Date


Output Type

Download Available

63 results

Special Issue on Adversarial AI to IoT Security and Privacy Protection: Attacks and Defenses

Journal Article
Gao, H., & Tan, Z. (2022)
Special Issue on Adversarial AI to IoT Security and Privacy Protection: Attacks and Defenses. Computer Journal, 65(11), 2847-2848. https://doi.org/10.1093/comjnl/bxac128
The prosperity of social IoT data brings revolutionary changes to our daily lives and greatly increases the existing data volume. But IoT data are vulnerable due to security a...

Ensemble learning-based IDS for sensors telemetry data in IoT networks

Journal Article
Naz, N., Khan, M. A., Alsuhibany, S. A., Diyan, M., Tan, Z., Khan, M. A., & Ahmad, J. (2022)
Ensemble learning-based IDS for sensors telemetry data in IoT networks. Mathematical Biosciences and Engineering, 19(10), 10550-10580. https://doi.org/10.3934/mbe.2022493
The Internet of Things (IoT) is a paradigm that connects a range of physical smart devices to provide ubiquitous services to individuals and automate their daily tasks. IoT de...

Evaluation Mechanism for Decentralised Collaborative Pattern Learning in Heterogeneous Vehicular Networks

Journal Article
Qiao, C., Qiu, J., Tan, Z., Min, G., Zomaya, A. Y., & Tian, Z. (2023)
Evaluation Mechanism for Decentralised Collaborative Pattern Learning in Heterogeneous Vehicular Networks. IEEE Transactions on Intelligent Transportation Systems, 24(11), 13123 - 13132. https://doi.org/10.1109/TITS.2022.3186630
Collaborative machine learning, especially Feder-ated Learning (FL), is widely used to build high-quality Machine Learning (ML) models in the Internet of Vehicles (IoV). In th...

Building Towards Automated Cyberbullying Detection: A Comparative Analysis

Journal Article
Al Harigy, L. M., Al Nuaim, H. A., Moradpoor, N., & Tan, Z. (2022)
Building Towards Automated Cyberbullying Detection: A Comparative Analysis. Computational Intelligence and Neuroscience, 2022, Article 4794227. https://doi.org/10.1155/2022/4794227
The increased use of social media between digitally anonymous users, sharing their thoughts and opinions, can facilitate participation and collaboration. However, it’s this an...

A novel flow-vector generation approach for malicious traffic detection

Journal Article
Hou, J., Liu, F., Lu, H., Tan, Z., Zhuang, X., & Tian, Z. (2022)
A novel flow-vector generation approach for malicious traffic detection. Journal of Parallel and Distributed Computing, 169, 72-86. https://doi.org/10.1016/j.jpdc.2022.06.004
Malicious traffic detection is one of the most important parts of cyber security. The approaches of using the flow as the detection object are recognized as effective. Benefit...

Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT

Journal Article
Wang, F., Yang, S., Wang, C., Li, Q., Babaagba, K., & Tan, Z. (2022)
Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT. International Journal of Intelligent Systems, 37(10), 7058-7078. https://doi.org/10.1002/int.22871
Internet of Things (IoT) is fast growing. Non-PC devices under the umbrella of IoT have been increasingly applied in various fields and will soon account for a significant sha...

A Novel Nomad Migration-Inspired Algorithm for Global Optimization

Journal Article
Lin, N., Fu, L., Zhao, L., Hawbani, A., Tan, Z., Al-Dubai, A., & Min, G. (2022)
A Novel Nomad Migration-Inspired Algorithm for Global Optimization. Computers and Electrical Engineering, 100, Article 107862. https://doi.org/10.1016/j.compeleceng.2022.107862
Nature-inspired computing (NIC) has been widely studied for many optimization scenarios. However, miscellaneous solution space of real-world problem causes it is challenging t...

Guest Editorial: Special Issue on "Advance in Mobile Edge Computing"

Journal Article
Yang, X., Tan, Z., & Xu, Y. (2021)
Guest Editorial: Special Issue on "Advance in Mobile Edge Computing". Journal of Internet Technology, 22(5),
Cloud computing has a problem for communication-intensive applications, which need to meet the delay requirements. The problem becomes more intense with the huge application o...

Machine Learning: The Cyber-Security, Privacy, and Public Safety Opportunities and Challenges for Emerging Applications

Journal Article
Guo, K., Tan, Z., Luo, E., & Zhou, X. (2021)
Machine Learning: The Cyber-Security, Privacy, and Public Safety Opportunities and Challenges for Emerging Applications. Security and Communication Networks, 2021, Article 9870129. https://doi.org/10.1155/2021/9870129

A VMD and LSTM based hybrid model of load forecasting for power grid security

Journal Article
Lv, L., Wu, Z., Zhang, J., Tan, Z., Zhang, L., & Tian, Z. (2022)
A VMD and LSTM based hybrid model of load forecasting for power grid security. IEEE Transactions on Industrial Informatics, 18(9), 6474-6482. https://doi.org/10.1109/tii.2021.3130237
As the basis for the static security of the power grid, power load forecasting directly affects the safety of grid operation, the rationality of grid planning, and the economy...