Thomas Tan

thomas tan

Dr Thomas Tan

Lecturer in Cybersecurity; Deputy to the Research Degrees Leader

Biography

Dr Zhiyuan Tan is a Lecturer in the School of Computing at the Edinburgh Napier University (ENU). He holds a BEng degree (2005) with high distinction from the North-eastern University, China, and a MEng degree (2008) from the Beijing University of Technology, China. He was awarded a PhD degree in Computer Systems by the University of Technology Sydney (UTS), Australia in 2014.

Prior to joining ENU in 2016, Dr Tan held different research positions at three research intensive universities, respectively. He was a Postdoctoral Researcher in Cybersecurity at the University of Twente (UT), the Netherlands from 2014 to 2016; a Research Associate at the University of Technology, Sydney (UTS), Australia in 2014; and a Senior Research Assistant at La Trobe University, Australia in 2013.

Dr Tan has a strong research background, and his current research interests include cybersecurity, machine learning, data analytics, virtualisation and cyber-physical system. Dr Tan has received AUD 27,800 funding from Commonwealth Scientific and Industrial Research Organisation (CSIRO) and UTS for his research on autonomous network intrusion detection, £29,703 funding from ENU Development Trust, £10,759 funding from the Scottish Informatics & Computer Science Alliance for his research on digital forensics, as well as £6,987 funding from ENU for his research on securing future 5G health care systems. Over the past nine years, he also has participated in other network security research projects funded by CSIRO, Minster of Education (Oman), and ITEA2-/CATRENE.

These projects have contributed highly efficient solutions for 1) detecting, classifying and defending malicious activity and intrusion in an entire network as well as systems providing critical services, 2) furthering the cutting edge in practical security monitoring, and 3) developing secure data and service architectures. Based on the outcomes of these projects, Dr Tan has published over 50 quality scholarly articles. His most recent research achievements have been published in highly-cited IEEE Transactions and Elsevier journals as well as premier international conferences.

His research contribution on cybersecurity is internationally recognised. According to Google Scholar, he has an H-Index of 15 and his research articles have received over 1100 citations since 2011. Moreover, he has earned various research awards, including a National Research Award 2017 from the Research Council of the Sultanate of Oman, two Best Paper Awards, and a Kaspersky Lab’s Annual Student Cyber Security Conference Finalist Award, over the past years.

Besides, Dr Tan has played various chair roles in international workshops and conferences, and has served international journals as an editorial board member or as an associate editor. Dr Tan has organised Special Issues for international journals. Dr Tan has also been invited to serve as a technical program committee member of major international conferences and a reviewer for prestigious journals.

In addition, Dr Tan has been involved in supervising Research Master and PhD students since he accomplished his PhD thesis in 2013 and has been entitled to independently supervise research student projects since 2016. Over the past 6 years, Dr Tan has mentored and supervised 9 PhD students, and his research students have achieved productive research outcomes, including 10 journal and 7 conference publications. By far, 3 PhD students have successfully accomplished their study under his mentoring/supervision. He received an Honourable Mention in SICSA Supervisor of the Year 2019 Award.

Dr Tan is now RECRUITING highly self-motivated Ph.D. students, who are expected to conduct challenging research on Network Security
- Adversarial machine learning for Anomaly/Malware detection
- Virtualisation security based on non-parametric behaviour modelling
- Knowledge transfer (Transfer Machine Learning) in cyber-security problems
- IoT Security with focuses on Cloud and Edge computing security issues

News

Esteem

Conference Activity

  • TPC Member, The 29th International Conference on Computer Communications and Networks (ICCCN2020)
  • Program Vice Chair, The 8th IEEE International Conference on Smart City and Informatization (iSCI 2020)
  • TPC Member, The 6th International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2020)
  • TPC Member, The 5th IEEE International Conference on Intelligent Data and Security (IEEE IDS 2020)
  • TPC Member, The 6th IEEE International Conference on High Performance and Smart Computing (IEEE HPSC 2020)
  • TPC Member, The 3rd International Conference on Smart BlockChain (SmartBlock 2020)
  • Group leader, 2020 7th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI 2020)
  • TPC Member, The International Conference on Communication Systems and Network Technologies (CSNT2020)
  • TPC Member, The 6th IEEE International Conference on Cloud and Big Data Computing
  • TPC Member, 2019 The 2nd International Conference on Software and Services Engineering (CSSE 2019)
  • TPC Member, The 5th IEEE International Conference on High Performance and Smart Computing (IEEE HPSC 2019)
  • TPC Member, The 5th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2019)
  • TPC Member, The 5th International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2019)
  • Publicity Chair, The 11th International Workshop on Security in e-Science and e-Research (ISSR 2019)
  • TPC Member, Wireless Days 2019 (WD'19)
  • TPC Member, The International Conference on Computational Intelligence and Communication Networks (CICN 2019)
  • Publicity Chair, The 7th IEEE International Workshop on Network Optimization and Performance Evaluation (NOPE-19)
  • Organising Chair, The 3rd International Workshop on Securing IoT Networks (SITN 2019)
  • Organising Chair, The 3rd International Workshop on Secure Smart Society in Next Generation Networking Paradigm (SECSOC 2019)
  • Program Vice Chair, The 5th International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2019)
  • TPC Member, The 11th International Symposium on Cyberspace Safety and Security (CSS 2019)
  • TPC Member, The 6th International Symposium on Big Data Principles, Architectures & Applications (BDAA 2019)
  • Co-Chair, Organised Session on Recent Advances in Security & Privacy in Healthcare (Secure-eHealth) in conjunction with 2019 IEEE 8th Global Conference on Consumer Electronics (GCCE 2019)
  • TPC Member, The 11th International Symposium on UbiSafe Computing (UbiSafe 2019)
  • Technical Program Chairs; The 9th EAI International Conference on Cloud Computing (CloudComp 2019)
  • TPC Member, The 4th International Conference on Smart Computing and Communication (SmartCom 2019)
  • TPC Member, The 3rd International Workshop on Cyberspace Security (IWCSS2019)
  • Publication Co-Chair, 13th International Conference on Network and System Security (NSS 2019)
  • Organiser and Chair, The Second International Workshop on Securing IoT Networks 2018 (SITN-2018)
  • Organiser and Chair, The Second International Workshop on Secure Smart Societies in Next Generation Networks (SECSOC 2018)
  • Program Chair, The 8th EAI International Conference on Big Data Technologies and Applications (BD:TA 2018)
  • TPC Member, The 2nd International Workshop on Cyberspace Security (IWCSS 2018)
  • TPC Member, The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2018)
  • TPC Member, The 2018 the International Conference on Software and Services Engineering (ICSSE2018)
  • TPC Member, The 2018 International Workshop on Privacy, Security and Trust in Computational Intelligence (PSTCI 2018)
  • Publicity Chair, The 10th International Workshop on Security in e-Science and e-Research (ISSR 2018)
  • Organiser, International Symposium on Advances in High Performance Computing and Networking (AHPCN-2018)
  • TPC Member, Future 5V 2018 - 3rd EAI International Conference on Future Intelligent Vehicular Technologies
  • Organiser and Chair, International Workshop on Securing IoT Networks 2017 (SITN-2017) held in conjunction with The 2017 IEEE International Conference on Internet of Things (iThings-2017)
  • Organiser, Special Session on Industrial Automation and Process System’s Security for IEEE International Symposium on Industrial Electronics (ISIE’17)
  • Organiser and Chair, The 1st IEEE International Workshop on Secure Smart Society in Next Generation Networks (SECSOC2017) held in conjunction with The 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-17)
  • Publication Co-chair, The 2nd EAI International Conference on Future Intelligent Vehicular Technologies (Future 5V)
  • TPC Member, The 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2017)
  • TPC Member, The 9th International Symposium on Cyberspace Safety and Security (CSS 2017)
  • TPC Member, The 2017 World Symposium on Computer Applications & Research (WSCAR 2017)
  • TPC Member, The Third International Symposium on Intelligent Systems Technologies and Applications (ISTA'17)

 

Editorial Activity

  • Guess Editor, Special Issue on Privacy and Security in Evolving Internet of Multimedia Things for ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), ISSN: 1551-6857
  • Guess Editor, Special Issue on “Security and Privacy for Cross-Blockchains” for Annals of Telecommunications, ISSN: 1958-9395
  • Guess Editor, Special Issue on 'Blockchain for Edge-enabled Smart Cities Applications' for Journal of Information Security and Applications (JISA), ISSN: 2214-2126
  • Lead Guest Editor, Special Issue on Recent Advance in Security and Privacy for Smart Society for Concurrency and Computation: Practice and Experience, Online ISSN:1532-0634
  • Lead Guest Editor, Special Issue "Emerging Security and Privacy Issues in IoT-based Smart Networks" for Information by MDPI, (ISSN 2078-2489)
  • Guest Editor, Special Issue on Security and Privacy for Smart Cities: Challenges and Opportunities, Computers and Electrical Engineering, ISSN: 0045-7906
  • Guest Editor, Special Collection on Advances in Cyber Physical Social Systems, International Journal of Distributed Sensor Networks, ISSN: 15501477
  • Section Editor, Ad Hoc & Sensor Wireless Networks, ISSN: 1551-9899
  • Lead Guest Editor, Special Issue on Secure Smart Society in Next Generation Networking Paradigm, Journal of Cyber Security Technology, Print ISSN: 2374-2917 Online ISSN: 2374-2925
  • Guest Editor, Special Issue on Moving from Wireless Sensor Networks towards the Internet of Things: Future Trends and Research Challenges, Ad Hoc & Sensor Wireless Networks Journal, ISSN: 1551-9899
  • Editorial Board Member, The International Journal of Computer Sciences and its Applications
  • Guest Editor, Special section on Security and Trusted Computing for Industrial Internet of Things, IEEE Access, ISSN: 2169-3536
  • Associate Editor, IEEE Access, ISSN: 2169-3536

 

Fellowships and Awards

  • Honourable Mention - SICSA Supervisor of the Year 2019
  • Best Paper Award - 2019 IEEE International Conference on Smart Internet of Things (IEEE SmartIoT 2019)
  • Outstanding Contribution in Reviewing 2017 - Future Generation Computer Systems, ISSN: 0167-739X
  • The National Research Award 2017 - The Research Council of the Sultanate of Oman
  • IEEE Outstanding Service Award 2017
  • Outstanding Contribution in Reviewing 2016 - Journal of Network and Computer Applications, ISSN: 1084-8045
  • Finalist of Asia-Pacific & MEA Round, Kaspersky Lab’s Annual Student Conference ‘CyberSecurity for the Next Generation’ 2013
  • Best Paper Award - The 1st International Conference on Security of Internet of Things

 

Grant Reviewer

  • Grant Reviewer for Medical Research Council - UKRI Future Leaders Fellowships
  • Grant Reviewer for Engineering and Physical Sciences Research Council (EPSRC)
  • Grant Reviewer for Innovational Research Incentives Scheme Vidi, Netherlands Organisation for Scientific Research (NWO)

 

Invited Speaker

  • An Invited Talk on ‘An Adversarial Learning Approach to defeating Metamorphic Malware’ at Shenyang Aerospace University (China), 18 November 2019
  • An Invited Talk on ‘Data Driven Mobile Endpoint Security’ at Neusoft Institute Guangdong (China), 29 November 2019
  • An Invited Talk on ‘UK Education in Cybersecurity and Its Implementation at Edinburgh Napier University’ at the Conference on Cyber Space Security Education at Universities in Guangdong. China on 29 November 2019
  • An Invited Talk on ‘Network Security: Data Analysis Aspects’ at Hunan University of Science and Technology (China), 22 June 2018
  • An Invited Talk on ‘Network Security: Data Analysis Aspects’ at Hunan University of Science and Engineering (China), 20 June 2018
  • An Invited Talk on ‘Internet of Things and Its Security’ at the Dongguan University of Technology, China, December 2017

 

Membership of Professional Body

  • Member of British Computer Society (BCS)
  • Member of European Alliance for Innovation (EAI)
  • Member of The Institute of Electrical and Electronics Engineers (IEEE)

 

Research Degree External Examining

  • Ph.D. degree external examiner for Charles Sturt University, Australia

 

Reviewing

  • ACM Transactions on Multimedia Computing, Communications, and Applications (ACM TOMM)
  • IEEE Transactions on Intelligent Transportation Systems (IEEE TITS)
  • International Journal Autonomous and Adaptive Communications Systems (IJAACS)
  • Neurocomputing (NEUCOM)
  • Computational Intelligence (COIN)
  • Enterprise Information Systems
  • IEEE Transactions on Vehicular Technology (IEEE TVT)
  • IEEE Wireless Communications Magazine (IEEE WCM)
  • IEEE Transactions on Wireless Communications (IEEE TWC)
  • IEEE Transactions on Industrial Informatics (IEEE TII)
  • Information Fusion (INFFUS)
  • IEEE Network Magazine
  • IEEE Internet of Things Journal (IEEE IoTJ)
  • Cognitive Computation
  • IEEE/ACM Transactions on Networking (IEEE ToN)
  • Transactions on Emerging Telecommunications Technologies (ETT)
  • IEEE Transactions on Emerging Topics in Computing (IEEE TETC)
  • Reviewing a book proposal for Blockchains for Network Security for IET
  • IEEE Transactions on Cybernetic
  • IEEE Transactions on Sustainable Computing (IEEE T-SUSC)
  • IEEE Transactions on Computational Social System (IEEE TCSS)
  • Computer & Security (COSE)
  • Journal of Medical Systems
  • International Journal of Embedded Systems (IJES).
  • Computers & Electrical Engineering
  • IEEE/ACM Transactions on Computational Biology and Bioinformatics (IEEE/ACM TCBB)
  • Soft Computing
  • International Journal of Distributed Sensor Networks (IJDSN)
  • Outstanding Contribution in Reviewing 2018 - Computers, Environment and Urban Systems, ISSN: 0198-9715
  • IEEE Access
  • Computers, Environment and Urban Systems (CEUS)
  • Concurrency and Computation: Practice and Experience (CCPE)
  • IET Networks
  • IEEE Transactions on Information Forensics & Security (IEEE T-IFS)
  • IEEE Transactions on Computers (IEEE TC)
  • IEEE Transactions on Dependable and Secure Computing (IEEE TDSC)
  • IEEE Transactions on Services Computing (IEEE TSC)
  • IEEE Transactions on Network and Service Management (IEEE TNSM)
  • IEEE Transactions on Network Science and Engineering (IEEE TNSE)
  • Journal of Cyber Security Technology
  • Applied Computing and Informatics (ACI)
  • Information Sciences (INS)
  • ACM Transactions on Internet Technology (ACM ToIT)
  • Security and Communication Networks (SCN)
  • IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS)
  • Future Generation Computer Systems (FGCS)
  • Journal of Network and Computer Applications (JNCA)
  • Frontiers of Computer Science (FCS)

 

Visiting Positions

  • Visiting Professor at Neusoft Institute Guangdong, China

 

Date


68 results

Deep learning based emotion analysis of microblog texts

Journal Article
Xu, D., Tian, Z., Lai, R., Kong, X., Tan, Z., & Shi, W. (2020)
Deep learning based emotion analysis of microblog texts. Information Fusion, 64, 1-11. https://doi.org/10.1016/j.inffus.2020.06.002
Traditional text emotion analysis methods are primarily devoted to studying extended texts, such as news reports and full-length documents. Microblogs are considered short tex...

Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites

Conference Proceeding
Babaagba, K. O., Tan, Z., & Hart, E. (2020)
Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites. In Applications of Evolutionary Computation. EvoApplications 2020. , (117-132). https://doi.org/10.1007/978-3-030-43722-0_8
In the field of metamorphic malware detection, training a detection model with malware samples that reflect potential mutants of the malware is crucial in developing a model r...

Exploring coupled images fusion based on joint tensor decomposition

Journal Article
Lu, L., Ren, X., Yeh, K., Tan, Z., & Chanussot, J. (2020)
Exploring coupled images fusion based on joint tensor decomposition. Human-Centric Computing and Information Sciences, 10, https://doi.org/10.1186/s13673-020-00215-z
Data fusion has always been a hot research topic in human-centric computing and extended with the development of artificial intelligence. Generally, the coupled data fusion al...

Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples

Conference Proceeding
Babaagba, K., Tan, Z., & Hart, E. (in press)
Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples
Detecting metamorphic malware provides a challenge to machine-learning models as trained models might not generalise to future mutant variants of the malware. To address this,...

KNN-Based Approximate Outlier Detection Algorithm Over IoT Streaming Data

Journal Article
Zhu, R., Ji, X., Yu, D., Tan, Z., Zhao, L., Li, J., & Xia, X. (2020)
KNN-Based Approximate Outlier Detection Algorithm Over IoT Streaming Data. IEEE Access, 8, 42749-42759. https://doi.org/10.1109/access.2020.2977114
KNN-Based outlier detection over IoT streaming data is a fundamental problem, which has many applications. However, due to its computational complexity, existing efforts canno...

Secure Information Transmissions in Wireless-powered Cognitive Radio Networks for Internet of Medical Things

Journal Article
Tang, K., Tang, W., Luo, E., Tan, Z., Meng, W., & Qi, L. (2020)
Secure Information Transmissions in Wireless-powered Cognitive Radio Networks for Internet of Medical Things. Security and Communication Networks, 2020, https://doi.org/10.1155/2020/7542726
In this paper, we consider the issue of the secure transmissions for the cognitive radio-based Internet of Medical Things (IoMT) with wireless energy harvesting. In these syst...

A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network

Conference Proceeding
Thomson, C., Wadhaj, I., Al-Dubai, A., & Tan, Z. (in press)
A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network
The issue of energy holes, or hotspots, in wireless sensor networks is well referenced. As is the proposed mobilisa-tion of the sink node in order to combat this. However, as ...

GAN based Text Data Augmentation for IoT domain Dialogue System

Journal Article
Wang, E. K., Tan, Z., Yeh, K., Wang, X., Xu, P., & Chen, C. (in press)
GAN based Text Data Augmentation for IoT domain Dialogue System. Mobile Networks and Applications,
IoT domain Dialogue System is a new tool for AI based IoT applications. However, how to realize an accurate dialogue system has been a key issue. Language understanding is the...

FIMPA: A Fixed Identity Mapping Prediction Algorithm in Edge Computing Environment

Journal Article
Zhang, S., Liu, Y., Li, S., Tan, Z., Zhao, X., & Zhou, J. (2020)
FIMPA: A Fixed Identity Mapping Prediction Algorithm in Edge Computing Environment. IEEE Access, 8, 17356-17365. https://doi.org/10.1109/access.2020.2966399
Edge computing is a research hotspot that extends cloud computing to the edge of the network. Due to the recent developments in computation, storage and network technology for...

FairEdge: A Fairness-Oriented Task Offloading Scheme for Iot Applications in Mobile Cloudlet Networks

Journal Article
Lai, S., Fan, X., Ye, Q., Tan, Z., Zhang, Y., He, X., & Nanda, P. (2020)
FairEdge: A Fairness-Oriented Task Offloading Scheme for Iot Applications in Mobile Cloudlet Networks. IEEE Access, 8, 13516-13526. https://doi.org/10.1109/access.2020.2965562
Mobile cloud computing has emerged as a promising paradigm to facilitate computation-intensive and delay-sensitive mobile applications. Computation offloading services at the ...

Pre-Napier Funded Projects

  • AUD 2,900, "Network Denial-of-Service Attack Detection Using Image Retrieval", SoCC Incentive Grant, School of Computing and Communications, University of Technology Sydney, Australia
  • AUD 27,800 , "Intrusion Detection in Peer-to-Peer Systems Using Statistical Techniques", CSIRO UTS ICT Top-up Scholarship CSIRO, Marsfiled, Australia

Current Post Grad projects

Previous Post Grad projects

Non-Napier PhD or MSc by Research supervisions

  • Ms. Pallavi Jagannatha - Master of Computer Science with Specialisation in Cyber Security, University of Twente, the Netherlands