Profile image of Lei Pan

Dr Lei Pan

STAFF PROFILE

Position

Senior Lecturer in Cyber Security

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Contact

l.pan@deakin.edu.au
+61 3 925 17483

Publications

Filter by

2018

Comprehensive analysis of network traffic data

Y Miao, Z Ruan, L Pan, J Zhang, Y Xiang

(2018), Vol. 30, pp. 1-16, Concurrency and computation: practice and experience, Chichester, Eng., C1

journal

Object localisation through clustering unreliable ultrasonic range sensors

L Pan, X Zheng, P Kolar, S Bangay

(2018), Vol. 27, pp. 268-280, International journal of sensor networks, Olney, Eng., C1

journal

Practical overview of security issues in wireless sensor network applications

H Radhappa, Lei Pan, X Zheng, S Wen

(2018), Vol. 40, pp. 202-213, International journal of computers and applications, London, Eng., C1

journal

Intelligent agents defending for an IoT world: a review

R Coulter, L Pan

(2018), Vol. 73, pp. 439-458, Computers and security, Amsterdam, The Netherlands, C1

journal

Privacy protection in interactive content based image retrieval

Y Huang, J Zhang, L Pan, Y Xiang

(2018), pp. 1-13, IEEE transactions on dependable and secure computing, Piscataway, N.J., C1

journal

Cross-project transfer representation learning for vulnerable function discovery

G Lin, J Zhang, W Luo, L Pan, Y Xiang, O De Vel, P Montague

(2018), Vol. 14, pp. 3289-3297, IEEE transactions on industrial informatics, Piscataway, N.J., C1

journal

Big network traffic data visualization

Z Ruan, Y Miao, L Pan, Y Xiang, J Zhang

(2018), Vol. 77, pp. 11459-11487, Multimedia tools and applications, New York, N.Y., C1

journal

Distributed detection of zero-day network traffic flows

Y Miao, L Pan, S Rajasegarar, J Zhang, C Leckie, Y Xiang

(2018), Vol. 845, pp. 173-191, AusDM 2017 : Proceedings of the 15th Australasian Data Mining Conference 2017, Melbourne, Vic., E1

conference

High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space

H Lai, M Luo, J Pieprzyk, J Zhang, L Pan, M Orgun

(2018), Vol. 61, pp. 1-11, Science China information sciences, Berlin, Germany, C1

journal

Honeypot frameworks and their applications: a new framework

Chee Ng, Lei Pan, Y Xiang

(2018), Singapore, A1

book

Identifying items for moderation in a peer assessment framework

S James, E Lanham, V mak, L Pan, T Wilkin, G Wood-bradley

(2018), pp. 1-9, Knowledge-based systems, Amsterdam, The Netherlands, C1

journal

Exploring feature coupling and model coupling for image source identification

Y Huang, L Cao, J Zhang, L Pan, Y Liu

(2018), Vol. 13, pp. 3108-3121, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal

Round-robin-differential-phase-shift quantum key distribution based on wavelength division multiplexing

H Lai, M Luo, Y Xiu, J Pieprzyk, J Zhang, L Pan, M Orgun

(2018), Vol. 15, Laser physics letters, Bristol, Eng., C1

journal

A Quantum Secret Sharing Scheme Using Orbital Angular Momentum onto Multiple Spin States Based on Fibonacci Compression Encoding

H Lai, M Luo, Y Xu, J Pieprzyk, J Zhang, L Pan, M Orgun

(2018), Vol. 70, pp. 384-390, Communications in Theoretical Physics, C1

journal
2017

Visual representation of penetration testing actions and skills in a technical tree model

A Falah, L Pan, M Abdelrazek

(2017), pp. 1-10, ACSW 2017 : Proceedings of the Australasian Computer Science Week Multiconference, Geelong, Vic., E1

conference

Security analysis of modern mission critical android mobile applications

X zheng, L Pan, E Yilmaz

(2017), pp. 1-9, ACSW 2017 : Proceedings of the Australasian Computer Science Week Multiconference, Geelong, Victoria, E1

conference

Fast and simple high-capacity quantum cryptography with error detection

H Lai, M-X Luo, J Pieprzyk, J Zhang, L Pan, S Li, M Orgun

(2017), Vol. 7, pp. 1-11, Scientific reports, London, Eng., C1

journal

Comprehensive analysis of network traffic data

Y Miao, Z ruan, L Pan, J Zhang, Y Xiang, Y Wang

(2017), pp. 423-430, CIT 2016 : Proceedings of the IEEE International Conference on Computer and Information Technology, Nadi, Fiji, E1

conference

Portguard - An authentication tool for securing ports in an IoT gateway

S Sathyadevan, V Vejesh, R Doss, L Pan

(2017), pp. 624-629, PerCom 2017 : IEEE International Conference on Pervasive Computing and Communications Workshops, Kona, Hawaii, E1

conference

Visualization of big data security - a case study on the KDD99 cup data set

Z Ruan, Y Miao, L Pan, N Patterson, J Zhang

(2017), Vol. 3, pp. 250-259, Digital communications and networks, Amsterdam, The Netherlands, C1

journal

Online peer marking with aggregation functions

S James, L Pan, T Wilkin, L Yin

(2017), pp. 1-6, FUZZ-IEEE 2017 : IEEE International Conference on Fuzzy Systems, Naples, Italy, E1

conference

Cyber security attacks to modern vehicular systems

L Pan, X Zheng, H Chen, H Luan, H Bootwala, L Batten

(2017), Vol. 36, pp. 90-100, Journal of information security and applications, Amsterdam, The Netherlands, C1

journal

Noise-resistant statistical traffic classification

B Wang, J Zhang, Z Zhang, L Pan, Y Xiang, D Xia

(2017), pp. 1-13, IEEE transactions on big data, Piscataway, N.J., C1

journal

A testbed for security analysis of modern vehicle systems

X Zheng, L Pan, H Chen, R Di Pietro, L Batten

(2017), pp. 1090-1095, trustcom/BigDataSE/ICESS 2017 : Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Sydney, N.S.W., E1

conference

Security test MOODLE: a penetration testing case study

A Mudiyanselage, L Pan

(2017), pp. 1-12, International journal of computers and applications, Abingdon, Eng., C1

journal

Generating security questions for better protection of user privacy

A Anvari, L Pan, X Zheng

(2017), International Journal of Computers and Applications, Anaheim, Calif., C1

journal
2016

Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding

H Lai, J Zhang, M-X Luo, L Pan, J Pieprzyk, F Xiao, M Orgun

(2016), Vol. 6, pp. 1-12, Scientific reports, London, Eng., C1

journal

Investigating security vulnerabilities in modern vehicle systems

X Zheng, L Pan, H Chen, P Wang

(2016), Vol. 651, pp. 29-40, ATIS 2016 : Proceedings of the International Conference on Applications and Techniques in Information Security, Cairns, Queensland, E1

conference

Robustness and embedding capacity enhancement in time-spread echo-based audio watermarking

I Natgunanathan, Y Xiang, L Pan, P Chen, D Peng

(2016), pp. 1536-1541, ICIEA 2016: Proceedings of the IEEE 11th Conference on Industrial Electronics and Applications, Hefei, China, E1

conference
2015

Segregation-of-duties conflicts in the insider threat landscape: an overview and case study

S Ballesteros, L Pan, L Batten, G Li

(2015), pp. 367-370, ERMM 2015: Proceedings of the 2015 International Conference on Education Reform and Modern Management, Hong Kong, E1

conference

The usefulness metrics of the most popular eReader used by higher education students

D Sari, E Lanham, L Pan

(2015), Vol. 12, pp. 203-212, Issues in informing science and information technology, Santa Rosa, Cailf., C1

journal

Enhanced Twitter sentiment analysis by using feature selection and combination

A Yang, J Zhang, L Pan, Y Xiang

(2015), pp. 52-57, SOCIALSEC 2015: Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, Hangzhou, China, E1

conference
2014

Investigating Facebook groups through a random graph model

D Pallegedara, L Pan

(2014), Vol. 9, pp. 25-34, Journal of multimedia, Finland, C1

journal

Generating repudiable, memorizable and privacy preserving security questions using the Propp Theory of Narrative

L Pan, S Bangay

(2014), pp. 66-72, CyberC 2014 : The 6th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Shanghai, China, E1

conference

A novel method for detecting double compressed Facebook JPEG images

C Ng, L Pan, Y Xiang

(2014), Vol. 490, pp. 191-198, Communications in Computer and Information Science, Dordrecht , Germany, B1

chapter

Privacy preserving in location data release: A differential privacy approach

P Xiong, T Zhu, L Pan, W Niu, G Li

(2014), Vol. 8862, pp. 183-195, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Berlin, Germany, B1

chapter

Forensic identification of students outsourcing assignment projects from freelancer.com

M Monnik, L Pan

(2014), Vol. 490, pp. 183-190, Communications in Computer and Information Science, Berlin, Germany, B1

chapter

Privacy preserving collaborative filtering for KNN attack resisting

T Zhu, G Li, L Pan, Y Ren, W Zhou

(2014), Vol. 4, pp. 1-14, Social network analysis and mining, Berlin, Germany, C1-1

journal
2013

Developing a cloud computing based approach for forensic analysis using OCR

M Trojahn, L Pan, F Schmidt

(2013), pp. 59-68, IMF 2013 : Proceedings of the Seventh International Conference on IT Security Incident Management and IT Forensics, Nuremberg, Germany, E1

conference

Developing an empirical algorithm for protecting text-based CAPTCHAs against segmentation attacks

L Pan, Y Zhou

(2013), pp. 1-8, TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Vic., E1

conference
2012

Using hypothesis generation in event profiling for digital forensic investigations

L Pan, N Khan, L Batten

(2012), pp. 76-86, WDFIA 2012 : Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis:, Crete, Greece, E1

conference

Detecting SMS-based control commands in a Botnet from infected android devices

A Nguyen, L Pan

(2012), pp. 23-27, ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop, Melbourne, Vic., E1

conference

Towards a sustainable assessment strategy for digital forensic education and training

L Pan, D Hutchinson, N Khan

(2012), TALE 2012 : Proceedings of the IEEE International Conference on Teaching, Assessment and Learning for Engineering, Hong Kong, E1

conference

Hypothesis generation and testing in event profiling for digital forensic investigations

L Batten, L Pan, N Khan

(2012), Vol. 4, pp. 1-14, International journal of digital crime and forensics, Hershey, Pa., C1

journal
2011

Image source detection : a case study on Facebook images taken by iPhones

L Pan, N Trepanic

(2011), pp. 39-46, ATIS 2011 : Workshop proceedingof ATIS 2011. Melbourne, November 9th, 2011. Second Applications and Techniques in Information Security Workshop, Melbourne, Vic., E1

conference

A Grobner-Shirshov algorithm for applications in internet security

A Kelarev, J Yearwood, P Watters, X Wu, L Ma, J Abawajy, L Pan

(2011), Vol. 35, pp. 807-820, Southeast Asian bulletin of mathematics, Hong Kong, C1

journal
2010

Internet security applications of the Munn rings

A Kelarev, J Yearwood, P Watters, X Wu, J Abawajy, L Pan

(2010), Vol. 81, pp. 162-171, Semigroup forum, New York N.Y., C1

journal

Dynamic addressing in wireless sensor networks without location awareness

R Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2010), Vol. 26, pp. 443-460, Journal of information science and engineering, Taipei, Taiwan, C1

journal

Using relationship-building in event profiling for digital forensic investigations

L Batten, L Pan

(2010), e-Forensics 2010 : Proceedings of the 3rd International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, Shangai, China, E1

conference
2009

Robust correctness testing for digital forensic tools

L Pan, L Batten

(2009), pp. 54-64, Forensics in telecommunications, information and multimedia : second international conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009 : revised selected papers, Berlin, Germany, E1

conference

Robust performance testing for digital forensic tools

L Pan, L Batten

(2009), Vol. 6, pp. 71-81, Digital investigation, Kidlington, England, C1

journal
2008

Teaching digital forensics to undergraduate students

L Batten, L Pan

(2008), Vol. 6, pp. 54-56, IEEE security & privacy, New York, N.Y., C1

journal

Measure of integrity leakage in live forensic context

L Pan, A Savoldi, P Gubian, L Batten

(2008), pp. 534-537, IIH-MSP 2008 : Proceedings of the Intelligent Information Hiding and Multimedia Signal Processing 2008 international conference, Harbin, China, E1-1

conference
2007

A lower bound on effective performance testing for digital forensic tools

L Pan, L Batten

(2007), pp. 117-130, SADFE 2007 : Second International Workshop on Systematic Approaches to Digital Forensic Engineering : proceedings : 10-12 April 2007, Seattle, Washington, USA, Seattle, Washington, E1

conference

An effective and efficient testing methodology for correctness testing for file recovery tools

L Pan, L Batten

(2007), pp. 103-107, IIHMSP 2007 : Third International conference on Intelligent Information Hiding and Multimedia Signal Processing : proceedings : 26-28 November, 2007, Kaohsiung, Taiwan, Kaohsiung, Taiwan, E1

conference
2006

Lease based addressing for event-driven wireless sensor networks

R Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2006), pp. 251-256, ISCC 2006 proceedings : 11th IEEE Symposium on Computers and Communications : 26-29 June 2006, Cagliari, Sardinia, Italy, Cagliari, Sardinia, Italy, E1

conference

Address reuse in wireless sensor networks

R Chellappa Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2006), pp. 329-333, ATNAC, Australian Telecommuncation Networks and Applications Conference, 2006., Melbourne, Australia, E1

conference

A case for cross layer design: the impact of physical layer properties on routing protocol performance in MANETs

R Doss, L Pan

(2006), pp. 409-413, ATNAC, Australian Telecommuncation Networks and Applications Conference, 2006., Melbourne, Australia, E1

conference
2005

Reproducibility of digital evidence in forensic investigations

L Pan, L Batten

(2005), pp. 1-8, DFRWS 2005 : Proceedings of the 5th Annual Digital Forensic Research Workshop, New Orleans, La., E1

conference

Funded Projects at Deakin

No Funded Projects at Deakin found

Supervisions

Associate Supervisor
2018

Ahmed Abdulateef Mohammed

Thesis entitled: Robust Approaches for Face Recognition

Doctor of Philosophy (Information Technology), School of Information Technology

Purnomo Yustianto

Thesis entitled: General Framework for Service Engineering Analysis and Design

Doctor of Philosophy (Information Technology), School of Information Technology

2014

Moutaz Alazab

Thesis entitled: Analysis on Smartphone Devices for Detection and Prevention of Malware

Doctor of Philosophy (Information Technology), School of Information Technology