460403. Data security and protection


Title460403. Data security and protection
Parent4604. Cybersecurity and privacy

Latest research outputs

Sort by Date Title
Evaluating Cryptocurrency Market Risk on the Blockchain: An Empirical Study Using the ARMA-GARCH-VaR Model
Huang, Yongrong, Wang, Huiqing, Chen, Zhide, Feng, Chen, Zhu, Kexin, Yang, Xu and Yang, Wencheng. 2024. "Evaluating Cryptocurrency Market Risk on the Blockchain: An Empirical Study Using the ARMA-GARCH-VaR Model." IEEE Open Journal of the Computer Society. 5, pp. 83-94. https://doi.org/10.1109/OJCS.2024.3370603

Article

Feature extraction and learning approaches for cancellable biometrics: A survey
Yang, Wencheng, Wang, Song, Hu, Jiankun, Tao, Xiaohui and Li, Yan. 2024. "Feature extraction and learning approaches for cancellable biometrics: A survey." CAAI Transactions on Intelligence Technology. 9 (1), pp. 4-25. https://doi.org/10.1049/cit2.12283

Article

Cybersecurity Defence of Synchrophasors in Distribution Systems: A Deep Learning Approach
Zhang, Ge, Cui, Yi, Zhang, Ruiyuan and Bai, Feifei. 2023. "Cybersecurity Defence of Synchrophasors in Distribution Systems: A Deep Learning Approach." 2023 IEEE International Conference on Energy Technologies for Future Grids (ETFG). Wollongong, Australia 03 - 06 Dec 2023 Australia. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ETFG55873.2023.10407305

Paper

A Review of Homomorphic Encryption for Privacy-Preserving Biometrics
Yang, Wencheng, Wang, Song, Cui, Hui, Tang, Zhaohui and Li, Yan. 2023. "A Review of Homomorphic Encryption for Privacy-Preserving Biometrics." Sensors. 23 (7). https://doi.org/10.3390/s23073566

Article

A review of multi-factor authentication in the Internet of Healthcare Things
Suleski, Tance, Ahmed, Mohiuddin, Yang, Wencheng and Wang, Eugene. 2023. "A review of multi-factor authentication in the Internet of Healthcare Things." Digital Health. 9, pp. 1-20. https://doi.org/10.1177/20552076231177144

Article

Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks
Cui, Hui, Yang, Xuechao, Yang, Wencheng, Qin, Baodong and Yi, Xun. 2023. "Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks." IEEE Transactions on Network Science and Engineering. 10 (4), pp. 2347-2357. https://doi.org/10.1109/TNSE.2023.3246439

Contribution to Journal

Exploiting Spatial Signatures of Power ENF Signal for Measurement Source Authentication
Cui, Yi, Liu, Yilu, Fuhr, Peter and Morales-Rodriguez, Marissa. 2018. "Exploiting Spatial Signatures of Power ENF Signal for Measurement Source Authentication." 2018 IEEE International Symposium on Technologies for Homeland Security (HST). Woburn, United States 23 - 24 Oct 2018 Woburn, United States. https://doi.org/10.1109/THS.2018.8574151

Paper

Spatio-Temporal Synchrophasor Data Characterization for Mitigating False Data Injection in Smart Grids
Cui, Yi, Wang, Weikang, Liu, Yilu, Fuhr, Peter and Morales-Rodriguez, Marissa. 2019. "Spatio-Temporal Synchrophasor Data Characterization for Mitigating False Data Injection in Smart Grids." 2020 IEEE Power and Energy Society General Meeting (PESGM). Atlanta, United States 04 - 08 Aug 2020 Atlanta, United States. https://doi.org/10.1109/pesgm40551.2019.8973586

Paper

Source Location Identification of Distribution-Level Electric Network Frequency Signals at Multiple Geographic Scales
Yao, Wenxuan, Zhao, Jiecheng, Till, Micah J., You, Shutang, Liu, Yong, Cui, Yi and Liu, Yilu. 2017. "Source Location Identification of Distribution-Level Electric Network Frequency Signals at Multiple Geographic Scales." IEEE Access. 5, pp. 11166-11175. https://doi.org/10.1109/ACCESS.2017.2707060

Article

A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks
Bedari, Aseel, Wang, Song and Yang, Wencheng. 2022. "A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks." Sensors. 22 (19), pp. 1-16. https://doi.org/10.3390/s22197609

Article

A Measurement Source Authentication Methodology for Power System Cyber Security Enhancement
Cui, Yi, Bai, Feifei, Liu, Yong and Liu, Yilu. 2018. "A Measurement Source Authentication Methodology for Power System Cyber Security Enhancement." IEEE Transactions on Smart Grid. 9 (4), pp. 3914-3916. https://doi.org/10.1109/TSG.2018.2826444

Article

Spatio-Temporal Characterization of Synchrophasor Data Against Spoofing Attacks in Smart Grids
Cui, Yi, Bai, Feifei, Liu, Yilu, Fuhr, Peter L. and Morales-Rodriguez, Marissa E.. 2019. "Spatio-Temporal Characterization of Synchrophasor Data Against Spoofing Attacks in Smart Grids." IEEE Transactions on Smart Grid. 10 (5), pp. 5807-5818. https://doi.org/10.1109/tsg.2019.2891852

Article

Source Authentication of Distribution Synchrophasors for Cybersecurity of Microgrids
Cui, Yi, Bai, Feifei, Yan, Ruifeng, Saha, Tapan, Ko, Ryan K. L. and Liu, Yilu. 2021. "Source Authentication of Distribution Synchrophasors for Cybersecurity of Microgrids." IEEE Transactions on Smart Grid. 12 (5), pp. 4577-4580. https://doi.org/10.1109/tsg.2021.3089041

Article

Multiscale Adaptive Multifractal Detrended Fluctuation Analysis-Based Source Identification of Synchrophasor Data
Cui, Yi, Bai, Feifei, Yin, Hongzhi, Chen, Tong, Dart, David, Zillmann, Matthew and Ko, Ryan K. L.. 2022. "Multiscale Adaptive Multifractal Detrended Fluctuation Analysis-Based Source Identification of Synchrophasor Data." IEEE Transactions on Smart Grid. 13 (6), pp. 4957-4960. https://doi.org/10.1109/tsg.2022.3207066

Article

Multifractal Characterization of Distribution Synchrophasors for Cybersecurity Defense of Smart Grids
Cui, Yi, Bai, Feifei, Yan, Ruifeng, Saha, Tapan, Mosadeghy, Mehdi, Yin, Hongzhi, Ko, Ryan K. L. and Liu, Yilu. 2022. "Multifractal Characterization of Distribution Synchrophasors for Cybersecurity Defense of Smart Grids." IEEE Transactions on Smart Grid. 13 (2), pp. 1658-1661. https://doi.org/10.1109/tsg.2021.3132536

Article

Authenticating source information of distribution synchrophasors at intra-state locations for cyber-physical resilient power networks
Cui, Yi, Bai, Feifei, Saha, Tapan and Yaghoobi, Jalil. 2022. "Authenticating source information of distribution synchrophasors at intra-state locations for cyber-physical resilient power networks." International Journal of Electrical Power and Energy Systems. 139, pp. 1-10. https://doi.org/10.1016/j.ijepes.2022.108009

Article

Data Source Authentication for Wide-Area Synchrophasor Measurements Based On Spatial Signature Extraction and Quadratic Kernel SVM
Liu, Shengyuan, You, Shutang, Yin, He, Lin, Zhenzhi, Liu, Yilu, Cui, Yi, Yao, Wenxuan and Sundaresh, Lakshmi. 2022. "Data Source Authentication for Wide-Area Synchrophasor Measurements Based On Spatial Signature Extraction and Quadratic Kernel SVM." International Journal of Electrical Power and Energy Systems. 140, pp. 1-13. https://doi.org/10.1016/j.ijepes.2022.108083

Article

Cost-effective synchrophasor data source authentication based on multiscale adaptive coupling correlation detrended analysis
Bai, Feifei, Cui, Yi, Yan, Ruifeng, Yin, Hongzhi, Chen, Tong, Dart, David and Yaghoobi, Jalil. 2023. "Cost-effective synchrophasor data source authentication based on multiscale adaptive coupling correlation detrended analysis." International Journal of Electrical Power and Energy Systems. 144, pp. 1-8. https://doi.org/10.1016/j.ijepes.2022.108606

Article

Multimedia security and privacy protection in the internet of things: research developments and challenges
Yang, Wencheng, Wang, Song, Hu, Jiankun and Karie, Nickson M.. 2022. "Multimedia security and privacy protection in the internet of things: research developments and challenges." International Journal of Multimedia Intelligence and Security. 4 (1), pp. 20-46. https://doi.org/10.1504/ijmis.2022.121282

Article

A Survey on Credit Card Fraud Detection Techniques in Banking Industry for Cyber Security
Btoush, Eyad, Zhou, Xujuan, Gururajan, Raj, Chan, KC and Tao, XiaoHui. 2021. "A Survey on Credit Card Fraud Detection Techniques in Banking Industry for Cyber Security." 8th IEEE International Conference on Behavioural and Social Computing (BESC 2021). Doha, Qatar 29 - 31 Oct 2021 Doha, Qatar. https://doi.org/10.1109/BESC53957.2021.9635559

Paper

Blockchain technology transforms digital marketing by growing consumer trust
Rabby, Fazla, Chimhundu, Ranga and Hassan, Rumman. 2022. "Blockchain technology transforms digital marketing by growing consumer trust." Idrees, Sheikh Mohammad and Nowostawski, Mariusz (ed.) Transformations Through Blockchain Technology: The New Digital Revolution. Cham, Switzerland. Springer. pp. 265-289

Edited book (chapter)

Secret sharing-based IoT text data outsourcing: a secure and efficient scheme
Tang, Zhaohui. 2021. "Secret sharing-based IoT text data outsourcing: a secure and efficient scheme." IEEE Access. 9, pp. 76908 -76920. https://doi.org/10.1109/ACCESS.2021.3075282

Article

Feasibility Study on Condition Monitoring of Power Network Asset Using PMU Measurements
Bai, Feifei, Cui, Yi, Zhang, Ge, Dart, David, Yaghoobi, Jalil and Zillmann, Matthew. 2022. "Feasibility Study on Condition Monitoring of Power Network Asset Using PMU Measurements." 2022 IEEE/IAS Industrial and Commercial Power System Asia (I&CPS Asia). Shanghai, China 08 - 11 Jul 2022 China. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ICPSAsia55496.2022.9949946

Paper

Machine Learning-based Cybersecurity Defence of Wide-area Monitoring Systems
He, Qian, Bai, Feifei, Cui, Yi and Zillmann, Matthew. 2022. "Machine Learning-based Cybersecurity Defence of Wide-area Monitoring Systems." 2022 IEEE/IAS Industrial and Commercial Power System Asia (I&CPS Asia). Shanghai, China 08 - 11 Jul 2022 China. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ICPSAsia55496.2022.9949686

Paper

Blockchain-Enabled Trust Management for Digital Marketing in the Industry 4.0 Era
Rabby, Fazla, Chimhundu, Ranga and Hassan, Rumman. 2022. "Blockchain-Enabled Trust Management for Digital Marketing in the Industry 4.0 Era." Maleh, Yassine, Tawalbeh, Lo’ai, Motahhir, Saad and Hafid, Abdelhakim Senhaji (ed.) Advances in Blockchain Technology for Cyber Physical Systems. Cham, Switzerland. Springer. pp. 303-321

Edited book (chapter)

Security and Privacy Factors Influencing the Adoption of Cloud Computing in Australian SMEs
Nagahawatta, Ruwan, Warren, Matthew, Lokuge, Sachithra and Salzman, Scott. 2021. "Security and Privacy Factors Influencing the Adoption of Cloud Computing in Australian SMEs." 25th Pacific Asia Conference on Information Systems (PACIS 2021). Dubai, United Arab Emirates 12 - 14 Jul 2021 United States.

Paper

An efficient hash based parallel block cipher mode of operation
Sahi, Aqeel, Lai, David and Li, Yan. 2018. "An efficient hash based parallel block cipher mode of operation." 3rd IEEE International Conference on Computer and Communication Systems (ICCCS 2018). Nagoya, Japan 27 - 30 Apr 2018 New York, United States.

Paper

Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption
Sahi, Aqeel, Lai, David and Li, Yan. 2018. "Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption." International Journal of Communication Networks and Distributed Systems. 21 (4), pp. 560-581. https://doi.org/10.1504/IJCNDS.2018.095373

Article

BDKM: A Blockchain‑Based Secure Deduplication Scheme with Reliable Key Management
Zhang, Guipeng, Xie, Haoran, Yang, Zhenguo, Tao, Xiaohui and Liu, Wenyin. 2022. "BDKM: A Blockchain‑Based Secure Deduplication Scheme with Reliable Key Management." Neural Processing Letters. 54, pp. 2657-2674. https://doi.org/10.1007/s11063-021-10450-9

Article

Incorporating security into electronic health records based healthcare systems with wireless sensor networks
Al-Zubaidie, Mishall Hammed Awaad. 2020. Incorporating security into electronic health records based healthcare systems with wireless sensor networks. PhD Thesis Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/e7re-as86

PhD Thesis

Organizing Classification of Application Logic Attacks in Component-based E-Commerce Systems
Nabi, Faisal, Yong, Jianming, Tao, Xiaohui, Farhan, Muhammad and Naseem, Nauman. 2021. "Organizing Classification of Application Logic Attacks in Component-based E-Commerce Systems." Journal of Computer Science. 17 (11), pp. 1046-1057. https://doi.org/10.3844/JCSSP.2021.1046.1058

Article

An Efficient Scheme to Secure Data Provenance in Home Area Networks
Tang, Zhaohui and Keoh, Sye Loong. 2020. "An Efficient Scheme to Secure Data Provenance in Home Area Networks." IEEE 3rd 5G World Forum (5GWF 2020). Bangalore, India 10 - 12 Sep 2020 United States. https://doi.org/10.1109/5GWF49715.2020.9221402

Paper

An Achilles heel: denial of service attacks on Australian critical information infrastructures
Christensen, Sharon, Caelli, William J., Duncan, William D. and Georgiades, Eugenia. 2010. "An Achilles heel: denial of service attacks on Australian critical information infrastructures." Information and Communications Technology Law. 19 (1), pp. 61-85. https://doi.org/10.1080/13600831003708059

Article