4604. Cybersecurity and privacy


Title4604. Cybersecurity and privacy
Parent46. Information and Computing Sciences

Latest research outputs

Sort by Date Title
An Enhanced Conventional Neural Network Schema for Structural Class-based Software Fault Prediction
Nabi, Faisal, Zhou, Xujuan and Gururajan, Raj. 2024. "An Enhanced Conventional Neural Network Schema for Structural Class-based Software Fault Prediction ." Journal of Cyber Security Technology . https://doi.org/10.1080/23742917.2024.2402014

Article

Blockchain Enabled Secure Data Transmission With NB-IoT Deployment in Smart Agriculture Crop Watch
Mohammed, Chand Pasha, Chopra, Shakti Raj, Albadri, Nehad, Dekeyser, Stijn, Jha, Sudan, Roy, Ajay and Pradhan, Nihar Ranjan. 2024. "Blockchain Enabled Secure Data Transmission With NB-IoT Deployment in Smart Agriculture Crop Watch." Internet Technology Letters. https://doi.org/10.1002/itl2.596

Letter

Generous teacher: Good at distilling knowledge for student learning
Ding, Yifeng, Yang, Gaoming, Yin, Shuting, Zhang, Ji, Fang, Xianjin and Yang, Wencheng. 2024. "Generous teacher: Good at distilling knowledge for student learning." Image and Vision Computing. 150. https://doi.org/10.1016/j.imavis.2024.105199

Article

BADFSS: Backdoor Attacks on Federated Self-Supervised Learning
Zhang, Jiale, Zhu, Chengcheng, Wu, Di, Sun, Xiaobing, Yong, Jianming and Long, Guodong. 2024. "BADFSS: Backdoor Attacks on Federated Self-Supervised Learning." Larson, Kate (ed.) 33rd International Joint Conference on Artificial Intelligence (IJCAI-24). Jeju, Korea 03 - 09 Aug 2024 Korea. https://doi.org/10.24963/ijcai.2024/61

Presentation

Advancing face detection efficiency: Utilizing classification networks for lowering false positive incidences
Zhang, Jianlin, Hou, Chen, Yang, Xu, Yang, Xuechao, Yang, Wencheng and Cui, Hui. 2024. "Advancing face detection efficiency: Utilizing classification networks for lowering false positive incidences." Array. 22. https://doi.org/10.1016/j.array.2024.100347

Article

EXVUL: Towards Effective and Explainable Vulnerability Detection for IoT Devices
Cao, Sicong, Sun, Xiaobing, Liu, Wei, Wu, Di, Zhang, Jiale, Li, Yan, Luan, Tom H. and Gao, Longxiang. 2024. "EXVUL: Towards Effective and Explainable Vulnerability Detection for IoT Devices." IEEE Internet of Things Journal. 11 (12), pp. 22385-22398. https://doi.org/10.1109/JIOT.2024.3381641

Article

Evaluating Cryptocurrency Market Risk on the Blockchain: An Empirical Study Using the ARMA-GARCH-VaR Model
Huang, Yongrong, Wang, Huiqing, Chen, Zhide, Feng, Chen, Zhu, Kexin, Yang, Xu and Yang, Wencheng. 2024. "Evaluating Cryptocurrency Market Risk on the Blockchain: An Empirical Study Using the ARMA-GARCH-VaR Model." IEEE Open Journal of the Computer Society. 5, pp. 83-94. https://doi.org/10.1109/OJCS.2024.3370603

Article

FedInverse: Evaluating Privacy Leakage in Federated Learning
Wu, Di, Bai, Jun, Song,Yiliao, Chen, Junjun, Zhou, Wei, Xiang, Yong and Sajjanhar, Atul. 2024. "FedInverse: Evaluating Privacy Leakage in Federated Learning." The Twelfth International Conference on Learning Representations. Vienna, Austria 07 - 11 May 2024 Austria.

Paper

Privacy Inference Attack and Defense in Centralized and Federated Learning: A Comprehensive Survey
Rao, Bosen, Zhang, Jiale, Wu, Di, Zhu, Chengcheng, Sun, Xiaobing and Chen, Bing. 2024. "Privacy Inference Attack and Defense in Centralized and Federated Learning: A Comprehensive Survey." IEEE Transactions on Artificial Intelligence. https://doi.org/10.1109/TAI.2024.3363670

Article

Feature extraction and learning approaches for cancellable biometrics: A survey
Yang, Wencheng, Wang, Song, Hu, Jiankun, Tao, Xiaohui and Li, Yan. 2024. "Feature extraction and learning approaches for cancellable biometrics: A survey." CAAI Transactions on Intelligence Technology. 9 (1), pp. 4-25. https://doi.org/10.1049/cit2.12283

Article

Privacy in the age of remote sensing during natural disasters in Australia and Indonesia
Lawal, Temitope, Jackson, Melanie and Georgiades, Eugenia. 2023. "Privacy in the age of remote sensing during natural disasters in Australia and Indonesia." Digital Law Journal. 4 (2), pp. 15-39. https://doi.org/10.38044/2686-9136-2023-4-2-15-39

Article

Privacy Risks and Legal Jurisprudence in the Emerging Metaverse: Evaluating the Use of Digital Avatar Personas for Governance and Data Privacy Law Reform
Georgiades, Eugenia, Birt, James R. and Svantesson, Dan Jerker B. 2023. Privacy Risks and Legal Jurisprudence in the Emerging Metaverse: Evaluating the Use of Digital Avatar Personas for Governance and Data Privacy Law Reform. Australia. Bond University.

Project report

Cybersecurity Defence of Synchrophasors in Distribution Systems: A Deep Learning Approach
Zhang, Ge, Cui, Yi, Zhang, Ruiyuan and Bai, Feifei. 2023. "Cybersecurity Defence of Synchrophasors in Distribution Systems: A Deep Learning Approach." 2023 IEEE International Conference on Energy Technologies for Future Grids (ETFG). Wollongong, Australia 03 - 06 Dec 2023 Australia. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ETFG55873.2023.10407305

Paper

Data privacy and system security on cloud computing architechture for banking and financial services industry
Mahalle, Abhishek. 2023. Data privacy and system security on cloud computing architechture for banking and financial services industry. PhD Thesis Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/z4z0x

PhD Thesis

VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems
Zhang, Jiale, Liu, Yue, Wu, Di, Lou, Shuai, Chen, Bing and Yu, Shui. 2023. "VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems." Digital Communications and Networks. 9 (4), pp. 981-989. https://doi.org/10.1016/j.dcan.2022.05.010

Article

A Review of Homomorphic Encryption for Privacy-Preserving Biometrics
Yang, Wencheng, Wang, Song, Cui, Hui, Tang, Zhaohui and Li, Yan. 2023. "A Review of Homomorphic Encryption for Privacy-Preserving Biometrics." Sensors. 23 (7). https://doi.org/10.3390/s23073566

Article

A review of multi-factor authentication in the Internet of Healthcare Things
Suleski, Tance, Ahmed, Mohiuddin, Yang, Wencheng and Wang, Eugene. 2023. "A review of multi-factor authentication in the Internet of Healthcare Things." Digital Health. 9, pp. 1-20. https://doi.org/10.1177/20552076231177144

Article

Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks
Cui, Hui, Yang, Xuechao, Yang, Wencheng, Qin, Baodong and Yi, Xun. 2023. "Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks." IEEE Transactions on Network Science and Engineering. 10 (4), pp. 2347-2357. https://doi.org/10.1109/TNSE.2023.3246439

Contribution to Journal

A systematic review of literature on credit card cyber fraud detection using machine and deep learning
Marazqah Btoush, Eyad Abdel Latif, Zhou, Xujuan, Gururajan, Raj, Chan, Ka Ching, Genrich, Rohan and Sankaran, Prema. 2023. "A systematic review of literature on credit card cyber fraud detection using machine and deep learning." PeerJ Computer Science. 9 (1). https://doi.org/10.7717/peerj-cs.1278

Article

Exploiting Spatial Signatures of Power ENF Signal for Measurement Source Authentication
Cui, Yi, Liu, Yilu, Fuhr, Peter and Morales-Rodriguez, Marissa. 2018. "Exploiting Spatial Signatures of Power ENF Signal for Measurement Source Authentication." 2018 IEEE International Symposium on Technologies for Homeland Security (HST). Woburn, United States 23 - 24 Oct 2018 Woburn, United States. https://doi.org/10.1109/THS.2018.8574151

Paper

Spatio-Temporal Synchrophasor Data Characterization for Mitigating False Data Injection in Smart Grids
Cui, Yi, Wang, Weikang, Liu, Yilu, Fuhr, Peter and Morales-Rodriguez, Marissa. 2019. "Spatio-Temporal Synchrophasor Data Characterization for Mitigating False Data Injection in Smart Grids." 2020 IEEE Power and Energy Society General Meeting (PESGM). Atlanta, United States 04 - 08 Aug 2020 Atlanta, United States. https://doi.org/10.1109/pesgm40551.2019.8973586

Paper

Source Location Identification of Distribution-Level Electric Network Frequency Signals at Multiple Geographic Scales
Yao, Wenxuan, Zhao, Jiecheng, Till, Micah J., You, Shutang, Liu, Yong, Cui, Yi and Liu, Yilu. 2017. "Source Location Identification of Distribution-Level Electric Network Frequency Signals at Multiple Geographic Scales." IEEE Access. 5, pp. 11166-11175. https://doi.org/10.1109/ACCESS.2017.2707060

Article

A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks
Bedari, Aseel, Wang, Song and Yang, Wencheng. 2022. "A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks." Sensors. 22 (19), pp. 1-16. https://doi.org/10.3390/s22197609

Article

A Measurement Source Authentication Methodology for Power System Cyber Security Enhancement
Cui, Yi, Bai, Feifei, Liu, Yong and Liu, Yilu. 2018. "A Measurement Source Authentication Methodology for Power System Cyber Security Enhancement." IEEE Transactions on Smart Grid. 9 (4), pp. 3914-3916. https://doi.org/10.1109/TSG.2018.2826444

Article

Spatio-Temporal Characterization of Synchrophasor Data Against Spoofing Attacks in Smart Grids
Cui, Yi, Bai, Feifei, Liu, Yilu, Fuhr, Peter L. and Morales-Rodriguez, Marissa E.. 2019. "Spatio-Temporal Characterization of Synchrophasor Data Against Spoofing Attacks in Smart Grids." IEEE Transactions on Smart Grid. 10 (5), pp. 5807-5818. https://doi.org/10.1109/tsg.2019.2891852

Article

Source Authentication of Distribution Synchrophasors for Cybersecurity of Microgrids
Cui, Yi, Bai, Feifei, Yan, Ruifeng, Saha, Tapan, Ko, Ryan K. L. and Liu, Yilu. 2021. "Source Authentication of Distribution Synchrophasors for Cybersecurity of Microgrids." IEEE Transactions on Smart Grid. 12 (5), pp. 4577-4580. https://doi.org/10.1109/tsg.2021.3089041

Article

Multiscale Adaptive Multifractal Detrended Fluctuation Analysis-Based Source Identification of Synchrophasor Data
Cui, Yi, Bai, Feifei, Yin, Hongzhi, Chen, Tong, Dart, David, Zillmann, Matthew and Ko, Ryan K. L.. 2022. "Multiscale Adaptive Multifractal Detrended Fluctuation Analysis-Based Source Identification of Synchrophasor Data." IEEE Transactions on Smart Grid. 13 (6), pp. 4957-4960. https://doi.org/10.1109/tsg.2022.3207066

Article

Multifractal Characterization of Distribution Synchrophasors for Cybersecurity Defense of Smart Grids
Cui, Yi, Bai, Feifei, Yan, Ruifeng, Saha, Tapan, Mosadeghy, Mehdi, Yin, Hongzhi, Ko, Ryan K. L. and Liu, Yilu. 2022. "Multifractal Characterization of Distribution Synchrophasors for Cybersecurity Defense of Smart Grids." IEEE Transactions on Smart Grid. 13 (2), pp. 1658-1661. https://doi.org/10.1109/tsg.2021.3132536

Article

Authenticating source information of distribution synchrophasors at intra-state locations for cyber-physical resilient power networks
Cui, Yi, Bai, Feifei, Saha, Tapan and Yaghoobi, Jalil. 2022. "Authenticating source information of distribution synchrophasors at intra-state locations for cyber-physical resilient power networks." International Journal of Electrical Power and Energy Systems. 139, pp. 1-10. https://doi.org/10.1016/j.ijepes.2022.108009

Article

Data Source Authentication for Wide-Area Synchrophasor Measurements Based On Spatial Signature Extraction and Quadratic Kernel SVM
Liu, Shengyuan, You, Shutang, Yin, He, Lin, Zhenzhi, Liu, Yilu, Cui, Yi, Yao, Wenxuan and Sundaresh, Lakshmi. 2022. "Data Source Authentication for Wide-Area Synchrophasor Measurements Based On Spatial Signature Extraction and Quadratic Kernel SVM." International Journal of Electrical Power and Energy Systems. 140, pp. 1-13. https://doi.org/10.1016/j.ijepes.2022.108083

Article

Cost-effective synchrophasor data source authentication based on multiscale adaptive coupling correlation detrended analysis
Bai, Feifei, Cui, Yi, Yan, Ruifeng, Yin, Hongzhi, Chen, Tong, Dart, David and Yaghoobi, Jalil. 2023. "Cost-effective synchrophasor data source authentication based on multiscale adaptive coupling correlation detrended analysis." International Journal of Electrical Power and Energy Systems. 144, pp. 1-8. https://doi.org/10.1016/j.ijepes.2022.108606

Article

Efficient Beaver Triple Generation for Privacy-preserving Collaborative Machine Learning
Tang, Zhaohui. 2022. "Efficient Beaver Triple Generation for Privacy-preserving Collaborative Machine Learning." Cho, Seongsoo (ed.) 9th International Conference on Advanced Engineering and ICT-Convergence (ICAEIC-2022). Jeju Island, Korea 13 - 15 Jul 2022 Seoul, Korea.

Paper

An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy
Shamshad, Shuhab, Riaz, Farina, Riaz, Rabia, Rizvi, Sanam Shahla and Abdulla, Shahab. 2022. "An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy." Sensors. 22 (21), pp. 1-24. https://doi.org/10.3390/s22218151

Article

Multimedia security and privacy protection in the internet of things: research developments and challenges
Yang, Wencheng, Wang, Song, Hu, Jiankun and Karie, Nickson M.. 2022. "Multimedia security and privacy protection in the internet of things: research developments and challenges." International Journal of Multimedia Intelligence and Security. 4 (1), pp. 20-46. https://doi.org/10.1504/ijmis.2022.121282

Article

A linear convolution-based cancelable fingerprint biometric authentication system
Yang, Wencheng, Wang, Song, Kang, James Jin, Johnstone, Michael N. and Bedari, Aseel. 2022. "A linear convolution-based cancelable fingerprint biometric authentication system." Computers and Security. 114, pp. 1-14. https://doi.org/10.1016/j.cose.2021.102583

Article

A Survey on Credit Card Fraud Detection Techniques in Banking Industry for Cyber Security
Btoush, Eyad, Zhou, Xujuan, Gururajan, Raj, Chan, KC and Tao, XiaoHui. 2021. "A Survey on Credit Card Fraud Detection Techniques in Banking Industry for Cyber Security." 8th IEEE International Conference on Behavioural and Social Computing (BESC 2021). Doha, Qatar 29 - 31 Oct 2021 Doha, Qatar. https://doi.org/10.1109/BESC53957.2021.9635559

Paper

A Review on Security Issues and Solutions of the Internet of Drones
Yang, Wencheng, Wang, Song, Yin, Xuefei, Wang, Xu and Hu, Jiankun. 2022. "A Review on Security Issues and Solutions of the Internet of Drones." IEEE Open Journal of the Computer Society. 3, pp. 96-110. https://doi.org/10.1109/OJCS.2022.3183003

Article

Federated Learning with Real-world Datasets: Compliance with the Privacy Act
Tang, Zhaohui and Keoh, Sye Loong. 2022. "Federated Learning with Real-world Datasets: Compliance with the Privacy Act." Cho, Seongsoo (ed.) 9th International Conference on Advanced Engineering and ICT-Convergence (ICAEIC-2022). Jeju Island, Korea 13 - 15 Jul 2022 Seoul, Korea.

Paper

Network Forensics in the Era of Artificial Intelligence
Yang, Wencheng, Johnstone, Michael N., Wang, Song, Karie, Nickson M., Bin Sahri, Nor Masri and Kang, James Jin. 2022. "Network Forensics in the Era of Artificial Intelligence." Ahmed, Mohiuddin, Islam, Sheikh Rabiul, Anwar, Adnan, Moustafa, Nour and Pathan, Al-Sakib Khan (ed.) Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence. Cham, Switzerland. Springer. pp. 171-190

Edited book (chapter)

Defending against membership inference attacks in federated learning via adversarial example
Xie, Yuanyuan, Chen, Bing, Zhang, Jiale and Wu, Di. 2021. "Defending against membership inference attacks in federated learning via adversarial example." 2021 17th International Conference on Mobility, Sensing and Networking (MSN). Exeter, United Kingdom 13 - 15 Dec 2021 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/MSN53354.2021.00036

Paper