Lei Pan

Affiliations:
  • Deakin University, School of IT, Faculty of Science and Technology, Melbourne, Australia


According to our database1, Lei Pan authored at least 85 papers between 2005 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Machine Learning-based Cyber Attacks Targeting on Controlled Information: A Survey.
ACM Comput. Surv., 2022

2021
Data congestion in VANETs: research directions and new trends through a bibliometric analysis.
J. Supercomput., 2021

Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases.
IEEE Trans. Dependable Secur. Comput., 2021

Private and Trustworthy Distributed Lending Model Using Hyperledger Besu.
SN Comput. Sci., 2021

The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services.
Proc. Priv. Enhancing Technol., 2021

Deep learning algorithms for cyber security applications: A survey.
J. Comput. Secur., 2021

SolGuard: Preventing external call issues in smart contract-based multi-agent robotic systems.
Inf. Sci., 2021

Multipath TCP Meets Transfer Learning: A Novel Edge-Based Learning for Industrial IoT.
IEEE Internet Things J., 2021

Improving malicious PDF classifier with feature engineering: A data-driven approach.
Future Gener. Comput. Syst., 2021

A Survey of Android Malware Detection with Deep Neural Models.
ACM Comput. Surv., 2021

The importance of selecting clustering parameters in VANETs: A survey.
Comput. Sci. Rev., 2021

ECG-Adv-GAN: Detecting ECG Adversarial Examples with Conditional Generative Adversarial Networks.
CoRR, 2021

Microwave Link Failures Prediction via LSTM-based Feature Fusion Network.
Proceedings of the International Joint Conference on Neural Networks, 2021

Detecting and Controlling the Occurrence of Data Congestion in a High-density VANETs Environment.
Proceedings of the 29th Conference of Open Innovations Association, 2021

2020
Privacy Protection in Interactive Content Based Image Retrieval.
IEEE Trans. Dependable Secur. Comput., 2020

Data-Driven Cyber Security in Perspective - Intelligent Traffic Analysis.
IEEE Trans. Cybern., 2020

Analysis of weighted quantum secret sharing based on matrix product states.
Quantum Inf. Process., 2020

High-capacity (2, 3) threshold quantum secret sharing based on asymmetric quantum lossy channels.
Quantum Inf. Process., 2020

Gathering Intelligence on Student Information Behavior Using Data Mining.
Libr. Trends, 2020

Code analysis for intelligent cyber systems: A data-driven approach.
Inf. Sci., 2020

VoterChoice: A ransomware detection honeypot with multiple voting framework.
Concurr. Comput. Pract. Exp., 2020

Software Vulnerability Analysis and Discovery Using Deep Learning Techniques: A Survey.
IEEE Access, 2020

Opportunistic Tracking in Cyber-Physical Systems.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Unmasking Windows Advanced Persistent Threat Execution.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Security Evaluation of Smart Contract-Based On-chain Ethereum Wallets.
Proceedings of the Network and System Security - 14th International Conference, 2020

Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network.
Proceedings of the Network and System Security - 14th International Conference, 2020

2019
Noise-Resistant Statistical Traffic Classification.
IEEE Trans. Big Data, 2019

Automatic extraction and integration of behavioural indicators of malware for protection of cyber-physical networks.
Future Gener. Comput. Syst., 2019

Cyber security insights into self-proclaimed virtual world hackers.
CoRR, 2019

Security Analysis Methods on Ethereum Smart Contract Vulnerabilities: A Survey.
CoRR, 2019

The Audio Auditor: Participant-Level Membership Inference in Voice-Based IoT.
CoRR, 2019

Editorial: Recent advances in machine learning for cybersecurity.
Concurr. Comput. Pract. Exp., 2019

Protean Authentication Scheme - A Time-Bound Dynamic KeyGen Authentication Technique for IoT Edge Nodes in Outdoor Deployments.
IEEE Access, 2019

A3CM: Automatic Capability Annotation for Android Malware.
IEEE Access, 2019

Predicting the Impact of Android Malicious Samples via Machine Learning.
IEEE Access, 2019

Data-Driven Android Malware Intelligence: A Survey.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

A Visualization-Based Analysis on Classifying Android Malware.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Multiple Energy Harvesting Devices Enabled Joint Computation Offloading and Dynamic Resource Allocation for Mobile-Edge Computing Systems.
Proceedings of the 2019 IEEE International Conference on Web Services, 2019

Domain-Adversarial Graph Neural Networks for Text Classification.
Proceedings of the 2019 IEEE International Conference on Data Mining, 2019

Attainable Hacks on Keystore Files in Ethereum Wallets - A Systematic Analysis.
Proceedings of the Future Network Systems and Security - 5th International Conference, 2019

Password Strength Estimators Trained on the Leaked Password Lists.
Proceedings of the Applications and Techniques in Information Security, 2019

2018
Cross-Project Transfer Representation Learning for Vulnerable Function Discovery.
IEEE Trans. Ind. Informatics, 2018

Exploring Feature Coupling and Model Coupling for Image Source Identification.
IEEE Trans. Inf. Forensics Secur., 2018

A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement.
Quantum Inf. Process., 2018

Big network traffic data visualization.
Multim. Tools Appl., 2018

Identifying items for moderation in a peer assessment framework.
Knowl. Based Syst., 2018

Object localisation through clustering unreliable ultrasonic range sensors.
Int. J. Sens. Networks, 2018

Automated Big Traffic Analytics for Cyber Security.
CoRR, 2018

Comprehensive analysis of network traffic data.
Concurr. Comput. Pract. Exp., 2018

Intelligent agents defending for an IoT world: A review.
Comput. Secur., 2018

High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space.
Sci. China Inf. Sci., 2018

A Quantitative Approach to Design Special Purpose Systems to Measure Hacking Skills.
Proceedings of the IEEE International Conference on Teaching, 2018

A Scalable and Efficient PKI Based Authentication Protocol for VANETs.
Proceedings of the 28th International Telecommunication Networks and Applications Conference, 2018

Identifying Drawbacks in Malicious PDF Detectors.
Proceedings of the Future Network Systems and Security - 4th International Conference, 2018

Keep Calm and Know Where to Focus: Measuring and Predicting the Impact of Android Malware.
Proceedings of the Advanced Data Mining and Applications - 14th International Conference, 2018

Honeypot Frameworks and their Applications: A New Framework
SpringerBriefs on Cyber Security Systems and Networks, Springer, ISBN: 978-981-10-7738-8, 2018

2017
Cyber security attacks to modern vehicular systems.
J. Inf. Secur. Appl., 2017

A Testbed for Security Analysis of Modern Vehicle Systems.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Portguard - an authentication tool for securing ports in an IoT gateway.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

Online peer marking with aggregation functions.
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017

POSTER: Vulnerability Discovery with Function Representation Learning from Unlabeled Projects.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Distributed Detection of Zero-Day Network Traffic Flows.
Proceedings of the Data Mining, 2017

Security analysis of modern mission critical android mobile applications.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

Visual representation of penetration testing actions and skills in a technical tree model.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

2016
Investigating Security Vulnerabilities in Modern Vehicle Systems.
Proceedings of the Applications and Techniques in Information Security, 2016

Comprehensive Analysis of Network Traffic Data.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Enhanced Twitter Sentiment Analysis by Using Feature Selection and Combination.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

2014
Privacy preserving collaborative filtering for KNN attack resisting.
Soc. Netw. Anal. Min., 2014

Privacy Preserving in Location Data Release: A Differential Privacy Approach.
Proceedings of the PRICAI 2014: Trends in Artificial Intelligence, 2014

Generating Repudiable, Memorizable, and Privacy Preserving Security Questions Using the Propp Theory of Narrative.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

2013
Developing an Empirical Algorithm for Protecting Text-Based CAPTCHAs against Segmentation Attacks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Developing a Cloud Computing Based Approach for Forensic Analysis Using OCR.
Proceedings of the Seventh International Conference on IT Security Incident Management and IT Forensics, 2013

2012
Hypothesis Generation and Testing in Event Profiling for Digital Forensic Investigations.
Int. J. Digit. Crime Forensics, 2012

Using Hypothesis Generation in Event Profiling for Digital Forensic Investigations.
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012

2010
Testing Digital Forensic Software Tools Used in Expert Testimony.
Proceedings of the Handbook of Research on Computational Forensics, 2010

Dynamic Addressing in Wireless Sensor Networks without Location Awareness.
J. Inf. Sci. Eng., 2010

Using Relationship-Building in Event Profiling for Digital Forensic Investigations.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

2009
Robust performance testing for digital forensic tools.
Digit. Investig., 2009

Robust Correctness Testing for Digital Forensic Tools.
Proceedings of the Forensics in Telecommunications, 2009

2008
Teaching Digital Forensics to Undergraduate Students.
IEEE Secur. Priv., 2008

Measure of Integrity Leakage in Live Forensic Context.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2007
A Lower Bound on Effective Performance Testing for Digital Forensic Tools.
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007

An Effective and Efficient Testing Methodology for Correctness Testing for File Recovery Tools.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
Lease Based Addressing for Event-Driven Wireless Sensor Networks.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

2005
Reproducibility of Digital Evidence in Forensic Investigations.
Proceedings of the Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, 2005


  Loading...