Zhiyuan Tan

Orcid: 0000-0001-5420-2554

Affiliations:
  • Edinburgh Napier University, School of Computing, UK
  • University of Technology Sydney, Australia (PhD 2014)


According to our database1, Zhiyuan Tan authored at least 101 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Overtaking Feasibility Prediction for Mixed Connected and Connectionless Vehicles.
IEEE Trans. Intell. Transp. Syst., October, 2024

STIDNet: Identity-Aware Face Forgery Detection With Spatiotemporal Knowledge Distillation.
IEEE Trans. Comput. Soc. Syst., August, 2024

Machine Un-learning: An Overview of Techniques, Applications, and Future Directions.
Cogn. Comput., March, 2024

Preserving Differential Privacy in Deep Learning Based on Feature Relevance Region Segmentation.
IEEE Trans. Emerg. Top. Comput., 2024

MalSort: Lightweight and efficient image-based malware classification using masked self-supervised framework with Swin Transformer.
J. Inf. Secur. Appl., 2024

How Much Do Robots Understand Rudeness? Challenges in Human-Robot Interaction.
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024

2023
Evaluation Mechanism for Decentralized Collaborative Pattern Learning in Heterogeneous Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., November, 2023

A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing.
IEEE J. Sel. Areas Commun., November, 2023

An omnidirectional approach to touch-based continuous authentication.
Comput. Secur., May, 2023

CDTier: A Chinese Dataset of Threat Intelligence Entity Relationships.
IEEE Trans. Sustain. Comput., 2023

A Probability Mapping-Based Privacy Preservation Method for Social Networks.
Proceedings of the Ubiquitous Security, 2023

Self-attention is What You Need to Fool a Speaker Recognition System.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

TouchEnc: a Novel Behavioural Encoding Technique to Enable Computer Vision for Continuous Smartphone User Authentication.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Can Federated Models Be Rectified Through Learning Negative Gradients?
Proceedings of the Big Data Technologies and Applications, 2023

2022
NgramPOS: a bigram-based linguistic and statistical feature process model for unstructured text classification.
Wirel. Networks, 2022

Editorial: Big data technologies and applications.
Wirel. Networks, 2022

A VMD and LSTM Based Hybrid Model of Load Forecasting for Power Grid Security.
IEEE Trans. Ind. Informatics, 2022

A novel flow-vector generation approach for malicious traffic detection.
J. Parallel Distributed Comput., 2022

Toward machine intelligence that learns to fingerprint polymorphic worms in IoT.
Int. J. Intell. Syst., 2022

Special Issue on Adversarial AI to IoT Security and Privacy Protection: Attacks and Defenses.
Comput. J., 2022

A novel nomad migration-inspired algorithm for global optimization.
Comput. Electr. Eng., 2022

A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs.
Proceedings of the Machine Learning, Optimization, and Data Science, 2022

A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

2021
A mobility aware duty cycling and preambling solution for wireless sensor network with mobile sink node.
Wirel. Networks, 2021

A Novel Cost Optimization Strategy for SDN-Enabled UAV-Assisted Vehicular Computation Offloading.
IEEE Trans. Intell. Transp. Syst., 2021

Vehicular Computation Offloading for Industrial Mobile Edge Computing.
IEEE Trans. Ind. Informatics, 2021

A Novel Web Attack Detection System for Internet of Things via Ensemble Classification.
IEEE Trans. Ind. Informatics, 2021

Deep Learning in Mobile Computing: Architecture, Applications, and Future Challenges.
Mob. Inf. Syst., 2021

Blockchain for edge-enabled smart cities applications.
J. Inf. Secur. Appl., 2021

Block-Sparse Coding-Based Machine Learning Approach for Dependable Device-Free Localization in IoT Environment.
IEEE Internet Things J., 2021

Conceptual text region network: Cognition-inspired accurate scene text detection.
Neurocomputing, 2021

Towards an energy balancing solution for wireless sensor network with mobile sink node.
Comput. Commun., 2021

A novel tensor-information bottleneck method for multi-input single-output applications.
Comput. Networks, 2021

Newly engineered energy-based features for supervised anomaly detection in a physical model of a water supply system.
Ad Hoc Networks, 2021

2020
Introduction to the Special Issue on Privacy and Security in Evolving Internet of Multimedia Things.
ACM Trans. Multim. Comput. Commun. Appl., 2020

On Privacy Aware Carriers for Value-Possessed e-Invoices Considering Intelligence Mining.
IEEE Trans. Emerg. Top. Comput. Intell., 2020

Hybrid Tree-Rule Firewall for High Speed Data Transmission.
IEEE Trans. Cloud Comput., 2020

Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things.
Secur. Commun. Networks, 2020

Double-Arc Parallel Coordinates and its Axes re-Ordering Methods.
Mob. Networks Appl., 2020

Deep learning based emotion analysis of microblog texts.
Inf. Fusion, 2020

Exploring coupled images fusion based on joint tensor decomposition.
Hum. centric Comput. Inf. Sci., 2020

A comprehensive survey of security threats and their mitigation techniques for next-generation SDN controllers.
Concurr. Comput. Pract. Exp., 2020

PTAOD: A Novel Framework for Supporting Approximate Outlier Detection Over Streaming Data for Edge Computing.
IEEE Access, 2020

KNN-Based Approximate Outlier Detection Algorithm Over IoT Streaming Data.
IEEE Access, 2020

FIMPA: A Fixed Identity Mapping Prediction Algorithm in Edge Computing Environment.
IEEE Access, 2020

IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities.
IEEE Access, 2020

FairEdge: A Fairness-Oriented Task Offloading Scheme for Iot Applications in Mobile Cloudlet Networks.
IEEE Access, 2020

A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020

Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites.
Proceedings of the Applications of Evolutionary Computation - 23rd European Conference, 2020

Towards Continuous User Authentication Using Personalised Touch-Based Behaviour.
Proceedings of the IEEE Intl Conf on Dependable, 2020

Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples.
Proceedings of the IEEE Congress on Evolutionary Computation, 2020

2019
Mobility Aware Duty Cycling Algorithm (MADCAL) A Dynamic Communication Threshold for Mobile Sink in Wireless Sensor Network.
Sensors, 2019

A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks.
Sensors, 2019

Copy-move forgery detection using combined features and transitive matching.
Multim. Tools Appl., 2019

Design of multi-view based email classification for IoT systems via semi-supervised learning.
J. Netw. Comput. Appl., 2019

SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application.
J. Netw. Comput. Appl., 2019

Deriving ChaCha20 key streams from targeted memory analysis.
J. Inf. Secur. Appl., 2019

PFARS: Enhancing throughput and lifetime of heterogeneous WSNs through power-aware fusion, aggregation, and routing scheme.
Int. J. Commun. Syst., 2019

A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services.
Future Gener. Comput. Syst., 2019

Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop.
Future Gener. Comput. Syst., 2019

Decrypting live SSH traffic in virtual environments.
Digit. Investig., 2019

Discovering Encrypted Bot and Ransomware Payloads Through Memory Inspection Without A Priori Knowledge.
CoRR, 2019

A Secured and Efficient Communication Scheme for Decentralized Cognitive Radio-Based Internet of Vehicles.
IEEE Access, 2019

O-ADPI: Online Adaptive Deep-Packet Inspector Using Mahalanobis Distance Map for Web Service Attacks Classification.
IEEE Access, 2019

ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System.
IEEE Access, 2019

Mobility Aware Duty Cycling Algorithm (MADCAL) in Wireless Sensor Network with Mobile Sink Node.
Proceedings of the 2019 IEEE International Conference on Smart Internet of Things (SmartIoT), 2019

A Multi-attributes-Based Trust Model of Internet of Vehicle.
Proceedings of the Network and System Security - 13th International Conference, 2019

Multi-Miner's Cooperative Evolution Method of Bitcoin Pool Based on Temporal Difference Leaning Method.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

A Learning-Based Vehicle-Trajectory Generation Method for Vehicular Networking.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

A 3D Smooth Random Walk Mobility Model for FANETs.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

2018
Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait.
Mob. Networks Appl., 2018

Moving Towards Highly Reliable and Effective Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2018

Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors.
IEEE Access, 2018

A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment.
IEEE Access, 2018

Power Consumption Interval Prediction Based on Quantile Regression Neural Network and Kernel Density Estimation.
Proceedings of the 11th International Symposium on Computational Intelligence and Design, 2018

A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2017
An Intrusion Detection System Based on Polynomial Feature Correlation Analysis.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A framework for data security in cloud using collaborative intrusion detection scheme.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

2016
Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm.
IEEE Trans. Computers, 2016

An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2015
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques.
IEEE Trans. Computers, 2015

2014
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis.
IEEE Trans. Parallel Distributed Syst., 2014

Intrusion detection method based on nonlinear correlation measure.
Int. J. Internet Protoc. Technol., 2014

Improving cloud network security using the Tree-Rule firewall.
Future Gener. Comput. Syst., 2014

Enhancing Big Data Security with Collaborative Intrusion Detection.
IEEE Cloud Comput., 2014

Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Stateful Mechanism for the Tree-Rule Firewall.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Novel Feature Selection Approach for Intrusion Detection Data Classification.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
Detection of denial-of-service attacks based on computer vision techniques
PhD thesis, 2013

RePIDS: A multi tier Real-time Payload-based Intrusion Detection System.
Comput. Networks, 2013

2012
Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Evaluation on multivariate correlation analysis based denial-of-service attack detection system.
Proceedings of the First International Conference on Security of Internet of Things, 2012

2011
Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

2010
Intrusion detection using GSAD model for HTTP traffic on web services.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

A Two-Tier System for Web Attack Detection Using Linear Discriminant Method.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

2009
Web Service Locating Unit in RFID-Centric Anti-counterfeit System.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

Intrusion Detection Using Geometrical Structure.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009


  Loading...