ORCID Profile
0000-0002-2572-2355
Current Organisations
Deakin University
,
Macquaire University
,
Macquarie University
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
In Research Link Australia (RLA), "Research Topics" refer to ANZSRC FOR and SEO codes. These topics are either sourced from ANZSRC FOR and SEO codes listed in researchers' related grants or generated by a large language model (LLM) based on their publications.
Computer Software | Distributed Computing | Decision Support and Group Support Systems | Software Engineering | Computational Logic and Formal Languages | Computer System Security | Mobile Technologies | Control Systems, Robotics and Automation
Road Safety | Road Passenger Movements (excl. Public Transport) | Aerospace Transport not elsewhere classified | Application Tools and System Utilities |
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 15-03-2022
Publisher: Elsevier BV
Date: 06-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: IEEE
Date: 10-2015
DOI: 10.1109/MASS.2015.15
Publisher: IEEE
Date: 21-03-2022
Publisher: Elsevier BV
Date: 02-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2021
Publisher: IEEE
Date: 03-2014
Publisher: Springer Nature Switzerland
Date: 2023
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2018
Publisher: IEEE
Date: 12-2021
DOI: 10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA-CYBERMATICS53846.2021.00040
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2023
Publisher: Springer International Publishing
Date: 2021
Publisher: Springer Singapore
Date: 2020
Publisher: Informa UK Limited
Date: 05-12-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2019
Publisher: MDPI AG
Date: 05-01-2021
DOI: 10.3390/S21010312
Abstract: Privacy protection in electronic healthcare applications is an important consideration, due to the sensitive nature of personal health data. Internet of Health Things (IoHT) networks that are used within a healthcare setting have unique challenges and security requirements (integrity, authentication, privacy, and availability) that must also be balanced with the need to maintain efficiency in order to conserve battery power, which can be a significant limitation in IoHT devices and networks. Data are usually transferred without undergoing filtering or optimization, and this traffic can overload sensors and cause rapid battery consumption when interacting with IoHT networks. This poses certain restrictions on the practical implementation of these devices. In order to address these issues, this paper proposes a privacy-preserving two-tier data inference framework solution that conserves battery consumption by inferring the sensed data and reducing data size for transmission, while also protecting sensitive data from leakage to adversaries. The results from experimental evaluations on efficiency and privacy show the validity of the proposed scheme, as well as significant data savings without compromising data transmission accuracy, which contributes to energy efficiency of IoHT sensor devices.
Publisher: ACM
Date: 02-06-2014
Publisher: IEEE
Date: 13-10-2022
Publisher: Association for Computing Machinery (ACM)
Date: 22-05-2020
DOI: 10.1145/3379464
Abstract: Outsourcing helps relocate data from the cyber-physical system (CPS) for efficient storage at low cost. Current server-based outsourcing mainly focuses on the benefits of servers. This cannot attract users well, as their security, efficiency, and economy are not guaranteed. To solve with this issue, a hybrid outsourcing model that exploits both cloud server and edge devices to store data is needed. Meanwhile, the requirements of security and efficiency are different under specific scenarios. There is a lack of a comprehensive solution that considers all of the above issues. In this work, we overcome the above issues by proposing the first hybrid user-centric data outsourcing (HUCDO) scheme. It allows users to outsource data securely, efficiently, and economically via different CPSs. Brielly, our contributions consist of theories, implementations, and evaluations. Our theories include the first homomorphic collision-resistant chameleon hash (HCCH) and homomorphic designated-receiver signcryption (HDRS). As implementations, we instantiate how to use our proposals to outsource small- or large-scale data through distinct CPS, respectively. Additionally, a blockchain with proof-of-discrete-logarithm (B-PoDL) is instantiated to help improve our performance. Last, as demonstrated by our evaluations, our proposals are secure, efficient, and economic for users to implement while outsourcing their data via CPSs.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 02-2022
Publisher: IEEE
Date: 12-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 10-2023
Publisher: ACM
Date: 29-01-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 15-07-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 10-2020
Publisher: Springer Science and Business Media LLC
Date: 02-03-2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2019
Publisher: Wiley
Date: 16-03-2022
DOI: 10.1002/ETT.3935
Abstract: Internet of Things (IoT) is a novel paradigm, which not only facilitates a large number of devices to be ubiquitously connected over the Internet but also provides a mechanism to remotely control these devices. The IoT is pervasive and is almost an integral part of our daily life. These connected devices often obtain user's personal data and store it online. The security of collected data is a big concern in recent times. As devices are becoming increasingly connected, privacy and security issues become more and more critical and these need to be addressed on an urgent basis. IoT implementations and devices are eminently prone to threats that could compromise the security and privacy of the consumers, which, in turn, could influence its practical deployment. In recent past, some research has been carried out to secure IoT devices with an intention to alleviate the security concerns of users. There have been research on blockchain technologies to tackle the privacy and security issues of the collected data in IoT. The purpose of this paper is to highlight the security and privacy issues in IoT systems. To this effect, the paper examines the security issues at each layer in the IoT protocol stack, identifies the under‐lying challenges and key security requirements and provides a brief overview of existing security solutions to safeguard the IoT from the layered context.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2019
Publisher: ACM
Date: 07-11-2022
Publisher: IEEE
Date: 05-2020
Publisher: IEEE
Date: 22-03-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2023
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2023
Publisher: IEEE
Date: 11-2020
DOI: 10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA-CYBERMATICS50389.2020.00095
Publisher: Elsevier BV
Date: 11-2020
Publisher: Elsevier BV
Date: 10-2020
Publisher: Association for Computing Machinery (ACM)
Date: 24-10-2019
DOI: 10.1145/3324926
Abstract: Both academia and industry have directed tremendous interest toward the combination of Cyber Physical Systems and Cloud Computing, which enables a new breed of applications and services. However, due to the relative long distance between remote cloud and end nodes, Cloud Computing cannot provide effective and direct management for end nodes, which leads to security vulnerabilities. In this article, we first propose a novel trust evaluation mechanism using crowdsourcing and Intelligent Mobile Edge Computing. The mobile edge users with relatively strong computation and storage ability are exploited to provide direct management for end nodes. Through close access to end nodes, mobile edge users can obtain various information of the end nodes and determine whether the node is trustworthy. Then, two incentive mechanisms, i.e., Trustworthy Incentive and Quality-Aware Trustworthy Incentive Mechanisms, are proposed for motivating mobile edge users to conduct trust evaluation. The first one aims to motivate edge users to upload their real information about their capability and costs. The purpose of the second one is to motivate edge users to make trustworthy effort to conduct tasks and report results. Detailed theoretical analysis demonstrates the validity of Quality-Aware Trustworthy Incentive Mechanism from data trustfulness, effort trustfulness, and quality trustfulness, respectively. Extensive experiments are carried out to validate the proposed trust evaluation and incentive mechanisms. The results corroborate that the proposed mechanisms can efficiently stimulate mobile edge users to perform evaluation task and improve the accuracy of trust evaluation.
Publisher: Springer International Publishing
Date: 15-12-2022
Publisher: ACM
Date: 07-11-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 15-06-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 02-2020
Publisher: ACM
Date: 12-11-2019
Publisher: IEEE
Date: 06-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2022
Publisher: ACM
Date: 31-01-2017
Publisher: Elsevier BV
Date: 2020
Publisher: IEEE
Date: 05-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2023
Publisher: Association for Computing Machinery (ACM)
Date: 16-06-2021
DOI: 10.1145/3383779
Abstract: Time-series medical images are an important type of medical data that contain rich temporal and spatial information. As a state-of-the-art, computer-aided diagnosis (CAD) algorithms are usually used on these image sequences to improve analysis accuracy. However, such CAD algorithms are often required to upload medical images to honest-but-curious servers, which introduces severe privacy concerns. To preserve privacy, the existing CAD algorithms support analysis on each encrypted image but not on the whole encrypted image sequences, which leads to the loss of important temporal information among frames. To meet this challenge, a convolutional-LSTM network, named HE-CLSTM, is proposed for analyzing time-series medical images encrypted by a fully homomorphic encryption mechanism. Specifically, several convolutional blocks are constructed to extract discriminative spatial features, and LSTM-based sequence analysis layers (HE-LSTM) are leveraged to encode temporal information from the encrypted image sequences. Moreover, a weighted unit and a sequence voting layer are designed to incorporate both spatial and temporal features with different weights to improve performance while reducing the missed diagnosis rate. The experimental results on two challenging benchmarks (a Cervigram dataset and the BreaKHis public dataset) provide strong evidence that our framework can encode visual representations and sequential dynamics from encrypted medical image sequences our method achieved AUCs above 0.94 both on the Cervigram and BreaKHis datasets, constituting a significant margin of statistical improvement compared with several competing methods.
Publisher: IEEE
Date: 03-2020
Publisher: IEEE
Date: 12-2020
Publisher: Association for Computing Machinery (ACM)
Date: 11-05-2017
DOI: 10.1145/3063382
Abstract: In Cyber-Physical Systems (CPS), cyber and physical components must work seamlessly in tandem. Runtime verification of CPS is essential yet very difficult, due to deployment environments that are expensive, dangerous, or simply impossible to use for verification tasks. A key enabling factor of runtime verification of CPS is the ability to integrate real-time simulations of portions of the CPS into live running systems. We propose a verification approach that allows CPS application developers to opportunistically leverage real-time simulation to support runtime verification. Our approach, termed B race B ind , allows selecting, at runtime, between actual physical processes or simulations of them to support a running CPS application. To build B race B ind , we create a real-time simulation architecture to generate and manage multiple real-time simulation environments based on existing simulation models in a manner that ensures sufficient accuracy for verifying a CPS application. Specifically, B race B ind aims to both improve simulation speed and minimize latency, thereby making it feasible to integrate simulations of physical processes into the running CPS application. B race B ind then integrates this real-time simulation architecture with an existing runtime verification approach that has low computational overhead and high accuracy. This integration uses an aspect-oriented adapter architecture that connects the variables in the cyber portion of the CPS application with either sensors and actuators in the physical world or the automatically generated real-time simulation. Our experimental results show that, with a negligible performance penalty, our approach is both efficient and effective in detecting program errors that are otherwise only detectable in a physical deployment.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 15-11-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2022
Publisher: Inderscience Publishers
Date: 2018
Publisher: IEEE
Date: 04-2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 15-02-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 10-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2020
Publisher: IEEE
Date: 21-03-2022
Publisher: Association for Computing Machinery (ACM)
Date: 31-10-2020
DOI: 10.1145/3415151
Abstract: The Internet of Multimedia Things (IoMT) has become the backbone of innumerable multimedia applications in various fields. The wide application of IoMT not only makes our life convenient but also brings challenges to service discovery. Service discovery aims to leverage location information and trust evidence scattered in a variety of multimedia applications to find trusted IoMT devices that can provide specific service in target areas. However, the eavesdropping and t ering to these sensitive IoMT data during the trust propagation process invalidate the service discovery process. To address these challenges, we propose Secure Service Discovery (SSD) for IoMT using cross-blockchain-enabled fog computing. To resist the t ering and eavesdropping during the trust propagation process, a scalable cross-blockchain structure consisting of multiple parallel blockchains is first proposed based on fog, in which different parallel blockchains can be orchestrated to propagate encrypted location information and trust evidence of different applications. Moreover, to enable a cross-blockchain structure to leverage encrypted location information and trust evidence to find trusted IoMT devices in preset areas, a novel privacy-preserving range query is proposed to query and aggregate trust evidence. Security analysis and simulations are carried out to demonstrate the effectiveness and security of the proposed SSD.
Publisher: Springer Science and Business Media LLC
Date: 04-02-2022
Publisher: Springer International Publishing
Date: 2020
Publisher: Springer International Publishing
Date: 2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2021
Publisher: IEEE
Date: 08-2017
Publisher: Elsevier BV
Date: 09-2020
Publisher: Springer International Publishing
Date: 2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Springer International Publishing
Date: 2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 02-2023
Publisher: IEEE
Date: 21-03-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2021
Publisher: IEEE
Date: 03-2020
Publisher: IEEE
Date: 06-2021
Publisher: Elsevier BV
Date: 02-2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 02-2022
Publisher: Elsevier BV
Date: 10-2017
Publisher: Springer Science and Business Media LLC
Date: 05-05-2019
Publisher: IEEE
Date: 07-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: IEEE
Date: 08-2017
DOI: 10.1109/CBD.2017.16
Publisher: Wiley
Date: 14-02-2018
DOI: 10.1002/CPE.4436
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 15-11-2022
Publisher: ACM
Date: 07-11-2022
Publisher: Springer Singapore
Date: 2016
Publisher: Springer International Publishing
Date: 2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2017
Publisher: Association for Computing Machinery (ACM)
Date: 29-01-2020
DOI: 10.1145/3369390
Abstract: Recommendation systems have been widely used in large e-commerce websites, but cold start and data sparsity seriously affect the accuracy of recommendation. To solve these problems, we propose SSL-SVD, which works to mine the sparse trust between users and improve the performance of the recommendation system. Specifically, we mine sparse trust relationships by decomposing trust impact into fine-grained factors and employing the Transductive Support Vector Machine algorithm to combine these factors. Then, we incorporate both social trust and sparse trust information into the SVD++ model, which can effectively utilize the explicit and implicit influence of trust for rating prediction in the recommendation system. Experiments show that our SSL-SVD increases the trust density degree of each dataset by more than 65% and improves the recommendation accuracy by up to 4.3%.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 15-11-2022
Publisher: IEEE
Date: 05-2015
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2020
Publisher: IEEE
Date: 05-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 15-04-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 08-2021
Publisher: IEEE
Date: 11-2019
Publisher: Elsevier BV
Date: 11-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2022
Publisher: IEEE
Date: 10-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2021
Publisher: Springer International Publishing
Date: 2018
Publisher: IEEE
Date: 12-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2023
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2022
Publisher: Springer International Publishing
Date: 2020
Publisher: Association for Computing Machinery (ACM)
Date: 30-10-2019
DOI: 10.1145/3331147
Abstract: In recent years, wireless sensor networks (WSNs) have become an active area of research for monitoring physical and environmental conditions. Due to the interdependence of sensors, a functional anomaly in one sensor can cause a functional anomaly in another sensor, which can further lead to the malfunctioning of the entire sensor network. Existing research work has analysed faulty sensor anomalies but fails to show the effectiveness throughout the entire interdependent network system. In this article, a dictionary learning algorithm based on a non-negative constraint is developed, and a sparse representation anomaly node detection method for sensor networks is proposed based on the dictionary learning. Through experiment on a specific thermal power plant in China, we verify the robustness of our proposed method in detecting abnormal nodes against four state of the art approaches and proved our method is more robust. Furthermore, the experiments are conducted on the obtained abnormal nodes to prove the interdependence of multi-layer sensor networks and reveal the conditions and causes of a system crash.
Publisher: Elsevier BV
Date: 10-2022
Publisher: IEEE
Date: 10-2021
Publisher: IEEE
Date: 03-2020
Publisher: IEEE
Date: 11-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2020
Publisher: Association for Computing Machinery (ACM)
Date: 31-01-2021
DOI: 10.1145/3416492
Abstract: With the rapid development of various computing technologies, the constraints of data processing capabilities gradually disappeared, and more data can be simultaneously processed to obtain better performance compared to conventional methods. As a standard statistical analysis method that has been widely used in many fields, Independent Component Analysis (ICA) provides a new way for motion detection by extracting the foreground without precisely modeling the background. However, most existing ICA-based motion detection algorithms use only two-channel data for source separation and simply generate the observation vectors by decomposing and reconstructing the images by row, hence they cannot obtain an integrated and accurate shape of the moving objects in complex scenes. In this article, we propose a refined ICA algorithm for motion detection (RICA-MD), which fuses a larger number of channels than conventional ICA-based motion detection algorithms to provide more effective information for foreground extraction. Meanwhile, we propose four novel methods for generating observation vectors to further cover the erse motion styles of the moving objects. These improvements enable RICA-MD to effectively deal with slowly moving objects, which are difficult to detect using conventional methods. Our quantitative evaluation in multiple scenes shows that our proposed method is able to achieve a better performance at an acceptable cost of false alarms.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2019
Publisher: IEEE
Date: 12-2020
Publisher: IEEE
Date: 22-03-2021
Publisher: IEEE
Date: 12-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2020
Publisher: Computers, Materials and Continua (Tech Science Press)
Date: 2019
Publisher: MDPI AG
Date: 03-12-2019
DOI: 10.3390/S19235324
Abstract: Sensor-clouds are a combination of wireless sensor networks (WSNs) and cloud computing. The emergence of sensor-clouds has greatly enhanced the computing power and storage capacity of traditional WSNs via exploiting the advantages of cloud computing in resource utilization. However, there are still many problems to be solved in sensor-clouds, such as the limitations of WSNs in terms of communication and energy, the high latency, and the security and privacy issues due to applying a cloud platform as the data processing and control center. In recent years, mobile edge computing has received increasing attention from industry and academia. The core of mobile edge computing is to migrate some or all of the computing tasks of the original cloud computing center to the vicinity of the data source, which gives mobile edge computing great potential in solving the shortcomings of sensor-clouds. In this paper, the latest research status of sensor-clouds is briefly analyzed and the characteristics of the existing sensor-clouds are summarized. After that we discuss the issues of sensor-clouds and propose some applications, especially a trust evaluation mechanism and trustworthy data collection which use mobile edge computing to solve the problems in sensor-clouds. Finally, we discuss research challenges and future research directions in leveraging mobile edge computing for sensor-clouds.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2019
Publisher: IEEE
Date: 12-2019
Publisher: Informa UK Limited
Date: 10-12-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: IEEE
Date: 12-2018
Publisher: Association for Computing Machinery (ACM)
Date: 13-07-2023
DOI: 10.1145/3582270
Abstract: Sensor-cloud originates from extensive recent applications of wireless sensor networks and cloud computing. To draw a roadmap of the current research activities of the sensor-cloud community, we first investigate the state-of-the-art sensor-cloud literature reviews published since the late 2010s and discovered that these surveys have primarily studied the sensor-cloud in specific aspects, security-enabled solutions, efficient management mechanisms, and architectural challenges. While the existing surveys have reviewed the sensor-cloud from various perspectives, they are inadequate for the three key issues that require urgent attention in the sensor-cloud: reliability , energy , and heterogeneity . To fill this gap, we perform a thorough survey by examining the origins of the sensor-cloud and providing an in-depth and comprehensive discussion of these three key challenges. We summarize initial designs of the new edge-based schemes to address these challenges and identify several open issues and promising future research directions.
Start Date: 06-2022
End Date: 06-2025
Amount: $459,593.00
Funder: Australian Research Council
View Funded ActivityStart Date: 06-2021
End Date: 06-2024
Amount: $341,853.00
Funder: Australian Research Council
View Funded ActivityStart Date: 2021
End Date: 12-2024
Amount: $448,958.00
Funder: Australian Research Council
View Funded Activity