4604. Cybersecurity and privacy


Title4604. Cybersecurity and privacy
Parent46. Information and Computing Sciences

Latest research outputs

Sort by Date Title
Data Source Authentication for Wide-Area Synchrophasor Measurements Based On Spatial Signature Extraction and Quadratic Kernel SVM
Liu, Shengyuan, You, Shutang, Yin, He, Lin, Zhenzhi, Liu, Yilu, Cui, Yi, Yao, Wenxuan and Sundaresh, Lakshmi. 2022. "Data Source Authentication for Wide-Area Synchrophasor Measurements Based On Spatial Signature Extraction and Quadratic Kernel SVM." International Journal of Electrical Power and Energy Systems. 140, pp. 1-13. https://doi.org/10.1016/j.ijepes.2022.108083

Article

Efficient Beaver Triple Generation for Privacy-preserving Collaborative Machine Learning
Tang, Zhaohui. 2022. "Efficient Beaver Triple Generation for Privacy-preserving Collaborative Machine Learning." Cho, Seongsoo (ed.) 9th International Conference on Advanced Engineering and ICT-Convergence (ICAEIC-2022). Jeju Island, Korea 13 - 15 Jul 2022 Seoul, Korea.

Paper

An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy
Shamshad, Shuhab, Riaz, Farina, Riaz, Rabia, Rizvi, Sanam Shahla and Abdulla, Shahab. 2022. "An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy." Sensors. 22 (21), pp. 1-24. https://doi.org/10.3390/s22218151

Article

Multimedia security and privacy protection in the internet of things: research developments and challenges
Yang, Wencheng, Wang, Song, Hu, Jiankun and Karie, Nickson M.. 2022. "Multimedia security and privacy protection in the internet of things: research developments and challenges." International Journal of Multimedia Intelligence and Security. 4 (1), pp. 20-46. https://doi.org/10.1504/ijmis.2022.121282

Article

A linear convolution-based cancelable fingerprint biometric authentication system
Yang, Wencheng, Wang, Song, Kang, James Jin, Johnstone, Michael N. and Bedari, Aseel. 2022. "A linear convolution-based cancelable fingerprint biometric authentication system." Computers and Security. 114, pp. 1-14. https://doi.org/10.1016/j.cose.2021.102583

Article

A Survey on Credit Card Fraud Detection Techniques in Banking Industry for Cyber Security
Btoush, Eyad, Zhou, Xujuan, Gururajan, Raj, Chan, KC and Tao, XiaoHui. 2021. "A Survey on Credit Card Fraud Detection Techniques in Banking Industry for Cyber Security." 8th IEEE International Conference on Behavioural and Social Computing (BESC 2021). Doha, Qatar 29 - 31 Oct 2021 Doha, Qatar. https://doi.org/10.1109/BESC53957.2021.9635559

Paper

A Review on Security Issues and Solutions of the Internet of Drones
Yang, Wencheng, Wang, Song, Yin, Xuefei, Wang, Xu and Hu, Jiankun. 2022. "A Review on Security Issues and Solutions of the Internet of Drones." IEEE Open Journal of the Computer Society. 3, pp. 96-110. https://doi.org/10.1109/OJCS.2022.3183003

Article

Federated Learning with Real-world Datasets: Compliance with the Privacy Act
Tang, Zhaohui and Keoh, Sye Loong. 2022. "Federated Learning with Real-world Datasets: Compliance with the Privacy Act." Cho, Seongsoo (ed.) 9th International Conference on Advanced Engineering and ICT-Convergence (ICAEIC-2022). Jeju Island, Korea 13 - 15 Jul 2022 Seoul, Korea.

Paper

Network Forensics in the Era of Artificial Intelligence
Yang, Wencheng, Johnstone, Michael N., Wang, Song, Karie, Nickson M., Bin Sahri, Nor Masri and Kang, James Jin. 2022. "Network Forensics in the Era of Artificial Intelligence." Ahmed, Mohiuddin, Islam, Sheikh Rabiul, Anwar, Adnan, Moustafa, Nour and Pathan, Al-Sakib Khan (ed.) Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence. Cham, Switzerland. Springer. pp. 171-190

Edited book (chapter)

Defending against membership inference attacks in federated learning via adversarial example
Xie, Yuanyuan, Chen, Bing, Zhang, Jiale and Wu, Di. 2021. "Defending against membership inference attacks in federated learning via adversarial example." 2021 17th International Conference on Mobility, Sensing and Networking (MSN). Exeter, United Kingdom 13 - 15 Dec 2021 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/MSN53354.2021.00036

Paper

Cybersecurity Issues and Practices in a Cloud Context: A Comparison Amongst Micro, Small and Medium Enterprises
Nagahawatta, Ruwan, Lokuge, Sachithra, Warren, Matthew and Salzman, Scott. 2021. "Cybersecurity Issues and Practices in a Cloud Context: A Comparison Amongst Micro, Small and Medium Enterprises." 32nd Australasian Conference on Information Systems (ACIS 2021). Sydney, Australia 06 - 10 Dec 2021 Australia.

Paper

A social contract for cyberspace
Sheniar, Dawood, Northway, James, Talbot, James, Millsom, David, Li, Yan and Addie, Ron. 2021. "A social contract for cyberspace." 31st International Telecommunication Networks and Application Conference (ITNAC). Sydney, Australia 24 - 26 Nov 2021 Sydney. https://doi.org/10.1109/ITNAC53136.2021.9652166

Paper

A survey on detection of cybersecurity threats on Twitter using deep learning
Alsodi, Omar, Zhou, Xujuan, Gururajan, Raj and Shrestha, Anup. 2021. "A survey on detection of cybersecurity threats on Twitter using deep learning." Xu, Guandong, Ali, Raian, Zaghouani, Wajdi, Tao, Xiaohui and Li, Lin (ed.) 8th IEEE International Conference on Behavioural and Social Computing (BESC 2021). Doha, Qatar 29 - 31 Oct 2021 United States. https://doi.org/10.1109/BESC53957.2021.9635406

Paper

A federated learning based semi-supervised credit prediction approach enhanced by multi-layer label mean
Li, Lin, Long, Sijie, Bi, Jiaxiu, Wang, Guowei, Zhang, Jiawei and Tao, Xiaohui. 2021. "A federated learning based semi-supervised credit prediction approach enhanced by multi-layer label mean." Web Intelligence. 19 (4), pp. 329-342. https://doi.org/10.3233/WEB-210476

Article

Blockchain technology transforms digital marketing by growing consumer trust
Rabby, Fazla, Chimhundu, Ranga and Hassan, Rumman. 2022. "Blockchain technology transforms digital marketing by growing consumer trust." Idrees, Sheikh Mohammad and Nowostawski, Mariusz (ed.) Transformations Through Blockchain Technology: The New Digital Revolution. Cham, Switzerland. Springer. pp. 265-289

Edited book (chapter)

Secret sharing-based IoT text data outsourcing: a secure and efficient scheme
Tang, Zhaohui. 2021. "Secret sharing-based IoT text data outsourcing: a secure and efficient scheme." IEEE Access. 9, pp. 76908 -76920. https://doi.org/10.1109/ACCESS.2021.3075282

Article

Demarcating the Privacy Issues of Aarogya Setu App in Covid-19 Pandemic in India: An Exploration into Contact Tracing Mobile Applications from Elaboration Likelihood Model
Acharya, Nirmal and Sharma, Abhishek. 2022. "Demarcating the Privacy Issues of Aarogya Setu App in Covid-19 Pandemic in India: An Exploration into Contact Tracing Mobile Applications from Elaboration Likelihood Model." 4th International Conference on HCI for Cybersecurity, Privacy, and Trust (HCI-CPT 2022). 26 Jun - 01 Jul 2022 Switzerland . Springer. https://doi.org/10.1007/978-3-031-05563-8_28

Paper

Campus Network Intrusion Detection based on Federated Learning
Chen, Junjun, Guo, Qiang, Fu, Zhongnan, Shang, Qun, Ma, Hao and Wu, Di. 2022. "Campus Network Intrusion Detection based on Federated Learning." 2022 International Joint Conference on Neural Networks (IJCNN). Padua, Italy 18 - 23 Jul 2022 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/IJCNN55064.2022.9892843

Paper

From distributed machine learning to federated learning: In the view of data privacy and security
Shen, Sheng, Zhu, Tianqing, Wu, Di, Wang, Wei and Zhou, Wanlei. 2022. "From distributed machine learning to federated learning: In the view of data privacy and security." Concurrency and Computation: Practice and Experience. 34 (16). https://doi.org/10.1002/cpe.6002

Article

A Blockchain-based Multi-layer Decentralized Framework for Robust Federated Learning
Wu, Di, Wang, Nai, Zhang, Jiale, Zhang, Yuan, Xiang, Yong and Gao, Longxiang. 2022. "A Blockchain-based Multi-layer Decentralized Framework for Robust Federated Learning." 2022 International Joint Conference on Neural Networks (IJCNN). Padua, Italy 18 - 23 Jul 2022 IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/IJCNN55064.2022.9892039

Paper

Detecting and mitigating poisoning attacks in federated learning using generative adversarial networks
Zhao, Ying, Chen, Junjun, Zhang, Jiale, Wu, Di, Blumenstein, Michael and Yu, Shui. 2022. "Detecting and mitigating poisoning attacks in federated learning using generative adversarial networks." Concurrency and Computation: Practice and Experience. 34 (7). https://doi.org/10.1002/cpe.5906

Article

Feasibility Study on Condition Monitoring of Power Network Asset Using PMU Measurements
Bai, Feifei, Cui, Yi, Zhang, Ge, Dart, David, Yaghoobi, Jalil and Zillmann, Matthew. 2022. "Feasibility Study on Condition Monitoring of Power Network Asset Using PMU Measurements." 2022 IEEE/IAS Industrial and Commercial Power System Asia (I&CPS Asia). Shanghai, China 08 - 11 Jul 2022 China. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ICPSAsia55496.2022.9949946

Paper

Machine Learning-based Cybersecurity Defence of Wide-area Monitoring Systems
He, Qian, Bai, Feifei, Cui, Yi and Zillmann, Matthew. 2022. "Machine Learning-based Cybersecurity Defence of Wide-area Monitoring Systems." 2022 IEEE/IAS Industrial and Commercial Power System Asia (I&CPS Asia). Shanghai, China 08 - 11 Jul 2022 China. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ICPSAsia55496.2022.9949686

Paper

Blockchain-enabled trust management for digital marketing in the Industry 4.0 Era
Rabby, Fazla, Chimhundu, Ranga and Hassan, Rumman. 2022. "Blockchain-enabled trust management for digital marketing in the Industry 4.0 Era." Maleh, Yassine, Tawalbeh, Lo’ai, Motahhir, Saad and Hafid, Abdelhakim Senhaji (ed.) Advances in Blockchain Technology for Cyber Physical Systems. Cham, Switzerland. Springer. pp. 303-321

Edited book (chapter)

Security and Privacy Factors Influencing the Adoption of Cloud Computing in Australian SMEs
Nagahawatta, Ruwan, Warren, Matthew, Lokuge, Sachithra and Salzman, Scott. 2021. "Security and Privacy Factors Influencing the Adoption of Cloud Computing in Australian SMEs." 25th Pacific Asia Conference on Information Systems (PACIS 2021). Dubai, United Arab Emirates 12 - 14 Jul 2021 United States.

Paper

Security concerns influencing the adoption of cloud computing of SMEs: a literature review
Nagahawatta, Ruwan, Warren, Matthew, Lokuge, Sachithra and Salzman, Scott. 2021. "Security concerns influencing the adoption of cloud computing of SMEs: a literature review." 27th Americas Conference on Information Systems: Digital Innovation and Entrepreneurship (AMCIS 2021). Montreal, Canada 09 - 13 Aug 2021 United States.

Paper

Analysis of web based structural security patterns by employing ten security principles
Riaz, Rabia, Rizvi, Sanam Shehla, Riaz, Farina, Hameed, Nausheen and Shokat, Sana. 2017. "Analysis of web based structural security patterns by employing ten security principles." International Journal of Computer Science and Network Security. 17 (10), pp. 45-56.

Article

A Review of the State of the Art in Privacy and Security in the eHealth Cloud
Sahi, Aqeel, Lai, David and Li, Yan. 2021. "A Review of the State of the Art in Privacy and Security in the eHealth Cloud." IEEE Access. 9, pp. 104127-104141. https://doi.org/10.1109/ACCESS.2021.3098708

Article

Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems
Nabi, Faisal, Yong, Jianming, Tao, Xiaohui, Malhi, Muhammad Saqib, Farhan, Muhammad and Mahmood, Umar. 2021. "Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems." Journal of Information Security. 12 (3), pp. 189-211. https://doi.org/10.4236/jis.2021.123010

Article

An efficient hash based parallel block cipher mode of operation
Sahi, Aqeel, Lai, David and Li, Yan. 2018. "An efficient hash based parallel block cipher mode of operation." 3rd IEEE International Conference on Computer and Communication Systems (ICCCS 2018). Nagoya, Japan 27 - 30 Apr 2018 New York, United States.

Paper

A survey of privacy solutions using blockchain for recommender systems: current status, classification and open issues
Abduljabbar, Tamara Abdulmunim, Tao, Xiaohui, Zhang, Ji, Zhou, Xujuan, Li, Lin and Cai, Yi. 2021. "A survey of privacy solutions using blockchain for recommender systems: current status, classification and open issues." The Computer Journal. 64 (7), pp. 1104-1129. https://doi.org/10.1093/comjnl/bxab065

Article

Security aspects in modern service component‑oriented application logic for social e‑commerce systems
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2021. "Security aspects in modern service component‑oriented application logic for social e‑commerce systems." Social Network Analysis and Mining. 11 (1). https://doi.org/10.1007/s13278-020-00717-9

Article

Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption
Sahi, Aqeel, Lai, David and Li, Yan. 2018. "Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption." International Journal of Communication Networks and Distributed Systems. 21 (4), pp. 560-581. https://doi.org/10.1504/IJCNDS.2018.095373

Article

BDKM: A Blockchain‑Based Secure Deduplication Scheme with Reliable Key Management
Zhang, Guipeng, Xie, Haoran, Yang, Zhenguo, Tao, Xiaohui and Liu, Wenyin. 2022. "BDKM: A Blockchain‑Based Secure Deduplication Scheme with Reliable Key Management." Neural Processing Letters. 54, pp. 2657-2674. https://doi.org/10.1007/s11063-021-10450-9

Article

Stakeholder security analysis - a new approach to security design with example application
Hadaad, Nabeel Mahdy Hadaad. 2020. Stakeholder security analysis - a new approach to security design with example application. PhD Thesis Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/05r4-0365

PhD Thesis

User authentication into electronic health record based on reliable lightweight algorithms
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2021. "User authentication into electronic health record based on reliable lightweight algorithms." Cruz-Cunha, Maria Manuela and Mateus-Coelho, Nuno Ricardo (ed.) Handbook of research on cyber crime and information privacy. United States. IGI Global. pp. 700-738

Edited book (chapter)

Locally differentially private distributed algorithms for set intersection and union [Letter]
Xue, Qiao, Zhu, Youwen, Wang, Jian, Li, Xingxin and Zhang, Ji. 2020. "Locally differentially private distributed algorithms for set intersection and union [Letter]." Science China Information Sciences. https://doi.org/10.1007/s11432-018-9899-8

Article

Incorporating security into electronic health records based healthcare systems with wireless sensor networks
Al-Zubaidie, Mishall Hammed Awaad. 2020. Incorporating security into electronic health records based healthcare systems with wireless sensor networks. PhD Thesis Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/e7re-as86

PhD Thesis

Fooling intrusion detection systems using adversarially autoencoder
Chen, Junjun, Wu, Di, Zhao, Ying, Sharma, Nabin, Blumenstein, Michael and Yu, Shui. 2021. "Fooling intrusion detection systems using adversarially autoencoder." Digital Communications and Networks. 7 (3), pp. 453-460. https://doi.org/10.1016/j.dcan.2020.11.001

Article

Biometrics for internet‐of‐things security: A review
Yang, Wencheng, Wang, Song, Sahri, Nor Masri, Karie, Nickson M., Ahmed, Mohiuddin and Valli, Craig. 2021. "Biometrics for internet‐of‐things security: A review." Sensors. 21 (18). https://doi.org/10.3390/s21186163

Article