4604. Cybersecurity and privacy
Title | 4604. Cybersecurity and privacy |
---|---|
Parent | 46. Information and Computing Sciences |
Latest research outputs
Sort by Date Title
An Enhanced Conventional Neural Network Schema for Structural Class-based Software Fault Prediction
Nabi, Faisal, Zhou, Xujuan and Gururajan, Raj. 2024. "An Enhanced Conventional Neural Network Schema for Structural Class-based Software Fault Prediction ." Journal of Cyber Security Technology . https://doi.org/10.1080/23742917.2024.2402014Article
Blockchain Enabled Secure Data Transmission With NB-IoT Deployment in Smart Agriculture Crop Watch
Mohammed, Chand Pasha, Chopra, Shakti Raj, Albadri, Nehad, Dekeyser, Stijn, Jha, Sudan, Roy, Ajay and Pradhan, Nihar Ranjan. 2024. "Blockchain Enabled Secure Data Transmission With NB-IoT Deployment in Smart Agriculture Crop Watch." Internet Technology Letters. https://doi.org/10.1002/itl2.596Letter
Generous teacher: Good at distilling knowledge for student learning
Ding, Yifeng, Yang, Gaoming, Yin, Shuting, Zhang, Ji, Fang, Xianjin and Yang, Wencheng. 2024. "Generous teacher: Good at distilling knowledge for student learning." Image and Vision Computing. 150. https://doi.org/10.1016/j.imavis.2024.105199Article
BADFSS: Backdoor Attacks on Federated Self-Supervised Learning
Zhang, Jiale, Zhu, Chengcheng, Wu, Di, Sun, Xiaobing, Yong, Jianming and Long, Guodong. 2024. "BADFSS: Backdoor Attacks on Federated Self-Supervised Learning." Larson, Kate (ed.) 33rd International Joint Conference on Artificial Intelligence (IJCAI-24). Jeju, Korea 03 - 09 Aug 2024 Korea. https://doi.org/10.24963/ijcai.2024/61Presentation
Advancing face detection efficiency: Utilizing classification networks for lowering false positive incidences
Zhang, Jianlin, Hou, Chen, Yang, Xu, Yang, Xuechao, Yang, Wencheng and Cui, Hui. 2024. "Advancing face detection efficiency: Utilizing classification networks for lowering false positive incidences." Array. 22. https://doi.org/10.1016/j.array.2024.100347Article
EXVUL: Towards Effective and Explainable Vulnerability Detection for IoT Devices
Cao, Sicong, Sun, Xiaobing, Liu, Wei, Wu, Di, Zhang, Jiale, Li, Yan, Luan, Tom H. and Gao, Longxiang. 2024. "EXVUL: Towards Effective and Explainable Vulnerability Detection for IoT Devices." IEEE Internet of Things Journal. 11 (12), pp. 22385-22398. https://doi.org/10.1109/JIOT.2024.3381641Article
Evaluating Cryptocurrency Market Risk on the Blockchain: An Empirical Study Using the ARMA-GARCH-VaR Model
Huang, Yongrong, Wang, Huiqing, Chen, Zhide, Feng, Chen, Zhu, Kexin, Yang, Xu and Yang, Wencheng. 2024. "Evaluating Cryptocurrency Market Risk on the Blockchain: An Empirical Study Using the ARMA-GARCH-VaR Model." IEEE Open Journal of the Computer Society. 5, pp. 83-94. https://doi.org/10.1109/OJCS.2024.3370603Article
FedInverse: Evaluating Privacy Leakage in Federated Learning
Wu, Di, Bai, Jun, Song,Yiliao, Chen, Junjun, Zhou, Wei, Xiang, Yong and Sajjanhar, Atul. 2024. "FedInverse: Evaluating Privacy Leakage in Federated Learning." The Twelfth International Conference on Learning Representations. Vienna, Austria 07 - 11 May 2024 Austria.Paper
Privacy Inference Attack and Defense in Centralized and Federated Learning: A Comprehensive Survey
Rao, Bosen, Zhang, Jiale, Wu, Di, Zhu, Chengcheng, Sun, Xiaobing and Chen, Bing. 2024. "Privacy Inference Attack and Defense in Centralized and Federated Learning: A Comprehensive Survey." IEEE Transactions on Artificial Intelligence. https://doi.org/10.1109/TAI.2024.3363670Article
Feature extraction and learning approaches for cancellable biometrics: A survey
Yang, Wencheng, Wang, Song, Hu, Jiankun, Tao, Xiaohui and Li, Yan. 2024. "Feature extraction and learning approaches for cancellable biometrics: A survey." CAAI Transactions on Intelligence Technology. 9 (1), pp. 4-25. https://doi.org/10.1049/cit2.12283Article
Privacy in the age of remote sensing during natural disasters in Australia and Indonesia
Lawal, Temitope, Jackson, Melanie and Georgiades, Eugenia. 2023. "Privacy in the age of remote sensing during natural disasters in Australia and Indonesia." Digital Law Journal. 4 (2), pp. 15-39. https://doi.org/10.38044/2686-9136-2023-4-2-15-39Article
Privacy Risks and Legal Jurisprudence in the Emerging Metaverse: Evaluating the Use of Digital Avatar Personas for Governance and Data Privacy Law Reform
Georgiades, Eugenia, Birt, James R. and Svantesson, Dan Jerker B. 2023. Privacy Risks and Legal Jurisprudence in the Emerging Metaverse: Evaluating the Use of Digital Avatar Personas for Governance and Data Privacy Law Reform. Australia. Bond University.Project report
Cybersecurity Defence of Synchrophasors in Distribution Systems: A Deep Learning Approach
Zhang, Ge, Cui, Yi, Zhang, Ruiyuan and Bai, Feifei. 2023. "Cybersecurity Defence of Synchrophasors in Distribution Systems: A Deep Learning Approach." 2023 IEEE International Conference on Energy Technologies for Future Grids (ETFG). Wollongong, Australia 03 - 06 Dec 2023 Australia. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ETFG55873.2023.10407305Paper
Data privacy and system security on cloud computing architechture for banking and financial services industry
Mahalle, Abhishek. 2023. Data privacy and system security on cloud computing architechture for banking and financial services industry. PhD Thesis Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/z4z0xPhD Thesis
VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems
Zhang, Jiale, Liu, Yue, Wu, Di, Lou, Shuai, Chen, Bing and Yu, Shui. 2023. "VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems." Digital Communications and Networks. 9 (4), pp. 981-989. https://doi.org/10.1016/j.dcan.2022.05.010Article
A Review of Homomorphic Encryption for Privacy-Preserving Biometrics
Yang, Wencheng, Wang, Song, Cui, Hui, Tang, Zhaohui and Li, Yan. 2023. "A Review of Homomorphic Encryption for Privacy-Preserving Biometrics." Sensors. 23 (7). https://doi.org/10.3390/s23073566Article
A review of multi-factor authentication in the Internet of Healthcare Things
Suleski, Tance, Ahmed, Mohiuddin, Yang, Wencheng and Wang, Eugene. 2023. "A review of multi-factor authentication in the Internet of Healthcare Things." Digital Health. 9, pp. 1-20. https://doi.org/10.1177/20552076231177144Article
Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks
Cui, Hui, Yang, Xuechao, Yang, Wencheng, Qin, Baodong and Yi, Xun. 2023. "Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks." IEEE Transactions on Network Science and Engineering. 10 (4), pp. 2347-2357. https://doi.org/10.1109/TNSE.2023.3246439Contribution to Journal
A systematic review of literature on credit card cyber fraud detection using machine and deep learning
Marazqah Btoush, Eyad Abdel Latif, Zhou, Xujuan, Gururajan, Raj, Chan, Ka Ching, Genrich, Rohan and Sankaran, Prema. 2023. "A systematic review of literature on credit card cyber fraud detection using machine and deep learning." PeerJ Computer Science. 9 (1). https://doi.org/10.7717/peerj-cs.1278Article
Exploiting Spatial Signatures of Power ENF Signal for Measurement Source Authentication
Cui, Yi, Liu, Yilu, Fuhr, Peter and Morales-Rodriguez, Marissa. 2018. "Exploiting Spatial Signatures of Power ENF Signal for Measurement Source Authentication." 2018 IEEE International Symposium on Technologies for Homeland Security (HST). Woburn, United States 23 - 24 Oct 2018 Woburn, United States. https://doi.org/10.1109/THS.2018.8574151Paper
Spatio-Temporal Synchrophasor Data Characterization for Mitigating False Data Injection in Smart Grids
Cui, Yi, Wang, Weikang, Liu, Yilu, Fuhr, Peter and Morales-Rodriguez, Marissa. 2019. "Spatio-Temporal Synchrophasor Data Characterization for Mitigating False Data Injection in Smart Grids." 2020 IEEE Power and Energy Society General Meeting (PESGM). Atlanta, United States 04 - 08 Aug 2020 Atlanta, United States. https://doi.org/10.1109/pesgm40551.2019.8973586Paper
Source Location Identification of Distribution-Level Electric Network Frequency Signals at Multiple Geographic Scales
Yao, Wenxuan, Zhao, Jiecheng, Till, Micah J., You, Shutang, Liu, Yong, Cui, Yi and Liu, Yilu. 2017. "Source Location Identification of Distribution-Level Electric Network Frequency Signals at Multiple Geographic Scales." IEEE Access. 5, pp. 11166-11175. https://doi.org/10.1109/ACCESS.2017.2707060Article
A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks
Bedari, Aseel, Wang, Song and Yang, Wencheng. 2022. "A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks." Sensors. 22 (19), pp. 1-16. https://doi.org/10.3390/s22197609Article
A Measurement Source Authentication Methodology for Power System Cyber Security Enhancement
Cui, Yi, Bai, Feifei, Liu, Yong and Liu, Yilu. 2018. "A Measurement Source Authentication Methodology for Power System Cyber Security Enhancement." IEEE Transactions on Smart Grid. 9 (4), pp. 3914-3916. https://doi.org/10.1109/TSG.2018.2826444Article
Spatio-Temporal Characterization of Synchrophasor Data Against Spoofing Attacks in Smart Grids
Cui, Yi, Bai, Feifei, Liu, Yilu, Fuhr, Peter L. and Morales-Rodriguez, Marissa E.. 2019. "Spatio-Temporal Characterization of Synchrophasor Data Against Spoofing Attacks in Smart Grids." IEEE Transactions on Smart Grid. 10 (5), pp. 5807-5818. https://doi.org/10.1109/tsg.2019.2891852Article
Source Authentication of Distribution Synchrophasors for Cybersecurity of Microgrids
Cui, Yi, Bai, Feifei, Yan, Ruifeng, Saha, Tapan, Ko, Ryan K. L. and Liu, Yilu. 2021. "Source Authentication of Distribution Synchrophasors for Cybersecurity of Microgrids." IEEE Transactions on Smart Grid. 12 (5), pp. 4577-4580. https://doi.org/10.1109/tsg.2021.3089041Article
Multiscale Adaptive Multifractal Detrended Fluctuation Analysis-Based Source Identification of Synchrophasor Data
Cui, Yi, Bai, Feifei, Yin, Hongzhi, Chen, Tong, Dart, David, Zillmann, Matthew and Ko, Ryan K. L.. 2022. "Multiscale Adaptive Multifractal Detrended Fluctuation Analysis-Based Source Identification of Synchrophasor Data." IEEE Transactions on Smart Grid. 13 (6), pp. 4957-4960. https://doi.org/10.1109/tsg.2022.3207066Article
Multifractal Characterization of Distribution Synchrophasors for Cybersecurity Defense of Smart Grids
Cui, Yi, Bai, Feifei, Yan, Ruifeng, Saha, Tapan, Mosadeghy, Mehdi, Yin, Hongzhi, Ko, Ryan K. L. and Liu, Yilu. 2022. "Multifractal Characterization of Distribution Synchrophasors for Cybersecurity Defense of Smart Grids." IEEE Transactions on Smart Grid. 13 (2), pp. 1658-1661. https://doi.org/10.1109/tsg.2021.3132536Article
Authenticating source information of distribution synchrophasors at intra-state locations for cyber-physical resilient power networks
Cui, Yi, Bai, Feifei, Saha, Tapan and Yaghoobi, Jalil. 2022. "Authenticating source information of distribution synchrophasors at intra-state locations for cyber-physical resilient power networks." International Journal of Electrical Power and Energy Systems. 139, pp. 1-10. https://doi.org/10.1016/j.ijepes.2022.108009Article
Data Source Authentication for Wide-Area Synchrophasor Measurements Based On Spatial Signature Extraction and Quadratic Kernel SVM
Liu, Shengyuan, You, Shutang, Yin, He, Lin, Zhenzhi, Liu, Yilu, Cui, Yi, Yao, Wenxuan and Sundaresh, Lakshmi. 2022. "Data Source Authentication for Wide-Area Synchrophasor Measurements Based On Spatial Signature Extraction and Quadratic Kernel SVM." International Journal of Electrical Power and Energy Systems. 140, pp. 1-13. https://doi.org/10.1016/j.ijepes.2022.108083Article
Cost-effective synchrophasor data source authentication based on multiscale adaptive coupling correlation detrended analysis
Bai, Feifei, Cui, Yi, Yan, Ruifeng, Yin, Hongzhi, Chen, Tong, Dart, David and Yaghoobi, Jalil. 2023. "Cost-effective synchrophasor data source authentication based on multiscale adaptive coupling correlation detrended analysis." International Journal of Electrical Power and Energy Systems. 144, pp. 1-8. https://doi.org/10.1016/j.ijepes.2022.108606Article
Efficient Beaver Triple Generation for Privacy-preserving Collaborative Machine Learning
Tang, Zhaohui. 2022. "Efficient Beaver Triple Generation for Privacy-preserving Collaborative Machine Learning." Cho, Seongsoo (ed.) 9th International Conference on Advanced Engineering and ICT-Convergence (ICAEIC-2022). Jeju Island, Korea 13 - 15 Jul 2022 Seoul, Korea.Paper
An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy
Shamshad, Shuhab, Riaz, Farina, Riaz, Rabia, Rizvi, Sanam Shahla and Abdulla, Shahab. 2022. "An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy." Sensors. 22 (21), pp. 1-24. https://doi.org/10.3390/s22218151Article
Multimedia security and privacy protection in the internet of things: research developments and challenges
Yang, Wencheng, Wang, Song, Hu, Jiankun and Karie, Nickson M.. 2022. "Multimedia security and privacy protection in the internet of things: research developments and challenges." International Journal of Multimedia Intelligence and Security. 4 (1), pp. 20-46. https://doi.org/10.1504/ijmis.2022.121282Article
A linear convolution-based cancelable fingerprint biometric authentication system
Yang, Wencheng, Wang, Song, Kang, James Jin, Johnstone, Michael N. and Bedari, Aseel. 2022. "A linear convolution-based cancelable fingerprint biometric authentication system." Computers and Security. 114, pp. 1-14. https://doi.org/10.1016/j.cose.2021.102583Article
A Survey on Credit Card Fraud Detection Techniques in Banking Industry for Cyber Security
Btoush, Eyad, Zhou, Xujuan, Gururajan, Raj, Chan, KC and Tao, XiaoHui. 2021. "A Survey on Credit Card Fraud Detection Techniques in Banking Industry for Cyber Security." 8th IEEE International Conference on Behavioural and Social Computing (BESC 2021). Doha, Qatar 29 - 31 Oct 2021 Doha, Qatar. https://doi.org/10.1109/BESC53957.2021.9635559Paper
A Review on Security Issues and Solutions of the Internet of Drones
Yang, Wencheng, Wang, Song, Yin, Xuefei, Wang, Xu and Hu, Jiankun. 2022. "A Review on Security Issues and Solutions of the Internet of Drones." IEEE Open Journal of the Computer Society. 3, pp. 96-110. https://doi.org/10.1109/OJCS.2022.3183003Article
Federated Learning with Real-world Datasets: Compliance with the Privacy Act
Tang, Zhaohui and Keoh, Sye Loong. 2022. "Federated Learning with Real-world Datasets: Compliance with the Privacy Act." Cho, Seongsoo (ed.) 9th International Conference on Advanced Engineering and ICT-Convergence (ICAEIC-2022). Jeju Island, Korea 13 - 15 Jul 2022 Seoul, Korea.Paper
Network Forensics in the Era of Artificial Intelligence
Yang, Wencheng, Johnstone, Michael N., Wang, Song, Karie, Nickson M., Bin Sahri, Nor Masri and Kang, James Jin. 2022. "Network Forensics in the Era of Artificial Intelligence." Ahmed, Mohiuddin, Islam, Sheikh Rabiul, Anwar, Adnan, Moustafa, Nour and Pathan, Al-Sakib Khan (ed.) Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence. Cham, Switzerland. Springer. pp. 171-190Edited book (chapter)
Defending against membership inference attacks in federated learning via adversarial example
Xie, Yuanyuan, Chen, Bing, Zhang, Jiale and Wu, Di. 2021. "Defending against membership inference attacks in federated learning via adversarial example." 2021 17th International Conference on Mobility, Sensing and Networking (MSN). Exeter, United Kingdom 13 - 15 Dec 2021 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/MSN53354.2021.00036Paper