Browse by ANZSRC Socio-Economic Objective codes

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: A | B | C | D | H | K | L | M | S | T | X | Z
Number of items at this level: 34.

A

Ahmad, Jameel, Zia, Muhammad Umer, Naqvi, Ijaz Haider, Chattha, Jawwad Nasar, Butt, Faran Awais, Huang, Tao, and Xiang, Wei (2024) Machine learning and blockchain technologies for cybersecurity in connected vehicles. WIREs Data Mining and Knowledge Discovery, 14. e1515.

B

Ban, Xinbo, Ding, Ming, Liu, Shigang, Chen, Chao, Zhang, Jun, and Xiang, Yang (2022) TAESim: A Testbed for IoT Security Analysis of Trigger-Action Environment. In: Lecture Notes in Computer Science (13106) p. 218. From: ESORICS 2021: European Symposium on Research in Computer Security, 4-8 October 2021, Virtual.

C

Cianciullo, Louis (2022) Investigation of unconditionally secure multi-party computation. PhD thesis, James Cook University.

Cianciullo, Louis, and Ghodosi, Hossein (2022) Unconditionally Secure Oblivious Polynomial Evaluation: A Survey and New Results. Journal of computer science and technology, 37 (2). pp. 443-458.

D

Dong, Xuening, Amirsoleimani, Amirali, Rahimi Azghadi, Mostafa, and Genov, Roman (2024) WALLAX: A memristor-based Gaussian random number generator. Neurocomputing, 566. 126933.

Deng, Runze, Luo, Fengji, Yang, Jiajia, Huang, Da-Wen, Ranzi, Gianluca, and Dong, Zhao Yang (2022) Privacy preserving renewable energy trading system for residential communities. International Journal of Electrical Power and Energy Systems, 142 (Part B). 108367.

Dillon, Roberto, Lothian, Paul, Grewal, Simran, and Pereira, Daryl (2021) Cyber security: evolving threats in an ever-changing world. In: Kuah, Adrian T.H., and Dillon, Roberto, (eds.) Digital Transformation in a Post-COVID World: sustainable innovation, disruption, and change. CRC Press, Boca Raton, FL, USA, pp. 131-155.

Dillon, Roberto, and Vagal, Vihangi (2021) Reducing cyber risk in remote working. In: Kuah, Adrian T.H., and Dillon, Roberto, (eds.) Digital Transformation in a Post-COVID World: sustainable innovation, disruption, and change. CRC Press, Boca Raton, FL, USA, pp. 157-171.

H

Huang, Tao, Yan, Shihao, Zhang, Guanglin, Sun, Li, Yuen, Tsz Hon, Park, YoHan, and Lee, Changhoon (2023) Security and Privacy for Modern Wireless Communication Systems. MDPI, Basel, Switzerland.

Hu, Aoting, Xie, Renjie, Lu, Zhigang, Hu, Aiqun, and Xue, Minhui (2021) TableGAN-MCA: Evaluating Membership Collisions of GAN-Synthesized Tabular Data Releasing. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. pp. 2096-2112. From: CCS'21: 2021 ACM SIGSAC Conference on Computer and Communications Security, 15-19 November 2021, Virtual Event.

K

Kerrison, Steve, Jusak, Jusak, and Huang, Tao (2023) Blockchain-Enabled IoT for Rural Healthcare: Hybrid-Channel Communication with Digital Twinning. Electronics, 12 (9).

L

Lei, Songze, Shan, Aokui, Liu, Bo, Zhao, Yanxiao, and Xiang, Wei (2023) Lightweight and efficient dual-path fusion network for iris segmentation. Scientific Reports, 13. 14034.

Li, Jingjin, Chen, Chao, Rahimi Azghadi, Mostafa, Ghodosi, Hossein, Pan, Lei, and Zhang, Jun (2023) Security and privacy problems in voice assistant applications: A survey. Computers & Security, 134. 103448.

Lu, Zhigang, and Shen, Hong (2022) Augmentation-Based Edge Differentially Private Path Publishing in Networks. IEEE Transactions on Network and Service Management, 19 (4). pp. 5183-5195.

Lu, Zhigang, Asghar, Hassan Jameel, Kaafar, Mohamed Ali, Webb, Darren, and Dickinson, Peter (2022) A Differentially Private Framework for Deep Learning With Convexified Loss Functions. IEEE Transactions on Information Forensics and Security, 17. pp. 2151-2165.

Li, Xiaonan, Ghodosi, Hossein, Chen, Chao, Sankupellay, Mangalam, and Lee, Ickjai (2022) Improving Network-Based Anomaly Detection in Smart Home Environment. Sensors, 22 (15). 5626.

Liu, Zhengyang, Zhang, Xiaoyu, Chen, Chenyang, Lin, Shen, and Li, Jingjin (2022) Membership Inference Attacks Against Robust Graph Neural Network. In: Cyberspace Safety and Security, CSS 2022 (13547) pp. 259-273. From: Cyberspace Safety and Security: 14th International Symposium, CSS 2022, 16–18 October 2022, Xi’an, China.

Lu, Zhigang, and Shen, Hong (2021) Differentially Private k-Means Clustering with Convergence Guarantee. IEEE Transactions on Dependable and Secure Computing, 18 (4). pp. 1541-1552.

Lu, Zhigang, and Shen, Hong (2019) A Convergent Differentially Private k-Means Clustering Algorithm. In: Lecture Notes in Computer Science (11439) pp. 612-624. From: PAKDD 2019: 23rd Pacific-Asia Conference on Knowledge Discovery and Data Mining, 14-17 April 2019, Macau, China.

Laurens, Roy, Jusak, Jusak, and Zou, Cliff (2018) Invariant diversity as a proactive fraud detection mechanism for online merchants. In: Proceedings of the IEEE Global Communications Conference. From: GLOBECOM 2017: IEEE Global Communications Conference, 4-8 December 2017, Singapore.

Lu, Zhigang, and Shen, Hong (2017) A New Lower Bound of Privacy Budget for Distributed Differential Privacy. In: Proceedings of the 18th International Conference on Parallel and Distributed Computing, Applications and Technologies. pp. 25-32. From: PDCAT 2017: 18th International Conference on Parallel and Distributed Computing, Applications and Technologies, 18-20 December 2017, Taipei, Taiwan.

Lu, Zhigang, and Shen, Hong (2017) Secured Privacy Preserving Data Aggregation with Semi-honest Servers. In: Advances in Knowledge Discovery and Data Mining: proceedings of the 21st Pacific-Asia Conference (10235) pp. 300-312. From: PAKDD 2017: Pacific-Asia Conference on Knowledge Discovery and Data Mining, 23-26 May 2017, Jeju, South Korea.

Lu, Zhigang, and Shen, Hong (2015) A Security-assured Accuracy-maximised Privacy Preserving Collaborative Filtering Recommendation Algorithm. In: Proceedings of the 19th International Database Engineering & Applications Symposium. pp. 72-80. From: IDEAS '15: 19th International Database Engineering & Applications Symposium, 13-15 July 2015, Yokohama, Japan.

Lu, Zhigang, and Shen, Hong (2015) An accuracy-assured privacy-preserving recommender system for internet commerce. Computer Science and Information Systems, 12 (4). pp. 1307-1326.

M

McGregor, Richard, Reaiche, Carmen, Boyle, Stephen, and de Zubielqui, Graciela Corral (2024) Cyberspace and Personal Cyber Insurance: A Systematic Review. Journal of Computer Information Systems, 64 (1). pp. 157-171.

Miao, Yuantian, Chen, Chao, Pan, Lei, Han, Qing-Long, Zhang, Jun, and Xiang, Yang (2021) Machine learning–based cyber attacks targeting on controlled information: a survey. ACM Computing Surveys, 54 (7). 139. pp. 1-36.

Mu, Xuejiao, Shen, Hong, and Lu, Zhigang (2019) A Temporal Caching-Aware Dummy Selection Location Algorithm. In: Proceedngs of the 20th International Conference on Parallel and Distributed Computing, Applications and Technologies. pp. 501-504. From: PDCAT 2019: 20th International Conference on Parallel and Distributed Computing, Applications and Technologies, 5-7 December 2019, Gold Coast, QLD, Australia.

S

Subash, Aditya, Song, Insu, and Tao, Kexin (2023) Robust Keystroke Behavior Features for Continuous User Authentication for Online Fraud Detection. In: Lecture Notes in Networks and Systems (693) pp. 879-891. From: ICICT 2023: International Conference on Information and Computer Technologies, 24-26 March 2023, London, UK.

Sheikh, Nazim Uddin, Lu, Zhigang, Asghar, Hassan Jameel, and Kaafar, Mohamed (2021) Trace Recovery: Inferring Fine-grained Trace of Energy Data from Aggregates. In: Proceedings of the 18th International Conference on Security and Cryptography (1) pp. 283-274. From: SECRYPT: 18th International Conference on Security and Cryptography, 6-8 July 2021, Online.

T

Torten, Ron, Reaiche, Carmen, and Boyle, Stephen (2018) The impact of security awarness on information technology professionals’ behavior. Computers & Security, 79. pp. 68-79.

X

Xu, Chuan, Ding, Yingyi, Chen, Chao, Ding, Yong, Zhou, Wei, and Wen, Sheng (2022) Personalized Location Privacy Protection for Location-Based Services in Vehicular Networks. IEEE Transactions on Intelligent Transportation Systems, 24 (1). pp. 1163-1177.

Z

Zhang, Jun, Pan, Lei, Han, Qing-Long, Chen, Chao, Wen, Sheng, and Xiang, Yang (2022) Deep learning based attack detection for cyber-physical system cybersecurity: a survey. IEEE - CAA Journal of Automatica Sinica, 9 (3). pp. 377-391.

Zhang, Bonan, Li, Jingjin, Chen, Chao, Lee, Kyungmi, and Lee, Ickjai (2022) A Practical Botnet Traffic Detection System using GNN. In: Lecture Notes in Computer Science (13172) pp. 66-78. From: CSS 2021: Cyberspace Safety and Security, 9-11 November 2021, Virtual.

Zhang, Xiaoyu, Chen, Chao, Xie, Yi, Chen, Xiaofeng, Zhang, Jun, and Xiang, Yang (2022) A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network. Computer Standards and Interfaces, 83. 103672.

This list was generated on Fri Jul 19 22:51:14 2024 AEST.