Profile image of Yang Xiang

Prof Yang Xiang

STAFF PROFILE

Position

Visitor

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Contact

yang.xiang@deakin.edu.au
+61 3 925 17482

Publications

Filter by

2017

Investigating the deceptive information in Twitter spam

C Chen, S Wen, J Zhang, Y Xiang, J Oliver, A Alelaiwi, M Hassan

(2017), Vol. 72, pp. 319-326, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

The structure of communities in scale-free networks

J Jiang, S Wen, S Yu, Y Xiang, W Zhou, H Hassan

(2017), Vol. 29, pp. 1-16, Concurrency and computation: practice and experience, Chichester, Eng., C1

journal

Parallel compressive sampling matching pursuit algorithm for compressed sensing signal reconstruction with OpenCL

F Huang, J Tao, Y Xiang, P Liu, L Dong, L Wang

(2017), Vol. 72, pp. 51-60, Journal of systems architecture, Amsterdam, The Netherlands, C1

journal

A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks

W Meng, W Li, Y Xiang, K Choo

(2017), Vol. 78, pp. 162-169, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

Precise contention-aware performance prediction on virtualized multicore system

Y Cheng, W Chen, Z Wang, Y Xiang

(2017), Vol. 72, pp. 42-50, Journal of systems architecture, Amsterdam, The Netherlands, C1

journal

Associative retrieval in spatial big data based on spreading activation with semantic ontology

S Sun, W Song, A Zomaya, Y Xiang, K-K Choo, T Shah, L Wang

(2017), Vol. 76, pp. 499-509, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

Using epidemic betweenness to measure the influence of users in complex networks

S Wen, J Jiang, B Liu, Y Xiang, W Zhou

(2017), Vol. 78, pp. 288-299, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

Identifying propagation sources in networks: state-of-the-art and comparative studies

J Jiang, S Wen, S Yu, Y Xiang, W Zhou

(2017), Vol. 19, pp. 465-481, IEEE communications surveys & tutorials, Piscataway, N.J., C1

journal

Joint affinity aware grouping and virtual machine placement

J Chen, Q He, D Ye, W Chen, Y Xiang, K Chiew, L Zhu

(2017), Vol. 52, pp. 365-380, Microprocessors and microsystems, Amsterdam, The Netherlands, C1

journal

Addressing the class imbalance problem in Twitter spam detection using ensemble learning

S Liu, Y Wang, J Zhang, C Chen, Y Xiang

(2017), Vol. 69, pp. 35-49, Computers & security, Kidlington, Eng., C1

journal

Embedded device forensics and security

K Choo, Y Fei, Y Xiang, Y Yu

(2017), Vol. 16, pp. 1-5, ACM transactions on embedded computing systems, New York, N.Y., C1

journal

A CPS framework based perturbation constrained buffer planning approach in VLSI design

X Chen, X Huang, Y Xiang, D Zhang, R Ranjan, C Liao

(2017), Vol. 103, pp. 3-10, Journal of parallel and distributed computing, Amsterdam, The Netherlands, C1

journal

An over-the-air key establishment protocol using keyless cryptography

Y Zhang, Y Xiang, T Wang, W Wu, J Shen

(2017), Future Generation Computer Systems, Netherlands, C1

journal

SADI: a novel model to study the propagation of social worms in hierarchical networks

T Wang, C Xia, S Wen, H Xue, Y Xiang, S Tu

(2017), pp. 1-14, IEEE transactions on dependable and secure computing, Piscataway, N.J., C1

journal

A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment

J Shen, H Tan, Y Zhang, X Sun, Y Xiang

(2017), pp. 1-23, Multimedia Tools and Applications, New York, N.Y., C1

journal

Statistical features-based real-time detection of drifted Twitter spam

C Chen, Y Wang, J Zhang, Y Xiang, W Zhou, G Min

(2017), Vol. 12, pp. 914-925, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal

MBSA: a lightweight and flexible storage architecture for virtual machines

X Chen, W Chen, Z Lu, Y Zhang, R Chang, M Hassan, A Alelaiwi, Y Xiang

(2017), Vol. 29, pp. 1-10, Concurrency and computation: practice and experience, Chichester, Eng., C1

journal

MIPE: a practical memory integrity protection method in a trusted execution environment

R Chang, L Jiang, W Chen, Y Xiang, Y Cheng, A Alelaiwi

(2017), Vol. 20, pp. 1075-1087, Cluster Computing, New York, N.Y., C1

journal

A variant of password authenticated key exchange protocol

Y Zhang, Y Xiang, W Wu, A Alelaiwi

(2017), Future Generation Computer Systems, C1

journal

A general framework for secure sharing of personal health records in cloud system

M Au, T Yuen, J Liu, W Susilo, X Huang, Y Xiang, Z Jiang

(2017), Vol. 90, pp. 46-62, Journal of Computer and System Sciences, C1-1

journal

A practical cross-datacenter fault-tolerance algorithm in the cloud storage system

Y Cheng, X Yu, W Chen, R Chang, Y Xiang

(2017), Vol. 20, pp. 1801-1813, Cluster Computing, New York, N.Y., C1

journal

Towards accurate statistical analysis of security margins: new searching strategies for differential attacks

J Chen, J Teh, Z Liu, C Su, A Samsudin, Y Xiang

(2017), Vol. 66, pp. 1763-1777, IEEE transactions on computers, Piscataway, N.J., C1-1

journal

Crossed Cube Ring: A k-connected virtual backbone for wireless sensor networks

J Zhang, L Xu, S Zhou, G Min, Y Xiang, J Hu

(2017), Vol. 91, pp. 75-88, Journal of Network and Computer Applications, London, Eng., C1

journal

Detecting spamming activities in Twitter based on deep-learning technique

T Wu, S Wen, S Liu, J Zhang, Y Xiang, M Alrubaian, M Hassan

(2017), Vol. 29, pp. 1-11, Concurrency and computation: practice and experience, Chichester, Eng., C1

journal

STC: exposing hidden compromised devices in networked sustainable green smart computing platforms by partial observation

D Wang, T Wu, S Wen, X Chen, Y Xiang, W Zhou

(2017), pp. 1-14, IEEE transactions on sustainable computing, Piscataway, N.J., C1

journal

The spatial-temporal perspective: the study of the propagation of modern social worms

T Wang, C Xia, Z Li, X Liu, Y Xiang

(2017), Vol. 12, pp. 2558-2573, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal

Geographic spatiotemporal big data correlation analysis via the Hilbert-Huang transformation

W Song, L Wang, Y Xiang, A Zomaya

(2017), Vol. 89, pp. 130-141, Journal of computer and system sciences, Amsterdam, The Netherlands, C1

journal

Statistical Twitter spam detection demystified: performance, stability and scalability

G Lin, N Sun, S Nepal, J Zhang, Y Xiang, H Hassan

(2017), Vol. 5, pp. 11142-11154, IEEE ACCESS, Piscataway, N.J., C1

journal

Comprehensive analysis of network traffic data

Y Miao, Z Ruan, L Pan, J Zhang, Y Xiang

(2017), pp. 1-16, Concurrency and computation: practice and experience, Chichester, Eng., C1

journal

TC-Release++: an efficient timestamp-based coherence protocol for many-core architectures

Y Yao, W Chen, T Mitra, Y Xiang

(2017), Vol. 28, pp. 3313-3327, IEEE transactions on parallel and distributed systems, Piscataway, N.J., C1

journal
2016

Certificate-based encryption resilient to key leakage

Q Yu, J Li, Y Zhang, W Wu, X Huang, Y Xiang

(2016), Vol. 116, pp. 101-112, Journal of systems and software, Amsterdam, The Netherlands, C1

journal

Robust time-spread echo watermarking using characteristics of host signals

P Hu, D Peng, Z Yi, Y Xiang

(2016), Vol. 52, pp. 5-6, Electronics letters, Piscataway, N.J., C1

journal

Efficient consolidation-aware VCPU scheduling on multicore virtualization platform

B Wang, Y Cheng, W Chen, Q He, Y Xiang, M Hassan, A Alelaiwi

(2016), Vol. 56, pp. 229-237, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

Fuzzy-based feature and instance recovery

S Liu, J Zhang, Y Wang, Y Xiang

(2016), Vol. 9621, pp. 605-615, Intelligent information and database systems : 8th Asian conference, ACIIDS 2016, Da Nang, Vietnam, March 14-16, 2016, proceedings, part I, Berlin, Germany, B1

chapter

Spammers are becoming "smarter" on Twitter

C Chen, J Zhang, Y Xiang, W Zhou, J Oliver

(2016), Vol. 18, pp. 66-70, IT professional, Piscataway, N.J., C1

journal

A performance evaluation of machine learning-based streaming spam tweets detection

C Chen, J Zhang, Y Xie, Y Xiang, W Zhou, M Hassan, A Alelaiwi, M Alrubaian

(2016), Vol. 2, pp. 65-76, IEEE transactions on computational social systems, Piscataway, N.J, C1

journal

Two-factor data security protection mechanism for cloud storage system

J Liu, K Liang, W Susilo, J Liu, Y Xiang

(2016), Vol. 65, pp. 1992-2004, IEEE transactions on computers, Piscataway, N.J., C1

journal

Trustworthiness-hypercube-based reliable communication in mobile social networks

L Lin, L Xu, S Zhou, Y Xiang

(2016), Vol. 369, pp. 34-50, Information sciences, Amsterdam, The Netherlands, C1

journal

Achieving simple, secure and efficient hierarchical access control in cloud computing

S Tang, X Li, X Huang, Y Xiang, L Xu

(2016), Vol. 65, pp. 2325-2331, IEEE transactions on computers, Piscataway, N.J., C1

journal

An ensemble learning approach for addressing the class imbalance problem in twitter spam detection

S Liu, Y Wang, C Chen, Y Xiang

(2016), Vol. 9722, pp. 215-228, Information security and privacy, Berlin, Germany, B1

chapter

Detection and classification of anomaly intrusion using hierarchy clustering and SVM

C Tang, Y Xiang, Y Wang, J Qian, B Qiang

(2016), Vol. 9, pp. 3401-3411, Security and communication networks, Hoboken, N.J., C1

journal

Statistical detection of online drifting twitter spam

S Liu, J Zhang, Y Xiang

(2016), pp. 1-10, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security, Xi'an, China, E1

conference

SEMD: secure and efficient message dissemination with policy enforcement in VANET

X Liu, Y Xia, W Chen, Y Xiang, M Hassan, A Alelaiwi

(2016), Vol. 82, pp. 1316-1328, Journal of computer and system sciences, Amsterdam, The Netherlands, C1

journal

Network coding based converge-cast scheme in wireless sensor networks

L Xu, J Zhang, Y Xiang, X Huang

(2016), pp. 1-26, Wireless personal communications, Berlin, Germany, C1

journal

Gatekeeping behavior analysis for information credibility assessment on weibo

B Xie, Y Wang, C Chen, Y Xiang

(2016), Vol. 9955 LNCS, pp. 483-496, NSS 2016 : Proceedings of the Network and System Security 2016 Conference, Taipei, Taiwan, E1

conference

A general collaborative framework for modeling and perceiving distributed network behavior

Y Xie, Y Wang, H He, Y Xiang, S Yu, X Liu

(2016), Vol. 24, pp. 3162-3176, IEEE/ACM transactions on networking, Piscataway, N.J., C1

journal

On the race of worms and patches: modeling the spread of information in wireless sensor networks

M Sayad Haghighi, S Wen, Y Xiang, B Quinn, W Zhou

(2016), Vol. 11, pp. 2854-2865, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal

Password-authenticated group key exchange: a cross-layer design

Y Zhang, Y Xiang, X Huang

(2016), Vol. 16, pp. 1-20, ACM transactions on internet technology, New York, N.Y., C1

journal

Smart VM co-scheduling with the precise prediction of performance characteristics

Y Cheng, W Chen, Z Wang, Z Tang, Y Xiang

(2016), pp. 1-12, Future generation computer systems, Amsterdam, The Netherlands, C1

journal
2015

A strong provably secure IBE scheme without bilinear map

M Zheng, Y Xiang, H Zhou

(2015), Vol. 81, pp. 125-131, Journal of computer and system sciences, Amsterdam, The Netherlands, C1

journal

Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption

G Wei, J Shao, Y Xiang, P Zhu, R Lu

(2015), Vol. 318, pp. 111-122, Information sciences, Amsterdam, The Netherlands, C1

journal

Dynamic cloud service selection using an adaptive learning mechanism in multi-cloud computing

X Wang, J Cao, Y Xiang

(2015), Vol. 100, pp. 195-210, Journal of systems and software, Amsterdam, The Netherlands, C1

journal

A privacy-preserving location tracking system for smartphones based on cloud storage

K Zhao, H Jin, D Zou, W Dai, Y Xiang

(2015), Vol. 8, pp. 446-458, Security and communication networks, London, Eng., C1

journal

Dominating set and network coding-based routing in wireless mesh networks

J Chen, K He, R Du, M Zheng, Y Xiang, Q Yuan

(2015), Vol. 26, pp. 423-433, IEEE transactions on parallel and distributed systems, Piscataway, N.J., C1

journal

A sword with two edges: Propagation studies on both positive and negative information in online social networks

S Wen, M Haghighi, C Chen, Y Xiang, W Zhou, W Jia

(2015), Vol. 64, pp. 640-653, IEEE transactions on computers, Piscataway, N.J., C1

journal

A stochastic time-domain model for burst data aggregation in IEEE 802.15.4 wireless sensor networks

M Haghighi, Y Xiang, V Varadharajan, B Quinn

(2015), Vol. 64, pp. 627-639, IEEE transactions on computers, Piscataway, N.J., C1

journal

A framework for cloud-based healthcare services to monitor noncommunicable diseases patient

M Al-Qurishi, M Al-Rakhami, F Al-Qershi, M Hassan, A Alamri, H Khan, Y Xiang

(2015), Vol. 2015, pp. 1-11, International journal of distributed sensor networks, Philadelphia, Pa., C1

journal

Cost-effective authentic and anonymous data sharing with forward security

X Huang, J Liu, S Tang, Y Xiang, K Liang, L Xu, J Zhou

(2015), Vol. 64, pp. 971-983, IEEE transactions on computers, Piscataway, N.J., C1

journal

Detecting stepping stones by abnormal causality probability

S Wen, D Wu, P Li, Y Xiang, W Zhou, G Wei

(2015), Vol. 8, pp. 1831-1844, Security and communication networks, London, Eng., C1

journal

AMC: an adaptive multi-level cache algorithm in hybrid storage systems

Y Cheng, W Chen, Z Wang, X Yu, Y Xiang

(2015), Vol. 27, pp. 4230-4246, Concurrency and computation: practice and experience, London, Eng., C1

journal

Target coverage through distributed clustering in directional sensor networks

M Islam, M Ahasanuzzaman, M Razzaque, M Hassan, A Alelaiwi, Y Xiang

(2015), Vol. 2015, pp. 1-18, EURASIP journal on wireless communications and networking, Heidelberg, Germany, C1

journal

A secure cloud computing based framework for big data information management of smart grid

J Baek, Q Vu, J Liu, X Huang, Y Xiang

(2015), Vol. 3, pp. 233-244, IEEE transactions on cloud computing, Piscataway, N.J., C1

journal

FESTAL: fault-tolerant elastic scheduling algorithm for real-time tasks in virtualized clouds

J Wang, W Bao, X Zhu, L Yang, Y Xiang

(2015), Vol. 64, pp. 2545-2558, IEEE transactions on computers, Piscataway, N.J., C1

journal

Robust network traffic classification

J Zhang, X Chen, Y Xiang, W Zhou, J Wu

(2015), Vol. 23, pp. 1257-1270, IEEE/ACM transactions on networking, Piscataway, N.J., C1

journal

A lightweight virtualization solution for android devices

W Chen, L Xu, G Li, Y Xiang

(2015), Vol. 64, pp. 2741-2751, IEEE transactions on computers, Piscataway, N.J., C1

journal

Verifiable auditing for outsourced database in cloud computing

J Wang, X Chen, X Huang, I You, Y Xiang

(2015), Vol. 64, pp. 3293-3303, IEEE transactions on computers, Piscataway, N.J., C1

journal

Secure distributed deduplication systems with improved reliability

J Li, X Chen, X Huang, S Tang, Y Xiang, M Hassan, A Alelaiwi

(2015), Vol. 64, pp. 3569-3578, IEEE transactions on computers, Piscataway, N.J., C1

journal

ANGEL: agent-based scheduling for real-time tasks in virtualized clouds

X Zhu, C Chen, L Yang, Y Xiang

(2015), Vol. 64, pp. 3389-3403, IEEE transactions on computers, Piscataway, N.J., C1

journal

K-Center: an approach on the multi-source identification of information diffusion

J Jiang, S Wen, S Yu, Y Xiang, W Zhou

(2015), Vol. 10, pp. 2616-2626, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal

Asymmetric self-learning for tackling Twitter spam drift

C Chen, J Zhang, Y Xiang, W Zhou

(2015), Vol. 2015-August, pp. 208-213, INFOCOM WKSHPS 2015: Proceedings of the Computer Communications Workshops, Hong Kong, E1

conference

Anonymous credential-based access control scheme for clouds

X Yao, H Liu, H Ning, L Yang, Y Xiang

(2015), Vol. 2, pp. 34-43, IEEE cloud computing, Piscataway, N.J., C1

journal

Enhanced Twitter sentiment analysis by using feature selection and combination

A Yang, J Zhang, L Pan, Y Xiang

(2015), pp. 52-57, SOCIALSEC 2015: Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, Hangzhou, China, E1

conference

6 million spam tweets: a large ground truth for timely Twitter spam detection

C Chen, J Zhang, X Chen, Y Xiang, W Zhou

(2015), pp. 7065-7070, ICC 2015 : IEEE Proceedings of the International Conference on Communications, London, England, E1

conference

The relation between local and global influence of individuals in scale-free networks

S Wen, J Jiang, K Majbouri Yazdi, Y Xiang, W Zhou

(2015), pp. 80-84, SOCIALSEC 2015: Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, Hangzhou, China, E1

conference

A secure and efficient data sharing framework with delegated capabilities in hybrid cloud

X Liu, Y Xia, Y Xiang, M Hassan, A Alelaiwi

(2015), pp. 7-14, SocialSec 2015 : Proceedings of the Security and Privacy in Social Networks and Big Data 2015 Symposium, Hangzhou, China, E1

conference

Identifying diffusion sources in large networks: a community structure based approach

J Jiang, A Zhou, K Majbouri Yazdi, S Wen, S Yu, Y Xiang

(2015), Vol. 1, pp. 302-309, TrustCom 2015: Proceedings of the IEEE Trust, Security and Privacy in Computing and Communications 2015 International Conference, Helsinki, Finland, E1

conference

Unknown pattern extraction for statistical network protocol identification

Y Wang, C Chen, Y Xiang

(2015), pp. 506-509, LCN 2015: Proceedings of the IEEE Local Computer Networks 2015 Annual Conference, Cleanwater Beach, Fla., E1

conference

Integrating internet-of-things with the power of cloud computing and the intelligence of big Data analytics- a three layered approach

M Khorshed, N Sharma, K Kumar, M Prasad, A Ali, Y Xiang

(2015), pp. 1-8, APWC on CSE 2015: Proceedings of the Asia-Pacific Computer Science and Engineering 2015 World Congress, Nadi, Fiji, E1

conference

Real time cyber attack analysis on Hadoop ecosystem using machine learning algorithms

M Khorshed, N Sharma, A Dutt, A Ali, Y Xiang

(2015), pp. 1-7, APWC on CSE 2015: Proceedings of the Asia-Pacific Computer Science and Engineering 2015 World Congress, Nadi, Fiji, E1

conference

Fully reversible privacy region protection for cloud video surveillance

X Ma, L Yang, Y Xiang, W Zeng, D Zou, H Jin

(2015), pp. 1-13, IEEE transactions on cloud computing, Piscataway, N.J., C1-1

journal

Cost efficient resource management in fog computing supported medical cyber-physical system

L Gu, D Zeng, S Guo, A Barnawi, Y Xiang

(2015), Vol. PP, IEEE Transactions on Emerging Topics in Computing, C1-1

journal
2014

Detecting replicated nodes in wireless sensor networks using random walks and network division

W Khan, M Aalsalem, M Saad, Y Xiang, T Luan

(2014), pp. 1-1, IEEE WCNC 2014 : Proceedings of the IEEE Wireless Communications and Networking 2014 Conference, Istanbul, Turkey, E1

conference

Modeling and analysis on the propagation dynamics of modern email malware

S Wen, W Zhou, J Zhang, Y Xiang, W Zhou, W Jia, C C Zou

(2014), Vol. 11, pp. 361-374, IEEE Transactions on Dependable and Secure Computing, Piscataway, N.J., C1

journal

Detection and defense of application-layer DDoS attacks in backbone web traffic

W Zhou, W Jia, S Wen, Y Xiang, W Zhou

(2014), Vol. 38, pp. 36-46, Future generation computer systems, Amsterdam, Netherlands, C1

journal

Control flow-based malware variant detection

S Cesare, Y Xiang, W Zhou

(2014), Vol. 11, pp. 304-317, IEEE transactions on dependable and secure computing, Piscataway, NJ, C1

journal

Modeling the propagation of worms in networks: a survey

Y Wang, S Wen, Y Xiang, W Zhou

(2014), Vol. 16, pp. 942-960, IEEE communications surveys and tutorials, Piscataway, NJ, C1

journal

Internet traffic clustering with side information

Y Wang, Y Xiang, J Zhang, W Zhou, B Xie

(2014), Vol. 80, pp. 1021-1036, Journal of Computer and System Sciences, Amsterdam, The Netherlands, C1

journal

Securely outsourcing attribute-based encryption with checkability

J Li, X Huang, J Li, X Chen, Y Xiang

(2014), Vol. 25, pp. 2201-2210, IEEE Transactions on Parallel and Distributed Systems, Piscataway, United States, C1

journal

Further observations on smart-card-based password-authenticated key agreement in distributed systems

X Huang, X Chen, J Li, Y Xiang, L Xu

(2014), Vol. 25, pp. 1767-1775, IEEE Transactions on Parallel and Distributed Systems, Piscataway, N. J, C1

journal

Robustness enhancement of quantization based audio watermarking method using adaptive safe-band

I Natgunanathan, Y Xiang, T Zong, Y Xiang

(2014), pp. 890-895, IEEE ICC 2014 - Communication and Information Systems Security Symposium, Sydney, N.S.W., E1

conference

A cross-layer key establishment scheme in wireless mesh networks

Y Zhang, Y Xiang, X Huang, L Xu

(2014), Vol. 8712, pp. 526-541, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Berlin, Germany, B1

chapter

Spam Trapping System: Novel security framework to fight against spam botnets

A Derhab, A Bouras, F Muhaya, M Khan, Y Xiang

(2014), pp. 467-471, ICT 2014 : Cooperation for a United World : Proceedings of the 21st International Conference on Telecommunications, Lisbon, Portugal, E1

conference

Security from the transparent computing aspect

G Wang, Q Liu, Y Xiang, J Chen

(2014), pp. 216-220, ICNC 2014 : Proceedings of the 2014 International Conference on Computing, Networking and Communications, Honolulu, Hawaii, E1

conference

Are the popular users always important for information dissemination in online social networks?

S Wen, J Jiang, Y Xiang, S Yu, W Zhou

(2014), Vol. 28, pp. 64-67, IEEE Network, Piscataway, N. J, C1

journal

Chameleon hashing for secure and privacy-preserving vehicular communications

S Guo, D Zeng, Y Xiang

(2014), Vol. 25, pp. 2794-2803, IEEE transactions on parallel and distributed systems, Piscataway, NJ, C1

journal

Internet traffic classification using constrained clustering

Y Wang, Y Xiang, J Zhang, W Zhou, G Wei, L Yang

(2014), Vol. 25, pp. 2932-2943, IEEE transactions on parallel and distributed systems, Piscataway, N.J., C1

journal

On addressing the imbalance problem: A correlated KNN approach for network traffic classification

D Wu, X Chen, C Chen, J Zhang, Y Xiang, W Zhou

(2014), Vol. 8792, pp. 138-151, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Heidelberg, Germany, B1

chapter

A novel method for detecting double compressed Facebook JPEG images

C Ng, L Pan, Y Xiang

(2014), Vol. 490, pp. 191-198, Communications in Computer and Information Science, Dordrecht , Germany, B1

chapter

Secure outsourced attribute-based signatures

X Chen, J Li, X Huang, J Li, Y Xiang, D Wong

(2014), Vol. 25, pp. 3284-3294, IEEE transactions on parallel and distributed systems, Piscataway, NJ, C1

journal

To shut them up or to clarify: restraining the spread of rumors in online social networks

S Wen, J Jiang, Y Xiang, S Yu, W Zhou, W Jia

(2014), Vol. 25, pp. 3306-3316, IEEE transactions on parallel and distributed systems, Piscataway, NJ, C1

journal

Robust multi-factor authentication for fragile communications

X Huang, Y Xiang, E Bertino, J Zhou, L Xu

(2014), Vol. 11, pp. 568-581, IEEE Transactions on Dependable and Secure Computing, Piscataway, N. J, C1

journal

An analytical model for optimal spectrum leasing under constraints of quality of service in CRNs

G Wei, Y Xiang, M Ji, P Zhu

(2014), Vol. 74, pp. 71-80, Computer networks, Amsterdam, Netherlands, C1

journal

FEACS: a flexible and efficient access control scheme for cloud computing

Y Zhang, J Chen, R Du, L Deng, Y Xiang, Q Zhou

(2014), pp. 310-319, TrustCom 2014 : Proceedings of the IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, Beijing, China, E1

conference

Towards designing an email classification system using multi-view based semi-supervised learning

W Li, W Meng, Z Tan, Y Xiang

(2014), pp. 174-181, TrustCom 2014 : Proceedings of the IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, Beijing, China, E1

conference

An efficient anonymous remote attestation scheme for trusted computing based on improved CPK

Y Fajiang, C Jing, X Yang, Z Jiacheng, Z Yangdi

(2014), pp. 1-30, Electronic commerce research, New York, N.Y., C1

journal
2013

Unsupervised traffic classification using flow statistical properties and IP packet payload

J Zhang, Y Xiang, W Zhou, Y Wang

(2013), Vol. 79, pp. 573-585, Journal of computer and system sciences, Amsterdam, The Netherlands, C1

journal

Novel Z-Domain precoding method for blind separation of spatially correlated signals

Y Xiang, D Peng, Y Xiang, S Guo

(2013), Vol. 24, pp. 94-105, IEEE transactions on neural networks and learning systems, Piscataway, N.J., C1

journal

Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions

Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou

(2013), Vol. 8, pp. 5-15, IEEE Transactions on Information Forensics and Security, C1

journal

Network traffic classification using correlation information

J Zhang, Y Xiang, Y Wang, W Zhou, Y Xiang, Y Guan

(2013), Vol. 24, pp. 104-117, IEEE transactions on parallel and distributed systems, Piscataway, N.J., C1

journal

Mobile phone sensing systems : a survey

W Khan, Y Xiang, M Aalsalem, Q Arshad

(2013), Vol. 15, pp. 402-427, IEEE communications surveys and tutorials, Piscataway, N.J., C1

journal

Modeling propagation dynamics of social network worms

S Wen, W Zhou, J Zhang, Y Xiang, W Zhou, W Jia

(2013), Vol. 24, pp. 1633-1643, IEEE transactions on parallel and distributed systems, Piscataway, N.J., C1

journal

Robust image retrieval with hidden classes

J Zhang, L Ye, Y Xiang, W Zhou

(2013), Vol. 117, pp. 670-679, Computer vision and image understanding, Amsterdam, The Netherlands, C1

journal

Malwise-an effective and efficient classification system for packed and polymorphic malware

S Cesare, Y Xiang, W Zhou

(2013), Vol. 62, pp. 1193-1206, IEEE transactions on computers, Piscataway, N.J., C1

journal

Resisting web proxy-based HTTP attacks by temporal and spatial locality behavior

Y Xie, S Tang, Y Xiang, J Hu

(2013), Vol. 24, pp. 1401-1410, IEEE transactions on parallel and distributed systems, Piscataway, N.J., C1

journal

An Effective Network Traffic Classification Method with Unknown Flow Detection

Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou, A Vasilakos

(2013), Vol. 10, pp. 133-147, IEEE Transactions on Network and Service Management, C1

journal

A clustering based coscheduling strategy for efficient scientific workflow execution in cloud computing

K Deng, K Ren, J Song, D Yuan, Y Xiang, J Chen

(2013), Vol. 25, pp. 2523-2539, Concurrency computation practice and experience, London, England, C1

journal

Robust network traffic identification with unknown applications

Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou

(2013), pp. 405-414, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ACM, E1

conference

Analysis of a patchwork-based audio watermarking scheme

I Natgunanathan, Y Xiang, S Elbadry, W Zhou, Y Xiang

(2013), pp. 900-905, ICIEA 2013 : Proceedings of the 8th IEEE Conference on Industrial Electronics and Applications, Melbourne, Victoria, E1

conference

A Markov model of safety message broadcasting for vehicular networks

N Toorchi, M Attari, M Haghighi, Y Xiang

(2013), pp. 1657-1662, WCNC 2013 : IEEE Wireless Communications and Networking Conference, Shanghai, China, E1

conference

Fault-tolerant topology control based on artificial immune theory in WMNs

J Chen, R Du, L Zhao, C Wang, M Zheng, Y Xiang

(2013), pp. 590-598, NSS 2013 : Network and system security: 7th International Conference, Madrid, Spain, June 3-4, 2013, proceedings, Madrid, Spain, E1

conference

Modeling and analysis for thwarting worm propagation in email networks

S Wen, Y Xiang, W Zhou

(2013), pp. 763-769, Network and system security : 7th international conference, NSS 2013, Madrid, Spain, June 3-4, 2013, proceedings, Madrid, Spain, E1

conference

How to achieve non-repudiation of origin with privacy protection in cloud computing

W Wu, J Zhou, Y Xiang, L Xu

(2013), Vol. 79, pp. 1200-1213, Journal of computer and system sciences, Amsterdam, The Netherlands, C1

journal

Modeling oscillation behavior of network traffic by nested hidden Markov model with variable state-duration

Y Xie, J Hu, Y Xiang, S Yu, S Tang, Y Wang

(2013), Vol. 24, pp. 1807-1817, IEEE transactions on parallel and distributed systems, Piscataway, N.J., C1

journal

Detection and mitigation of node replication attacks in wireless sensor networks : a survey

W Khan, M Aalsalem, M Saad, Y Xiang

(2013), Vol. 2013, pp. 1-22, International journal of distributed sensor networks, Philadelphia, Pa., C1

journal

Clonewise - detecting package-level clones using machine learning

S Cesare, Y Xiang, J Zhang

(2013), pp. 197-215, Security and privacy in communication networks, Berlin, Germany, B1

chapter

Towards designing privacy-preserving signature-based IDS as a service : a study and practice

Y Meng, W Li, L Kwok, Y Xiang

(2013), pp. 181-188, Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems; INCOS 2013, Xi'an, China, E1

conference

Network traffic clustering using random forest proximities

Y Wang, Y Xiang, J Zhang

(2013), pp. 2058-2062, ICC 2013 : IEEE International Conference on Communications, Budapest, Hungary, E1

conference

Matrix-based pairwise key establishment in wireless mesh networks using deployment knowledge

Y Zhang, L Xu, Y Xiang, X Huang

(2013), pp. 1604-1608, ICC 2013 : IEEE International Conference on Communications, Budapest, Hungary, E1

conference

Time correlated anomaly detection based on inferences

A Olabelurin, G Kallos, Y Xiang, R Bloomfield, S Veluru, M Rajarajan

(2013), pp. 351-360, ECIWS 2013 : Proceedings of the European Conference on Information Warfare and Security, Jyvaskyla, Finland, E1

conference

An effective deferentially private data releasing algorithm for decision tree

T Zhu, P Xiong, Y Xiang, W Zhou

(2013), pp. 388-395, TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Victoria, E1

conference

Detecting stepping stones by abnormal causality probability

S Wen, P Li, D Wu, Y Xiang, W Zhou

(2013), pp. 308-322, Cyberspace safety and security, Cham, Switzerland, B1

chapter

Zero-day traffic identification

J Zhang, X Chen, Y Xiang, W Zhou

(2013), pp. 213-227, Cyberspace safety and security, Cham, Switzerland, B1

chapter

Traffic identification in semi-known network environment

X Chen, J Zhang, Y Xiang, W Zhou

(2013), pp. 572-579, CSE 2013 : Proceedings of the IEEE Computational Science and Engineering 2013 international conference, Sydney, N.S.W., E1

conference

Simseer and Bugwise - web services for binary-level software similarity and defect detection

S Cesare, Y Xiang

(2013), Vol. 140, pp. 21-30, AusPDC 2013 : Proceedings of the 11th Australasian Symposium on Parallel and Distributed Computing, Adelaide, South Australia, E1-1

conference
2012

Generating regular expression signatures for network traffic classification in trusted network management

Y Wang, Y Xiang, W Zhou, S Yu

(2012), Vol. 35, pp. 992-1000, Journal of network and computer applications, London, U. K., C1

journal

Locating defense positions for thwarting the propagation of topological worms

S Wen, W Zhou, Y Wang, W Zhou, Y Xiang

(2012), Vol. 16, pp. 560-563, IEEE Communications Letters, Piscataway, N.J., C1

journal

Internet traffic clustering with constraints

Y Wang, Y Xiang, J Zhang, S Yu

(2012), pp. 619-624, IWCMC 2012 : Proceedings of the IEEE 8th Wireless Communications and Mobile Computing Conference, Limassol, Cyprus, E1

conference

Semi-supervised and Compound Classification of Network Traffic

Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou

(2012), pp. 617-621, Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on, IEEE, E1

conference

Classification of correlated Internet traffic flows

Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou

(2012), pp. 490-496, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, E1

conference

Wire - a formal intermediate language for binary analysis

S Cesare, Y Xiang

(2012), pp. 515-524, TrustCom 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, England, E1

conference

A QoS-based fine-grained reputation system in the grid environment

Y Cui, M Li, Y Xiang, Y Ren, S Cesare

(2012), Vol. 24, pp. 1990-2006, Concurrency computation : practice and experience, Chichester, England, C1

journal

An analytical model on the propagation of modern email worms

W Zhou, S Wen, Y Wang, Y Xiang, W Zhou

(2012), pp. 533-540, TrustCom 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, England, E1

conference

Software similarity and classification

S Cesare, Y Xiang

(2012), Berlin, Germany, A1

book

Algorithms and architectures for parallel processing

Y Xiang, I Stojmenovic, B Apduhan, G Wang, K Nakano, A Zomaya

(2012), Berlin, Germany, A1-1

book

Algorithms and architectures for parallel processing

Y Xiang, I Stojmenovic, B Apduhan, G Wang, K Nakano, A Zomaya

(2012), Berlin, Germany, A1-1

book

Semi-supervised and compound classification of network traffic

J Zhang, C Chen, Y Xiang, W Zhou

(2012), Vol. 7, pp. 252-261, International journal of security and networks, Geneva, Switzerland, C1-1

journal
2011

A generic framework for three-factor authentication : preserving security and privacy in distributed systems

X Huang, Y Xiang, A Chonka, J Zhou, R Deng

(2011), Vol. 22, pp. 1390-1397, IEEE transactions on parallel and distributed systems, Piscataway, N. J., C1

journal

A secure and efficient data aggregation scheme for wireless sensor networks

W Zhu, F Gao, Y Xiang

(2011), Vol. 23, pp. 1414-1430, Concurrency Computation Practice and Experience, United Kingdom, C1

journal

CAFS : a novel lightweight cache-based scheme for large-scale intrusion alert fusion

S Wen, W Zhou, Y Xiang, W Zhou

(2011), Vol. 24, pp. 1137-1153, Concurrency computation : practice and experience, West Sussex, U. K., C1

journal

Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks

A Chonka, Y Xiang, W Zhou, A Bonti

(2011), Vol. 34, pp. 1097-1107, Journal of network and computer applications, London, U. K., C1

journal

Eliminating errors in worm propagation models

Y Wang, S Wen, S Cesare, W Zhou, Y Xiang

(2011), Vol. 15, pp. 1022-1024, IEEE Communications Letters, United States, C1

journal

Low-rate DDoS attacks detection and traceback by using new information metrics

Y Xiang, K Li, W Zhou

(2011), Vol. 6, pp. 426-437, IEEE Transactions on Information Forensics and Security, Piscataway, NJ, C1

journal

Optimistic fair exchange with strong resolution-ambiguity

X Huang, Y Mu, W Susilo, W Wu, Y Xiang

(2011), Vol. 29, pp. 1491-1502, IEEE journal on selected areas in communications, Piscataway, N. J., C1

journal

Secure image retrieval based on visual content and watermarking protocol

J Zhang, Y Xiang, W Zhou, L Ye, Y Mu

(2011), Vol. 54, pp. 1661-1674, Computer journal, Oxford, U. K., C1

journal

Secure localization with attack detection in wireless sensor networks

W Zhu, Y Xiang, J Zhou, R Deng, F Bao

(2011), Vol. 10, pp. 155-171, International journal of information security, Heidelberg, Germany, C1

journal

The microcosmic model of worm propagation

Y Wang, S Wen, S Cesare, W Zhou, Y Xiang

(2011), Vol. 54, pp. 1700-1720, The Computer Journal, Oxford, England, C1

journal

Internet traffic classification using machine learning : a token-based approach

Y Wang, Y Xiang, S Yu

(2011), pp. 285-289, CSE 2011 : Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, Dalian, China, E1

conference

Malware variant detection using similarity search over sets of control flow graphs

S Cesare, Y Xiang

(2011), pp. 181-189, TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, E1

conference

Modeling worms propagation on probability

Y Wang, S Wen, Y Xiang

(2011), pp. 49-56, NSS 2011 : Proceedings of the 5th International Conference on Network and System Security, Milan, Italy, E1

conference

Trust ticket deployment : a notion of a data owner's trust in cloud computing

M Ahmed, Y Xiang

(2011), pp. 111-117, TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, E1

conference

A novel semi-supervised approach for network traffic clustering

Y Wang, Y Xiang, J Zhang, S Yu

(2011), pp. 169-175, NSS 2011 : Proceedings of the 5th International Conference on Network and System Security, Milan, Italy, E1

conference

Browsing behavior mimicking attacks on popular web sites for large botnets

S Yu, G Zhao, S Guo, Y Xiang, A Vasilakos

(2011), pp. 947-951, INFOCOM WKSHPS 2011 : IEEE Conference on Computer Communications Workshops, Shanghai, China, E1

conference

Defending against large-scale and coordinated attacks in the ubiquitous environments

Y Xiang

(2011), pp. 7-8, TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, E1

conference

The probability model of peer-to-peer botnet propagation

Y Wang, S Wen, W Zhou, W Zhou, Y Xiang

(2011), pp. 470-480, Algorithms and Architectures for Parallel Processing Conference, Melbourne, Victoria, E1

conference

A hybrid graphical password based system

W Khan, Y Xiang, M Aalsalem, Q Arshad

(2011), pp. 153-164, ICA3PP 2011 : Proceedings of the 11th Algorithms and Architectures for Parallel Processing International Conference, Melbourne, Victoria, E1

conference

Polymorphic malware detection using Hierarchical Hidden Markov Model

F Muhaya, M Khan, Y Xiang

(2011), pp. 151-155, DASC 2011 : Proceedings of the 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, Sydney, N.S.W., E1

conference
2010

A microscopic competition model and its dynamics analysis on network attacks

Y Xiang, D Tian, W Zhou

(2010), Vol. 22, pp. 503-517, Concurrency computation practice and experience, West Sussex, England, C1

journal

A lightweight intrusion alert fusion system

S Wen, Y Xiang, W Zhou

(2010), pp. 695-700, HPCC 2010 : Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, Melbourne, Vic., E1

conference

An automatic application signature construction system for unknown traffic

Y Wang, Y Xiang, S Yu

(2010), Vol. 22, pp. 1927-1944, Concurrency computation practice and experience, West Sussex, England, C1

journal

Fault-tolerant scheduling with dynamic number of replicas in heterogeneous systems

L Zhao, Y Ren, Y Xiang, K Sakurai

(2010), pp. 434-441, HPCC 2010 : Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, Melbourne, Vic., E1

conference

Modeling the propagation of peer-to-peer worms

X Fan, Y Xiang

(2010), Vol. 26, pp. 1433-1443, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

Email classification using data reduction method

R Islam, Y Xiang

(2010), pp. 1-5, CHINACOM 2010 : Proceedings of the 5th International ICST Conference on Communications and Networking in China, Beijing, China, E1

conference

Further observations on optimistic fair exchange protocols in the multi-user setting

X Huang, Y Mu, W Susilo, W Wu, Y Xiang

(2010), pp. 124-141, PKC 2010 : Public key cryptography : Proceedings of the 13th International Conference on Practice and Theory of Public-Key Cryptography, Paris, France, May 26-28, Paris, France, E1

conference

Above the trust and security in cloud computing : a notion towards innovation

M Ahmed, Y Xiang

(2010), pp. 723-730, IEEE/IFIP 2010 : Proceedings of the IEEE/IFIP 8th International Conference Embedded and Ubiquitous Computing 2010, Hong Kong, China, E1

conference

Evolution of cooperation in reputation system by group-based scheme

Y Ren, M Li, Y Xiang, Y Cui, K Sakurai

(2010), Vol. 63, pp. 171-190, Journal of supercomputing, New York, N.Y., C1

journal

Defending against the propagation of active worms

X Fan, Y Xiang

(2010), Vol. 51, pp. 167-200, Journal of supercomputing, Berlin, Germany, C1-1

journal
2009

An innovative analyser for multi-classifier e-mail classification based on grey list analysis

M Islam, W Zhou, M Guo, Y Xiang

(2009), Vol. 32, pp. 357-366, Journal of network and computer applications, London, England, C1

journal

Flexible deterministic packet marking: an IP traceback system to find the real source of attacks

Y Xiang, W Zhou, M Guo

(2009), Vol. 20, pp. 567-580, IEEE transactions on parallel and distributed systems, Piscataway, NJ, C1

journal

Spam filtering for network traffic security on a multi-core environment

R Islam, W Zhou, Y Xiang, A Mahmood

(2009), Vol. 21, pp. 1307-1320, Concurrency and computation : practice & experience, Bognor Regis, England, C1

journal

Ubiquitous multicore (UM) methodology for multimedia

A Chonka, W Zhou, L Ngo, Y Xiang

(2009), Vol. 4, pp. 145-156, International Journal of Multimedia and Ubiquitous Engineering, Ojung-Dong, Republic of Korea, C1-1

journal

Large-scale network intrusion detection based on distributed learning algorithm

D Tian, Y Liu, Y Xiang

(2009), Vol. 8, pp. 25-35, International journal of information security, Heidelberg, Germany, C1-1

journal

Managing email overload with an automatic nonparametric clustering system

Y Xiang

(2009), Vol. 48, pp. 227-242, Journal of supercomputing, New York, N.Y., C1-1

journal
2008

Defending against distributed denial of service

Y Xiang, W Zhou

(2008), pp. 121-129, Encyclopedia of information ethics and security, Hershey, PA, B1

chapter

Protecting web services from DDoS attacks by SOTA

A Chonka, W Zhou, Y Xiang

(2008), pp. 379-384, ICITA 2008 : Proceedings of the 5th International Conference on Information Technology and Applications, Cairns, Queensland, E1

conference

Multi-core security defense system (MSDS)

A Chonka, W Zhou, Y Xiang

(2008), pp. 85-90, ATNAC 2008 : Proceedings of the 2008 Australasian Telecommunication Networks and Applications Conference, Adelaide, S. Aust., E1

conference

Detecting and tracing DDoS attacks by intelligent decision prototype

A Chonka, W Zhou, J Singh, Y Xiang

(2008), pp. 578-583, Proceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications, Hong Kong, E1

conference

Protecting web services with service oriented traceback architecture

A Chonka, W Zhou, Y Xiang

(2008), pp. 706-711, CIT 2008 : Proceedings of IEEE 8th International Conference on Computer and Information Technology, Sydney, N.S.W., E1

conference

Protecting information systems from DDoS attack using multicore methodology

A Chonka, W Zhou, K Knapp, Y Xiang

(2008), pp. 270-275, CIT 2008 : Proceedings of IEEE 8th International Conference on Computer and Information Technology, Sydney, N.S.W., E1

conference

Multi-core Defense System (MSDS) for protecting computer infrastructure against DDoS attacks

A Chonka, S Chong, W Zhou, Y Xiang

(2008), pp. 503-508, PDCAT 2008 : Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies, Dunedin, New Zealand, E1

conference

Using multi-core processors to support network security applications

Y Xiang, W Zhou

(2008), pp. 213-218, Proceedings of the IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems, Pheonix, AZ, E1-1

conference

Checkpointing schemes for grid workflow systems

Z Li, Y Xiang

(2008), Vol. 20, pp. 1773-1790, Concurrency computation practice and experience, Chichester, United Kingdom, C1-1

journal
2007

Managing email overload with an automatic nonparametric clustering approach

Y Xiang, W Zhou, J Chen

(2007), Vol. 4672, pp. 81-90, Lecture notes in computer science, Berlin, Germany, C1

journal

Pervasive computing at tableside : a wireless web-based ordering system

Y Xiang, W Zhou

(2007), Vol. 3, pp. 82-101, International journal of pervasive computing and communications, Bingley, England, C1

journal

On the effectiveness of flexible deterministic packet marking for DDos defence

Y Xiang, W Zhou, Z Li, Q Zeng

(2007), pp. 183-190, 2007 IFIP International Conference on Network and Parallel Computing Workshops : proceedings : NPC 2007, 18-21 September, 2007, Dalian, China, Dalian, china, E1

conference
2006

Classifying DDoS packets in high-speed networks

Y Xiang, W Zhou

(2006), Vol. 6, pp. 107-115, International journal of computer science and network security, Republic of Korea, C1

journal

Protecting web applications from DDoS attacks by an active distributed defense system

Y Xiang, W Zhou

(2006), Vol. 2, pp. 37-44, International journal of web information systems, Leicester, England, C1

journal
2005

Distributed defense against distributed denial-of-service attacks

W Shi, Y Xiang, W Zhou

(2005), Vol. 3719, pp. 357-362, Lecture notes in computer science, Berlin, Germany, C1

journal

Safeguard information infrastructure against DDoS attacks: experiments and modeling

Y Xiang, W Zhou

(2005), Vol. 3810, pp. 320-333, Lecture notes in computer science, Berlin, Germany, C1

journal

Intelligent DDoS packet filtering in high-speed networks

Y Xiang, W Zhou

(2005), Vol. 3758, pp. 395-406, Lecture notes in computer science, Berlin, Germany, C1

journal

A defense system against DDoS attacks by large-scale IP traceback

Y Xiang, W Zhou

(2005), pp. 431-436, Third International Conference on Information Technology and Applications : 4-7 July 2005, Sydney, Australia : proceedings, Sydney, Australia, E1

conference

Mark-aided distributed filtering by using neural network for DDoS defense

Y Xiang, W Zhou

(2005), pp. 1701-1705, GLOBECOM '05 : IEEE Global Telecommunications Conference, 28 November-2 December 2005 St. Louis, Missouri, USA, discovery past and future, Missouri, USA, E1

conference
2004

GHIRS: integration of hotel management systems by web services

Y Xiang, W Zhou, M Chowdhury

(2004), Vol. 3033, pp. 1002-1009, Lecture notes in computer science, Berlin, Germany, C1

journal

Protect grids from DDoS attacks

Y Xiang, W Zhou

(2004), Vol. 3251, pp. 309-316, Lecture notes in computer science, Berlin, Germany, C1

journal

Towards extended machine translation model for next generation world wide web

G Nasierding, Y Xiang, H Dai

(2004), Vol. LNCS 3251, pp. 1017-1020, Lecture notes in computer science, Berlin , Germany, C1

journal

An active distributed defense system to protect web applications from DDoS attacks

Y Xiang, W Zhou

(2004), pp. 559-568, Sixth International Conference on Information Integration and Web-based Applications Services, 27-29 September 2004, Jakarta, Indonesia, Jakarta, Indonesia, E1

conference

Filtering mobile spam by support vector machine

Y Xiang, M Chowdhury, S Ali

(2004), pp. 1-4, CSITeA'04 : Third International Conference on Computer Sciences, Software Engineering, Information Technology, E-Business and Applications, Cairo, Egypt, E1

conference

IP spoofing attack and its countermeasures

Y Xiang, W Zhou

(2004), pp. 52-60, From information warfare to information operations: proceedings of the 5th Australian Information Warfare and Security Conference, Perth, Australia, E1

conference
2002

Object oriented finite element analysis: a distributed approach to mesh generation

Y Xiang, Y Ping, W Zhou

(2002), pp. 92-99, 2002 5th International Conference on Algorithms and Architectures for Parallel Processing : ICA3PP/2002 : Beijing, China, October 23-25, 2002, Beijing, China, E1

conference

The design and development of an integrated system for object-oriented finite element computing

Y Xiang, W Zhou

(2002), pp. 201-204, 2002 5th International Conference on Algorithms and Architectures for Parallel Processing : ICA3PP/2002 : Beijing, China, October 23-25, 2002, Beijing, China, E1

conference

A web-DB model on multicast and anycast

S Yu, W Zhou, Y Zhao, M Lan, Y Xiang

(2002), pp. 412-415, Proceedings of the 2002 5th International Conference on Algorithms and Architectures for Parallel Processing : ICA3PP/2002 : Beijing, China, October 23-25, 2002, Beijing, China, E1

conference
1999

A new approach to blind separation of cyclostationary sources

K Abed-Meraim, Y Xiang, J Manton, Y Hua

(1999), pp. 114-117, SPAWC 1999 : Proceedings of the Signal Processing Advances in Wireless Communications 1999 IEEE Workshop, Annapolis, Maryland, E1-1

conference

Funded Projects at Deakin

Australian Competitive Grants

Developing an active defence system to identify malicious domains and websites

Prof Yang Xiang, Prof Wanlei Zhou, Prof Vijay Varadharajan, Dr Jonathan Oliver

ARC Linkage - Projects Rnd 2

  • 2015: $15,237
  • 2014: $58,882
  • 2013: $56,274
  • 2012: $41,539

Modelling and defence against worm propagation

Prof Wanlei Zhou, Prof Yang Xiang

ARC - Discovery Projects

  • 2016: $121,053
  • 2015: $104,867
  • 2014: $119,506

Classifying Internet traffic for security applications

Prof Yang Xiang

ARC - Discovery Projects

  • 2016: $90,374
  • 2015: $92,630

Industry and Other Funding

Developing an active defence system to identify malicious domains and websites

Prof Yang Xiang, Prof Wanlei Zhou, Prof Vijay Varadharajan, Dr Jonathan Oliver

  • 2015: $15,000
  • 2014: $30,000
  • 2013: $30,000
  • 2012: $15,000

Development of a smart data management and optimisation system

Prof Yang Xiang

  • 2012: $25,000

Recommendations on a business information system strategy,

Prof Yang Xiang

  • 2014: $4,545
  • 2013: $4,545

Cost effective scheduling of data intensive application workflows on cloud through information correlation

A/Prof Jinjun Chen, Prof Yang Xiang, Prof Ramamohanarao Kotagiri

  • 2016: $18,750
  • 2015: $25,000

Develop a real estate web portal system

Prof Yang Xiang

  • 2015: $3,636
  • 2014: $5,454

Honeypot research in mining industry in Australia

Prof Yang Xiang, Prof Wanlei Zhou

  • 2015: $50,000

An Active Defence System for NFV Infrastructure

Prof Yang Xiang, Mr Yu Wang

  • 2016: $27,501
  • 2015: $12,300

Supervisions

Principal Supervisor
2017

Yuexin Zhang

Thesis entitled: Cross-Layer Key Establishment Protocols for Wireless Devices

Doctor of Philosophy (Information Technology), School of Information Technology

Chao Chen

Thesis entitled: Analysing and Detecting twitter Spam

Doctor of Philosophy (Information Technology), School of Information Technology

Shigang Liu

Thesis entitled: Deficient Data Classification with Fuzzy Learning

Doctor of Philosophy (Information Technology), School of Information Technology

2016

Md Tanzim Khorshed

Thesis entitled: Combating cyber attacks in cloud computing using machine learning techniques

Doctor of Philosophy (Information Technology), School of Information Technology

2014

Xiao Chen

Thesis entitled: Network traffic classification using Machine Learning approach Honeypot research in mining industry in Australia

Master of Science (Information Technology), School of Information Technology

2013

Silvio Cesare

Thesis entitled: Software Similarity and Classification

Doctor of Philosophy (Information Technology), School of Information Technology

Mahbub Ahmed

Thesis entitled: Security in cloud computing

Doctor of Philosophy (Information Technology), School of Information Technology

Yu Wang

Thesis entitled: Automatic network traffic classification

Doctor of Philosophy (Information Technology), School of Information Technology

Associate Supervisor
2014

Moutaz Alazab

Thesis entitled: Analysis on Smartphone Devices for Detection and Prevention of Malware

Doctor of Philosophy (Information Technology), School of Information Technology

Tianqing Zhu

Thesis entitled: Differential Privacy and Its Application

Doctor of Philosophy (Information Technology), School of Information Technology

Sheng Wen

Thesis entitled: Modern Worms' Propagation: Modelling and Analysis

Doctor of Philosophy (Information Technology), School of Information Technology

2012

Yini Wang

Thesis entitled: Modelling and Defence against Propagation of Worms in Networks

Doctor of Philosophy (Information Technology), School of Information Technology