Wanlei Zhou

Orcid: 0000-0002-1680-2521

Affiliations:
  • City University of Macau, Institute of Data Science, Macau
  • University of Technology Sydney, School of Computer Science, NSW, Australia
  • Deakin University, Melbourne Burwood Campus, VIC, Australia (1994 - 2018)
  • National University of Singapore, Singapore (1992 - 1994)
  • Australian National University, Canberra, Australia (PhD 1991)


According to our database1, Wanlei Zhou authored at least 433 papers between 1990 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Location-Based Real-Time Updated Advising Method for Traffic Signal Control.
IEEE Internet Things J., April, 2024

Blockchain-Empowered Multiagent Systems: Advancing IoT Security and Transaction Efficiency.
IEEE Internet Things J., April, 2024

Privacy and Fairness in Federated Learning: On the Perspective of Tradeoff.
ACM Comput. Surv., February, 2024

A two-stage model extraction attack on GANs with a small collected dataset.
Comput. Secur., February, 2024

Graph neural networks: a survey on the links between privacy and security.
Artif. Intell. Rev., February, 2024

Machine Unlearning: A Survey.
ACM Comput. Surv., January, 2024

Defending Against Label-Only Attacks via Meta-Reinforcement Learning.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Privacy and evolutionary cooperation in neural-network-based game theory.
Knowl. Based Syst., December, 2023

A Game-Theoretic Federated Learning Framework for Data Quality Improvement.
IEEE Trans. Knowl. Data Eng., November, 2023

Model-Based Self-Advising for Multi-Agent Learning.
IEEE Trans. Neural Networks Learn. Syst., October, 2023

Revisiting model fairness via adversarial examples.
Knowl. Based Syst., October, 2023

Balancing Learning Model Privacy, Fairness, and Accuracy With Early Stopping Criteria.
IEEE Trans. Neural Networks Learn. Syst., September, 2023

Time-Driven and Privacy-Preserving Navigation Model for Vehicle-to-Vehicle Communication Systems.
IEEE Trans. Veh. Technol., July, 2023

Privacy Data Diffusion Modeling and Preserving in Online Social Network.
IEEE Trans. Knowl. Data Eng., June, 2023

Evolution of cooperation in malicious social networks with differential privacy mechanisms.
Neural Comput. Appl., June, 2023

Differentially Private Crowdsourcing With the Public and Private Blockchain.
IEEE Internet Things J., May, 2023

Learning Games for Defending Advanced Persistent Threats in Cyber Systems.
IEEE Trans. Syst. Man Cybern. Syst., April, 2023

A Robust Game-Theoretical Federated Learning Framework With Joint Differential Privacy.
IEEE Trans. Knowl. Data Eng., April, 2023

Adversarial Attacks Against Deep Generative Models on Data: A Survey.
IEEE Trans. Knowl. Data Eng., April, 2023

Privacy Data Propagation and Preservation in Social Media: A Real-World Case Study.
IEEE Trans. Knowl. Data Eng., April, 2023

Sparse representation for heterogeneous information networks.
Neurocomputing, March, 2023

Fairness in graph-based semi-supervised learning.
Knowl. Inf. Syst., February, 2023

Label-Only Model Inversion Attacks: Attack With the Least Information.
IEEE Trans. Inf. Forensics Secur., 2023

FedRecovery: Differentially Private Machine Unlearning for Federated Learning Frameworks.
IEEE Trans. Inf. Forensics Secur., 2023

A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems.
IEEE Trans. Inf. Forensics Secur., 2023

Label-Only Membership Inference Attacks and Defenses in Semantic Segmentation Models.
IEEE Trans. Dependable Secur. Comput., 2023

Making DeepFakes More Spurious: Evading Deep Face Forgery Detection via Trace Removal Attack.
IEEE Trans. Dependable Secur. Comput., 2023

CIFair: Constructing continuous domains of invariant features for image fair classifications.
Knowl. Based Syst., 2023

Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity.
ACM Comput. Surv., 2023

Privacy Intelligence: A Survey on Image Privacy in Online Social Networks.
ACM Comput. Surv., 2023

Reinforcement Unlearning.
CoRR, 2023

FD-MIA: Efficient Attacks on Fairness-enhanced Models.
CoRR, 2023

Generative Adversarial Networks Unlearning.
CoRR, 2023

Robust Audio Anti-Spoofing with Fusion-Reconstruction Learning on Multi-Order Spectrograms.
CoRR, 2023

Privacy and Fairness in Federated Learning: on the Perspective of Trade-off.
CoRR, 2023

Boosting Model Inversion Attacks with Adversarial Examples.
CoRR, 2023

Low-frequency Image Deep Steganography: Manipulate the Frequency Distribution to Hide Secrets with Tenacious Robustness.
CoRR, 2023

High-frequency Matters: An Overwriting Attack and defense for Image-processing Neural Network Watermarking.
CoRR, 2023

New challenges in reinforcement learning: a survey of security and privacy.
Artif. Intell. Rev., 2023

Towards Robust Gan-Generated Image Detection: A Multi-View Completion Representation.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Protect Trajectory Privacy in Food Delivery with Differential Privacy and Multi-agent Reinforcement Learning.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
Desynchronization-attack-resilient audio watermarking mechanism for stereo signals using the linear correlation between channels.
World Wide Web, 2022

Time-optimal and privacy preserving route planning for carpool policy.
World Wide Web, 2022

Maximizing User Service Satisfaction for Delay-Sensitive IoT Applications in Edge Computing.
IEEE Trans. Parallel Distributed Syst., 2022

Service Provisioning for Multi-source IoT Applications in Mobile Edge Computing.
ACM Trans. Sens. Networks, 2022

Near Optimal Learning-Driven Mechanisms for Stable NFV Markets in Multitier Cloud Networks.
IEEE/ACM Trans. Netw., 2022

Request Reliability Augmentation With Service Function Chain Requirements in Mobile Edge Computing.
IEEE Trans. Mob. Comput., 2022

More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence.
IEEE Trans. Knowl. Data Eng., 2022

The Dynamic Privacy-Preserving Mechanisms for Online Dynamic Social Networks.
IEEE Trans. Knowl. Data Eng., 2022

Fairness in Semi-Supervised Learning: Unlabeled Data Help to Reduce Discrimination.
IEEE Trans. Knowl. Data Eng., 2022

Recognizing Very Small Face Images Using Convolution Neural Networks.
IEEE Trans. Intell. Transp. Syst., 2022

Recognizing Palm Vein in Smartphones Using RGB Images.
IEEE Trans. Ind. Informatics, 2022

One Parameter Defense - Defending Against Data Inference Attacks via Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2022

Differentially Private Multi-Agent Planning for Logistic-Like Problems.
IEEE Trans. Dependable Secur. Comput., 2022

Differential Advising in Multiagent Reinforcement Learning.
IEEE Trans. Cybern., 2022

Energy-Aware Collaborative Service Caching in a 5G-Enabled MEC With Uncertain Payoffs.
IEEE Trans. Commun., 2022

Image fairness in deep learning: problems, models, and challenges.
Neural Comput. Appl., 2022

Data forwarding: A new VoteRank and Assortativity based approach to improve propagation time in social networks.
J. High Speed Networks, 2022

Multi-agent reinforcement learning via knowledge transfer with differentially private noise.
Int. J. Intell. Syst., 2022

More than Privacy: Adopting Differential Privacy in Game-theoretic Mechanism Design.
ACM Comput. Surv., 2022

How Does a Deep Learning Model Architecture Impact Its Privacy?
CoRR, 2022

Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It.
CoRR, 2022

Label-only Model Inversion Attack: The Attack that Requires the Least Information.
CoRR, 2022

Private-encoder: Enforcing privacy in latent space for human face images.
Concurr. Comput. Pract. Exp., 2022

From distributed machine learning to federated learning: In the view of data privacy and security.
Concurr. Comput. Pract. Exp., 2022

Correlated data in differential privacy: Definition and analysis.
Concurr. Comput. Pract. Exp., 2022

Fairness and privacy preservation for facial images: GAN-based methods.
Comput. Secur., 2022

Visual privacy attacks and defenses in deep learning: a survey.
Artif. Intell. Rev., 2022

Privacy-Preserving in Double Deep-Q-Network with Differential Privacy in Continuous Spaces.
Proceedings of the AI 2021: Advances in Artificial Intelligence, 2022

2021
Can Steering Wheel Detect Your Driving Fatigue?
IEEE Trans. Veh. Technol., 2021

Effective Quarantine and Recovery Scheme Against Advanced Persistent Threat.
IEEE Trans. Syst. Man Cybern. Syst., 2021

Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks.
IEEE Trans. Netw. Sci. Eng., 2021

Game Theoretical Adversarial Deep Learning With Variational Adversaries.
IEEE Trans. Knowl. Data Eng., 2021

A Differentially Private Game Theoretic Approach for Deceiving Cyber Adversaries.
IEEE Trans. Inf. Forensics Secur., 2021

Authenticated Medical Documents Releasing with Privacy Protection and Release Control.
IEEE Trans. Dependable Secur. Comput., 2021

Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control.
IEEE Trans. Computers, 2021

Non-Linear-Echo Based Anti-Collusion Mechanism for Audio Signals.
IEEE ACM Trans. Audio Speech Lang. Process., 2021

Desynchronization Attacks Resilient Watermarking Method Based on Frequency Singular Value Coefficient Modification.
IEEE ACM Trans. Audio Speech Lang. Process., 2021

DP-Image: Differential Privacy for Image Data in Feature Space.
CoRR, 2021

Near Optimal and Dynamic Mechanisms Towards a Stable NFV Market in Multi-Tier Cloud Networks.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

2020
An Identity-Based and Revocable Data-Sharing Scheme in VANETs.
IEEE Trans. Veh. Technol., 2020

GAN-Driven Personalized Spatial-Temporal Private Data Sharing in Cyber-Physical Social Systems.
IEEE Trans. Netw. Sci. Eng., 2020

A Semantic Web-Based Recommendation Framework of Educational Resources in E-Learning.
Technol. Knowl. Learn., 2020

Correlated Differential Privacy: Feature Selection in Machine Learning.
IEEE Trans. Ind. Informatics, 2020

Familial Clustering for Weakly-Labeled Android Malware Using Hybrid Representation Learning.
IEEE Trans. Inf. Forensics Secur., 2020

Differentially Private Malicious Agent Avoidance in Multiagent Advising Learning.
IEEE Trans. Cybern., 2020

Blockchain for secure location verification.
J. Parallel Distributed Comput., 2020

Prediction optimization of diffusion paths in social networks using integration of ant colony and densest subgraph algorithms.
J. High Speed Networks, 2020

Network sparse representation: Decomposition, dimensionality-reduction and reconstruction.
Inf. Sci., 2020

A study of data pre-processing techniques for imbalanced biomedical data classification.
Int. J. Bioinform. Res. Appl., 2020

Differentially private model publishing in cyber physical systems.
Future Gener. Comput. Syst., 2020

Private collaborative filtering under untrusted recommender server.
Future Gener. Comput. Syst., 2020

Security and privacy in 6G networks: New areas and new challenges.
Digit. Commun. Networks, 2020

Differential Advising in Multi-Agent Reinforcement Learning.
CoRR, 2020

Fairness Constraints in Semi-supervised Learning.
CoRR, 2020

Privacy Intelligence: A Survey on Image Sharing on Online Social Networks.
CoRR, 2020

Channel Correlation Based Robust Audio Watermarking Mechanism for Stereo Signals.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

Service Provisioning for IoT Applications with Multiple Sources in Mobile Edge Computing.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

Secure Balance Planning of Off-blockchain Payment Channel Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
Malicious Attack Propagation and Source Identification
Advances in Information Security 73, Springer, ISBN: 978-3-030-02178-8, 2019

STC: Exposing Hidden Compromised Devices in Networked Sustainable Green Smart Computing Platforms by Partial Observation.
IEEE Trans. Sustain. Comput., 2019

Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach.
IEEE Trans. Inf. Forensics Secur., 2019

E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT.
IEEE Internet Things J., 2019

Greedily assemble tandem repeats for next generation sequences.
Int. J. High Perform. Comput. Netw., 2019

Edge-based stochastic network model reveals structural complexity of edges.
Future Gener. Comput. Syst., 2019

A blockchain-based location privacy-preserving crowdsensing system.
Future Gener. Comput. Syst., 2019

A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade.
ACM Comput. Surv., 2019

Static malware clustering using enhanced deep embedding method.
Concurr. Comput. Pract. Exp., 2019

Adversaries or allies? Privacy and deep learning in big data era.
Concurr. Comput. Pract. Exp., 2019

Novel Multi-Keyword Search on Encrypted Data in the Cloud.
IEEE Access, 2019

Improving Recommender Systems Accuracy in Social Networks Using Popularity.
Proceedings of the 20th International Conference on Parallel and Distributed Computing, 2019

MFE-HAR: multiscale feature engineering for human activity recognition using wearable sensors.
Proceedings of the MobiQuitous 2019, 2019

GAN-DP: Generative Adversarial Net Driven Differentially Privacy-Preserving Big Data Publishing.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Null Model and Community Structure in Heterogeneous Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Simultaneously Advising via Differential Privacy in Cloud Servers Environment.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Protecting Privacy-Sensitive Locations in Trajectories with Correlated Positions.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Data Authentication with Privacy Protection.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2018
Privacy of Things: Emerging Challenges and Opportunities in Wireless Internet of Things.
IEEE Wirel. Commun., 2018

Malware Propagations in Wireless Ad Hoc Networks.
IEEE Trans. Dependable Secur. Comput., 2018

Rumor Source Identification in Social Networks with Time-Varying Topology.
IEEE Trans. Dependable Secur. Comput., 2018

A Hybrid Privacy Protection Scheme in Cyber-Physical Social Networks.
IEEE Trans. Comput. Soc. Syst., 2018

Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networks.
J. Comput. Sci., 2018

Answering differentially private queries for continual datasets release.
Future Gener. Comput. Syst., 2018

An iteration-based differentially private social network data release.
Comput. Syst. Sci. Eng., 2018

Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks.
CoRR, 2018

Twitter spam detection: Survey of new approaches and comparative study.
Comput. Secur., 2018

Human-Driven Edge Computing and Communication: Part 2.
IEEE Commun. Mag., 2018

Density-Based Location Preservation for Mobile Crowdsensing With Differential Privacy.
IEEE Access, 2018

Differential Private POI Queries via Johnson-Lindenstrauss Transform.
IEEE Access, 2018

Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing Architecture.
IEEE Access, 2018

A Differential Game Approach to Patch Injection.
IEEE Access, 2018

Location Privacy and Its Applications: A Systematic Study.
IEEE Access, 2018

Traffic Flow Prediction for Road Intersection Safety.
Proceedings of the 2018 IEEE SmartWorld, 2018

Hiding RFID in the Image Matching Based Access Control to a Smart Building.
Proceedings of the 2018 IEEE SmartWorld, 2018

Integrating Ant Colony Algorithm and Node Centrality to Improve Prediction of Information Diffusion in Social Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control.
Proceedings of the Network and System Security - 12th International Conference, 2018

Who Spread to Whom? Inferring Online Social Networks with User Features.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Improving Data Utility through Game Theory in Personalized Differential Privacy.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

FBI: Friendship Learning-Based User Identification in Multiple Social Networks.
Proceedings of the IEEE Global Communications Conference, 2018

Using Adversarial Noises to Protect Privacy in Deep Learning Era.
Proceedings of the IEEE Global Communications Conference, 2018

Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases.
Proceedings of the Computer Security, 2018

A Data-driven Attack against Support Vectors of SVM.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Location Privacy in Mobile Applications
Springer, ISBN: 978-981-13-1704-0, 2018

2017
Differential Privacy and Applications
Advances in Information Security 69, Springer, ISBN: 978-3-319-62002-2, 2017

Invisible Hand: A Privacy Preserving Mobile Crowd Sensing Framework Based on Economic Models.
IEEE Trans. Veh. Technol., 2017

Differentially Private Data Publishing and Analysis: A Survey.
IEEE Trans. Knowl. Data Eng., 2017

Statistical Features-Based Real-Time Detection of Drifted Twitter Spam.
IEEE Trans. Inf. Forensics Secur., 2017

Fuzzy-Based Information Decomposition for Incomplete and Imbalanced Data Learning.
IEEE Trans. Fuzzy Syst., 2017

Using epidemic betweenness to measure the influence of users in complex networks.
J. Netw. Comput. Appl., 2017

FogRoute: DTN-Based Data Dissemination Model in Fog Computing.
IEEE Internet Things J., 2017

The structure of communities in scale-free networks.
Concurr. Comput. Pract. Exp., 2017

Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies.
IEEE Commun. Surv. Tutorials, 2017

A secure search protocol for low cost passive RFID tags.
Comput. Networks, 2017

Human-Driven Edge Computing and Communication: Part 1.
IEEE Commun. Mag., 2017

My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Privacy Preserving Collaborative Filtering via the Johnson-Lindenstrauss Transform.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

On-Street Car Parking Prediction in Smart City: A Multi-source Data Analysis in Sensor-Cloud Environment.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Personalized Privacy Preserving Collaborative Filtering.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Flow Entry Sharing in Protection Design for Software Defined Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Differentially private query learning: From data publishing to model publishing.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

TRA: tandem repeat assembler for next generation sequences.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

2016
Silence is Golden: Enhancing Privacy of Location-Based Services by Content Broadcasting and Active Caching in Wireless Vehicular Networks.
IEEE Trans. Veh. Technol., 2016

PPM-HDA: Privacy-Preserving and Multifunctional Health Data Aggregation With Fault Tolerance.
IEEE Trans. Inf. Forensics Secur., 2016

On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2016

Comments and Corrections.
IEEE Trans. Comput. Soc. Syst., 2016

A Feasible IP Traceback Framework through Dynamic Deterministic Packet Marking.
IEEE Trans. Computers, 2016

Query verification schemes for cloud-hosted databases: a brief survey.
Int. J. Parallel Emergent Distributed Syst., 2016

Privacy-preserving topic model for tagging recommender systems.
Knowl. Inf. Syst., 2016

Discovery of stop regions for understanding repeat travel behaviors of moving objects.
J. Comput. Syst. Sci., 2016

Spammers Are Becoming "Smarter" on Twitter.
IT Prof., 2016

Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing.
Entropy, 2016

K-Source: Multiple source selection for traffic offloading in mobile social networks.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016

Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing.
Proceedings of the Network and System Security - 10th International Conference, 2016

String matching query verification on cloud-hosted databases.
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016

Analysis of the Spreading Influence Variations for Online Social Users under Attacks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Studying the Global Spreading Influence and Local Connections of Users in Online Social Networks.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Delay Tolerant Networks
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-18108-0, 2015

Mining streams of short text for analysis of world-wide event evolutions.
World Wide Web, 2015

Privacy preserving data release for tagging recommender systems.
Web Intell., 2015

Robust Network Traffic Classification.
IEEE/ACM Trans. Netw., 2015

Correlated Differential Privacy: Hiding Information in Non-IID Data Set.
IEEE Trans. Inf. Forensics Secur., 2015

K-Center: An Approach on the Multi-Source Identification of Information Diffusion.
IEEE Trans. Inf. Forensics Secur., 2015

Secure Tag Search in RFID Systems Using Mobile Readers.
IEEE Trans. Dependable Secur. Comput., 2015

Robust Histogram Shape-Based Method for Image Watermarking.
IEEE Trans. Circuits Syst. Video Technol., 2015

A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection.
IEEE Trans. Comput. Soc. Syst., 2015

A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks.
IEEE Trans. Computers, 2015

Zero Knowledge Grouping Proof Protocol for RFID EPC C1G2 Tags.
IEEE Trans. Computers, 2015

Detecting stepping stones by abnormal causality probability.
Secur. Commun. Networks, 2015

Special issue on recent advances in network and information security - security and communication networks journal.
Secur. Commun. Networks, 2015

Modeling malicious activities in cyber space.
IEEE Netw., 2015

A survey of recommendation techniques based on offline data processing.
Concurr. Comput. Pract. Exp., 2015

Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy.
Comput. Commun., 2015

Mobility Increases the Risk of Malware Propagations in Wireless Networks.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

The Relation Between Local and Global Influence of Individuals in Scale-Free Networks.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

Asymmetric self-learning for tackling Twitter Spam Drift.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

6 million spam tweets: A large ground truth for timely Twitter spam detection.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

A Data as a Product Model for Future Consumption of Big Stream Data in Clouds.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

2014
Modelling personal preferences for Top-N movie recommendations.
Web Intell. Agent Syst., 2014

To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Internet Traffic Classification Using Constrained Clustering.
IEEE Trans. Parallel Distributed Syst., 2014

A Robust Grouping Proof Protocol for RFID EPC C1G2 Tags.
IEEE Trans. Inf. Forensics Secur., 2014

Modeling and Analysis on the Propagation Dynamics of Modern Email Malware.
IEEE Trans. Dependable Secur. Comput., 2014

Control Flow-Based Malware VariantDetection.
IEEE Trans. Dependable Secur. Comput., 2014

Patchwork-Based Audio Watermarking Method Robust to De-synchronization Attacks.
IEEE ACM Trans. Audio Speech Lang. Process., 2014

Privacy preserving collaborative filtering for KNN attack resisting.
Soc. Netw. Anal. Min., 2014

The maximum imputation framework for neighborhood-based collaborative filtering.
Soc. Netw. Anal. Min., 2014

Distributed Denial of Service (DDoS) detection by traffic pattern analysis.
Peer-to-Peer Netw. Appl., 2014

Are the popular users always important for information dissemination in online social networks?
IEEE Netw., 2014

Guest Editorial.
J. Multim., 2014

Internet traffic clustering with side information.
J. Comput. Syst. Sci., 2014

An effective privacy preserving algorithm for neighborhood-based collaborative filtering.
Future Gener. Comput. Syst., 2014

Detection and defense of application-layer DDoS attacks in backbone web traffic.
Future Gener. Comput. Syst., 2014

Modeling the Propagation of Worms in Networks: A Survey.
IEEE Commun. Surv. Tutorials, 2014

Deferentially Private Tagging Recommendation Based on Topic Model.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
Network Traffic Classification Using Correlation Information.
IEEE Trans. Parallel Distributed Syst., 2013

Modeling Propagation Dynamics of Social Network Worms.
IEEE Trans. Parallel Distributed Syst., 2013

An Effective Network Traffic Classification Method with Unknown Flow Detection.
IEEE Trans. Netw. Serv. Manag., 2013

Multidimensional Routing Protocol in Human-Associated Delay-Tolerant Networks.
IEEE Trans. Mob. Comput., 2013

Trust, security and privacy for pervasive applications.
J. Supercomput., 2013

Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions.
IEEE Trans. Inf. Forensics Secur., 2013

Secure RFID Tag Ownership Transfer Based on Quadratic Residues.
IEEE Trans. Inf. Forensics Secur., 2013

Lazy Collaborative Filtering for Data Sets With Missing Values.
IEEE Trans. Cybern., 2013

Malwise - An Effective and Efficient Classification System for Packed and Polymorphic Malware.
IEEE Trans. Computers, 2013

A learning method for Top-N recommendations with incomplete data.
Soc. Netw. Anal. Min., 2013

Unsupervised traffic classification using flow statistical properties and IP packet payload.
J. Comput. Syst. Sci., 2013

Robust image retrieval with hidden classes.
Comput. Vis. Image Underst., 2013

A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems.
Ad Hoc Networks, 2013

Offline grouping proof protocol for RFID systems.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

Privacy Preserving for Tagging Recommender Systems.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013

An Effective Deferentially Private Data Releasing Algorithm for Decision Tree.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Privacy Protected Data Forwarding in Human Associated Delay Tolerant Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Recommendation Techniques Based on Off-Line Data Processing a Multifaceted Survey.
Proceedings of the Ninth International Conference on Semantics, Knowledge and Grids, 2013

RFID tags - Grouping proof with forward security.
Proceedings of the 2013 IEEE International Conference on RFID-Technologies and Applications, 2013

Top-N Recommendations by Learning User Preference Dynamics.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013

Modeling and Analysis for Thwarting Worm Propagation in Email Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013

Anonymous Data Forwarding in Human Associated Delay Tolerant Networks.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

A general cloud firewall framework with dynamic resource allocation.
Proceedings of IEEE International Conference on Communications, 2013

A dynamical Deterministic Packet Marking scheme for DDoS traceback.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Secure ownership transfer in multi-tag/multi-owner passive RFID systems.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Zero-Day Traffic Identification.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Detecting Stepping Stones by Abnormal Causality Probability.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Traffic Identification in Semi-known Network Environment.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Robust network traffic identification with unknown applications.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Differential privacy for neighborhood-based collaborative filtering.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

AdaM: adaptive-maximum imputation for neighborhood-based collaborative filtering.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient.
IEEE Trans. Parallel Distributed Syst., 2012

A Dual-Channel Time-Spread Echo Method for Audio Watermarking.
IEEE Trans. Inf. Forensics Secur., 2012

Robust Patchwork-Based Embedding and Decoding Scheme for Digital Audio Watermarking.
IEEE Trans. Speech Audio Process., 2012

Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures.
J. Netw. Comput. Appl., 2012

Generating regular expression signatures for network traffic classification in trusted network management.
J. Netw. Comput. Appl., 2012

M-Dimension: Multi-characteristics based routing protocol in human associated delay-tolerant networks with improved performance over one dimensional classic models.
J. Netw. Comput. Appl., 2012

Semi-supervised and compound classification of network traffic.
Int. J. Secur. Networks, 2012

Locating Defense Positions for Thwarting the Propagation of Topological Worms.
IEEE Commun. Lett., 2012

Advances in network and system security.
Concurr. Comput. Pract. Exp., 2012

CAFS: a novel lightweight cache-based scheme for large-scale intrusion alert fusion.
Concurr. Comput. Pract. Exp., 2012

A minimum disclosure approach to authentication and privacy in RFID systems.
Comput. Networks, 2012

Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics.
Comput. J., 2012

Advances in Network and System Security: Editorial Statement.
Comput. J., 2012

Learning User Preference Patterns for Top-N Recommendations.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012

A secure tag ownership transfer scheme in a closed loop RFID system.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference Workshops, 2012

An Analytical Model on the Propagation of Modern Email Worms.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Classification of Correlated Internet Traffic Flows.
Proceedings of the 11th IEEE International Conference on Trust, 2012

AMDD: Exploring Entropy Based Anonymous Multi-dimensional Data Detection for Network Optimization in Human Associated DTNs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Improving Top-N Recommendations with User Consuming Profiles.
Proceedings of the PRICAI 2012: Trends in Artificial Intelligence, 2012

A secure search protocol based on Quadratic Residues for EPC Class-1 Gen-2 UHF RFID tags.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

Why it is Hard to Fight against Cyber Criminals?
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

DDoS discrimination by Linear Discriminant Analysis (LDA).
Proceedings of the International Conference on Computing, Networking and Communications, 2012

The efficient imputation method for neighborhood-based collaborative filtering.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

Learning Rating Patterns for Top-N Recommendations.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
Traceback of DDoS Attacks Using Entropy Variations.
IEEE Trans. Parallel Distributed Syst., 2011

Effective Pseudonoise Sequence and Decoding Function for Imperceptibility and Robustness Enhancement in Time-Spread Echo-Based Audio Watermarking.
IEEE Trans. Multim., 2011

Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics.
IEEE Trans. Inf. Forensics Secur., 2011

Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks.
J. Netw. Comput. Appl., 2011

Eliminating Errors in Worm Propagation Models.
IEEE Commun. Lett., 2011

Special Section: Trusted computing.
Future Gener. Comput. Syst., 2011

A mobile agent-based routing algorithm and some theoretical analysis.
Comput. Syst. Sci. Eng., 2011

Special Issue: Securing Distributed Networks and Systems.
Concurr. Comput. Pract. Exp., 2011

Editorial: Advances in network and system security.
Comput. Secur., 2011

Special issue: Building secure parallel and distributed networks and systems.
Comput. Commun., 2011

Secure Image Retrieval Based on Visual Content and Watermarking Protocol.
Comput. J., 2011

The Microcosmic Model of Worm Propagation.
Comput. J., 2011

MAR: Message-aware routing for opportunistic wireless ad hoc networks.
Proceedings of the Australasian Telecommunication Networks and Applications Conference, 2011

The Probability Model of Peer-to-Peer Botnet Propagation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

2010
Using the k-core decomposition to analyze the static structure of large-scale software systems.
J. Supercomput., 2010

Sharable file searching in unstructured Peer-to-peer systems.
J. Supercomput., 2010

A locality aware cache diffusion system.
J. Supercomput., 2010

Security in next generation wireless networks.
Secur. Commun. Networks, 2010

Dynamic Addressing in Wireless Sensor Networks without Location Awareness.
J. Inf. Sci. Eng., 2010

Spectral shape descriptor using spherical harmonics.
Integr. Comput. Aided Eng., 2010

A microscopic competition model and its dynamics analysis on network attacks.
Concurr. Comput. Pract. Exp., 2010

CALD: Surviving Various Application-Layer DDoS Attacks That Mimic Flash Crowd.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Getting the Real-Time Precise Round-Trip Time for Stepping Stone Detection.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Efficient Web Browsing with Perfect Anonymity Using Page Prefetching.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2010

A Lightweight Intrusion Alert Fusion System.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010

A Quick-Response Real-Time Stepping Stone Detection Scheme.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010

S-Kcore: A Social-aware Kcore Decomposition Algorithm in Pocket Switched Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

OST: A Transaction Based Online Social Trust Model for Social Network and File Sharing Security.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks.
IEEE Trans. Parallel Distributed Syst., 2009

Network and system security.
J. Netw. Comput. Appl., 2009

An innovative analyser for multi-classifier e-mail classification based on grey list analysis.
J. Netw. Comput. Appl., 2009

A Mobile Learning Model for Universities -Re-blending the Current Learning Environment.
Int. J. Interact. Mob. Technol., 2009

E-Learning over Mobile Phone Technology: Best Practices and Guidelines.
Int. J. Interact. Mob. Technol., 2009

Reducing the bandwidth requirements of P2P keyword indexing.
Int. J. High Perform. Comput. Netw., 2009

Effective metric for detecting distributed denial-of-service attacks based on information divergence.
IET Commun., 2009

Chaos theory based detection against network mimicking DDoS attacks.
IEEE Commun. Lett., 2009

A parallel information retrieval method for e-commerce.
Comput. Syst. Sci. Eng., 2009

Adjacency cache: an efficient P2P web cache indexing and lookup system.
Comput. Syst. Sci. Eng., 2009

Special Issue: Multi-core Supported Network and System Security.
Concurr. Comput. Pract. Exp., 2009

I/O scheduling and performance analysis on multi-core platforms.
Concurr. Comput. Pract. Exp., 2009

Spam filtering for network traffic security on a multi-core environment.
Concurr. Comput. Pract. Exp., 2009

Defending Grid Web Services from XDoS Attacks by SOTA.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Discriminating DDoS Flows from Flash Crowds Using Information Distance.
Proceedings of the Third International Conference on Network and System Security, 2009

Distinguishing DDoS Attacks from Flash Crowds Using Probability Metrics.
Proceedings of the Third International Conference on Network and System Security, 2009

Reliable Downloading Algorithms for BitTorrent-like Systems.
Proceedings of the NPC 2009, 2009

Effective DDoS Attacks Detection Using Generalized Entropy Metric.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009

Minimizing the Limitations of GL Analyser of Fusion Based Email Classification.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009

A Resource Allocation Method for Computational Grids Based on On-line Reverse Auction.
Proceedings of the Fourth ChinaGrid Annual Conference, ChinaGrid 2009, Yantai, Shandong, 2009

MVGL Analyser for Multi-classifier Based Spam Filtering System.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Information theory based detection against network behavior mimicking DDoS attacks.
IEEE Commun. Lett., 2008

Special Issue: Network Attacks and Defense Systems.
Comput. Syst. Sci. Eng., 2008

Entropy-Based Collaborative Detection of DDOS Attacks on Community Networks.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

Detecting and Tracing DDoS Attacks by Intelligent Decision Prototype.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

Multi-Core Defense System (MSDS) for Protecting Computer Infrastructure against DDoS Attacks.
Proceedings of the Ninth International Conference on Parallel and Distributed Computing, 2008

Multi-classifier Classification of Spam Email on a Ubiquitous Multi-core Architecture.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Using Multi-core to Support Security-Related Applications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2008

An Operational Approach to Validate the Path of BGP.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2008

Reducing Cache Lookup and Publish Overhead through Locality Awareness in P2P Web Caching.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Using Multi-Core Processors to Support Network Security Applications.
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008

Keynote III: Detection and traceback of DDoS attacks.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

Image retrieval based on semantics of intra-region color properties.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

Protecting web services with Service Oriented Traceback Architecture.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

Email Categorization Using (2+1)-Tier Classification Algorithms.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

2007
Defending against Distributed Denial of Service.
Proceedings of the Encyclopedia of Information Ethics and Security, 2007

An effective non-parametric method for globally clustering genes from expression profiles.
Medical Biol. Eng. Comput., 2007

Pervasive computing at tableside: a wireless web-based ordering system.
Int. J. Pervasive Comput. Commun., 2007

An Enhanced Parallel Downloading Algorithm for BT.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2007

A Resource-Search and Routing Algorithm within PCDN Autonomy Area.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007

Email Categorization Using Multi-stage Classification Technique.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007

Managing Email Overload with an Automatic Nonparametric Clustering Approach.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2007

Novel Data Management Algorithms in Peer-to-Peer Content Distribution Networks.
Proceedings of the Knowledge Science, 2007

Architecture of Adaptive Spam Filtering Based on Machine Learning Algorithms.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007

A Parallel Downloading Algorithm for Redundant Networks.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

A Composite Descriptor for Shape Retrieval.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

Dynamic Feature Selection for Spam Filtering Using Support Vector Machine.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

Adjacency Cache: Fast Web Cache Indexing and Lookup.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
Protecting web applications from DDoS attacks by an active distributed defense system.
Int. J. Web Inf. Syst., 2006

Developing wikis to foster web-based learning communities: an iterative approach.
Int. J. Web Based Communities, 2006

Protecting information infrastructure from DDoS attacks by MADF.
Int. J. High Perform. Comput. Netw., 2006

A solution for fault tolerance in replicated database systems.
Int. J. Comput. Sci. Eng., 2006

Frequency distribution of TATA Box and extension sequences on human promoters.
BMC Bioinform., 2006

Lease Based Addressing for Event-Driven Wireless Sensor Networks.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

2005
An IT Bachelor Degree Using Modern Technologies to Illustrate Core Concepts and Principles and Building Generic Skills.
Educ. Inf. Technol., 2005

A Sensor Enabled Multi-Agent Infrastructure for Applications Integration.
Proceedings of the Soft Computing as Transdisciplinary Science and Technology, 2005

A Reactive Framework for Supporting Knowledge Management.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2005

Technologies and Considerations for Developing Internet and Multiplayer Computer Games: A Tutorial.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

A Mesh Based Anycast Routing Protocol for Ad Hoc Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Intelligent DDoS Packet Filtering in High-Speed Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

A Defense System against DDoS Attacks by Large-Scale IP Traceback.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

A Parallel Euler Approach for Large-Scale Biological Sequence Assembly.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Employing Wikis for Online Collaboration in the E-Learning Environment: Case Study.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

The Multifaceted and Ever-Changing Directions of Information Security - Australia Get Ready!
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Security in the Online E-Learning Environment.
Proceedings of the 5th IEEE International Conference on Advanced Learning Technologies, 2005

Clock Synchronization State Graphs Based on Clock Precision Difference.
Proceedings of the Distributed and Parallel Computing, 2005

An Efficient Reliable Architecture for Application Layer Anycast Service.
Proceedings of the Distributed and Parallel Computing, 2005

Distributed Defense Against Distributed Denial-of-Service Attacks.
Proceedings of the Distributed and Parallel Computing, 2005

Mark-aided distributed filtering by using neural network for DDoS defense.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

An Innovative Spam Filtering Model Based on Support Vector Machine.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005

Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

Understanding Transition towards Information Security Culture Change.
Proceedings of the 3rd Australian Information Security Management Conference, 2005

Spam Filtering based on Preference Ranking.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

Distributed network systems - from concepts to implementations.
Network theory and applications 15, Springer, ISBN: 978-0-387-23839-5, 2005

2004
Delay Control and Parallel Admission Algorithms for Real-Time Anycast Flow.
J. Supercomput., 2004

A reactive system architecture for building fault-tolerant distributed applications.
J. Syst. Softw., 2004

Optimal Multicast Tree Routing for Cluster Computing in Hypercube Interconnection Networks.
IEICE Trans. Inf. Syst., 2004

An analysis of update ordering in distributed replication systems.
Future Gener. Comput. Syst., 2004

Advanced services for Clusters and Internet computing.
Future Gener. Comput. Syst., 2004

A Novel Middleware Based Web Database Model.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004

Minicast: A Multicast-Anycast Protocol for Message Delivery.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

Combating DDoS Attacks in Web-based Services.
Proceedings of the iiWAS'2004, 2004

Load Balance Algorithms for Anycast.
Proceedings of the iiWAS'2004, 2004

An Active Distributed Defense System to Protect Web Applications from DDOS Attacks.
Proceedings of the iiWAS'2004, 2004

A Self-Learning System for Identifying Harmful Network Information.
Proceedings of the iiWAS'2004, 2004

From e-Learning to Virtual Learning Community: Bridging the Gap.
Proceedings of the Advances in Web-Based Learning, 2004

Improving the Performance of Equalization and a Fast Start-Up Technique for Communication Systems.
Proceedings of the ICETE 2004, 2004

Toward Pervasive Computing in Restaurant.
Proceedings of the ICETE 2004, 2004

A Fast and Robust Method Applied in Telecommunication Systems.
Proceedings of the International Conference on Artificial Intelligence, 2004

Protect Grids from DDoS Attacks.
Proceedings of the Grid and Cooperative Computing, 2004

The Cost of Recovery Protocols in Web-based Database Systems.
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004

2003
Self-Adaptive Clock Synchronization for Computational Grid.
J. Comput. Sci. Technol., 2003

Decision Analysis of Statistically Detecting Distributed Denial-of-Service Flooding Attacks.
Int. J. Inf. Technol. Decis. Mak., 2003

Cultural Issues in Online Learning - Is Blended Learning a Possible Solution?
Int. J. Comput. Process. Orient. Lang., 2003

Guest Editors' Introduction.
Int. J. Comput. Process. Orient. Lang., 2003

Fault-Tolerant Servers for Anycast Communication.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003

Exploring the Foundations of Practicing Online Collaboration.
Proceedings of the Advances in Web-Based Learning, 2003

Cultural Issues Relating to Teaching IT Professional Ethics Online: Lessons Learned.
Proceedings of the Advances in Web-Based Learning, 2003

Improving the Performance of Equalization in Communication Systems.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

A Load Balancing Algorithm for Web Based Server Grids.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

GHIRS: Integration of Hotel Management Systems by Web Services.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Large-Scale Biological Sequence Assembly and Alignment by Using Computing Grid.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

An Adaptive Information Grid Architecture for Recommendation System.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Towards an Interactive Architecture for Web-Based Databases.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Self-Adaptive Clock Synchronization Based on Clock Precision Difference.
Proceedings of the Computer Science 2003, 2003

2002
A token-based independent update protocol for managing replicated objects.
Comput. Syst. Sci. Eng., 2002

Optimal Multicast Tree Routing for Cluster Computing in Hypercube Interconnection Networks.
Proceedings of the International Symposium on Parallel Architectures, 2002

An Efficient Algorithm for Application-Layer Anycasting.
Proceedings of the Distributed Communities on the Web, 4th International Workshop, 2002

2001
The design and implementation of an active replication scheme for distributing services in a cluster of workstations.
J. Syst. Softw., 2001

The Development of a Mobile Decision Support System.
J. Interconnect. Networks, 2001

The Design and Implementation of a Traffic Accident Analysis System.
Proceedings of the Engineering of Intelligent Systems, 2001

Automating the Construction of Replicated Objects in a Cluster of Workstations.
Proceedings of the First IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2001), 2001

2000
An architecture for resolving networking partitioning.
Proceedings of the ISCA 15th International Conference Computers and Their Applications, 2000

1999
Replication Techniques in Distributed Systems.
Scalable Comput. Pract. Exp., 1999

Detecting and tolerating failures in a loosely integrated heterogeneous database system.
Comput. Commun., 1999

Managing Replicated Remote Procedure Call Transactions.
Comput. J., 1999

A Tool for Constructing Service Replication Systems.
Proceedings of the TOOLS 1999: 31st International Conference on Technology of Object-Oriented Languages and Systems, 1999

The Design and Simulation of a Hybrid Replication Control Protocol.
Proceedings of the 1999 International Symposium on Parallel Architectures, 1999

The Design and Application of Sensors Implemented in Java.
Proceedings of the 17th IASTED International Conference on Applied Informatics, 1999

1998
Primary-Backup Object Replications in Java.
Proceedings of the TOOLS 1998: 27th International Conference on Technology of Object-Oriented Languages and Systems, 1998

1997
Fault-tolerant servers for the RHODOS system.
J. Syst. Softw., 1997

A tool for layered analysing and understanding of distributed programs.
Comput. Commun., 1997

An Architecture for Building Reliable Distributed Object-Based Systems.
Proceedings of the TOOLS 1997: 24th International Conference on Technology of Object-Oriented Languages and Systems, 1997

Using Sensors to Detect Failures in a Loosely Integrated Heterogeneous Database System.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1997

1996
A system for managing remote procedure call transactions.
J. Syst. Softw., 1996

Supporting fault-tolerant and open distributed processing using RPC.
Comput. Commun., 1996

A tool for assisting the understanding of distributed programs.
Proceedings of the ACM SIGCSE 1st Australasian Conference on Computer Science Education, 1996

1994
A rapid prototyping system for distributed information system applications.
J. Syst. Softw., 1994

1993
The design and implementation of a distributed program monitor.
J. Syst. Softw., 1993

A Layered Distributed Program Debugger.
Proceedings of the Fifth IEEE Symposium on Parallel and Distributed Processing, 1993

1991
On the Management of Remote Procedure Call Transactions.
Proceedings of the Advances in Computing and Information, 1991

1990
PM: a system for prototyping and monitoring remote procedure call programs.
ACM SIGSOFT Softw. Eng. Notes, 1990

A Model of Execution Time Estimating for RPC-Oriented Programs.
Proceedings of the Advances in Computing and Information, 1990


  Loading...