Date


Download Available

74 results

Ensemble learning-based IDS for sensors telemetry data in IoT networks

Journal Article
Naz, N., Khan, M. A., Alsuhibany, S. A., Diyan, M., Tan, Z., Khan, M. A., & Ahmad, J. (2022)
Ensemble learning-based IDS for sensors telemetry data in IoT networks. Mathematical Biosciences and Engineering, 19(10), 10550-10580. https://doi.org/10.3934/mbe.2022493
The Internet of Things (IoT) is a paradigm that connects a range of physical smart devices to provide ubiquitous services to individuals and automate their daily tasks. IoT de...

Evaluation Mechanism for Decentralised Collaborative Pattern Learning in Heterogeneous Vehicular Networks

Journal Article
Qiao, C., Qiu, J., Tan, Z., Min, G., Zomaya, A. Y., & Tian, Z. (2023)
Evaluation Mechanism for Decentralised Collaborative Pattern Learning in Heterogeneous Vehicular Networks. IEEE Transactions on Intelligent Transportation Systems, 24(11), 13123 - 13132. https://doi.org/10.1109/TITS.2022.3186630
Collaborative machine learning, especially Feder-ated Learning (FL), is widely used to build high-quality Machine Learning (ML) models in the Internet of Vehicles (IoV). In th...

Building Towards Automated Cyberbullying Detection: A Comparative Analysis

Journal Article
Al Harigy, L. M., Al Nuaim, H. A., Moradpoor, N., & Tan, Z. (2022)
Building Towards Automated Cyberbullying Detection: A Comparative Analysis. Computational Intelligence and Neuroscience, 2022, Article 4794227. https://doi.org/10.1155/2022/4794227
The increased use of social media between digitally anonymous users, sharing their thoughts and opinions, can facilitate participation and collaboration. However, it’s this an...

A novel flow-vector generation approach for malicious traffic detection

Journal Article
Hou, J., Liu, F., Lu, H., Tan, Z., Zhuang, X., & Tian, Z. (2022)
A novel flow-vector generation approach for malicious traffic detection. Journal of Parallel and Distributed Computing, 169, 72-86. https://doi.org/10.1016/j.jpdc.2022.06.004
Malicious traffic detection is one of the most important parts of cyber security. The approaches of using the flow as the detection object are recognized as effective. Benefit...

A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs

Conference Proceeding
McLaren, R. A., Babaagba, K., & Tan, Z. (in press)
A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs. In The 8th International Conference on machine Learning, Optimization and Data science - LOD 2022
As the field of malware detection continues to grow, a shift in focus is occurring from feature vectors and other common, but easily obfuscated elements to a semantics based a...

Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT

Journal Article
Wang, F., Yang, S., Wang, C., Li, Q., Babaagba, K., & Tan, Z. (2022)
Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT. International Journal of Intelligent Systems, 37(10), 7058-7078. https://doi.org/10.1002/int.22871
Internet of Things (IoT) is fast growing. Non-PC devices under the umbrella of IoT have been increasingly applied in various fields and will soon account for a significant sha...

A Novel Nomad Migration-Inspired Algorithm for Global Optimization

Journal Article
Lin, N., Fu, L., Zhao, L., Hawbani, A., Tan, Z., Al-Dubai, A., & Min, G. (2022)
A Novel Nomad Migration-Inspired Algorithm for Global Optimization. Computers and Electrical Engineering, 100, Article 107862. https://doi.org/10.1016/j.compeleceng.2022.107862
Nature-inspired computing (NIC) has been widely studied for many optimization scenarios. However, miscellaneous solution space of real-world problem causes it is challenging t...

Guest Editorial: Special Issue on "Advance in Mobile Edge Computing"

Journal Article
Yang, X., Tan, Z., & Xu, Y. (2021)
Guest Editorial: Special Issue on "Advance in Mobile Edge Computing". Journal of Internet Technology, 22(5),
Cloud computing has a problem for communication-intensive applications, which need to meet the delay requirements. The problem becomes more intense with the huge application o...

Machine Learning: The Cyber-Security, Privacy, and Public Safety Opportunities and Challenges for Emerging Applications

Journal Article
Guo, K., Tan, Z., Luo, E., & Zhou, X. (2021)
Machine Learning: The Cyber-Security, Privacy, and Public Safety Opportunities and Challenges for Emerging Applications. Security and Communication Networks, 2021, Article 9870129. https://doi.org/10.1155/2021/9870129

A VMD and LSTM based hybrid model of load forecasting for power grid security

Journal Article
Lv, L., Wu, Z., Zhang, J., Tan, Z., Zhang, L., & Tian, Z. (2022)
A VMD and LSTM based hybrid model of load forecasting for power grid security. IEEE Transactions on Industrial Informatics, 18(9), 6474-6482. https://doi.org/10.1109/tii.2021.3130237
As the basis for the static security of the power grid, power load forecasting directly affects the safety of grid operation, the rationality of grid planning, and the economy...