sustain. Comput., 2022
FASE: A Fast and Accurate Privacy-Preserving Multi-Keyword Top-k Retrieval Scheme Over Encrypted Cloud Data.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
CSEdge: Enabling Collaborative Edge Storage for Multi-Access Edge Computing Based on Blockchain.
IEEE Trans. Parallel Distributed Syst., 2022
Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity.
ACM Trans. Internet Techn., 2022
ACM Trans. Internet Techn., 2022
IEEE Trans. Netw. Sci. Eng., 2022
ACM Trans. Manag. Inf. Syst., 2022
IEEE Trans. Mob. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training.
IEEE Trans. Dependable Secur. Comput., 2022
Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
DELIA: Distributed Efficient Log Integrity Audit Based on Hierarchal Multi-Party State Channel.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples.
IEEE Trans. Cybern., 2022
Inspecting Edge Data Integrity With Aggregate Signature in Distributed Edge Computing Environment.
IEEE Trans. Cloud Comput., 2022
A Physical-Layer Key Generation Approach Based on Received Signal Strength in Smart Homes.
IEEE Internet Things J., 2022
Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey.
IEEE CAA J. Autom. Sinica, 2022
Distributed Ledger Technol. Res. Pract., 2022
ACM Comput. Surv., 2022
Event detection in online social network: Methodologies, state-of-art, and evolution.
Comput. Sci. Rev., 2022
Comput. Stand. Interfaces, 2022
CoRR, 2022
Nebula-I: A General Framework for Collaboratively Training Deep Learning Models on Low-Bandwidth Cloud Clusters.
CoRR, 2022
CoRR, 2022
Evaluating intrusion sensitivity allocation with supervised learning in collaborative intrusion detection.
Concurr. Comput. Pract. Exp., 2022
Comput. Secur., 2022
Comput. Secur., 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset.
Proceedings of the Network and System Security - 16th International Conference, 2022
Proceedings of the IEEE International Conference on Web Services, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022
Proceedings of the BSCI 2022: Proceedings of the 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Secure Outsourced Principal Eigentensor Computation for Cyber-Physical-Social Systems.
IEEE Trans. Sustain. Comput., 2021
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Parallel Distributed Syst., 2021
IEEE Trans. Mob. Comput., 2021
IEEE Trans. Knowl. Data Eng., 2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Green Commun. Netw., 2021
ASBKS: Towards Attribute Set Based Keyword Search Over Encrypted Personal Health Records.
IEEE Trans. Dependable Secur. Comput., 2021
Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models.
IEEE Trans. Dependable Secur. Comput., 2021
Authenticated Medical Documents Releasing with Privacy Protection and Release Control.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control.
IEEE Trans. Computers, 2021
IEEE Trans. Computers, 2021
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services.
Proc. Priv. Enhancing Technol., 2021
Vortex-shock and vortex-vortex interactions in the compressible starting jet from two beveled nozzle configurations.
J. Vis., 2021
Inf. Sci., 2021
Challenge-based collaborative intrusion detection in software-defined networking: an evaluation.
Digit. Commun. Networks, 2021
ACM Comput. Surv., 2021
CoRR, 2021
AC2M: An Automated Consent Management Model for Blockchain Financial Services Platform.
Proceedings of the IEEE International Conference on Smart Data Services, 2021
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
A Blockchain-Enabled Federated Learning Model for Privacy Preservation: System Design.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing.
IEEE Trans. Sustain. Comput., 2020
EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data.
IEEE Trans. Serv. Comput., 2020
IEEE Trans. Knowl. Data Eng., 2020
DeepPAR and DeepDPA: Privacy Preserving and Asynchronous Deep Learning for Industrial IoT.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Fuzzy Syst., 2020
IEEE Trans. Emerg. Top. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Cybern., 2020
Proc. IEEE, 2020
J. Netw. Comput. Appl., 2020
J. Inf. Secur. Appl., 2020
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
A study of data pre-processing techniques for imbalanced biomedical data classification.
Int. J. Bioinform. Res. Appl., 2020
Moving centroid based routing protocol for incompletely predictable cyber devices in Cyber-Physical-Social Distributed Systems.
Future Gener. Comput. Syst., 2020
Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities.
Future Gener. Comput. Syst., 2020
Future Gener. Comput. Syst., 2020
Digit. Commun. Networks, 2020
SIAT: A Systematic Inter-Component Communication Analysis Technology for Detecting Threats on Android.
CoRR, 2020
Secure and efficient sharing of authenticated energy usage data with privacy preservation.
Comput. Secur., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Network and System Security - 14th International Conference, 2020
Proceedings of the Blockchain - ICBC 2020, 2020
Proceedings of the Blockchain - ICBC 2020, 2020
Proceedings of the Financial Cryptography and Data Security, 2020
What risk? I don't understand. An Empirical Study on Users' Understanding of the Terms Used in Security Texts.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the Australasian Computer Science Week, 2020
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
Advances in Information Security 73, Springer, ISBN: 978-3-030-02178-8, 2019
CATE: Cloud-Aided Trustworthiness Evaluation Scheme for Incompletely Predictable Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2019
STC: Exposing Hidden Compromised Devices in Networked Sustainable Green Smart Computing Platforms by Partial Observation.
IEEE Trans. Sustain. Comput., 2019
IEEE Trans. Parallel Distributed Syst., 2019
ACM Trans. Intell. Syst. Technol., 2019
SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks.
IEEE Trans. Dependable Secur. Comput., 2019
IEEE Trans. Dependable Secur. Comput., 2019
Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps.
ACM Trans. Cyber Phys. Syst., 2019
Leveraging deep learning to understand health beliefs about the Human Papillomavirus Vaccine from social media.
npj Digit. Medicine, 2019
Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing.
J. Parallel Distributed Comput., 2019
Design of multi-view based email classification for IoT systems via semi-supervised learning.
J. Netw. Comput. Appl., 2019
On exploiting priority relation graph for reliable multi-path communication in mobile social networks.
Inf. Sci., 2019
Data security against receiver corruptions: SOA security for receivers from simulatable DEMs.
Inf. Sci., 2019
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges.
IEEE Internet Things J., 2019
IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT.
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
An efficient anonymous remote attestation scheme for trusted computing based on improved CPK.
Electron. Commer. Res., 2019
CoRR, 2019
Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples.
CoRR, 2019
Concurr. Comput. Pract. Exp., 2019
IEEE Commun. Surv. Tutorials, 2019
IEEE Access, 2019
Insider Threat Identification Using the Simultaneous Neural Learning of Multi-Source Logs.
IEEE Access, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Unsupervised Insider Detection Through Neural Feature Learning and Model Optimisation.
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Dynamic Clustering of Stream Short Documents Using Evolutionary Word Relation Network.
Proceedings of the Data Science - 6th International Conference, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
An Efficient Supply Chain Architecture Based on Blockchain for High-value Commodities.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019
Proceedings of the IEEE International Conference on Blockchain, 2019
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019
2018
Robust Reputation-Based Cooperative Spectrum Sensing via Imperfect Common Control Channel.
IEEE Trans. Veh. Technol., 2018
Blind Filtering at Third Parties: An Efficient Privacy-Preserving Framework for Location-Based Services.
IEEE Trans. Mob. Comput., 2018
IEEE Trans. Ind. Informatics, 2018
IEEE Trans. Dependable Secur. Comput., 2018
IEEE Trans. Dependable Secur. Comput., 2018
A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing.
Secur. Commun. Networks, 2018
A fog-based privacy-preserving approach for distributed signature-based intrusion detection.
J. Parallel Distributed Comput., 2018
Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networks.
J. Comput. Sci., 2018
J. Netw. Comput. Appl., 2018
<i>TouchWB</i>: Touch behavioral user authentication based on web browsing on smartphones.
J. Netw. Comput. Appl., 2018
J. Ambient Intell. Humaniz. Comput., 2018
Inf. Sci., 2018
Inf. Sci., 2018
Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things.
IEEE Internet Things J., 2018
A survey on security control and attack detection for industrial cyber-physical systems.
Neurocomputing, 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Efficient cache resource aggregation using adaptive multi-level exclusive caching policies.
Future Gener. Comput. Syst., 2018
Comput. Syst. Sci. Eng., 2018
Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps.
CoRR, 2018
Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones.
CoRR, 2018
Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks.
CoRR, 2018
IEEE Commun. Surv. Tutorials, 2018
Comput. Secur., 2018
JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones.
Comput. Secur., 2018
Comput. Secur., 2018
Density-Based Location Preservation for Mobile Crowdsensing With Differential Privacy.
IEEE Access, 2018
IEEE Access, 2018
Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing Architecture.
IEEE Access, 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases.
Proceedings of the Computer Security, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Keep Calm and Know Where to Focus: Measuring and Predicting the Impact of Android Malware.
Proceedings of the Advanced Data Mining and Applications - 14th International Conference, 2018
SpringerBriefs on Cyber Security Systems and Networks, Springer, ISBN: 978-981-10-7738-8, 2018
2017
Wirel. Pers. Commun., 2017
TC-Release++: An Efficient Timestamp-Based Coherence Protocol for Many-Core Architectures.
IEEE Trans. Parallel Distributed Syst., 2017
Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2017
The Spatial-Temporal Perspective: The Study of the Propagation of Modern Social Worms.
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Fuzzy Syst., 2017
IEEE Trans. Cloud Comput., 2017
IEEE Trans. Cloud Comput., 2017
Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks.
IEEE Trans. Computers, 2017
Erratum to: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment.
Multim. Tools Appl., 2017
A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment.
Multim. Tools Appl., 2017
Microprocess. Microsystems, 2017
Parallel compressive sampling matching pursuit algorithm for compressed sensing signal reconstruction with OpenCL.
J. Syst. Archit., 2017
J. Syst. Archit., 2017
A CPS framework based perturbation constrained buffer planning approach in VLSI design.
J. Parallel Distributed Comput., 2017
J. Netw. Comput. Appl., 2017
J. Netw. Comput. Appl., 2017
A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks.
J. Netw. Comput. Appl., 2017
Geographic spatiotemporal big data correlation analysis via the Hilbert-Huang transformation.
J. Comput. Syst. Sci., 2017
J. Comput. Syst. Sci., 2017
Secure independent-update concise-expression access control for video on demand in cloud.
Inf. Sci., 2017
IACR Cryptol. ePrint Arch., 2017
Associative retrieval in spatial big data based on spreading activation with semantic ontology.
Future Gener. Comput. Syst., 2017
Attribute-based data access control in mobile cloud computing: Taxonomy and open issues.
Future Gener. Comput. Syst., 2017
Future Gener. Comput. Syst., 2017
Concurr. Comput. Pract. Exp., 2017
Concurr. Comput. Pract. Exp., 2017
Concurr. Comput. Pract. Exp., 2017
Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies.
IEEE Commun. Surv. Tutorials, 2017
Addressing the class imbalance problem in Twitter spam detection using ensemble learning.
Comput. Secur., 2017
IEEE Commun. Mag., 2017
Clust. Comput., 2017
MIPE: a practical memory integrity protection method in a trusted execution environment.
Clust. Comput., 2017
Statistical Twitter Spam Detection Demystified: Performance, Stability and Scalability.
IEEE Access, 2017
My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
How Spam Features Change in Twitter and the Impact to Machine Learning Based Detection.
Proceedings of the Information Security Practice and Experience, 2017
A Hierarchical VDB Scheme with Scalable Verification and Tampered Record Localization.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
A Cross-Layer Key Establishment Model for Wireless Devices in Cyber-Physical Systems.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017
POSTER: Vulnerability Discovery with Function Representation Learning from Unlabeled Projects.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the Data Mining, 2017
Proceedings of the Australasian Computer Science Week Multiconference, 2017
Modeling User Preferences on Spatiotemporal Topics for Point-of-Interest Recommendation.
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017
2016
A General Collaborative Framework for Modeling and Perceiving Distributed Network Behavior.
IEEE/ACM Trans. Netw., 2016
ACM Trans. Internet Techn., 2016
On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2016
Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing.
IEEE Trans. Computers, 2016
IEEE Trans. Computers, 2016
Detection and classification of anomaly intrusion using hierarchy clustering and SVM.
Secur. Commun. Networks, 2016
J. Comput. Syst. Sci., 2016
Inf. Sci., 2016
Future Gener. Comput. Syst., 2016
Privacy Preserving Scheme for Location and Content Protection in Location-Based Services.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
An Ensemble Learning Approach for Addressing the Class Imbalance Problem in Twitter Spam Detection.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Intelligent Information and Database Systems - 8th Asian Conference, 2016
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
2015
IEEE Trans. Parallel Distributed Syst., 2015
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Comput. Soc. Syst., 2015
A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid.
IEEE Trans. Cloud Comput., 2015
IEEE Trans. Computers, 2015
A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks.
IEEE Trans. Computers, 2015
IEEE Trans. Computers, 2015
FESTAL: Fault-Tolerant Elastic Scheduling Algorithm for Real-Time Tasks in Virtualized Clouds.
IEEE Trans. Computers, 2015
IEEE Trans. Computers, 2015
IEEE Trans. Computers, 2015
A Stochastic Time-Domain Model for Burst Data Aggregation in IEEE 802.15.4 Wireless Sensor Networks.
IEEE Trans. Computers, 2015
IEEE Trans. Computers, 2015
A privacy-preserving location tracking system for smartphones based on cloud storage.
Secur. Commun. Networks, 2015
Secur. Commun. Networks, 2015
Dynamic cloud service selection using an adaptive learning mechanism in multi-cloud computing.
J. Syst. Softw., 2015
J. Comput. Syst. Sci., 2015
Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption.
Inf. Sci., 2015
Int. J. Distributed Sens. Networks, 2015
A Framework for Cloud-Based Healthcare Services to Monitor Noncommunicable Diseases Patient.
Int. J. Distributed Sens. Networks, 2015
EURASIP J. Wirel. Commun. Netw., 2015
Availability, resilience, and fault tolerance of internet and distributed computing systems.
Concurr. Comput. Pract. Exp., 2015
Concurr. Comput. Pract. Exp., 2015
Concurr. Comput. Pract. Exp., 2015
IEEE Cloud Comput., 2015
Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015
The Relation Between Local and Global Influence of Individuals in Scale-Free Networks.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015
A Secure and Efficient Data Sharing Framework with Delegated Capabilities in Hybrid Cloud.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
2014
To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks.
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Parallel Distributed Syst., 2014
Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Parallel Distributed Syst., 2014
Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Dependable Secur. Comput., 2014
IEEE Trans. Dependable Secur. Comput., 2014
Are the popular users always important for information dissemination in online social networks?
IEEE Netw., 2014
Editorial: Special Issue on Theory and Applications in Parallel and Distributed Computing Systems.
J. Comput. Syst. Sci., 2014
Future Gener. Comput. Syst., 2014
IEEE Commun. Surv. Tutorials, 2014
An analytical model for optimal spectrum leasing under constraints of quality of service in CRNs.
Comput. Networks, 2014
Detecting replicated nodes in Wireless Sensor Networks using random walks and network division.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning.
Proceedings of the 13th IEEE International Conference on Trust, 2014
On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification.
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the 21st International Conference on Telecommunications, 2014
Proceedings of the International Conference on Computing, Networking and Communications, 2014
Robustness enhancement of quantization based audio watermarking method using adaptive safe-band.
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Detecting clones in wireless sensor networks using Single Stage Memory Random Walk with Network Division.
Proceedings of the 2014 IEEE Asia Pacific Conference on Circuits and Systems, 2014
2013
IEEE Trans. Parallel Distributed Syst., 2013
IEEE Trans. Parallel Distributed Syst., 2013
Modeling Oscillation Behavior of Network Traffic by Nested Hidden Markov Model with Variable State-Duration.
IEEE Trans. Parallel Distributed Syst., 2013
IEEE Trans. Parallel Distributed Syst., 2013
IEEE Trans. Netw. Serv. Manag., 2013
Novel Z-Domain Precoding Method for Blind Separation of Spatially Correlated Signals.
IEEE Trans. Neural Networks Learn. Syst., 2013
J. Supercomput., 2013
IEEE Trans. Inf. Forensics Secur., 2013
A Matrix-Based Pairwise Key Establishment Scheme for Wireless Mesh Networks Using Pre Deployment Knowledge.
IEEE Trans. Emerg. Top. Comput., 2013
Malwise - An Effective and Efficient Classification System for Packed and Polymorphic Malware.
IEEE Trans. Computers, 2013
Unsupervised traffic classification using flow statistical properties and IP packet payload.
J. Comput. Syst. Sci., 2013
J. Comput. Syst. Sci., 2013
Int. J. Distributed Sens. Networks, 2013
Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey.
Int. J. Distributed Sens. Networks, 2013
Concurr. Comput. Pract. Exp., 2013
A clustering based coscheduling strategy for efficient scientific workflow execution in cloud computing.
Concurr. Comput. Pract. Exp., 2013
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Towards Designing Privacy-Preserving Signature-Based IDS as a Service: A Study and Practice.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Matrix-based pairwise key establishment in wireless mesh networks using deployment knowledge.
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Generating regular expression signatures for network traffic classification in trusted network management.
J. Netw. Comput. Appl., 2012
Int. J. Secur. Networks, 2012
IEEE Commun. Lett., 2012
Concurr. Comput. Pract. Exp., 2012
Concurr. Comput. Pract. Exp., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4471-2908-0, 2012
2011
A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2011
IEEE Trans. Inf. Forensics Secur., 2011
IEEE J. Sel. Areas Commun., 2011
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks.
J. Netw. Comput. Appl., 2011
Int. J. Inf. Sec., 2011
Concurr. Comput. Pract. Exp., 2011
Concurr. Comput. Pract. Exp., 2011
Comput. Commun., 2011
Comput. J., 2011
Defending against Large-Scale and Coordinated Attacks in the Ubiquitous Environments.
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011
2010
Concurr. Comput. Pract. Exp., 2010
Concurr. Comput. Pract. Exp., 2010
Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting.
Proceedings of the Public Key Cryptography, 2010
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the Endhost.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
2009
Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks.
IEEE Trans. Parallel Distributed Syst., 2009
J. Supercomput., 2009
An innovative analyser for multi-classifier e-mail classification based on grey list analysis.
J. Netw. Comput. Appl., 2009
Int. J. Inf. Sec., 2009
Propagation of active worms: A survey.
Comput. Syst. Sci. Eng., 2009
Concurr. Comput. Pract. Exp., 2009
Concurr. Comput. Pract. Exp., 2009
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
Modeling the Propagation Process of Topology-Aware Worms: An Innovative Logic Matrix Formulation.
Proceedings of the NPC 2009, 2009
Proceedings of the Autonomic and Trusted Computing, 6th International Conference, 2009
2008
Special Issue: Network Attacks and Defense Systems.
Comput. Syst. Sci. Eng., 2008
A cross-authentication model and implementation.
Comput. Syst. Sci. Eng., 2008
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008
Multi-Core Defense System (MSDS) for Protecting Computer Infrastructure against DDoS Attacks.
Proceedings of the Ninth International Conference on Parallel and Distributed Computing, 2008
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008
Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008
Proceedings of the Algorithms and Architectures for Parallel Processing, 2008
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008
2007
Proceedings of the Encyclopedia of Information Ethics and Security, 2007
Int. J. Pervasive Comput. Commun., 2007
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2007
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
2006
Protecting web applications from DDoS attacks by an active distributed defense system.
Int. J. Web Inf. Syst., 2006
Int. J. High Perform. Comput. Netw., 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Grid and Cooperative Computing Workshops, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Proceedings of the Distributed and Parallel Computing, 2005
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
2004
Combating DDoS Attacks in Web-based Services.
Proceedings of the iiWAS'2004, 2004
An Active Distributed Defense System to Protect Web Applications from DDOS Attacks.
Proceedings of the iiWAS'2004, 2004
Toward Pervasive Computing in Restaurant.
Proceedings of the ICETE 2004, 2004
Proceedings of the Grid and Cooperative Computing, 2004
Proceedings of the Grid and Cooperative Computing, 2004
2003
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003