Staff directory

Search for a surname in the box below and then click "Search" to search for Staff. 

If you want to get in touch but you don’t know who to contact, fill in our enquiry form and one of our advisers will get back to you as soon as possible.
51 results

A Novel Web Attack Detection System for Internet of Things via Ensemble Classification

Journal Article
Luo, C., Tan, Z., Min, G., Gan, J., Shi, W., & Tian, Z. (in press)
A Novel Web Attack Detection System for Internet of Things via Ensemble Classification. IEEE Transactions on Industrial Informatics, https://doi.org/10.1109/TII.2020.3038761
Internet of things (IoT) has become one of the fastestgrowing technologies and has been broadly applied in various fields. IoT networks contain millions of devices with the ca...

Towards Continuous User Authentication Using Personalised Touch-Based Behaviour

Conference Proceeding
Aaby, P., Giuffrida, M. V., Buchanan, W. J., & Tan, Z. (2020)
Towards Continuous User Authentication Using Personalised Touch-Based Behaviour. In 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00023
In this paper, we present an empirical evaluation of 30 features used in touch-based continuous authentication. It is essential to identify the most significant features for e...

Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection

Journal Article
Tian, Z., Shi, W., Tan, Z., Qiu, J., Sun, Y., Jiang, F., & Liu, Y. (in press)
Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection. Mobile Networks and Applications, https://doi.org/10.1007/s11036-020-01656-7
Organizations' own personnel now have a greater ability than ever before to misuse their access to critical organizational assets. Insider threat detection is a key component ...

Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples

Conference Proceeding
Babaagba, K., Tan, Z., & Hart, E. (2020)
Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples. https://doi.org/10.1109/CEC48606.2020.9185668
Detecting metamorphic malware provides a challenge to machine-learning models as trained models might not generalise to future mutant variants of the malware. To address this,...

Block-Sparse Coding Based Machine Learning Approach for Dependable Device-Free Localization in IoT Environment

Journal Article
Zhao, L., Huang, H., Su, C., Ding, S., Huang, H., Tan, Z., & Li, Z. (in press)
Block-Sparse Coding Based Machine Learning Approach for Dependable Device-Free Localization in IoT Environment. IEEE Internet of Things, https://doi.org/10.1109/JIOT.2020.3019732
Device-free localization (DFL) locates targets without equipping with wireless devices or tag under the Internet-of-Things (IoT) architectures. As an emerging technology, DFL ...

FPDP: Flexible Privacy-preserving Data Publishing Scheme for Smart Agriculture

Journal Article
Song, J., Zhong, Q., Su, C., Tan, Z., & Liu, Y. (in press)
FPDP: Flexible Privacy-preserving Data Publishing Scheme for Smart Agriculture. IEEE Sensors Journal, https://doi.org/10.1109/JSEN.2020.3017695
Food security is a global concern. Benefit from the development of 5G, IoT is used in agriculture to help the farmers to maintain and improve productivity. It not only enables...

Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT

Journal Article
Wang, F., Yang, S., Wang, C., Li, Q., Babaagba, K., & Tan, Z. (in press)
Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT. International Journal of Intelligent Systems,
Internet of Things (IoT) is fast growing. Non-PC devices under the umbrella of IoT have been increasingly applied in various fields and will soon account for a significant sha...

On privacy aware carriers for value-possessed e-invoices considering intelligence mining

Journal Article
Cha, S., Wang, H., Tan, Z., Joung, Y., Tseng, Y., & Yeh, K. (2020)
On privacy aware carriers for value-possessed e-invoices considering intelligence mining. IEEE Transactions on Emerging Topics in Computational Intelligence, 4(5), 641-652. https://doi.org/10.1109/TETCI.2019.2938547
Intelligence mining is one of the most promising technologies for effectively extracting intelligence (and knowledge) to enhance the quality of decision-making. In Taiwan, the...

Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites

Conference Proceeding
Babaagba, K. O., Tan, Z., & Hart, E. (2020)
Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites. In Applications of Evolutionary Computation. EvoApplications 2020. , (117-132). https://doi.org/10.1007/978-3-030-43722-0_8
In the field of metamorphic malware detection, training a detection model with malware samples that reflect potential mutants of the malware is crucial in developing a model r...

Secure Information Transmissions in Wireless-powered Cognitive Radio Networks for Internet of Medical Things

Journal Article
Tang, K., Tang, W., Luo, E., Tan, Z., Meng, W., & Qi, L. (2020)
Secure Information Transmissions in Wireless-powered Cognitive Radio Networks for Internet of Medical Things. Security and Communication Networks, 2020, https://doi.org/10.1155/2020/7542726
In this paper, we consider the issue of the secure transmissions for the cognitive radio-based Internet of Medical Things (IoMT) with wireless energy harvesting. In these syst...

Date


Research Areas

People

Date