Browse by ANZSRC Socio-Economic Objective codes

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0 [feed] RSS 2.0
Group by: Creators | Item Type
Number of items at this level: 31.

Article

Dong, Xuening, Amirsoleimani, Amirali, Rahimi Azghadi, Mostafa, and Genov, Roman (2024) WALLAX: A memristor-based Gaussian random number generator. Neurocomputing, 566. 126933.

Kerrison, Steve, Jusak, Jusak, and Huang, Tao (2023) Blockchain-Enabled IoT for Rural Healthcare: Hybrid-Channel Communication with Digital Twinning. Electronics, 12 (9).

McGregor, Richard, Reaiche, Carmen, Boyle, Stephen, and de Zubielqui, Graciela Corral (2023) Cyberspace and Personal Cyber Insurance: A Systematic Review. Journal of Computer Information Systems. (In Press)

Lei, Songze, Shan, Aokui, Liu, Bo, Zhao, Yanxiao, and Xiang, Wei (2023) Lightweight and efficient dual-path fusion network for iris segmentation. Scientific Reports, 13. 14034.

Ahmad, Jameel, Zia, Muhammad Umer, Naqvi, Ijaz Haider, Chattha, Jawwad Nasar, Butt, Faran Awais, Huang, Tao, and Xiang, Wei (2023) Machine learning and blockchain technologies for cybersecurity in connected vehicles. WIREs Data Mining and Knowledge Discovery. e1515. (In Press)

Li, Jingjin, Chen, Chao, Rahimi Azghadi, Mostafa, Ghodosi, Hossein, Pan, Lei, and Zhang, Jun (2023) Security and privacy problems in voice assistant applications: A survey. Computers & Security, 134. 103448.

Lu, Zhigang, and Shen, Hong (2022) Augmentation-Based Edge Differentially Private Path Publishing in Networks. IEEE Transactions on Network and Service Management, 19 (4). pp. 5183-5195.

Zhang, Jun, Pan, Lei, Han, Qing-Long, Chen, Chao, Wen, Sheng, and Xiang, Yang (2022) Deep learning based attack detection for cyber-physical system cybersecurity: a survey. IEEE - CAA Journal of Automatica Sinica, 9 (3). pp. 377-391.

Lu, Zhigang, Asghar, Hassan Jameel, Kaafar, Mohamed Ali, Webb, Darren, and Dickinson, Peter (2022) A Differentially Private Framework for Deep Learning With Convexified Loss Functions. IEEE Transactions on Information Forensics and Security, 17. pp. 2151-2165.

Li, Xiaonan, Ghodosi, Hossein, Chen, Chao, Sankupellay, Mangalam, and Lee, Ickjai (2022) Improving Network-Based Anomaly Detection in Smart Home Environment. Sensors, 22 (15). 5626.

Xu, Chuan, Ding, Yingyi, Chen, Chao, Ding, Yong, Zhou, Wei, and Wen, Sheng (2022) Personalized Location Privacy Protection for Location-Based Services in Vehicular Networks. IEEE Transactions on Intelligent Transportation Systems, 24 (1). pp. 1163-1177.

Deng, Runze, Luo, Fengji, Yang, Jiajia, Huang, Da-Wen, Ranzi, Gianluca, and Dong, Zhao Yang (2022) Privacy preserving renewable energy trading system for residential communities. International Journal of Electrical Power and Energy Systems, 142 (Part B). 108367.

Cianciullo, Louis, and Ghodosi, Hossein (2022) Unconditionally Secure Oblivious Polynomial Evaluation: A Survey and New Results. Journal of computer science and technology, 37 (2). pp. 443-458.

Zhang, Xiaoyu, Chen, Chao, Xie, Yi, Chen, Xiaofeng, Zhang, Jun, and Xiang, Yang (2022) A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network. Computer Standards and Interfaces, 83. 103672.

Lu, Zhigang, and Shen, Hong (2021) Differentially Private k-Means Clustering with Convergence Guarantee. IEEE Transactions on Dependable and Secure Computing, 18 (4). pp. 1541-1552.

Miao, Yuantian, Chen, Chao, Pan, Lei, Han, Qing-Long, Zhang, Jun, and Xiang, Yang (2021) Machine learning–based cyber attacks targeting on controlled information: a survey. ACM Computing Surveys, 54 (7). 139. pp. 1-36.

Torten, Ron, Reaiche, Carmen, and Boyle, Stephen (2018) The impact of security awarness on information technology professionals’ behavior. Computers & Security, 79. pp. 68-79.

Book Chapter

Dillon, Roberto, Lothian, Paul, Grewal, Simran, and Pereira, Daryl (2021) Cyber security: evolving threats in an ever-changing world. In: Kuah, Adrian T.H., and Dillon, Roberto, (eds.) Digital Transformation in a Post-COVID World: sustainable innovation, disruption, and change. CRC Press, Boca Raton, FL, USA, pp. 131-155.

Dillon, Roberto, and Vagal, Vihangi (2021) Reducing cyber risk in remote working. In: Kuah, Adrian T.H., and Dillon, Roberto, (eds.) Digital Transformation in a Post-COVID World: sustainable innovation, disruption, and change. CRC Press, Boca Raton, FL, USA, pp. 157-171.

Conference Item

Subash, Aditya, Song, Insu, and Tao, Kexin (2023) Robust Keystroke Behavior Features for Continuous User Authentication for Online Fraud Detection. In: Lecture Notes in Networks and Systems (693) pp. 879-891. From: ICICT 2023: International Conference on Information and Computer Technologies, 24-26 March 2023, London, UK.

Liu, Zhengyang, Zhang, Xiaoyu, Chen, Chenyang, Lin, Shen, and Li, Jingjin (2022) Membership Inference Attacks Against Robust Graph Neural Network. In: Cyberspace Safety and Security, CSS 2022 (13547) pp. 259-273. From: Cyberspace Safety and Security: 14th International Symposium, CSS 2022, 16–18 October 2022, Xi’an, China.

Zhang, Bonan, Li, Jingjin, Chen, Chao, Lee, Kyungmi, and Lee, Ickjai (2022) A Practical Botnet Traffic Detection System using GNN. In: Lecture Notes in Computer Science (13172) pp. 66-78. From: CSS 2021: Cyberspace Safety and Security, 9-11 November 2021, Virtual.

Ban, Xinbo, Ding, Ming, Liu, Shigang, Chen, Chao, Zhang, Jun, and Xiang, Yang (2022) TAESim: A Testbed for IoT Security Analysis of Trigger-Action Environment. In: Lecture Notes in Computer Science (13106) p. 218. From: ESORICS 2021: European Symposium on Research in Computer Security, 4-8 October 2021, Virtual.

Hu, Aoting, Xie, Renjie, Lu, Zhigang, Hu, Aiqun, and Xue, Minhui (2021) TableGAN-MCA: Evaluating Membership Collisions of GAN-Synthesized Tabular Data Releasing. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. pp. 2096-2112. From: CCS'21: 2021 ACM SIGSAC Conference on Computer and Communications Security, 15-19 November 2021, Virtual Event.

Lu, Zhigang, and Shen, Hong (2019) A Convergent Differentially Private k-Means Clustering Algorithm. In: Lecture Notes in Computer Science (11439) pp. 612-624. From: PAKDD 2019: 23rd Pacific-Asia Conference on Knowledge Discovery and Data Mining, 14-17 April 2019, Macau, China.

Mu, Xuejiao, Shen, Hong, and Lu, Zhigang (2019) A Temporal Caching-Aware Dummy Selection Location Algorithm. In: Proceedngs of the 20th International Conference on Parallel and Distributed Computing, Applications and Technologies. pp. 501-504. From: PDCAT 2019: 20th International Conference on Parallel and Distributed Computing, Applications and Technologies, 5-7 December 2019, Gold Coast, QLD, Australia.

Laurens, Roy, Jusak, Jusak, and Zou, Cliff (2018) Invariant diversity as a proactive fraud detection mechanism for online merchants. In: Proceedings of the IEEE Global Communications Conference. From: GLOBECOM 2017: IEEE Global Communications Conference, 4-8 December 2017, Singapore.

Lu, Zhigang, and Shen, Hong (2017) A New Lower Bound of Privacy Budget for Distributed Differential Privacy. In: Proceedings of the 18th International Conference on Parallel and Distributed Computing, Applications and Technologies. pp. 25-32. From: PDCAT 2017: 18th International Conference on Parallel and Distributed Computing, Applications and Technologies, 18-20 December 2017, Taipei, Taiwan.

Lu, Zhigang, and Shen, Hong (2015) A Security-assured Accuracy-maximised Privacy Preserving Collaborative Filtering Recommendation Algorithm. In: Proceedings of the 19th International Database Engineering & Applications Symposium. pp. 72-80. From: IDEAS '15: 19th International Database Engineering & Applications Symposium, 13-15 July 2015, Yokohama, Japan.

Book

Huang, Tao, Yan, Shihao, Zhang, Guanglin, Sun, Li, Yuen, Tsz Hon, Park, YoHan, and Lee, Changhoon (2023) Security and Privacy for Modern Wireless Communication Systems. MDPI, Basel, Switzerland.

Thesis

Cianciullo, Louis (2022) Investigation of unconditionally secure multi-party computation. PhD thesis, James Cook University.

This list was generated on Fri Apr 26 22:53:47 2024 AEST.