Research explorer tool

51 results

A Novel Web Attack Detection System for Internet of Things via Ensemble Classification

Journal Article
Luo, C., Tan, Z., Min, G., Gan, J., Shi, W., & Tian, Z. (2021)
A Novel Web Attack Detection System for Internet of Things via Ensemble Classification. IEEE Transactions on Industrial Informatics, 17(8), 5810-5818. https://doi.org/10.1109/TII.2020.3038761
Internet of things (IoT) has become one of the fastestgrowing technologies and has been broadly applied in various fields. IoT networks contain millions of devices with the ca...

Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection

Journal Article
Tian, Z., Shi, W., Tan, Z., Qiu, J., Sun, Y., Jiang, F., & Liu, Y. (in press)
Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection. Mobile Networks and Applications, https://doi.org/10.1007/s11036-020-01656-7
Organizations' own personnel now have a greater ability than ever before to misuse their access to critical organizational assets. Insider threat detection is a key component ...

Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples

Conference Proceeding
Babaagba, K., Tan, Z., & Hart, E. (2020)
Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples. https://doi.org/10.1109/CEC48606.2020.9185668
Detecting metamorphic malware provides a challenge to machine-learning models as trained models might not generalise to future mutant variants of the malware. To address this,...

Evaluation of Ensemble Learning for Android Malware Family Identification

Journal Article
Wylie, J., Tan, Z., Al-Dubai, A., & Wang, J. (2020)
Evaluation of Ensemble Learning for Android Malware Family Identification. Journal of Guangzhou University (Natural Science Edition), 19(4), 28-41
Every Android malware sample generally belongs to a specific family that performs a similar set of actions and characteristics. Having the ability to effectively identify Andr...

Block-Sparse Coding-Based Machine Learning Approach for Dependable Device-Free Localization in IoT Environment

Journal Article
Zhao, L., Huang, H., Su, C., Ding, S., Huang, H., Tan, Z., & Li, Z. (2021)
Block-Sparse Coding-Based Machine Learning Approach for Dependable Device-Free Localization in IoT Environment. IEEE Internet of Things Journal, 8(5), 3211-3223. https://doi.org/10.1109/JIOT.2020.3019732
Device-free localization (DFL) locates targets without equipping with wireless devices or tag under the Internet-of-Things (IoT) architectures. As an emerging technology, DFL ...

FPDP: Flexible Privacy-preserving Data Publishing Scheme for Smart Agriculture

Journal Article
Song, J., Zhong, Q., Su, C., Tan, Z., & Liu, Y. (in press)
FPDP: Flexible Privacy-preserving Data Publishing Scheme for Smart Agriculture. IEEE Sensors Journal, https://doi.org/10.1109/JSEN.2020.3017695
Food security is a global concern. Benefit from the development of 5G, IoT is used in agriculture to help the farmers to maintain and improve productivity. It not only enables...

Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT

Journal Article
Wang, F., Yang, S., Wang, C., Li, Q., Babaagba, K., & Tan, Z. (in press)
Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT. International Journal of Intelligent Systems,
Internet of Things (IoT) is fast growing. Non-PC devices under the umbrella of IoT have been increasingly applied in various fields and will soon account for a significant sha...

On privacy aware carriers for value-possessed e-invoices considering intelligence mining

Journal Article
Cha, S., Wang, H., Tan, Z., Joung, Y., Tseng, Y., & Yeh, K. (2020)
On privacy aware carriers for value-possessed e-invoices considering intelligence mining. IEEE Transactions on Emerging Topics in Computational Intelligence, 4(5), 641-652. https://doi.org/10.1109/TETCI.2019.2938547
Intelligence mining is one of the most promising technologies for effectively extracting intelligence (and knowledge) to enhance the quality of decision-making. In Taiwan, the...

Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites

Conference Proceeding
Babaagba, K. O., Tan, Z., & Hart, E. (2020)
Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites. In Applications of Evolutionary Computation. EvoApplications 2020. , (117-132). https://doi.org/10.1007/978-3-030-43722-0_8
In the field of metamorphic malware detection, training a detection model with malware samples that reflect potential mutants of the malware is crucial in developing a model r...

Secure Information Transmissions in Wireless-powered Cognitive Radio Networks for Internet of Medical Things

Journal Article
Tang, K., Tang, W., Luo, E., Tan, Z., Meng, W., & Qi, L. (2020)
Secure Information Transmissions in Wireless-powered Cognitive Radio Networks for Internet of Medical Things. Security and Communication Networks, 2020, https://doi.org/10.1155/2020/7542726
In this paper, we consider the issue of the secure transmissions for the cognitive radio-based Internet of Medical Things (IoMT) with wireless energy harvesting. In these syst...

Date


Research Areas

People

4 results