4604. Cybersecurity and privacy
Title | 4604. Cybersecurity and privacy |
---|---|
Parent | 46. Information and Computing Sciences |
Latest research outputs
Sort by Date Title
Data Source Authentication for Wide-Area Synchrophasor Measurements Based On Spatial Signature Extraction and Quadratic Kernel SVM
Liu, Shengyuan, You, Shutang, Yin, He, Lin, Zhenzhi, Liu, Yilu, Cui, Yi, Yao, Wenxuan and Sundaresh, Lakshmi. 2022. "Data Source Authentication for Wide-Area Synchrophasor Measurements Based On Spatial Signature Extraction and Quadratic Kernel SVM." International Journal of Electrical Power and Energy Systems. 140, pp. 1-13. https://doi.org/10.1016/j.ijepes.2022.108083Article
Efficient Beaver Triple Generation for Privacy-preserving Collaborative Machine Learning
Tang, Zhaohui. 2022. "Efficient Beaver Triple Generation for Privacy-preserving Collaborative Machine Learning." Cho, Seongsoo (ed.) 9th International Conference on Advanced Engineering and ICT-Convergence (ICAEIC-2022). Jeju Island, Korea 13 - 15 Jul 2022 Seoul, Korea.Paper
An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy
Shamshad, Shuhab, Riaz, Farina, Riaz, Rabia, Rizvi, Sanam Shahla and Abdulla, Shahab. 2022. "An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy." Sensors. 22 (21), pp. 1-24. https://doi.org/10.3390/s22218151Article
Multimedia security and privacy protection in the internet of things: research developments and challenges
Yang, Wencheng, Wang, Song, Hu, Jiankun and Karie, Nickson M.. 2022. "Multimedia security and privacy protection in the internet of things: research developments and challenges." International Journal of Multimedia Intelligence and Security. 4 (1), pp. 20-46. https://doi.org/10.1504/ijmis.2022.121282Article
A linear convolution-based cancelable fingerprint biometric authentication system
Yang, Wencheng, Wang, Song, Kang, James Jin, Johnstone, Michael N. and Bedari, Aseel. 2022. "A linear convolution-based cancelable fingerprint biometric authentication system." Computers and Security. 114, pp. 1-14. https://doi.org/10.1016/j.cose.2021.102583Article
A Survey on Credit Card Fraud Detection Techniques in Banking Industry for Cyber Security
Btoush, Eyad, Zhou, Xujuan, Gururajan, Raj, Chan, KC and Tao, XiaoHui. 2021. "A Survey on Credit Card Fraud Detection Techniques in Banking Industry for Cyber Security." 8th IEEE International Conference on Behavioural and Social Computing (BESC 2021). Doha, Qatar 29 - 31 Oct 2021 Doha, Qatar. https://doi.org/10.1109/BESC53957.2021.9635559Paper
A Review on Security Issues and Solutions of the Internet of Drones
Yang, Wencheng, Wang, Song, Yin, Xuefei, Wang, Xu and Hu, Jiankun. 2022. "A Review on Security Issues and Solutions of the Internet of Drones." IEEE Open Journal of the Computer Society. 3, pp. 96-110. https://doi.org/10.1109/OJCS.2022.3183003Article
Federated Learning with Real-world Datasets: Compliance with the Privacy Act
Tang, Zhaohui and Keoh, Sye Loong. 2022. "Federated Learning with Real-world Datasets: Compliance with the Privacy Act." Cho, Seongsoo (ed.) 9th International Conference on Advanced Engineering and ICT-Convergence (ICAEIC-2022). Jeju Island, Korea 13 - 15 Jul 2022 Seoul, Korea.Paper
Network Forensics in the Era of Artificial Intelligence
Yang, Wencheng, Johnstone, Michael N., Wang, Song, Karie, Nickson M., Bin Sahri, Nor Masri and Kang, James Jin. 2022. "Network Forensics in the Era of Artificial Intelligence." Ahmed, Mohiuddin, Islam, Sheikh Rabiul, Anwar, Adnan, Moustafa, Nour and Pathan, Al-Sakib Khan (ed.) Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence. Cham, Switzerland. Springer. pp. 171-190Edited book (chapter)
Defending against membership inference attacks in federated learning via adversarial example
Xie, Yuanyuan, Chen, Bing, Zhang, Jiale and Wu, Di. 2021. "Defending against membership inference attacks in federated learning via adversarial example." 2021 17th International Conference on Mobility, Sensing and Networking (MSN). Exeter, United Kingdom 13 - 15 Dec 2021 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/MSN53354.2021.00036Paper
Cybersecurity Issues and Practices in a Cloud Context: A Comparison Amongst Micro, Small and Medium Enterprises
Nagahawatta, Ruwan, Lokuge, Sachithra, Warren, Matthew and Salzman, Scott. 2021. "Cybersecurity Issues and Practices in a Cloud Context: A Comparison Amongst Micro, Small and Medium Enterprises." 32nd Australasian Conference on Information Systems (ACIS 2021). Sydney, Australia 06 - 10 Dec 2021 Australia.Paper
A social contract for cyberspace
Sheniar, Dawood, Northway, James, Talbot, James, Millsom, David, Li, Yan and Addie, Ron. 2021. "A social contract for cyberspace." 31st International Telecommunication Networks and Application Conference (ITNAC). Sydney, Australia 24 - 26 Nov 2021 Sydney. https://doi.org/10.1109/ITNAC53136.2021.9652166Paper
A survey on detection of cybersecurity threats on Twitter using deep learning
Alsodi, Omar, Zhou, Xujuan, Gururajan, Raj and Shrestha, Anup. 2021. "A survey on detection of cybersecurity threats on Twitter using deep learning." Xu, Guandong, Ali, Raian, Zaghouani, Wajdi, Tao, Xiaohui and Li, Lin (ed.) 8th IEEE International Conference on Behavioural and Social Computing (BESC 2021). Doha, Qatar 29 - 31 Oct 2021 United States. https://doi.org/10.1109/BESC53957.2021.9635406Paper
A federated learning based semi-supervised credit prediction approach enhanced by multi-layer label mean
Li, Lin, Long, Sijie, Bi, Jiaxiu, Wang, Guowei, Zhang, Jiawei and Tao, Xiaohui. 2021. "A federated learning based semi-supervised credit prediction approach enhanced by multi-layer label mean." Web Intelligence. 19 (4), pp. 329-342. https://doi.org/10.3233/WEB-210476Article
Blockchain technology transforms digital marketing by growing consumer trust
Rabby, Fazla, Chimhundu, Ranga and Hassan, Rumman. 2022. "Blockchain technology transforms digital marketing by growing consumer trust." Idrees, Sheikh Mohammad and Nowostawski, Mariusz (ed.) Transformations Through Blockchain Technology: The New Digital Revolution. Cham, Switzerland. Springer. pp. 265-289Edited book (chapter)
Secret sharing-based IoT text data outsourcing: a secure and efficient scheme
Tang, Zhaohui. 2021. "Secret sharing-based IoT text data outsourcing: a secure and efficient scheme." IEEE Access. 9, pp. 76908 -76920. https://doi.org/10.1109/ACCESS.2021.3075282Article
Demarcating the Privacy Issues of Aarogya Setu App in Covid-19 Pandemic in India: An Exploration into Contact Tracing Mobile Applications from Elaboration Likelihood Model
Acharya, Nirmal and Sharma, Abhishek. 2022. "Demarcating the Privacy Issues of Aarogya Setu App in Covid-19 Pandemic in India: An Exploration into Contact Tracing Mobile Applications from Elaboration Likelihood Model." 4th International Conference on HCI for Cybersecurity, Privacy, and Trust (HCI-CPT 2022). 26 Jun - 01 Jul 2022 Switzerland . Springer. https://doi.org/10.1007/978-3-031-05563-8_28Paper
Campus Network Intrusion Detection based on Federated Learning
Chen, Junjun, Guo, Qiang, Fu, Zhongnan, Shang, Qun, Ma, Hao and Wu, Di. 2022. "Campus Network Intrusion Detection based on Federated Learning." 2022 International Joint Conference on Neural Networks (IJCNN). Padua, Italy 18 - 23 Jul 2022 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/IJCNN55064.2022.9892843Paper
From distributed machine learning to federated learning: In the view of data privacy and security
Shen, Sheng, Zhu, Tianqing, Wu, Di, Wang, Wei and Zhou, Wanlei. 2022. "From distributed machine learning to federated learning: In the view of data privacy and security." Concurrency and Computation: Practice and Experience. 34 (16). https://doi.org/10.1002/cpe.6002Article
A Blockchain-based Multi-layer Decentralized Framework for Robust Federated Learning
Wu, Di, Wang, Nai, Zhang, Jiale, Zhang, Yuan, Xiang, Yong and Gao, Longxiang. 2022. "A Blockchain-based Multi-layer Decentralized Framework for Robust Federated Learning." 2022 International Joint Conference on Neural Networks (IJCNN). Padua, Italy 18 - 23 Jul 2022 IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/IJCNN55064.2022.9892039Paper
Detecting and mitigating poisoning attacks in federated learning using generative adversarial networks
Zhao, Ying, Chen, Junjun, Zhang, Jiale, Wu, Di, Blumenstein, Michael and Yu, Shui. 2022. "Detecting and mitigating poisoning attacks in federated learning using generative adversarial networks." Concurrency and Computation: Practice and Experience. 34 (7). https://doi.org/10.1002/cpe.5906Article
Feasibility Study on Condition Monitoring of Power Network Asset Using PMU Measurements
Bai, Feifei, Cui, Yi, Zhang, Ge, Dart, David, Yaghoobi, Jalil and Zillmann, Matthew. 2022. "Feasibility Study on Condition Monitoring of Power Network Asset Using PMU Measurements." 2022 IEEE/IAS Industrial and Commercial Power System Asia (I&CPS Asia). Shanghai, China 08 - 11 Jul 2022 China. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ICPSAsia55496.2022.9949946Paper
Machine Learning-based Cybersecurity Defence of Wide-area Monitoring Systems
He, Qian, Bai, Feifei, Cui, Yi and Zillmann, Matthew. 2022. "Machine Learning-based Cybersecurity Defence of Wide-area Monitoring Systems." 2022 IEEE/IAS Industrial and Commercial Power System Asia (I&CPS Asia). Shanghai, China 08 - 11 Jul 2022 China. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ICPSAsia55496.2022.9949686Paper
Blockchain-enabled trust management for digital marketing in the Industry 4.0 Era
Rabby, Fazla, Chimhundu, Ranga and Hassan, Rumman. 2022. "Blockchain-enabled trust management for digital marketing in the Industry 4.0 Era." Maleh, Yassine, Tawalbeh, Lo’ai, Motahhir, Saad and Hafid, Abdelhakim Senhaji (ed.) Advances in Blockchain Technology for Cyber Physical Systems. Cham, Switzerland. Springer. pp. 303-321Edited book (chapter)
Security and Privacy Factors Influencing the Adoption of Cloud Computing in Australian SMEs
Nagahawatta, Ruwan, Warren, Matthew, Lokuge, Sachithra and Salzman, Scott. 2021. "Security and Privacy Factors Influencing the Adoption of Cloud Computing in Australian SMEs." 25th Pacific Asia Conference on Information Systems (PACIS 2021). Dubai, United Arab Emirates 12 - 14 Jul 2021 United States.Paper
Security concerns influencing the adoption of cloud computing of SMEs: a literature review
Nagahawatta, Ruwan, Warren, Matthew, Lokuge, Sachithra and Salzman, Scott. 2021. "Security concerns influencing the adoption of cloud computing of SMEs: a literature review." 27th Americas Conference on Information Systems: Digital Innovation and Entrepreneurship (AMCIS 2021). Montreal, Canada 09 - 13 Aug 2021 United States.Paper
Analysis of web based structural security patterns by employing ten security principles
Riaz, Rabia, Rizvi, Sanam Shehla, Riaz, Farina, Hameed, Nausheen and Shokat, Sana. 2017. "Analysis of web based structural security patterns by employing ten security principles." International Journal of Computer Science and Network Security. 17 (10), pp. 45-56.Article
A Review of the State of the Art in Privacy and Security in the eHealth Cloud
Sahi, Aqeel, Lai, David and Li, Yan. 2021. "A Review of the State of the Art in Privacy and Security in the eHealth Cloud." IEEE Access. 9, pp. 104127-104141. https://doi.org/10.1109/ACCESS.2021.3098708Article
Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems
Nabi, Faisal, Yong, Jianming, Tao, Xiaohui, Malhi, Muhammad Saqib, Farhan, Muhammad and Mahmood, Umar. 2021. "Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems." Journal of Information Security. 12 (3), pp. 189-211. https://doi.org/10.4236/jis.2021.123010Article
An efficient hash based parallel block cipher mode of operation
Sahi, Aqeel, Lai, David and Li, Yan. 2018. "An efficient hash based parallel block cipher mode of operation." 3rd IEEE International Conference on Computer and Communication Systems (ICCCS 2018). Nagoya, Japan 27 - 30 Apr 2018 New York, United States.Paper
A survey of privacy solutions using blockchain for recommender systems: current status, classification and open issues
Abduljabbar, Tamara Abdulmunim, Tao, Xiaohui, Zhang, Ji, Zhou, Xujuan, Li, Lin and Cai, Yi. 2021. "A survey of privacy solutions using blockchain for recommender systems: current status, classification and open issues." The Computer Journal. 64 (7), pp. 1104-1129. https://doi.org/10.1093/comjnl/bxab065Article
Security aspects in modern service component‑oriented application logic for social e‑commerce systems
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2021. "Security aspects in modern service component‑oriented application logic for social e‑commerce systems." Social Network Analysis and Mining. 11 (1). https://doi.org/10.1007/s13278-020-00717-9Article
Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption
Sahi, Aqeel, Lai, David and Li, Yan. 2018. "Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption." International Journal of Communication Networks and Distributed Systems. 21 (4), pp. 560-581. https://doi.org/10.1504/IJCNDS.2018.095373Article
BDKM: A Blockchain‑Based Secure Deduplication Scheme with Reliable Key Management
Zhang, Guipeng, Xie, Haoran, Yang, Zhenguo, Tao, Xiaohui and Liu, Wenyin. 2022. "BDKM: A Blockchain‑Based Secure Deduplication Scheme with Reliable Key Management." Neural Processing Letters. 54, pp. 2657-2674. https://doi.org/10.1007/s11063-021-10450-9Article
Stakeholder security analysis - a new approach to security design with example application
Hadaad, Nabeel Mahdy Hadaad. 2020. Stakeholder security analysis - a new approach to security design with example application. PhD Thesis Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/05r4-0365PhD Thesis
User authentication into electronic health record based on reliable lightweight algorithms
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2021. "User authentication into electronic health record based on reliable lightweight algorithms." Cruz-Cunha, Maria Manuela and Mateus-Coelho, Nuno Ricardo (ed.) Handbook of research on cyber crime and information privacy. United States. IGI Global. pp. 700-738Edited book (chapter)
Locally differentially private distributed algorithms for set intersection and union [Letter]
Xue, Qiao, Zhu, Youwen, Wang, Jian, Li, Xingxin and Zhang, Ji. 2020. "Locally differentially private distributed algorithms for set intersection and union [Letter]." Science China Information Sciences. https://doi.org/10.1007/s11432-018-9899-8Article
Incorporating security into electronic health records based healthcare systems with wireless sensor networks
Al-Zubaidie, Mishall Hammed Awaad. 2020. Incorporating security into electronic health records based healthcare systems with wireless sensor networks. PhD Thesis Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/e7re-as86PhD Thesis
Fooling intrusion detection systems using adversarially autoencoder
Chen, Junjun, Wu, Di, Zhao, Ying, Sharma, Nabin, Blumenstein, Michael and Yu, Shui. 2021. "Fooling intrusion detection systems using adversarially autoencoder." Digital Communications and Networks. 7 (3), pp. 453-460. https://doi.org/10.1016/j.dcan.2020.11.001Article
Biometrics for internet‐of‐things security: A review
Yang, Wencheng, Wang, Song, Sahri, Nor Masri, Karie, Nickson M., Ahmed, Mohiuddin and Valli, Craig. 2021. "Biometrics for internet‐of‐things security: A review." Sensors. 21 (18). https://doi.org/10.3390/s21186163Article