Prof Wanlei Zhou

STAFF PROFILE

Position

Associate Dean- International Research Engagement

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Biography

Professor Wanlei Zhou received B.Eng and M.Eng degrees from Harbin Institute of Technology, Harbin, China in 1982 and 1984, respectively, and a PhD degree from The Australian National University, Canberra, Australia, in 1991, all in Computer Science and Engineering. He also received a DSc degree (a higher Doctorate degree) from Deakin University in 2002. He is currently the Alfred Deakin Professor (the highest honour the University can bestow on a member of academic staff) and Chair Professor in Information Technology, School of Information Technology, Deakin University. Before joining Deakin University, Professor Zhou served as a lecturer in University of Electronic Science and Technology of China, a system programmer in HP at Massachusetts, USA; a lecturer in Monash University, Melbourne, Australia; and a lecturer in National University of Singapore, Singapore. His research interests include distributed systems, network security, bioinformatics, and e-learning. Professor Zhou has published more than 300 papers in refereed international journals and refereed international conferences proceedings, including over 30 articles in IEEE journal in the last 5 years. He has also chaired many international conferences. Prof Zhou is a Senior Member of the IEEE.

Read more on Wanlei's profile

Biography summary

  • Jan 2015-present: Chair Professor of Information Technology, School of Information Technology, Deakin University.
  • Jan 2009-Jan 2015:
    Chair Professor of Information Technology and Head, School of Information Technology,
    Deakin University
  • May 2006 – Jan 2009:
    Chair Professor of Information Technology and Associate Dean (International),
    Faculty of Science and Technology, Deakin University
  • Jan. 2002 – Apr 2006:
    Chair Professor of Information Technology and Head,
    School of Information Technology, Deakin University

Research interests

  • Distributed and parallel systems
  • Network security
  • Bioinformatics
  • Internet and mobile computing
  • e-Learning

Units taught

  • SIT704 Advanced Topics in Digital Security
  • SIT382 System Security
  • SIT222 Operating Systems

Knowledge areas

Distributed and Parallel Systems
Network security
Bioinformatics
Internet and Mobile computing
e-Learning

Professional activities

Professor Zhou was the General Chair / Program Committee Chair / Co-Chair of many international conferences, including TrustCom, ISPA, IUCC, CSS, ICA3PP, EUC, NSS, HPCC, PRDC, etc., and has been invited to deliver keynote address in a number of international conferences, including SKG, NSS, PDCAT, NSS, EUC, ICWL, CIT, ISPA, ICA3PP, etc.

Projects

  • ARC Linkage Project LP0562156: 2005-2008, Wanlei Zhou and Wei Shi, "Protecting Web Services from Distributed Denial of Service Attacks".
  • ARC Discovery Project DP0773264: 2007-2009, Wanlei Zhou and Yang Xiang, "Development of methods to address internet crime".
  • ARC Linkage Project LP100100208, 2010-2012, Wanlei Zhou and Yang Xiang, "An active approach to detect and defend against peer-to-peer botnets".
  • ARC Linkage Project LP100100816, 2010-2012, Wanlei Zhou and Robin Doss, "Secure and Efficient Communication in Vehicle-based Radio Frequency Identification Systems".
  • ARC Discovery Project DP1095498, 2010-2012, Yang Xiang, Wanlei Zhou, and Yong Xiang, "Tracing real Internet attackers through information correlation".
  • ARC Linkage Project LP120200266, 2012-2015, Yang Xiang, Wanlei Zhou, Vijay Varadharajan, and Jonathan Oliver, "Developing an active defence system to identify malicious domains and websites".
  • ARC Discovery Project DP140103649, 2014-2016, Wanlei Zhou and Yang Xiang, "Modelling and defence against malware propagation".

Publications

Filter by

2017

The structure of communities in scale-free networks

J Jiang, S Wen, S Yu, Y Xiang, W Zhou, H Hassan

(2017), Vol. 29, pp. 1-16, Concurrency and computation: practice and experience, Chichester, Eng., C1

journal

Using epidemic betweenness to measure the influence of users in complex networks

S Wen, J Jiang, B Liu, Y Xiang, W Zhou

(2017), Vol. 78, pp. 288-299, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

Identifying propagation sources in networks: state-of-the-art and comparative studies

J Jiang, S Wen, S Yu, Y Xiang, W Zhou

(2017), Vol. 19, pp. 465-481, IEEE communications surveys & tutorials, Piscataway, N.J., C1

journal

Invisible hand: a privacy preserving mobile crowd sensing framework based on economic models

B Liu, W Zhou, T Zhu, H Zhou, X Lin

(2017), Vol. 66, pp. 4410-4423, IEEE transactions on vehicular technology, Piscataway, N.J., C1

journal

Statistical features-based real-time detection of drifted Twitter spam

C Chen, Y Wang, J Zhang, Y Xiang, W Zhou, G Min

(2017), Vol. 12, pp. 914-925, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal

Fog computing and its applications in 5G

L Gao, T Luan, B Liu, W Zhou, S Yu

(2017), pp. 571-593, 5G mobile communications, [Cham], Switzerland, B1

chapter

FogRoute: DTN-based data dissemination model in fog computing

L Gao, T Luan, S Yu, W Zhou, B Liu

(2017), Vol. 4, pp. 225-235, IEEE internet of things journal, Piscataway, N.J., C1

journal

Prediction model students' performance in online discussion forum

F Widyahastuti, Y Riady, W Zhou

(2017), pp. 6-10, ACM International Conference Proceeding Series, E1

conference

Studying the global spreading influence and local connections of users in online social networks

J Jiang, Y Qu, S Yu, W Zhou, W Wu

(2017), pp. 431-435, Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016, E1

conference

A secure search protocol for low cost passive RFID tags

S Sundaresan, R Doss, S Piramuthu, W Zhou

(2017), Vol. 122, pp. 70-82, Computer networks, Amsterdam, The Netherlands, C1

journal

Personalized privacy preserving collaborative filtering

M Yang, T Zhu, Y Xiang, W Zhou

(2017), Vol. 10232 LNCS, pp. 371-385, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), E1

conference

Answering differentially private queries for continual datasets release

T Zhu, G Li, P Xiong, W Zhou

(2017), pp. 1-12, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

STC: exposing hidden compromised devices in networked sustainable green smart computing platforms by partial observation

D Wang, T Wu, S Wen, X Chen, Y Xiang, W Zhou

(2017), pp. 1-14, IEEE transactions on sustainable computing, Piscataway, N.J., C1

journal

Pokémon GO in Melbourne CBD: a case study of the cyber-physical symbiotic social networks

D Wang, T Wu, S Wen, D Liu, Y Xiang, W Zhou, H Hassan, A Alelaiwi

(2017), pp. 1-12, Journal of computational science, Amsterdam, The Netherlands, C1

journal

Differentially private data publishing and analysis: a survey

T Zhu, G Li, W Zhou, P Yu

(2017), Vol. 29, pp. 1619-1638, IEEE Transactions on Knowledge and Data Engineering, Piscataway, N.J., C1

journal

Catch me if you can: detecting compromised users through partial observation on networks

D Wang, S Wen, Y Xiang, W Zhou, J Zhang, S Nepal

(2017), pp. 2417-2422, ICDCS 2017 : Proceedings of the 37th International Conference on Distributed Computing Systems, Atlanta, Georgia, E1

conference

Fuzzy-based information decomposition for incomplete and imbalanced data learning

S Liu, J Zhang, Y Xiang, W Zhou

(2017), pp. 1-15, IEEE transactions on fuzzy systems, Piscataway, N.J., C1

journal

My face is mine: fighting unpermitted tagging on personal/group photos in social media

L Tang, W Ma, S Wen, M Grobler, Y Xiang, W Zhou

(2017), Vol. 10570, pp. 528-539, WISE 2017 : Proceedings of the 18th International Conference on Web Information Systems Engineering, Puschino, Russia, E1

conference
2016

Privacy-preserving topic model for tagging recommender systems

T Zhu, G Li, W Zhou, P Xiong, C Yuan

(2016), Vol. 46, pp. 33-58, Knowledge and information systems, London, Eng., C1

journal

Discovery of stop regions for understanding repeat travel behaviors of moving objects

G Huang, J He, W Zhou, G Huang, L Guo, X Zhou, F Tang

(2016), Vol. 82, pp. 582-593, Journal of computer and system sciences, Amsterdam, The Netherlands, C1

journal

Query verification schemes for cloud-hosted databases: a brief survey

F Riaz-ud-Din, W Zhou, R Ram Mohan Doss

(2016), Vol. 31, pp. 543-561, International journal of parallel, emergent and distributed systems, Abingdon, Eng., C1

journal

Spammers are becoming "smarter" on Twitter

C Chen, J Zhang, Y Xiang, W Zhou, J Oliver

(2016), Vol. 18, pp. 66-70, IT professional, Piscataway, N.J., C1

journal

A performance evaluation of machine learning-based streaming spam tweets detection

C Chen, J Zhang, Y Xie, Y Xiang, W Zhou, M Hassan, A Alelaiwi, M Alrubaian

(2016), Vol. 2, pp. 65-76, IEEE transactions on computational social systems, Piscataway, N.J, C1

journal

String matching query verification on the cloud-hosted databases

F Riaz-ud-Din, R Ram Mohan Doss, W Zhou

(2016), pp. 1-10, IICDCN 2016 : Proceedings of the 17th International Conference on Distributed Computing and Networking, Singapore, E1

conference

A feasible IP traceback framework through dynamic deterministic packet marking

S Yu, W Zhou, S Guo, M Guo

(2016), Vol. 65, pp. 1418-1427, IEEE transactions on computers, Piscataway, N.J., C1

journal

Speedup of big data transfer on the internet

G Huang, W Zhou, J He

(2016), pp. 139-155, Networking for big data, Boca Raton, Fla., B1

chapter

PPM-HDA: privacy-preserving and multifunctional health data aggregation with fault tolerance

S Han, S Zhao, Q Li, C-H Ju, W Zhou

(2016), Vol. 11, pp. 1940-1955, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal

Efficient fine-grained access control for secure personal health records in cloud computing

K He, J Weng, J Liu, W Zhou, J Liu

(2016), pp. 65-79, NSS 2016 : Proceedings of the Network and System Security 2016 Conference, Taipei, Taiwan, E1

conference

On the race of worms and patches: modeling the spread of information in wireless sensor networks

M Sayad Haghighi, S Wen, Y Xiang, B Quinn, W Zhou

(2016), Vol. 11, pp. 2854-2865, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal

K-source: multiple source selection for traffic offloading in mobile social networks

B Liu, W Zhou, J Jiang, K Wang

(2016), pp. 1-5, WCSP 2016 : Proceedings of the 2016 8th International Conference on Wireless Communications and Signal Processing, Yangzhou, China, E1

conference

Silence is golden: enhancing privacy of location-based services by content broadcasting and active caching in wireless vehicular networks

B Liu, W Zhou, T Zhu, L Gao, H Luan, H Zhou

(2016), Vol. 65, pp. 9942-9953, IEEE transactions on vehicular technology, Piscataway, N.J., C1

journal

Malware propagations in wireless ad hoc networks

B Liu, W Zhou, L Gao, H Zhou, T Luan, S Wen

(2016), pp. 1-11, IEEE transactions on dependable and secure computing, Piscataway, N.J., C1

journal

Analysis of the spreading influence variations for online social users under attacks

J Jiang, S Wen, S Yu, W Zhou, Y Qian

(2016), pp. 1238-1244, GLOBECOM 2016: Proceedings of the 59th IEEE Global Communications Conference, Washington, D.C., E1-1

conference
2015

Mining streams of short text for analysis of world-wide event evolutions

G Huang, J He, Y Zhang, W Zhou, H Liu, P Zhang, Z Ding, Y You, J Cao

(2015), Vol. 18, pp. 1201-1217, World wide web, Berlin, Germany, C1

journal

Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy

S Sundaresan, R Ram Mohan Doss, W Zhou, S Piramuthu

(2015), Vol. 55, pp. 112-124, Computer communications, Amsterdam, The Netherlands, C1

journal

Correlated differential privacy: hiding information in non-IID data set

T Zhu, P Xiong, G Li, W Zhou

(2015), Vol. 10, pp. 229-242, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal

Secure tag search in RFID systems using mobile readers

S Sundaresan, R Ram Mohan Doss, S Piramuthu, W Zhou

(2015), Vol. 12, pp. 1-14, IEEE transactions on dependable and secure computing, Piscataway, N.J., C1

journal

Zero knowledge grouping proof protocol for RFID EPC C1G2 Tags

S Sundaresan, R Doss, W Zhou

(2015), Vol. 64, pp. 2994-3008, IEEE transactions on computers, Piscataway, N.J., C1

journal

A sword with two edges: Propagation studies on both positive and negative information in online social networks

S Wen, M Haghighi, C Chen, Y Xiang, W Zhou, W Jia

(2015), Vol. 64, pp. 640-653, IEEE transactions on computers, Piscataway, N.J., C1

journal

Robust histogram shape-based method for image watermarking

T Zong, Y Xiang, I Natgunanathan, S Guo, W Zhou, G Beliakov

(2015), Vol. 25, pp. 717-729, IEEE Transactions on Circuits and Systems for Video Technology, New York, NY, C1

journal

Detecting stepping stones by abnormal causality probability

S Wen, D Wu, P Li, Y Xiang, W Zhou, G Wei

(2015), Vol. 8, pp. 1831-1844, Security and communication networks, London, Eng., C1

journal

Robust network traffic classification

J Zhang, X Chen, Y Xiang, W Zhou, J Wu

(2015), Vol. 23, pp. 1257-1270, IEEE/ACM transactions on networking, Piscataway, N.J., C1

journal

A survey of recommendation techniques based on offline data processing

Y Ren, G Li, W Zhou

(2015), Vol. 27, pp. 3915-3942, Concurrency computation: practice and experience, London, Eng., C1

journal

K-Center: an approach on the multi-source identification of information diffusion

J Jiang, S Wen, S Yu, Y Xiang, W Zhou

(2015), Vol. 10, pp. 2616-2626, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal

Asymmetric self-learning for tackling Twitter spam drift

C Chen, J Zhang, Y Xiang, W Zhou

(2015), Vol. 2015-August, pp. 208-213, INFOCOM WKSHPS 2015: Proceedings of the Computer Communications Workshops, Hong Kong, E1

conference

A data as a product model for future consumption of big stream data in clouds

G Huang, J He, C Chi, W Zhou, Y Zhang

(2015), pp. 256-263, SCC 2015: Proceedings of the 12th International Conference on Services Computing, New York, New York, E1

conference

Privacy preserving data release for tagging recommender systems

T Zhu, G Li, Y Ren, W Zhou, P Xiong

(2015), Vol. 13, pp. 229-246, Web intelligence, Amsterdam, The Netherlands, C1

journal

Modeling malicious activities in cyber space

S Yu, G Wang, W Zhou

(2015), Vol. 29, pp. 83-87, IEEE network, Piscataway, N.J., C1

journal

6 million spam tweets: a large ground truth for timely Twitter spam detection

C Chen, J Zhang, X Chen, Y Xiang, W Zhou

(2015), pp. 7065-7070, ICC 2015 : IEEE Proceedings of the International Conference on Communications, London, England, E1

conference

The relation between local and global influence of individuals in scale-free networks

S Wen, J Jiang, K Majbouri Yazdi, Y Xiang, W Zhou

(2015), pp. 80-84, SOCIALSEC 2015: Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, Hangzhou, China, E1

conference

Mobility increases the risk of malware propagations in wireless networks

B Liu, W Zhou, L Gao, S Wen, H Luan

(2015), Vol. 1, pp. 90-95, TrustCom 2015: Proceedings of the IEEE Trust, Security and Privacy in Computing and Communications 2015 International Conference, Helsinki, Finland, E1

conference

Delay tolerant networks

L Gao, S Yu, H Luan, W Zhou

(2015), Berlin, Germany, A1

book
2014

Distributed denial of service (DDoS) detection by traffic pattern analysis

T Thapngam, S Yu, W Zhou, S Makki

(2014), Vol. 7, pp. 346-358, Peer-to-peer networking and applications, New York, N.Y., C1

journal

Modeling and analysis on the propagation dynamics of modern email malware

S Wen, W Zhou, J Zhang, Y Xiang, W Zhou, W Jia, C C Zou

(2014), Vol. 11, pp. 361-374, IEEE Transactions on Dependable and Secure Computing, Piscataway, N.J., C1

journal

Detection and defense of application-layer DDoS attacks in backbone web traffic

W Zhou, W Jia, S Wen, Y Xiang, W Zhou

(2014), Vol. 38, pp. 36-46, Future generation computer systems, Amsterdam, Netherlands, C1

journal

Control flow-based malware variant detection

S Cesare, Y Xiang, W Zhou

(2014), Vol. 11, pp. 304-317, IEEE transactions on dependable and secure computing, Piscataway, NJ, C1

journal

Modeling the propagation of worms in networks: a survey

Y Wang, S Wen, Y Xiang, W Zhou

(2014), Vol. 16, pp. 942-960, IEEE communications surveys and tutorials, Piscataway, NJ, C1

journal

Internet traffic clustering with side information

Y Wang, Y Xiang, J Zhang, W Zhou, B Xie

(2014), Vol. 80, pp. 1021-1036, Journal of Computer and System Sciences, Amsterdam, The Netherlands, C1

journal

Patchwork-based audio watermarking method robust to de-synchronization attacks

Y Xiang, I Natgunanathan, S Guo, W Zhou, S Nahavandi

(2014), Vol. 22, pp. 1413-1423, IEEE Transactions on audio, speech and language processing, Piscataway, NJ, C1

journal

Are the popular users always important for information dissemination in online social networks?

S Wen, J Jiang, Y Xiang, S Yu, W Zhou

(2014), Vol. 28, pp. 64-67, IEEE Network, Piscataway, N. J, C1

journal

Breast cancer prognosis risk estimation using integrated gene expression and clinical data

A Saini, J Hou, W Zhou

(2014), Vol. 2014, pp. 1-15, BioMed research international, United States, C1

journal

RRHGE: a novel approach to classify the estrogen receptor based breast cancer subtypes

A Saini, J Hou, W Zhou

(2014), Vol. 2014, pp. 1-13, ScientificWorldJournal, New York, N. Y., C1

journal

Internet traffic classification using constrained clustering

Y Wang, Y Xiang, J Zhang, W Zhou, G Wei, L Yang

(2014), Vol. 25, pp. 2932-2943, IEEE transactions on parallel and distributed systems, Piscataway, N.J., C1

journal

Deferentially private tagging recommendation based on topic model

T Zhu, G Li, W Zhou, P Xiong, C Yuan

(2014), Vol. 8443 Part 1, pp. 557-568, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Heidelberg, Germany, B1

chapter

An effective privacy preserving algorithm for neighborhood-based collaborative filtering

T Zhu, Y Ren, W Zhou, J Rong, P Xiong

(2014), Vol. 36, pp. 142-155, Future Generation Computer Systems, Amsterdam, The Netherlands, C1

journal

A robust grouping proof protocol for RFID EPC C1G2 tags

S Sundaresan, R Ram Mohan Doss, S Piramuthu, W Zhou

(2014), Vol. 9, pp. 961-975, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal

On addressing the imbalance problem: A correlated KNN approach for network traffic classification

D Wu, X Chen, C Chen, J Zhang, Y Xiang, W Zhou

(2014), Vol. 8792, pp. 138-151, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Heidelberg, Germany, B1

chapter

To shut them up or to clarify: restraining the spread of rumors in online social networks

S Wen, J Jiang, Y Xiang, S Yu, W Zhou, W Jia

(2014), Vol. 25, pp. 3306-3316, IEEE transactions on parallel and distributed systems, Piscataway, NJ, C1

journal

IPA: Integrated predictive gene signature from gene expression based breast cancer patient samples

A Saini, J Hou, W Zhou

(2014), pp. 13-30, Biotech 2014 : Innovative Approach in Stem Cell Research, Cancer Biology and Applied Biotechnology, New Delhi, India, E1

conference

The maximum imputation framework for neighborhood-based collaborative filtering

Yongli Ren, Gang Li, Jun Zhang, Wanlei Zhou

(2014), Vol. 4, pp. 1-15, Social Network Analysis and Mining, C1

journal

Privacy preserving collaborative filtering for KNN attack resisting

T Zhu, G Li, L Pan, Y Ren, W Zhou

(2014), Vol. 4, pp. 1-14, Social network analysis and mining, Berlin, Germany, C1-1

journal

Modelling personal preferences for Top-N movie recommendations

Y Ren, G Li, W Zhou

(2014), Vol. 12, pp. 289-307, Web intelligence, Amsterdam, The Netherlands, C1-1

journal
2013

A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems

R Doss, S Sundaresan, W Zhou

(2013), Vol. 11, pp. 383-396, Ad hoc networks, New York, N.Y., C1

journal

Unsupervised traffic classification using flow statistical properties and IP packet payload

J Zhang, Y Xiang, W Zhou, Y Wang

(2013), Vol. 79, pp. 573-585, Journal of computer and system sciences, Amsterdam, The Netherlands, C1

journal

Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions

Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou

(2013), Vol. 8, pp. 5-15, IEEE Transactions on Information Forensics and Security, C1

journal

Network traffic classification using correlation information

J Zhang, Y Xiang, Y Wang, W Zhou, Y Xiang, Y Guan

(2013), Vol. 24, pp. 104-117, IEEE transactions on parallel and distributed systems, Piscataway, N.J., C1

journal

Hub-based reliable gene expression algorithm to classify ER+ and ER- breast cancer subtypes

A Saini, J Hou, W Zhou

(2013), Vol. 3, pp. 20-26, International journal of bioscience, biochemistry and bioinformatics, Singapore, C1

journal

Modeling propagation dynamics of social network worms

S Wen, W Zhou, J Zhang, Y Xiang, W Zhou, W Jia

(2013), Vol. 24, pp. 1633-1643, IEEE transactions on parallel and distributed systems, Piscataway, N.J., C1

journal

Robust image retrieval with hidden classes

J Zhang, L Ye, Y Xiang, W Zhou

(2013), Vol. 117, pp. 670-679, Computer vision and image understanding, Amsterdam, The Netherlands, C1

journal

Malwise-an effective and efficient classification system for packed and polymorphic malware

S Cesare, Y Xiang, W Zhou

(2013), Vol. 62, pp. 1193-1206, IEEE transactions on computers, Piscataway, N.J., C1

journal

An Effective Network Traffic Classification Method with Unknown Flow Detection

Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou, A Vasilakos

(2013), Vol. 10, pp. 133-147, IEEE Transactions on Network and Service Management, C1

journal

Secure RFID tag ownership transfer based on quadratic residues

R Doss, W Zhou, S Yu

(2013), Vol. 8, pp. 390-401, IEEE Transactions on information forensics and security, Piscataway, N.J., C1

journal

Robust network traffic identification with unknown applications

Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou

(2013), pp. 405-414, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ACM, E1

conference

AdaM : adaptive-maximum imputation for neighborhood-based collaborative filtering

Y Ren, G Li, J Zhang, W Zhou

(2013), pp. 628-635, ASONAM 2013 : Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Niagara, Ontario, E1

conference

Differential privacy for neighborhood-based collaborative filtering

T Zhu, G Li, Y Ren, W Zhou, P Xiong

(2013), pp. 752-759, ASONAM 2013 : Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Niagara, Ontario, E1

conference

Analysis of a patchwork-based audio watermarking scheme

I Natgunanathan, Y Xiang, S Elbadry, W Zhou, Y Xiang

(2013), pp. 900-905, ICIEA 2013 : Proceedings of the 8th IEEE Conference on Industrial Electronics and Applications, Melbourne, Victoria, E1

conference

Modeling and analysis for thwarting worm propagation in email networks

S Wen, Y Xiang, W Zhou

(2013), pp. 763-769, Network and system security : 7th international conference, NSS 2013, Madrid, Spain, June 3-4, 2013, proceedings, Madrid, Spain, E1

conference

A general cloud firewall framework with dynamic resource allocation

S Yu, R Doss, W Zhou, S Guo

(2013), pp. 1941-1945, Proceedings of the IEEE International Conference on Communications; ICC 2013, Budapest, Hungary, E1

conference

Lazy collaborative filtering for data sets with missing values

Y Ren, G Li, J Zhang, W Zhou

(2013), Vol. 43, pp. 1822-1834, IEEE transactions on cybernetics, Piscataway, N.J., C1

journal

Multi-dimensional routing protocol in human associated delay-tolerant networks

L Gao, M Li, A Bonti, W Zhou, S Yu

(2013), Vol. 12, pp. 2132-2144, IEEE transactions on mobile computing, Piscataway, N.J., C1

journal

Privacy protected data forwarding in human associated delay tolerant networks

L Gao, M Li, W Zhou, W Shi

(2013), pp. 586-593, TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Vic., E1

conference

Top-N recommendations by learning user preference dynamics

Y Ren, T Zhu, G Li, W Zhou

(2013), pp. 390-401, PAKDD 2013 : Advances in knowledge discovery and data mining : 17th Pacific-Asia Conference, Gold Coast, Australia, April 14-17, 2013 : proceedings, Gold Coast, Queensland, E1

conference

Anonymous data forwarding in human associated delay tolerant networks

L Gao, M Li, W Zhou, W Shi

(2013), pp. 17-21, ICDCSW 2013 : Proceedings of the 33rd IEEE International Conference on Distributed Computing Systems, Philadelphia, Pennsylvania, E1

conference

An effective deferentially private data releasing algorithm for decision tree

T Zhu, P Xiong, Y Xiang, W Zhou

(2013), pp. 388-395, TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Victoria, E1

conference

Offline grouping proof protocol for RFID systems

S Sundaresan, R Doss, W Zhou

(2013), pp. 247-252, WiMob 2013 2013 : Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Lyon, France, E1

conference

Privacy preserving for tagging recommender systems

T Zhu, G Li, Y Ren, W Zhou, P Xiong

(2013), pp. 81-88, WI-IAT 2013 : Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence, Atlanta, Georgia, E1

conference

Detecting stepping stones by abnormal causality probability

S Wen, P Li, D Wu, Y Xiang, W Zhou

(2013), pp. 308-322, Cyberspace safety and security, Cham, Switzerland, B1

chapter

Zero-day traffic identification

J Zhang, X Chen, Y Xiang, W Zhou

(2013), pp. 213-227, Cyberspace safety and security, Cham, Switzerland, B1

chapter

RFID tags : grouping proof with forward security

S Sundaresan, R Doss, W Zhou

(2013), pp. 1-6, RFID-TA 2013 : Proceedings of the IEEE RFID-Technologies and Applications 2013 international conference, Johor Bahru, Malaysia, E1

conference

Traffic identification in semi-known network environment

X Chen, J Zhang, Y Xiang, W Zhou

(2013), pp. 572-579, CSE 2013 : Proceedings of the IEEE Computational Science and Engineering 2013 international conference, Sydney, N.S.W., E1

conference

Secure ownership transfer in multi-tag/multi-owner passive RFID systems

S Sundaresan, R Doss, W Zhou

(2013), pp. 1-6, GLOBECOM 2013 : Proceedings of the IEEE Global Communications 2013 conference, Atlanta, Georgia, E1

conference

A dynamical deterministic packet marking scheme for DDoS traceback

S Yu, W Zhou, S Guo, M Guo

(2013), pp. 729-734, IEEE GLOBECOM 2013 : The power of global communications : Proceedings of the IEEE Global Communications 2013 conference, exhibition and industry forum, Atlanta, Georgia, E1-1

conference

Recommendation techniques based on off-line data processing: a multifaceted survey

Y Ren, G Li, W Zhou

(2013), pp. 6-13, SKG 2013 : Proceedings 2013 9th International Conference on Semantics, Knowledge and Grids, Beijing, China, E1-1

conference

A learning method for Top-N recommendations with incomplete data

Y Ren, G Li, W Zhou

(2013), Vol. 3, pp. 1135-1148, Social network analysis and mining, Berlin, Germany, C1-1

journal
2012

Attacking anonymous web browsing at local area networks through browsing dynamics

S Yu, W Zhou, W Jia, J Hu

(2012), Vol. 55, pp. 410-421, Computer journal, Oxford, England, C1

journal

Generating regular expression signatures for network traffic classification in trusted network management

Y Wang, Y Xiang, W Zhou, S Yu

(2012), Vol. 35, pp. 992-1000, Journal of network and computer applications, London, U. K., C1

journal

Trust mechanisms in wireless sensor networks : attack analysis and countermeasures

Y Yu, K Li, W Zhou, P Li

(2012), Vol. 35, pp. 867-880, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

A dual-channel time-spread echo method for audio watermarking

Y Xiang, I Natgunanathan, D Peng, W Zhou, S Yu

(2012), Vol. 7, pp. 383-392, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal

Locating defense positions for thwarting the propagation of topological worms

S Wen, W Zhou, Y Wang, W Zhou, Y Xiang

(2012), Vol. 16, pp. 560-563, IEEE Communications Letters, Piscataway, N.J., C1

journal

Discriminating DDoS attacks from flash crowds using flow correlation coefficient

S Yu, W Zhou, W Jia, S Guo, Y Xiang, F Tang

(2012), Vol. 23, pp. 1073-1080, IEEE transactions on parallel and distributed systems, Piscataway, N. J., C1

journal

M-Dimension : multi-characteristics based routing protocol in human associated delay-tolerant networks with improved performance over one dimensional classic models

L Gao, M Li, A Bonti, W Zhou, S Yu

(2012), Vol. 35, pp. 1285-1296, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

Robust patchwork-based embedding and decoding scheme for digital audio watermarking

I Natgunanathan, Y Xiang, Y Rong, W Zhou, S Guo

(2012), Vol. 20, pp. 2232-2239, IEEE transactions on audio, speech and language processing, Piscataway, N. J., C1

journal

A secure tag ownership transfer scheme in a closed loop RFID system

R Doss, W Zhou

(2012), pp. 164-169, WCNCW 2012 : Proceedings of the 2012 IEEE Wireless Communications and Networking Conference Workshops, Paris, France, E1

conference

A minimum disclosure approach to authentication and privacy in RFID systems

R Doss, W Zhou, S Sundaresan, S Yu, L Gao

(2012), Vol. 56, pp. 3401-3416, Computer networks, Amsterdam, The Netherlands, C1

journal

DDoS discrimination by linear discriminant analysis (LDA)

T Thapngam, S Yu, W Zhou

(2012), pp. 532-536, ICNC 2012 : Proceedings of the 2012 International Conference on Computing, Networking and Communications, Maui, Hawaii, E1

conference

A serverless ultra-lightweight secure search protocol for EPC Class-1 Gen-2 UHF RFID tags

S Sundaresan, R Doss, W Zhou

(2012), pp. 580-585, ICCIS 2012 : Proceedings of the 2012 International Conference on Computer and Information Science, Kuala Lumpur, Malaysia, E1

conference

Why it is hard to fight against cyber criminals?

S Yu, W Zhou, W Dou, S Makki

(2012), pp. 537-541, Proceedings of the 32nd IEEE International Conference on Distributed Computing Systems Workshops : ICDCSW 2012, Macau, China, E1

conference

Semi-supervised and Compound Classification of Network Traffic

Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou

(2012), pp. 617-621, Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on, IEEE, E1

conference

Classification of correlated Internet traffic flows

Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou

(2012), pp. 490-496, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, E1

conference

Improving Top-N recommendations with user consuming profiles

Y Ren, G Li, W Zhou

(2012), pp. 887-890, PRICAI 2012 : Trends in Artificial Intelligence : 12th Pacific Rim International Conference on Artificial Intelligence, Kuching, Malaysia September 3-7 2012 : proceedings, Kuching, Malaysia, E1

conference

Learning rating patterns for Top-N recommendations

Y Ren, G Li, W Zhou

(2012), pp. 472-479, ASONAM 2012 : Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Istanbul, Turkey, E1

conference

The efficient imputation method for neighborhood-based collaborative filtering

Y Ren, G Li, J Zhang, W Zhou

(2012), pp. 684-693, CIKM 2012 : Proceedings of the 21st ACM International Conference on Information and Knowledge Management, Maui, Hawaii, E1

conference

A secure search protocol based on Quadratic Residues for EPC Class-1 Gen-2 UHF RFID tags

S Sundaresan, R Doss, W Zhou

(2012), pp. 30-35, PIMRC 2012 : IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Sydney, New South Wales, E1

conference

AMDD : Exploring entropy based anonymous multi-dimensional data detection for network optimization in human associated DTNs

L Gao, M Li, T Zhu, A Bonti, W Zhou, S Yu

(2012), pp. 1245-1250, TrustCom 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, England, E1

conference

An analytical model on the propagation of modern email worms

W Zhou, S Wen, Y Wang, Y Xiang, W Zhou

(2012), pp. 533-540, TrustCom 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, England, E1

conference

Semi-supervised and compound classification of network traffic

J Zhang, C Chen, Y Xiang, W Zhou

(2012), Vol. 7, pp. 252-261, International journal of security and networks, Geneva, Switzerland, C1-1

journal

Learning user preference patterns for Top-N recommendations

Y Ren, G Li, W Zhou

(2012), pp. 137-144, IEEE/WIC/ACM 2012 : Proceedings from the International Conference on International Conferences on Web Intelligence and Intelligent Agent Technology, Macau, China, E1

conference
2011

Effective pseudonoise sequence and decoding function for imperceptibility and robustness enhancement in time-spread echo-based audio watermarking

Y Xiang, D Peng, I Natgunanathan, W Zhou

(2011), Vol. 13, pp. 2-13, IEEE transactions on multimedia, Piscataway, N.J., C1

journal

Traceback of DDoS attacks using entropy variations

S Yu, W Zhou, R Doss, W Jia

(2011), Vol. 22, pp. 412-425, IEEE transactions on parallel and distributed systems, United States, C1

journal

S-Kcore: A Social-aware Kcore Decomposition Algorithm in Pocket Switched Networks

M li, L Gao, W zhou

(2011), Hong Kong, E1

conference

CAFS : a novel lightweight cache-based scheme for large-scale intrusion alert fusion

S Wen, W Zhou, Y Xiang, W Zhou

(2011), Vol. 24, pp. 1137-1153, Concurrency computation : practice and experience, West Sussex, U. K., C1

journal

Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks

A Chonka, Y Xiang, W Zhou, A Bonti

(2011), Vol. 34, pp. 1097-1107, Journal of network and computer applications, London, U. K., C1

journal

Eliminating errors in worm propagation models

Y Wang, S Wen, S Cesare, W Zhou, Y Xiang

(2011), Vol. 15, pp. 1022-1024, IEEE Communications Letters, United States, C1

journal

Low-rate DDoS attacks detection and traceback by using new information metrics

Y Xiang, K Li, W Zhou

(2011), Vol. 6, pp. 426-437, IEEE Transactions on Information Forensics and Security, Piscataway, NJ, C1

journal

Secure image retrieval based on visual content and watermarking protocol

J Zhang, Y Xiang, W Zhou, L Ye, Y Mu

(2011), Vol. 54, pp. 1661-1674, Computer journal, Oxford, U. K., C1

journal

The microcosmic model of worm propagation

Y Wang, S Wen, S Cesare, W Zhou, Y Xiang

(2011), Vol. 54, pp. 1700-1720, The Computer Journal, Oxford, England, C1

journal

Discriminating DDoS attack traffic from flash crowd through packet arrival patterns

T Thapngam, S Yu, W Zhou, G Beliakov

(2011), pp. 952-957, INFOCOM WKSHPS 2011 : IEEE Conference on Computer Communications Workshops, Shanghai, China, E1

conference

MAR : message-aware routing for opportunistic wireless ad hoc networks

M Li, L Gao, W Zhou

(2011), pp. 1-6, ATNAC 2011 : Australasian Telecommunication Networks and Applications Conference, Melbourne, Vic., E1

conference

A novel mutual authentication scheme with minimum disclosure for rfid systems

R Doss, W Zhou, S Yu, L Gao

(2011), pp. 544-549, ISSNIP 2011 : Proceedings of the 7th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Adelaide, S. Aust., E1

conference

The probability model of peer-to-peer botnet propagation

Y Wang, S Wen, W Zhou, W Zhou, Y Xiang

(2011), pp. 470-480, Algorithms and Architectures for Parallel Processing Conference, Melbourne, Victoria, E1

conference
2010

Dynamic addressing in wireless sensor networks without location awareness

R Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2010), Vol. 26, pp. 443-460, Journal of information science and engineering, Taipei, Taiwan, C1

journal

Connectivity-based shape descriptors

A Sajjanhar, G Lu, D Zhang, W Zhou

(2010), Vol. 32, pp. 93-98, International journal of computers and applications, Calgary, Canada, C1

journal

Spectral shape descriptor using spherical harmonics

A Sajjanhar, G Lu, D Zhang, J Hou, W Zhou, Y Chen

(2010), Vol. 17, pp. 167-173, Integrated computer-aided engineering, Netherlands, C1

journal

A locality aware cache diffusion system

J Casey, W Zhou

(2010), Vol. 52, pp. 1-22, Journal of supercomputing, New York, N.Y., C1

journal

A microscopic competition model and its dynamics analysis on network attacks

Y Xiang, D Tian, W Zhou

(2010), Vol. 22, pp. 503-517, Concurrency computation practice and experience, West Sussex, England, C1

journal

Sharable file searching in unstructured peer-to-peer systems

W Qu, W Zhou, M Kitsuregawa

(2010), Vol. 51, pp. 149-166, Journal of supercomputing, New York, N.Y., C1

journal

Virtual backbone routing structures in wireless ad-hoc networks

L Gao, M Li, B Li, W Zhou

(2010), Vol. 10, pp. 21-32, Global journal of computer science and technology, Pradesh, India, C1

journal

A lightweight intrusion alert fusion system

S Wen, Y Xiang, W Zhou

(2010), pp. 695-700, HPCC 2010 : Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, Melbourne, Vic., E1

conference

A quick-response real-time stepping stone detection scheme

P Li, W Zhou, Y Yu

(2010), pp. 677-682, HPCC 2010 : Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, Melbourne, Vic., E1

conference

Getting the real-time precise round-trip time for stepping stone detection

P Li, W Zhou, Y Wang

(2010), pp. 377-382, NSS 2010 : Proceedings of the 4th International Conference on Network and System Security, Melbourne, Vic., E1

conference

CALD : surviving various application-layer DDoS attacks that mimic flash crowd

S Wen, W Jia, W Zhou, W Zhou, C Xu

(2010), pp. 247-254, NSS 2010 : Proceedings of the 4th International Conference on Network and System Security, Melbourne, Vic., E1

conference

OST : A transaction based online social trust model for social network and file sharing security

M Li, A Bonti, W Zhou

(2010), pp. 826-832, IEEE/IFIP 2010 : Proceedings of the IEEE/IFIP 8th International Conference Embedded and Ubiquitous Computing 2010, Hong Kong, China, E1

conference

Efficient web browsing with perfect anonymity using page prefetching

S Yu, T Thapngam, S Wei, W Zhou

(2010), pp. 1-12, ICA3PP 2010 : Algorithms and architectures for parallel processing : Proceedings of the 10th International Conference Algorithms and Architectures for Parallel Processing, Busan, Korea, E1

conference

Image indexing for learning content via a mobile phone

F Khaddage, A Chonka, W Zhou

(2010), pp. 187-194, GLOBAL LEARN 2010 : Proceedings of the Learning and Technology Asia Pacific 2010 Global Conference, Penang, Malaysia, E1-1

conference
2009

An abnormal-based approach to effectively detect DDOS attacks

K Li, W Zhou

(2009), Vol. 32, pp. 889-895, Journal of the Chinese institute of engineers, Taipei City Taiwan, Republic of China, C1

journal

An parallel information retrieval method for e-commerce

W Qu, W Zhou, M Kitsuregawa

(2009), Vol. 24, pp. 29-37, International journal of computer systems science and engineering, Leicester, England, C1

journal

An innovative analyser for multi-classifier e-mail classification based on grey list analysis

M Islam, W Zhou, M Guo, Y Xiang

(2009), Vol. 32, pp. 357-366, Journal of network and computer applications, London, England, C1

journal

Adjacency cache : an efficient P2P web cache indexing and lookup system

J Casey, W Zhou

(2009), Vol. 24, pp. 83-91, International journal of computer systems science & engineering, Leicester, England, C1

journal

I/O scheduling and performance analysis on multi-core platforms

Z Liu, W Qu, H Li, M Ruan, W Zhou

(2009), Vol. 21, pp. 1405-1417, Concurrency computation practice and experience, West Sussex, England, C1

journal

Chaos theory based detection against network mimicking DDoS attacks

A Chonka, W Zhou

(2009), Vol. 13, pp. 717-719, IEEE communications letters, Piscataway, NJ, C1

journal

Effective metric for detecting distributed denial-of-service attacks based on information divergence

K Li, W Zhou, S Yu

(2009), Vol. 3, pp. 1851-1860, IET Communications, Herts, England, C1

journal

Flexible deterministic packet marking: an IP traceback system to find the real source of attacks

Y Xiang, W Zhou, M Guo

(2009), Vol. 20, pp. 567-580, IEEE transactions on parallel and distributed systems, Piscataway, NJ, C1

journal

Reducing the bandwidth requirements of P2P keyword indexing

J Casey, W Zhou

(2009), Vol. 6, pp. 119-129, International journal of high performance computing and networking, Olney, England, C1

journal

Spam filtering for network traffic security on a multi-core environment

R Islam, W Zhou, Y Xiang, A Mahmood

(2009), Vol. 21, pp. 1307-1320, Concurrency and computation : practice & experience, Bognor Regis, England, C1

journal

Minimizing the limitations of GL analyser of fusion based email classification

M Islam, W Zhou

(2009), Vol. 5574, pp. 761-774, Lecture notes in computer science, Heidelberg, Germany, C1

journal

Defending grid web services from XDoS attacks by SOTA

A Chonka, W Zhou

(2009), pp. 1-6, Percom 2009 : Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, Galveston, Texas, E1

conference

Discriminating DDoS flows from flash crowds using information distance

S Yu, T Thapngam, J Liu, S Wei, W Zhou

(2009), pp. 351-356, NSS 2009 : Proceedings of the third International Conference on Network and System Security, Gold Coast, Queensland, E1

conference

Distinguishing DDoS attacks from flash crowds using probability metrics

K Li, W Zhou, P Li, J Hai, J Liu

(2009), pp. 9-17, NSS 2009 : Proceedings of the third International Conference on Network and System Security, Gold Coast, Queensland, E1

conference

Reliable downloading algorithms for bittorrent-like systems

K Li, W Zhou, P Li

(2009), pp. 167-173, IFIP NPC 2009 : IFIP International Conference on Network and Parallel Computing Workshops : proceedings, 19-21 October, 2009, Gold Coast, Queensland, Gold Coast, Queensland, E1

conference

A proposed blended mobile learning model for application in higher education

F Khaddage, E Lanham, W Zhou

(2009), pp. 141-147, IMCL2009 : Proceedings of the Interactive Mobile and Computer Aided Learning 2009 international conference, Amman, Jordan, E1-1

conference

Mobile phones as a learning device : is it time to stop the ban?

F Khaddage, E Lanham, W Zhou

(2009), pp. 347-350, ML 2009 : Proceedings of the Mobile Learning 2009 international conference, Barcelona, Spain, E1-1

conference

A mobile learning model for universities : reblending the current learning environment

F Khaddage, E Lanham, W Zhou

(2009), Vol. 3, pp. 18-23, International journal of interactive mobile technologies, Berlin, Germany, C1-1

journal

E-learning over mobile phone technology: best practices and guidelines

F Khaddage, A Chonka, W Zhou

(2009), Vol. 3, pp. 55-58, International journal of interactive mobile technologies, Berlin, Germany, C1-1

journal

Technological considerations for mobile learning design

F Khaddage, A Chonka, W Zhou

(2009), pp. 310-310, IMCL 2009 : Proceedings of the Interactive Mobile and Computer Aided Learning 2009 international conference, Amman, Jordan, E1-1

conference

Lectures display and presentation for mobile phone retrieval

F Khaddage, A Chonka, W Zhou

(2009), ICBL 2009 : Proceedings of the Interactive Computer Aided Blended Learning 2009 international conference, Florianopolis, Brazil, E1-1

conference

Ubiquitous multicore (UM) methodology for multimedia

A Chonka, W Zhou, L Ngo, Y Xiang

(2009), Vol. 4, pp. 145-156, International Journal of Multimedia and Ubiquitous Engineering, Ojung-Dong, Republic of Korea, C1-1

journal
2008

Defending against distributed denial of service

Y Xiang, W Zhou

(2008), pp. 121-129, Encyclopedia of information ethics and security, Hershey, PA, B1

chapter

Information theory based detection against network behavior mimicking DDoS attacks

S Yu, W Zhou, R Doss

(2008), Vol. 12, pp. 319-321, IEEE communications letters, USA, C1

journal

An operational approach to validate the path of BGP

P Li, W Zhou, K Li

(2008), Vol. 5022, pp. 133-143, Lecture notes in computer science, Berlin, Germany, C1

journal

Dynamic feature selection for spam filtering using support vector machine

M Islam, W Zhou, M Chowdhury

(2008), Vol. 9, pp. 41-50, ACIS international journal of computer & information science, Mt. Pleasant, Mich., C1

journal

Source-based filtering scheme against DDOS attacks

F Yi, S Yu, W Zhou, J Hai, A Bonti

(2008), Vol. 1, pp. 9-20, International journal of database theory and application, Korea, C1

journal

Complementing a region descriptor for shape retrieval

A Sajjanhar, G Lu, D Zhang, W Zhou

(2008), Vol. 9, pp. 51-59, IJCIS international journal of computer & information science, Mt. Pleasant, Mich., C1

journal

Image retrieval based on semantics of intra-region color properties

A Sajjanhar, G Luo, D Zhang, W Zhou, Y Chen

(2008), pp. 338-343, CIT 2008: Proceedings of 2008 IEEE 8th International Conference on Computer and Information Technology, Sydney, N.S.W., E1

conference

Reducing cache lookup and publish overhead through locality awareness in P2P web caching

W Zhou, J Casey

(2008), pp. 296-303, HPCC 2008 : Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, Dalian, China, E1

conference

Protecting web services from DDoS attacks by SOTA

A Chonka, W Zhou, Y Xiang

(2008), pp. 379-384, ICITA 2008 : Proceedings of the 5th International Conference on Information Technology and Applications, Cairns, Queensland, E1

conference

Multi-core security defense system (MSDS)

A Chonka, W Zhou, Y Xiang

(2008), pp. 85-90, ATNAC 2008 : Proceedings of the 2008 Australasian Telecommunication Networks and Applications Conference, Adelaide, S. Aust., E1

conference

Entropy-based collaborative detection of DDOS attacks on community networks

S Yu, W Zhou

(2008), pp. 566-571, Proceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications, Hong Kong, E1

conference

Detecting and tracing DDoS attacks by intelligent decision prototype

A Chonka, W Zhou, J Singh, Y Xiang

(2008), pp. 578-583, Proceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications, Hong Kong, E1

conference

Corners-based composite descriptor for shapes

A Sajjanhar, G Lu, D Zhang, W Zhou

(2008), pp. 714-718, CISP 2008 : Proceedings of the First International Congress on Image and Signal Processing, Hainan, China, E1

conference

Protecting web services with service oriented traceback architecture

A Chonka, W Zhou, Y Xiang

(2008), pp. 706-711, CIT 2008 : Proceedings of IEEE 8th International Conference on Computer and Information Technology, Sydney, N.S.W., E1

conference

Protecting information systems from DDoS attack using multicore methodology

A Chonka, W Zhou, K Knapp, Y Xiang

(2008), pp. 270-275, CIT 2008 : Proceedings of IEEE 8th International Conference on Computer and Information Technology, Sydney, N.S.W., E1

conference

Multi-core Defense System (MSDS) for protecting computer infrastructure against DDoS attacks

A Chonka, S Chong, W Zhou, Y Xiang

(2008), pp. 503-508, PDCAT 2008 : Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies, Dunedin, New Zealand, E1

conference

Multi-classifier classification of spam email on an ubiquitous multi-core architecture

M Islam, J Singh, A Chonka, W Zhou

(2008), pp. 210-217, IFIP NPC 2008 : 2008 IFIP International Conference on Network and Parallel Computing Workshops : proceedings, 18-21 October, 2008, Shanghai, China, Shanghai, China, E1-1

conference

Email categorization using (2+1)-tier classification algorithms

M Islam, W Zhou, M Chowdhury

(2008), pp. 276-281, ICIS 2008 : Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science 2008, Portland, Oregon, E1-1

conference

An intelligent user interface for email categorisation

M Islam, W Zhou

(2008), Vol. 3, pp. 146-154, Journal of the People's University of Bangladesh : half-yearly journal of Center for Multidisciplinary Studies, Dhaka, Bangladesh, C1-1

journal

Using multi-core processors to support network security applications

Y Xiang, W Zhou

(2008), pp. 213-218, Proceedings of the IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems, Pheonix, AZ, E1-1

conference
2007

An effective non-parametric method for globally clustering genes from expression profiles

J Hou, W Shi, G Li, W Zhou

(2007), Vol. 45, pp. 1175-1185, Medical and biological engineering and computing, Berlin, Germany, C1

journal

Novel data management algorithms in peer-to-peer content distribution networks

K Li, W Zhou, S Yu, P Li

(2007), Vol. 4798, pp. 538-543, Lecture notes in computer science, Berlin, Germany, C1

journal

Managing email overload with an automatic nonparametric clustering approach

Y Xiang, W Zhou, J Chen

(2007), Vol. 4672, pp. 81-90, Lecture notes in computer science, Berlin, Germany, C1

journal

Identifying cis-regulatory elements by statistical analysis and phylogenetic footprinting and analyzing their coexistence and related gene ontology

W Shi, W Zhou, D Xu

(2007), Vol. 31, pp. 374-384, Physiological genomics, Bethesda, MD, C1

journal

Pervasive computing at tableside : a wireless web-based ordering system

Y Xiang, W Zhou

(2007), Vol. 3, pp. 82-101, International journal of pervasive computing and communications, Bingley, England, C1

journal

Architecture of adaptive spam filtering based on machine learning algorithms

M Islam, W Zhou

(2007), Vol. 4494, pp. 458-469, Lecture notes in computer science, Berlin, Germany, C1

journal

Dynamic feature selection for spam filtering using support vector machine

M Islam, W Zhou, M Chowdhury

(2007), pp. 757-762, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings : 11-13 July, 2007, Melbourne, Australia, Melbourne, Australia, E1

conference

A composite descriptor for shape retrieval

A Sajjanhar, G Lu, D Zhang, W Zhou

(2007), pp. 795-800, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings : 11-13 July, 2007, Melbourne, Australia, Melbourne, Australia, E1

conference

A conceptual matrix model for biological data processing

J Hou, W Zhou

(2007), pp. 559-564, 2007 Inaugural IEEE International Conference on Digital Ecosystems and Technologies 21-23 February 2007, Cairns, Australia, E1

conference

Email categorization using multi-stage classification technique

M Islam, W Zhou

(2007), pp. 51-58, PDCAT 2007 : Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies : 3-6 December, 2007, Adelaide, Australia, Adelaide, Australia, E1

conference

A parallel downloading algorithm for redundant networks

K Li, W Zhou, S Yu, B Dai

(2007), pp. 177-182, CIT 2007 : proceedings : 7th IEEE International Conference on Computer and Information Technology : 16-19 October, 2007, Aizu-Wakamatsu City, Fukushima, Japan, Fukushima, Japan, E1

conference

A resource-search and routing algorithm within PCDN autonomy area

K Li, W Zhou, S Yu, Y Zhang

(2007), pp. 509-514, PDCAT 2007 : Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies : 3-6 December, 2007, Adelaide, Australia, Adelaide, Australia, E1

conference

An innovative analyser for email classification based on grey list analysis

M Islam, W Zhou

(2007), pp. 176-182, 2007 IFIP International Conference on Network and Parallel Computing Workshops : proceedings : NPC 2007, 18-21 September, 2007, Dalian, China, Dalian, China, E1

conference

Novel dynamic routing algorithms in autonomous system

K Li, W Zhou, S Yu, R Tian

(2007), pp. 223-228, CIRAS 2007 : proceedings of the Fourth International Conference on Computational Intelligence, Robotics and Autonomous Systems, Massey University, Palmerston North, New Zealand, 28th-30th November, 2007, Palmerston North, New Zealand, E1

conference

An enhanced parallel downloading algorithm for BT

K Li, W Zhou, S Yu

(2007), pp. 1023-1027, PDPTA 2007 : Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA 2007, Las Vegas, Nevada, USA, June 25-28, 2007, Las Vegas, Nevada, USA, E1

conference

On the effectiveness of flexible deterministic packet marking for DDos defence

Y Xiang, W Zhou, Z Li, Q Zeng

(2007), pp. 183-190, 2007 IFIP International Conference on Network and Parallel Computing Workshops : proceedings : NPC 2007, 18-21 September, 2007, Dalian, China, Dalian, china, E1

conference
2006

Building virtual learning communities

N Augar, R Raitman, E Lanham, W Zhou

(2006), pp. 72-100, Web-based intelligent e-learning systems: technologies and applications, Hershey, USA, B1

chapter

Wikis: collaborative virtual learning environments

N Augar, R Raitman, W Zhou

(2006), pp. 1251-1269, International handbook of virtual learning environments, Dordrecht, The Netherlands, B1

chapter

Frequency distribution of TATA box and extension sequences on human promoters

W Shi, W Zhou

(2006), Vol. 7, pp. 1-12, BMC bioinformatics, London, England, C1

journal

A solution for fault tolerance in replicated database systems

C Chen, W Zhou

(2006), Vol. 2, pp. 64-71, International journal of computational science and engineering, Geneva, Switzerland, C1

journal

Classifying DDoS packets in high-speed networks

Y Xiang, W Zhou

(2006), Vol. 6, pp. 107-115, International journal of computer science and network security, Republic of Korea, C1

journal

Protecting web applications from DDoS attacks by an active distributed defense system

Y Xiang, W Zhou

(2006), Vol. 2, pp. 37-44, International journal of web information systems, Leicester, England, C1

journal

Developing wikis to foster web-based learning communities : an iterative approach

N Augar, R Raitman, W Zhou

(2006), Vol. 2, pp. 302-317, International journal of web based communities, Olney, United Kingdom, C1

journal

Lease based addressing for event-driven wireless sensor networks

R Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2006), pp. 251-256, ISCC 2006 proceedings : 11th IEEE Symposium on Computers and Communications : 26-29 June 2006, Cagliari, Sardinia, Italy, Cagliari, Sardinia, Italy, E1

conference

Address reuse in wireless sensor networks

R Chellappa Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2006), pp. 329-333, ATNAC, Australian Telecommuncation Networks and Applications Conference, 2006., Melbourne, Australia, E1

conference
2005

Introduction

D Kingsbury

(2005), pp. 1-8, Violence in between conflict and security in archipelagic Southeast Asia, Clayton, Vic. and Singapore, B1

chapter

Biological sequence assembly and alignment

W Shi, W Zhou, Y Chen

(2005), pp. 243-261, Bioinformatics Technologies, Berlin, Germany, B1

chapter

An IT Bachelor degree using modern technologies to illustrate core concepts and principles and building generic skills

A Goscinski, M Campbell, R Dew, P Horan, D Newlands, J Rough, J Silcock, W Zhou

(2005), Vol. 10, pp. 361-379, Education and information technologies, The Netherlands, C1

journal

Reducing the bandwidth requirements of P2P keyword indexing

J Casey, W Zhou

(2005), Vol. 3719, pp. 50-59, Lecture notes in computer science, Berlin, Germany, C1

journal

Distributed defense against distributed denial-of-service attacks

W Shi, Y Xiang, W Zhou

(2005), Vol. 3719, pp. 357-362, Lecture notes in computer science, Berlin, Germany, C1

journal

Safeguard information infrastructure against DDoS attacks: experiments and modeling

Y Xiang, W Zhou

(2005), Vol. 3810, pp. 320-333, Lecture notes in computer science, Berlin, Germany, C1

journal

An efficient reliable architecture for application layer anycast service

S Yu, W Zhou

(2005), Vol. 3719, pp. 376-385, Lecture notes in computer science, Berlin, Germany, C1

journal

Intelligent DDoS packet filtering in high-speed networks

Y Xiang, W Zhou

(2005), Vol. 3758, pp. 395-406, Lecture notes in computer science, Berlin, Germany, C1

journal

A mesh based anycast routing protocol for ad hoc networks

S Yu, W Zhou

(2005), Vol. 3758, pp. 927-932, Lecture notes in computer science, Berlin, Germany, C1

journal

Eulerian superpath approach to correct sequencing error in shotgun assembly

W Shi, W Zhou, W Zheng

(2005), Vol. 6, pp. 65-73, Online journal of bioinformatics, Daisy Hill, Qld, C1

journal

The multifaceted and ever-changing directions of information security - Australia get ready!

L Ngo, W Zhou

(2005), pp. 230-233, Third International Conference on Information Technology and Applications : 4-7 July 2005, Sydney, Australia : proceedings, Sydney, Australia, E1

conference

Understanding transition towards information security culture change

L Ngo, W Zhou, M Warren

(2005), pp. 67-73, Proceeding of the 3rd Australian Computer, Network & Information Forensics Conference, Perth, Western Australia, E1

conference

A parallel Euler approach for large-scale biological sequence assembly

W Shi, W Zhou

(2005), pp. 437-441, Third International Conference on Information Technology and Applications : 4-7 July 2005, Sydney, Australia : proceedings, Sydney, Australia, E1

conference

A defense system against DDoS attacks by large-scale IP traceback

Y Xiang, W Zhou

(2005), pp. 431-436, Third International Conference on Information Technology and Applications : 4-7 July 2005, Sydney, Australia : proceedings, Sydney, Australia, E1

conference

Employing wikis for online collaboration in the e-learning environment: case study

R Raitman, N Augar, W Zhou

(2005), pp. 142-146, Third International Conference on Information Technology and Applications : 4-7 July 2005, Sydney, Australia : proceedings, Sydney, Australia, E1

conference

Security in the online e-learning environment

R Raitman, L Ngo, N Augar, W Zhou

(2005), pp. 702-706, 5th IEEE International Conference on Advanced Learning Technologies : ICALT 2005 : proceedings : 5-8 July, 2005, Kaohsiung, Taiwan, Kaohsiung, Taiwan, E1

conference

Mark-aided distributed filtering by using neural network for DDoS defense

Y Xiang, W Zhou

(2005), pp. 1701-1705, GLOBECOM '05 : IEEE Global Telecommunications Conference, 28 November-2 December 2005 St. Louis, Missouri, USA, discovery past and future, Missouri, USA, E1

conference

Spam filtering based on preference ranking

M Lan, W Zhou

(2005), pp. 223-227, Fifth International Conference on Computer and Information Technology : CIT 2005 : proceedings : 21-23 September, 2005, Shanghai, China, Shanghai, China, E1

conference

Creating a blended learning model for cross-cultural e-learning: putting theory into practice

E Lanham, N Augar, W Zhou

(2005), pp. 2623-2630, E-learn 2005: the proceedings of the world conference on e-learning in corporate, government, healthcare and higher education, Vancouver BC, Canada, E1

conference

How using a wiki can help break the ice between cultures

E Lanham, N Augar, W Zhou

(2005), pp. 2631-2636, E-learn 2005: the proceedings of the world conference on e-learning in corporate, government, healthcare and higher education, Vancouver BC, Canada, E1

conference

An innovative spam filtering model based on support vector machine

M Islam, M Chowdhury, W Zhou

(2005), pp. 348-353, CIMCA 2005 jointly with IAWTIC 2005 : proceedings, Vienna, Austria, E1

conference

Clock synchronization state graphs based on clock precision difference

Y Zhao, W Zhou, Y Zhang, E Lanham, J Huang

(2005), Vol. 3179, pp. 34-39, Lecture notes in computer science, Berlin, Germany, C1

journal
2004

An analysis of update ordering in distributed replication systems

W Zhou, L Wang, W Jia

(2004), Vol. 20, pp. 565-590, Future generation computer systems, Netherlands, C1

journal

Improving the performance of equalization in communication systems

W Zhou, H Ye, L Ye

(2004), Vol. 3033, pp. 388-395, Lecture notes in computer science, Berlin, Germany, C1

journal

Large-scale biological sequence assembly and alignment by using computing grid

W Shi, W Zhou

(2004), Vol. 3032, pp. 26-33, Lecture notes in computer science, Berlin, Germany, C1

journal

An adaptive information grid architecture for recommendation system

M Lan, W Zhou

(2004), Vol. 3032, pp. 584-591, Lecture notes in computer science, Berlin, Germany, C1

journal

GHIRS: integration of hotel management systems by web services

Y Xiang, W Zhou, M Chowdhury

(2004), Vol. 3033, pp. 1002-1009, Lecture notes in computer science, Berlin, Germany, C1

journal

Towards an interactive architecture for web-based databases

C Chen, W Zhou

(2004), Vol. 3033, pp. 871-878, Lecture notes in computer science, Berlin, Germany, C1

journal

Protect grids from DDoS attacks

Y Xiang, W Zhou

(2004), Vol. 3251, pp. 309-316, Lecture notes in computer science, Berlin, Germany, C1

journal

Minicast: a multicast-anycast protocol for message delivery

S Yu, W Zhou, J Rough

(2004), Vol. 3358, pp. 798-803, Lecture notes in computer science, Berlin, Germany, C1

journal

A load balancing algorithm for web based server grids

S Yu, J Casey, W Zhou

(2004), Vol. 3033, pp. 121-128, Lecture notes in computer science, Berlin, Germany, C1

journal

From e-learning to virtual learning community: bridging the gap

N Augar, R Raitman, W Zhou

(2004), Vol. 3143, pp. 301-308, Lecture notes in computer science, Berlin, Germany, C1

journal

A fast and robust method applied in telecommunication systems

H Ye, W Zhou, J Rough

(2004), pp. 423-426, Proceedings of the International Conference on Artificial Intelligence, IC-AI 04 & proceedings of the International Conference on Machine Learning: Models, Technologies & Applications, MLMTA '04., Nevada, USA, E1

conference

An active distributed defense system to protect web applications from DDoS attacks

Y Xiang, W Zhou

(2004), pp. 559-568, Sixth International Conference on Information Integration and Web-based Applications Services, 27-29 September 2004, Jakarta, Indonesia, Jakarta, Indonesia, E1

conference

The cost of recovery protocols in web-based database systems

A Hammadi, J Casey, W Zhou

(2004), pp. 137-142, 2004 IEEE International Conference on Services Computing : (SCC 2004) : proceedings : Shanghai, China : September 15-18, 2004, Shanghai, China, E1

conference

A novel middleware based web database model

S Yu, W Zhou

(2004), pp. 533-536, IEEE/WIC International Conference on Web Intelligence (WI 2004) : Beijing, China, September 20-24, 2004 : proceedings, Beijing, China, E1

conference

Teaching and learning online with wikis

N Augar, R Raitman, W Zhou

(2004), pp. 95-104, Beyond the comfort zone : proceedings of the 21st ASCILITE Conference, Perth, 5-8 December, Perth, West Australia, E1

conference

Video lectures for cross-cultural use: a three phase model

E Lanham, W Zhou

(2004), pp. 2368-2373, E-Learn 2004 : World Conference on E-Learning in Corporate, Government, Healthcare, & Higher Education, Washington, DC, E1

conference

IP spoofing attack and its countermeasures

Y Xiang, W Zhou

(2004), pp. 52-60, From information warfare to information operations: proceedings of the 5th Australian Information Warfare and Security Conference, Perth, Australia, E1

conference

Students reflect on their learning community: survey results

R Raitman, A Hamadi, W Zhou

(2004), pp. 5068-5072, ED-MEDIA 2004 : World Conference on Educational Multimedia, Hypermedia and Telecommunications : proceedings of ED-MEDIA 2004, World Conference on Educational Multimedia, Hypermedia and Telecommunications June 21 - 26, 2004 ; Lugano Switzerland, Lugano, Switzerland, E1

conference

Constructing wikis as a platform for online collaboration in an e-learning environment

R Raitman, N Augar, W Zhou

(2004), pp. 1723-1730, International Conference on Computers in Education 2004 : a conference of the Asia-Pacific Society for Computers in Education (APSCE) November 30th - December, 2004 : Melbourne Exhibition Centre, Australia :conference proceedings, Melbourne, Victoria, E1

conference

A self-learning system for identifying harmful network information

W Shi, W Zhou, W Zheng

(2004), pp. 621-630, iiWAS 2004 : Sixth International Conference on Information Integration and Web-based Applications Services, 27-29 September 2004, Jakarta, Indonesia, Jakarta, Indonesia, E1

conference

Load balance algorithms for anycast

S Yu, W Zhou, J Casey

(2004), pp. 471-480, iiWAS2004 : Sixth International Conference on Information Integration and Web-based Applications Services, 27-29 September 2004, Jakarta, Indonesia, Jakarta, Indonesia, E1

conference

Delay control and parallel admission algorithms for real-time anycast flow

W Jia, B Han, C Zhang, W Zhou

(2004), Vol. 29, pp. 197-209, Journal of supercomputing, Norwell, Mass., C1

journal

A parallel DNA fragment assembly algorithm based on eulerian superpath approach

W Zheng, W Shi, W Zhou

(2004), Vol. 5, pp. 91-101, Online journal of bioinformatics, Daisy Hill, Qld, C1

journal

Optimal multicast tree routing for cluster computing in hypercube interconnection networks

W Jia, B Han, P Au, Y He, W Zhou

(2004), Vol. 87, pp. 1625-1632, IEICE transactions on information and systems, Oxford, England, C1

journal

A reactive system architecture for building fault-tolerant distributed applications

C Chen, W Jia, W Zhou

(2004), Vol. 72, pp. 401-415, Journal of systems and software, Amsterdam, The Netherlands, C1

journal
2003

Cultural issues in online learning - is blended learning a possible solution?

E Lanham, W Zhou

(2003), Vol. 16, pp. 275-292, International journal of computer processing of oriental languages, Singapore, C1

journal

Exploring the foundations of practicing online collaboration

R Raitman, W Zhou, P Nicholson

(2003), pp. 532-541, Proceedings of the Second Conference on Advances in Web-Based Learning, Melbourne, Vic., E1

conference

Blended learning for cross-cultural e-learning

E Lanham, W Zhou

(2003), pp. 1927-1930, E-learn 2003 World Conference on E-Learning in Corporate, Governement, Healthcare, & Higher Education, Phoenix, Arizona, USA, E1

conference

Tips for e-learning developers

R Raitman, W Zhou

(2003), Proceedings of International Conference on Computers in Education, Hong Kong, E1

conference

Cultural issues relating to teaching IT professional ethics online: lessons learned

E Lanham, W Zhou

(2003), pp. 134-144, Advances in Web-based learning--ICWL 2003 : second international conference, Melbourne, Australia, August 18-20, 2003 : proceedings, Melbourne, Australia, E1

conference

A solution for fault-tolerance in replicated database systems

C Chen, W Zhou

(2003), pp. 411-422, ISPA 2003 : Parallel and distributed processing and applications International Symposium, Japan, E1

conference

Quality-of-service routing for web-based multimedia servers

S Yu, W Zhou, M Chowdhury

(2003), pp. 1349-1353, Proceedings of the 7th Joint Conference on Information Sciences : September 26 - 30, 2003, Research Triangle Park, North Carolina, USA, Cary, N. C., E1

conference

Improving the performance of the LMS and RLS algorithms for adaptive equalizer

H Ye, W Zhou, S Yu, M Lan

(2003), pp. 457-462, Active media technology : proceedings of the Second International Conference on Active Media Technology, Chongqing, PR China, 29-31 May, 2003, Chongqing, China, E1

conference

Application of fast and robust equalization in communication technology

H Ye, W Zhou, Y Lin, E Lanham, R Raitman

(2003), pp. 114-118, International Conference for Young Computer Scientists (7th : 2003, Harbin China), Harbin, China, E1

conference

An architecture of internet based data processing based on multicast and anycast protocols

S Yu, W Zhou, M Lan, Y Wu

(2003), pp. 104-110, Parallel and distributed computing, applications and technologies : PDCAT'2003 : proceedings : (August 27-29, 2003, Chengdu, China), Chengdu, China, E1

conference

Fault-tolerant servers for anycast communication

S Yu, W Zhou, W Jia

(2003), pp. 1244-1250, PDPTA 2003 : Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, Las Vegas, Nevada, USA, E1

conference

Decision analysis of statistically detecting distributed denial-of-service flooding attacks

M Li, C Chi, W Jia, W Zhao, W Zhou, J Cao, D Long, Q Meng

(2003), Vol. 2, pp. 397-405, International journal of information technology and decision making, Singapore, C1

journal

Self-adaptive clock synchronisation based on clock precision difference

Y Zhao, W Zhou, E Lanham, S Yu, M Lan

(2003), pp. 181-187, Computer science 2003 : proceedings of the twenty-sixth Australasian Computer Science Conference, Adelaide, South Australia, Australia, E1

conference
2002

A token-based independent update protocol for managing replicated objects

W Zhou, W Jia

(2002), Vol. 17, pp. 189-207, International journal of computer systems science and engineering, London, UK, C1

journal

Comparison of the LMS with RLS for communication technology

W Zhou, H Ye, C Chen

(2002), pp. 737-744, Proceedings of the International Workshop on Grid and Cooerative Computing, Hainan,China, E1

conference

An analysis of update ordering in a cluster of replicated servers

W Zhou, L Wang

(2002), pp. 28-35, Proceedings of the Fifth International Conference on Algorithms and Architectures for Parallel Processing, Beijing, China, E1

conference

Object oriented finite element analysis: a distributed approach to mesh generation

Y Xiang, Y Ping, W Zhou

(2002), pp. 92-99, 2002 5th International Conference on Algorithms and Architectures for Parallel Processing : ICA3PP/2002 : Beijing, China, October 23-25, 2002, Beijing, China, E1

conference

The design and development of an integrated system for object-oriented finite element computing

Y Xiang, W Zhou

(2002), pp. 201-204, 2002 5th International Conference on Algorithms and Architectures for Parallel Processing : ICA3PP/2002 : Beijing, China, October 23-25, 2002, Beijing, China, E1

conference

A web-DB model on multicast and anycast

S Yu, W Zhou, Y Zhao, M Lan, Y Xiang

(2002), pp. 412-415, Proceedings of the 2002 5th International Conference on Algorithms and Architectures for Parallel Processing : ICA3PP/2002 : Beijing, China, October 23-25, 2002, Beijing, China, E1

conference

A co-recommendation algorithm for web searching

M Lan, S Yu, R Bacher, W Zhou

(2002), pp. 479-482, Proceedings of the Fifth International Conference on Algorithms and Architectures for Parallel Processing, Beijing, China, E1

conference

Research on network anycast

S Yu, W Zhou, Y Wu

(2002), pp. 154-161, 2002 5th International Conference on Algorithms and Architectures for Parallel Processing : ICA3PP/2002 : Beijing, China, October 23-25, 2002, Beijing, China, E1

conference

An efficient algorithm for application-layering anycasting

S Yu, W Zhou, F Huang, M Lan

(2002), pp. 74-83, DCW 2002 : Distributed communities on the Web : 4th international workshop, DCW 2002, Sydney, Australia, April 3-5, 2002 : revised papers, Sydney, New South Wales, E1

conference

Self-adaptive clock synchronization for computational grid

Y Zhao, W Zhou, J Huang, S Yu, E Lanham

(2002), pp. 932-942, GCC 2002 : Proceedings of the grid and cooperative computing international workshop, Hainan, China, E1

conference
2001

An automatic generation model for web-based database applications

S Yu, C Chen, W Zhou

(2001), pp. 62-66, Parallel and distributed computing and systems : proceedings of the IASTED international conference, August, 21 - 24, 2001, Anaheim, California, USA, Anaheim, California, USA, E1

conference

Update ordering in distributed replication systems

W Zhou, L Wang

(2001), pp. 79-85, CIC'2001 : proceedings of the International Conference on Communications in Computing : Las Vegas, Nevada, USA, June 25-28, 2001, Las Vegas, Nevada, USA, E1

conference

Toward the building of component-based electronic commerce systems

W Zhou, N Augar, J Casey

(2001), pp. 779-785, Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications : PDPTA '2001 : Las Vegas, Nevada, USA, June 25-28, 2001, Las Vegas, Nevada, USA, E1

conference

A reactive architecture for web-based information systems

C Chen, W Zhou, S Yu

(2001), pp. 1028-1034, Proceedings of the International Conference on Internet Computing : IC'2001 : Las Vegas, Nevada, USA, June 25-28, 2001, Las Vegas, Nevada, USA, E1

conference

Automating the construction of replicated objects in a cluster of workstations

W Zhou, L Wang

(2001), pp. 634-639, First IEEE/ACM International Symposium on Cluster Computing and the Grid : proceedings : Brisbane, Australia, May 15-18, 2001, Brisbane, Australia, E1

conference

The development of a mobile decision support system

W Yeu, T Yonghong, W Zhou

(2001), Vol. 2, pp. 379-390, Journal of interconnection networks, Singapore, C1

journal

The design and implementation of an active replication scheme for distributing services in a cluster of workstations

L Wang, W Zhou, W Jia

(2001), Vol. 58, pp. 199-210, Journal of systems and software, New York, N.Y., C1

journal

Efficient algorithm for mobile multicast using anycast group

W Jia, W Zhou, J Kaiser

(2001), Vol. 148, pp. 14-18, IEE proceedings- communications, Los Alamitos, Calif., C1

journal
1999

Detecting and tolerating failures in a loosely integrated heterogeneous database system

W Zhou

(1999), Vol. 22, pp. 1056-1067, Computer Communications, Amsterdam, The Netherlands, C1-1

journal

Managing replicated remote procedure call transactions

W Zhou, A Goscinski

(1999), Vol. 42, pp. 592-608, Computer journal, Oxford, Eng., C1-1

journal
1996

A system for managing remote procedure call transactions

W Zhou, B Molinari

(1996), Vol. 34, pp. 133-149, Journal of systems and software, New York, N.Y., C1-1

journal

Supporting fault-tolerant and open distributed processing using RPC

W Zhou

(1996), Vol. 19, pp. 528-538, Computer communications, Amsterdam, The Netherlands, C1-1

journal
1994

A rapid prototyping system for distributed information system applications

W Zhou

(1994), Vol. 24, pp. 3-29, Journal of systems and software, Amsterdam, The Netherlands, C1-1

journal

Funded Projects at Deakin

Australian Competitive Grants

Development of methods to address internet crime

Prof Wanlei Zhou

ARC - Discovery Projects

  • 2009: $78,568
  • 2008: $77,005
  • 2007: $75,498

Protecting Web Services from Distributed Denial of Service Attacks

Prof Wanlei Zhou, Dr Wei Shi

ARC Linkage - Projects Rnd 2 APAI, ARC_DUAPAI ARC_Deakin University Australian Postgraduate Award Industry

  • 2009: $26,138
  • 2008: $26,138
  • 2007: $51,254
  • 2006: $50,236

An active approach to detect and defend against peer-to-peer botnets

Prof Wanlei Zhou, Mr Yang Xiang

ARC Linkage - Projects Rnd 1

  • 2012: $60,312
  • 2011: $54,402
  • 2010: $51,671

Secure and Efficient Communication in Vehicle-based Radio Frequency Identification Systems

Prof Wanlei Zhou, Prof Robin Ram Mohan Doss

ARC Linkage - Projects Rnd 1

  • 2012: $60,312
  • 2011: $54,402
  • 2010: $51,671

Tracing real internet attackers through information correlation

Mr Yang Xiang, Prof Wanlei Zhou, Prof Yong Xiang

ARC - Discovery Projects

  • 2012: $75,370
  • 2011: $72,578
  • 2010: $81,660

Developing an active defence system to identify malicious domains and websites

Prof Yang Xiang, Prof Wanlei Zhou, Prof Vijay Varadharajan, Dr Jonathan Oliver

ARC Linkage - Projects Rnd 2

  • 2015: $15,237
  • 2014: $58,882
  • 2013: $56,274
  • 2012: $41,539

Modelling and defence against worm propagation

Prof Wanlei Zhou, Prof Yang Xiang

ARC - Discovery Projects

  • 2016: $121,053
  • 2015: $104,867
  • 2014: $119,506

Mining Patterns and Changes of Wave Shapes for Efficiently Que ying Periodic Data Streams - Dr Guangyan Huang

Dr Guangyan Huang, Prof Wanlei Zhou

ARC DECRA - Discovery Early Career Researcher Award

  • 2016: $124,133
  • 2015: $122,059
  • 2014: $119,910

Other Public Sector Funding

An e-lecture repository in the MAMS (Meta Access Management System) testbed Federation

Prof Wanlei Zhou, Dr Wei Shi, Mr Robert Ruge

  • 2006: $16,000

Fine-grained Anomaly Behaviour Identification for Predicting Cyber Insider Cyber Attacks - Scholarship for Ms Liu Liu

Prof Wanlei Zhou, Ms Liu Liu

  • 2017: $25,949
  • 2016: $12,975
  • 2015: $12,974

Industry and Other Funding

Protecting Web Services from Distributed Denial of Service Attacks

Prof Wanlei Zhou, Dr Wei Shi

  • 2007: $6,000
  • 2006: $6,000

An active approach to detect and defend against peer-to-peer botnets

Prof Wanlei Zhou, Mr Yang Xiang

  • 2012: $11,000
  • 2011: $11,000
  • 2010: $11,000

Secure and Efficient Communication in Vehicle-based Radio Frequency Identification Systems

Prof Wanlei Zhou, Prof Robin Ram Mohan Doss

  • 2012: $11,000
  • 2011: $11,000
  • 2010: $11,000

Developing an active defence system to identify malicious domains and websites

Prof Yang Xiang, Prof Wanlei Zhou, Prof Vijay Varadharajan, Dr Jonathan Oliver

  • 2015: $15,000
  • 2014: $30,000
  • 2013: $30,000
  • 2012: $15,000

Honeypot research in mining industry in Australia

Prof Yang Xiang, Prof Wanlei Zhou

  • 2015: $50,000

Developing a Secure and Privacy-Preserving App for the Cloud Campus System

Prof Wanlei Zhou, Dr Tianqing Zhu, Dr Bo Liu

  • 2016: $50,000

Investigating How to Build a Reliable Software-as-a-Service (SaaS) Platform

Dr James Xi Zheng, Dr Mohamed Abdelrazek, Prof Wanlei Zhou

  • 2017: $20,000
  • 2016: $60,000

Supervisions

Principal Supervisor
2015

Ashish Saini

Thesis entitled: A new innovative approach for cancer classification by computational analysis

Doctor of Philosophy (Information Technology), School of Information Technology

2014

Tianqing Zhu

Thesis entitled: Differential Privacy and Its Application

Doctor of Philosophy (Information Technology), School of Information Technology

Sheng Wen

Thesis entitled: Modern Worms' Propagation: Modelling and Analysis

Doctor of Philosophy (Information Technology), School of Information Technology

2013

Long Xiang Gao

Thesis entitled: Routing and Privacy Protection in Human Associated Delay Tolerant Networks

Doctor of Philosophy (Information Technology), School of Information Technology

Yongli Ren

Thesis entitled: Intelligent techniques for recommender systems

Doctor of Philosophy (Information Technology), School of Information Technology

Alessio Bonti

Thesis entitled: Models, services and security in modern online social networks

Doctor of Philosophy (Information Technology), School of Information Technology

2012

Yini Wang

Thesis entitled: Modelling and Defence against Propagation of Worms in Networks

Doctor of Philosophy (Information Technology), School of Information Technology

Theerasak Thapngam

Thesis entitled: Improvement of DDoS Attacks Detection and Web Access Anonymity

Doctor of Philosophy (Information Technology), School of Information Technology

2011

Ping Li

Thesis entitled: Detecting Stepping Stones in Internet Environments

Doctor of Philosophy (Information Technology), School of Information Technology

2010

Ferial Khaddage

Thesis entitled: Image Indexing for Learning Content in a Mobile Learning Environment

Doctor of Philosophy (Information Technology), School of Information Technology

2009

Ashley Chonka

Thesis entitled: Protecting Web Services from various Distributed Denial of Service Attacks

Doctor of Philosophy (Information Technology), School of Information Technology

Ke Li

Thesis entitled: Reliable Algorithms and Attack Detection Schemes for Network Systems

Doctor of Philosophy (Information Technology), School of Information Technology

Leanne Ngo

Thesis entitled: Transitioning towards an Improved IT Security Culture in Organisations

Doctor of Philosophy (Information Technology), School of Information Technology

2008

MD Rafiqul Islam

Thesis entitled: Spam Filtering using Classification Algorithms

Doctor of Philosophy (Information Technology), School of Information Technology

John Allan Casey

Thesis entitled: Replica Location, Indexing and Synchronization in Highly Distributed Environments

Doctor of Philosophy (Information Technology), School of Information Technology

2007

Elicia Lanham

Thesis entitled: Supporting Blended Learning in an E-learning Environment

Doctor of Philosophy (Information Technology), School of Information Technology

Yang Xiang

Thesis entitled: A Distributed Active Defense System against DDoS Attacks

Doctor of Philosophy (Information Technology), School of Information Technology

Ruth Sarah Raitman

Thesis entitled: Collaboration in the Online E-Learning Environment

Doctor of Philosophy (Information Technology), School of Information Technology

2006

Naomi Catharine Augar

Thesis entitled: Supporting Community, Culture and Collaboration with Emerging E-Learning Technologies

Doctor of Philosophy (Information Technology), School of Information Technology

Adil Mumtaz Hammadi

Thesis entitled: Reliability of Web-based Databases

Master of Science (Information Technology), School of Information Technology

2005

Mingjun Lan

Thesis entitled: Algorithms and Applications of Preference Based Ranking for Information Retrieval

Doctor of Philosophy (Information Technology), School of Information Technology

2004

Shui Yu

Thesis entitled: Anycast Service and its Applications

Doctor of Philosophy (Information Technology), School of Information Technology

Hua Ye

Thesis entitled: Application of Fast and Robust Equalization in Communication Technology

Doctor of Philosophy (Information Technology), School of Information Technology

2002

Changgui Chen

Thesis entitled: A Reactive System Model for Building Fault-Tolerant Distributed Applications

Doctor of Philosophy (Information Technology), School of Information Technology

2000

Li Wang

Thesis entitled: A Toolkit for Constructing Service Replication Systems

Doctor of Philosophy (Information Technology), School of Information Technology

1999

Jianting Zhong

Thesis entitled: Transaction Management in a Replicated and Mobile Environment

Master of Science (Information Technology), School of Information Technology

Associate Supervisor
2017

Jiaojiao Jiang

Thesis entitled: Rumor Source Identification in Complex Networks

Doctor of Philosophy (Information Technology), School of Information Technology

2016

Md Tanzim Khorshed

Thesis entitled: Combating cyber attacks in cloud computing using machine learning techniques

Doctor of Philosophy (Information Technology), School of Information Technology

2015

Tristan Galloway

Thesis entitled: China & Technical Global Internet Governance: From Norm-Taker to Norm-Maker?

Doctor of Philosophy, School of Humanities and Social Sciences

2014

Saravanan Sundaresan

Thesis entitled: Secure Ownership Transfer Protocols for RFID EPC C1G2 Tags

Doctor of Philosophy (Information Technology), School of Information Technology

2013

Silvio Cesare

Thesis entitled: Software Similarity and Classification

Doctor of Philosophy (Information Technology), School of Information Technology

Mahbub Ahmed

Thesis entitled: Security in cloud computing

Doctor of Philosophy (Information Technology), School of Information Technology

Yu Wang

Thesis entitled: Automatic network traffic classification

Doctor of Philosophy (Information Technology), School of Information Technology

2008

Matthew Stuart Turner

Thesis entitled: REDDL: A Language for Rapid Development of Document Editor Applications

Doctor of Philosophy (Information Technology), School of Information Technology

Ryszard Raban

Thesis entitled: Cognitive Aspects in Knowledge Management

Doctor of Technology, School of Information Technology

2004

Christopher McAvaney

Thesis entitled: An Automated Parallel Application Creation and Execution Tool for Clusters

Doctor of Philosophy (Information Technology), School of Information Technology

2002

Justin Rough

Thesis entitled: A Platform for Reliable Computing on Clusters using Group Communications

Doctor of Philosophy (Information Technology), School of Information Technology

1999

Michael Hobbs

Thesis entitled: Global scheduling techniques for distributed operating systems

Doctor of Philosophy (Information Technology), School of Information Technology

Philip Smith

Thesis entitled: Machine intelligence: astudy of automatic debugging systems for use by novice programmes

Doctor of Philosophy (Information Technology), School of Information Technology