Profile image of Lei Pan

A/Prof. Lei Pan

STAFF PROFILE

Position

Associate Professor

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Qualifications

Graduate Certificate of Higher Education, Monash University, 2012
Studying GCHE at other institution, Monash University, 2012
Doctor of Philosophy, Deakin University, 2008
Master of Science, Chalmers Uni of Tech (Sweden), 2004
Bachelor of Engineering, Univ of Sci & Tech of China, 2001

Contact

l.pan@deakin.edu.au
+61 3 925 17483

Research interests

AI Security

Blockchain

Quantum Computing

Emerging Technology

Teaching interests

Blockchain Technologies

Cyber Security

Emerging Technology

Research groups

Centre for Cyber Resilience and Trust (CREST)

Awards

  • Industry Engagement Award for excellence in industry collaboration and partnerships, 2022
  • Excellence in Aligning Courses with Industry Certifications, 2022
  • Outstanding Redevelopment, Teaching \& Student Learning Experience, 2020
  • Excellence in Research Impact, 2019
  • Vice Chancellor Award in Teaching, "Degrees of the Future: The Master of IT Leadership including Deakin Professional Practice Credentials", 2019
  • Excellence in Advancing Online Learning Experiences, 2016
  • Excellence in Service, 2015
  • Excellence in Service, 2014
  • Excellence in Service, 2012

Publications

Filter by

2024

Quantum Autoencoder Frameworks for Network Anomaly Detection

Moe Hdaib, S Rajasegarar, Lei Pan

(2024), pp. 69-82, ICONIP 2023 : Proceedings of the 30th International Conference on Neural Information Processing, Changsha, China, E1

conference

Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication

L Li, C Chen, L Pan, Y Tai, J Zhang, Y Xiang

(2024), Vol. 14346 LNCS, pp. 183-202, ESORICS 2023 : Proceedings of the European Symposium on Research in Computer Security 2023, The Hague, The Netherlands, E1

conference

Backdoor Attacks and Generative Model Fairness: Current Trends and Future Research Directions

R Holland, S Pal, L Pan, L Zhang

(2024), pp. 31-36, COMSNETS 2024 : Proceedings of the 16th International Conference on COMmunication Systems and NETworkS, Bengaluru, India, E1

conference
2023

Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism

M Nosouhi, S Shah, L Pan, Y Zolotavkin, A Nanda, P Gauravaram, R Doss

(2023), Vol. 18, pp. 2160-2174, IEEE Transactions on Information Forensics and Security, C1

journal article

Identification of disease propagation paths in two-layer networks

G Li, G Liu, X Wu, L Pan

(2023), Vol. 13, pp. 6357-, Scientific Reports, England, C1

journal article

Trustworthy Sensor Fusion against Inaudible Command Attacks in Advanced Driver-Assistance Systems

J Guan, L Pan, C Wang, S Yu, L Gao, X Zheng

(2023), Vol. 10, pp. 17254-17264, IEEE Internet of Things Journal, Piscataway, N.J., C1

journal article

Bit Flipping Key Encapsulation for the Post-Quantum Era

M Nosouhi, S Shah, L Pan, R Doss

(2023), Vol. 11, pp. 56181-56195, IEEE Access, C1

journal article

Resource-saving quantum key distribution based on three-photon matrix product states

Hong Lai, Josef Pieprzyk, Lei Pan, Ya Li

(2023), Vol. 22, pp. 1-16, Quantum Information Processing, Berlin, Germany, C1

journal article

Optimizing Performance in Federated Person Re-Identification through Benchmark Evaluation for Blockchain-Integrated Smart UAV Delivery Systems

Chengzu Dong, Jingwen Zhou, Qi An, Frank Jiang, Shiping Chen, Lei Pan, Xiao Liu

(2023), Vol. 7, pp. 1-17, Drones, Basel, Switzerland, C1

journal article

Security and privacy problems in voice assistant applications: A survey

J Li, C Chen, M Rahimi Azghadi, H Ghodosi, L Pan, J Zhang

(2023), Vol. 134, pp. 1-15, Computers and Security, Amsterdam, The Netherlands, C1

journal article

A Survey of PPG's Application in Authentication

L Li, C Chen, L Pan, L Zhang, Z Wang, J Zhang, Y Xiang

(2023), Vol. 135, pp. 103488-103488, Computers and Security, Amsterdam, The Netherlands, C1

journal article

Interrelated feature selection from health surveys using domain knowledge graph

M Jaworsky, X Tao, L Pan, S Pokhrel, J Yong, J Zhang

(2023), Vol. 11, Health Information Science and Systems, Berlin, Germany, C1

journal article

A Brief Survey of Machine Learning and Deep Learning Techniques for E-Commerce Research

X Zhang, F Guo, T Chen, L Pan, G Beliakov, J Wu

(2023), Vol. 18, pp. 2188-2216, Journal of Theoretical and Applied Electronic Commerce Research, Basel, Switzerland, C1

journal article

SoK: On Efficacy of the BGF Decoder for QC-MDPC-based Quantum-Safe Cryptosystems

Syed Shah, Mohammad Nosouhi, Lei Pan, Robin Doss

(2023), pp. 1-8, APKC '23 : Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop, Melbourne, Vic., E1

conference

SigD: A Cross-Session Dataset for PPG-based User Authentication in Different Demographic Groups

Lin Li, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang

(2023), IJCNN 2023 : Proceedings of the International Joint Conference on Neural Networks, Gold Coast, Qld., E1

conference

An Analysis of Important Factors Affecting the Success of Blockchain Smart Contract Security Vulnerability Scanning Tools

Cynthia Chee, Shantanu Pal, Lei Pan, Robin Doss

(2023), pp. 105-113, ASIA CCS 2023 : Proceedings of the 5th ACM Asia Conference on Computer and Communications Security, Melbourne, Victoria, E1

conference

ForTrac: a Secure NFT-based Forward Traceability System for Providing Data Accuracy and Completeness

Fokke Heikamp, Lei Pan, Robin Doss, Rolando Trujillo-Rasua, Sushmita Ruj

(2023), pp. 1-10, BSCI 2023 : Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure 2023, Melbourne, VIC., E1

conference

SigA: RPPG-based Authentication for Virtual Reality Head-mounted Display

L Li, C Chen, L Pan, L Zhang, J Zhang, Y Xiang

(2023), pp. 686-699, ACM International Conference Proceeding Series, E1

conference

TOTPAuth: A Time-based One Time Password Authentication Proof-of-Concept against Metaverse User Identity Theft

P Li, L Pan, F Chen, T Hoang, R Wang

(2023), pp. 662-665, Proceedings - 2023 IEEE International Conference on Metaverse Computing, Networking and Applications, MetaCom 2023, E1

conference

EnSpeciVAT: Enhanced SpecieVAT for cluster tendency identification in graphs

S Xia, S Rajasegarar, C Leckie, S Erfani, J Chan, Lei Pan

(2023), Vol. 14178, pp. 323-337, ADMA 2023 : Proceedings of the 19th International Conference on Advanced Data Mining and Applications, Shenyang, China, E1

conference

Knowledge-Based Nonlinear to Linear Dataset Transformation for Chronic Illness Classification

M Jaworsky, X Tao, J Yong, L Pan, J Zhang, S Pokhrel

(2023), Vol. 14305, pp. 115-126, HIS 2023 : Proceedings of the 12th International Conference on Health Information Science, Melbourne, Vic., E1

conference

An Empirical Study of AI Model's Performance for Electricity Load Forecasting with Extreme Weather Conditions

Fusen Guo, Jianzhang Wu, Lei Pan

(2023), pp. 193-204, SciSec 2023 : proceedings of the 5th International Conference on Science of Cyber Security 2023, Melbourne, VIC., E1

conference
2022

A Multi‐Domain Perspective of Future Directions for VANETs for Emergency Message Dissemination

Ravneet Kaur, Ramkumar Ramachandran, Robin Doss, Lei Pan

(2022), pp. 199-218, IoT-Enabled Smart Healthcare Systems, Services and Applications, London, Eng., B1

book chapter

Obfuscation-Based Mechanisms in Location-Based Privacy Protection

Basia Wozny, L Pan, A Anwar

(2022), Vol. 1025, pp. 191-211, Explainable Artificial Intelligence for Cyber Security, Cham, Switzerland, B1

book chapter

JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers

G Xu, X Xie, S Huang, J Zhang, L Pan, W Lou, K Liang

(2022), Vol. 19, pp. 862-878, IEEE Transactions on Dependable and Secure Computing, C1

journal article

Machine Learning based Cyber Atacks Targeting on Controlled Information: A Survey

Y Miao, C Chen, L Pan, Q Han, J Zhang, Y Xiang

(2022), Vol. 54, ACM Computing Surveys, C1

journal article

Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey

J Zhang, L Pan, Q Han, C Chen, S Wen, Y Xiang

(2022), Vol. 9, pp. 377-391, IEEE/CAA Journal of Automatica Sinica, Piscataway, NJ, C1

journal article

Domain adaptation for Windows advanced persistent threat detection

R Coulter, J Zhang, L Pan, Y Xiang

(2022), Vol. 112, Computers and Security, C1

journal article

Learning multi-level and multi-scale deep representations for privacy image classification

Y Han, Y Huang, L Pan, Y Zheng

(2022), Vol. 81, pp. 2259-2274, Multimedia Tools and Applications, C1

journal article

Dynamic and compressed quantum many-body state secret sharing based on site-independent matrix product states

H Lai, J Pieprzyk, L Pan

(2022), Vol. 21, pp. 1-17, Quantum Information Processing, Berlin, Germany, C1

journal article

Blockchain-Based Audio Watermarking Technique for Multimedia Copyright Protection in Distribution Networks

I Natgunanathan, P Praitheeshan, L Gao, Y Xiang, L Pan

(2022), Vol. 18, ACM Transactions on Multimedia Computing, Communications and Applications, C1

journal article

Cyber Code Intelligence for Android Malware Detection

Junyang Qiu, Q Han, W Luo, L Pan, S Nepal, J Zhang, Y Xiang

(2022), pp. 1-11, IEEE Transactions on Cybernetics, Piscataway, N.J., C1

journal article

Towards enhanced PDF maldocs detection with feature engineering: design challenges

A Falah, S Pokhrel, L Pan, A de Souza-Daw

(2022), Vol. 81, pp. 41103-41130, Multimedia Tools and Applications, Berlin, Germany, C1

journal article

An improved quantum network communication model based on compressed tensor network states

Q Zhang, H Lai, J Pieprzyk, L Pan

(2022), Vol. 21, pp. 1-19, Quantum Information Processing, Berlin, Germany, C1

journal article

On the Design and Implementation of a Blockchain-Based Data Management System for ETO Manufacturing

Z Jing, N Hu, Y Song, B Song, C Gu, L Pan

(2022), Vol. 12, Applied Sciences (Switzerland), C1

journal article

Combining Innovative Technology and Context based Approaches in Teaching Software Engineering

S Huda, S Alyahya, L Pan, H Al-Dossari

(2022), Vol. 13, pp. 305-314, International Journal of Advanced Computer Science and Applications, C1

journal article

Dynamic hierarchical quantum secret sharing based on the multiscale entanglement renormalization ansatz

H Lai, J Pieprzyk, L Pan

(2022), Vol. 106, Physical Review A, C1

journal article

Digital Twin For Cybersecurity: Towards Enhancing Cyber Resilience

Rajiv Faleiro, Lei Pan, Shiva Pokhrel, Robin Ram Mohan Doss

(2022), Vol. 413, pp. 57-76, Broadnets 2021: Broadband, Communications, Networks, and Systems, Virtual Event, E1

conference

Containers' Privacy and Data Protection via Runtime Scanning Methods

Francisco Rojo, Lei Pan

(2022), Vol. 413, pp. 37-56, BROADNETS 2021 : Proceedings of the 12th EAI International Conference 2021, Virtual Event, E1

conference

DU-QS22: A Dataset for Analyzing QC-MDPC-Based Quantum-Safe Cryptosystems

M Nosouhi, S Shah, L Pan, R Doss

(2022), Vol. 448, pp. 3-10, AC3 2022 : Proceedings of the EAI International Conference on Applied Cryptography in Computer and Communications 2022, Virtual Event, E1

conference

No-Label User-Level Membership Inference for ASR Model Auditing

Y Miao, C Chen, L Pan, S Liu, S Camtepe, J Zhang, Y Xiang

(2022), Vol. 13555 LNCS, pp. 610-628, ESORICS 2022 : Computer Security : Proceedings of European Symposium on Research in Computer Security 2022 symposium, Copehagen, Denmark, E1

conference

Video is all you need: Attacking PPG-based Biometric Authentication

L Li, C Chen, L Pan, J Zhang, Y Xiang

(2022), pp. 57-66, AISec '22 : Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security 2022, Los Angeles, Calif., E1

conference

Towards Privacy-Preserving Neural Architecture Search

F Wang, L Zhang, L Pan, S Hu, R Doss

(2022), pp. 1-6, Proceedings - 2022 IEEE Symposium on Computers and Communications, Rhodes, Greece, E1

conference

EvAnGCN: Evolving Graph Deep Neural Network Based Anomaly Detection in Blockchain

V Patel, V Patel, S Rajasegarar, S Rajasegarar, L Pan, L Pan, J Liu, J Liu, L Zhu, L Zhu

(2022), Vol. 13725, pp. 444-456, ADMA 2022 : Proceedings of the 18th International Conference on Advanced Data Mining and Applications 2022, Brisbane, Qld., E1

conference

Forward Traceability for Product Authenticity Using Ethereum Smart Contracts

F Heikamp, L Pan, R Trujillo-Rasua, S Ruj, R Doss

(2022), Vol. 13787, pp. 514-523, NSS 2022 : Proceedings of the 16th International Conference on Network and System Security 2022, Denarau Island, Fiji, E1

conference

Automated Knowledge Graph Construction for Healthcare Domain

M Jaworsky, X Tao, J Yong, L Pan, J Zhang, S Pokhrel

(2022), Vol. 13705, pp. 258-265, HIS 2022 : Proceedings of the Health Information Science 11th International Conference 2022, Virtual Event, E1

conference

Cyber Attack Detection in IoT Networks with Small Samples: Implementation And Analysis

V Kanthuru, S Rajasegarar, P Rathore, R Doss, L Pan, B Ray, M Chowdhury, C Srimathi, M Durai

(2022), Vol. 13725, pp. 118-130, ADMA 2022 : Proceedings of the Advanced Data Mining and Applications International Conference 2022, Brisbane, Qld., E1

conference

InstaVarjoLive: An Edge-Assisted 360 Degree Video Live Streaming for Virtual Reality Testbed

P Li, F Chen, R Wang, T Hoang, L Pan

(2022), pp. 609-613, Proceedings - 2022 18th International Conference on Mobility, Sensing and Networking, MSN 2022, ELECTR NETWORK, E1

conference
2021

Machine Learning-Based Online Source Identification for Image Forensics

Yonggang Huang, Lei Pan, wei Luo, Yahui Han, Jun Zhang

(2021), pp. 27-56, Cyber Security Meets Machine Learning, Singapore, B1

book chapter

Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases

Guanjun Lin, Jun Zhang, Wei Luo, Lei Pan, Olivier De Vel, Paul Montague, Yang Xiang

(2021), Vol. 18, pp. 2469-2485, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, C1

journal article

Improving malicious PDF classifier with feature engineering: A data-driven approach

A Falah, L Pan, S Huda, S Pokhrel, A Anwar

(2021), Vol. 115, pp. 314-326, Future Generation Computer Systems, C1

journal article

Energy-aware decision-making for dynamic task migration in MEC-based unmanned aerial vehicle delivery system

R Li, X Li, J Xu, F Jiang, Z Jia, D Shao, L Pan, X Liu

(2021), Vol. 33, Concurrency and Computation: Practice and Experience, C1

journal article

A Survey of Android Malware Detection with Deep Neural Models

J Qiu, J Zhang, W Luo, L Pan, S Nepal, Y Xiang

(2021), Vol. 53, ACM Computing Surveys, C1

journal article

Data congestion in VANETs: research directions and new trends through a bibliometric analysis

T Bhatia, R Ramachandran, R Doss, L Pan

(2021), Vol. 77, pp. 6586-6628, Journal of Supercomputing, C1

journal article

The audio auditor: user-level membership inference in Internet of Things voice services

Yuantian Miao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Benjamin Zhao, Dali Kaafar, Yang Xiang

(2021), Vol. 2021, pp. 209-228, Proceedings on privacy enhancing technologies, Warsaw, Poland, C1

journal article

Multipath TCP Meets Transfer Learning: A Novel Edge-Based Learning for Industrial IoT

S Pokhrel, L Pan, N Kumar, R Doss, H Vu

(2021), Vol. 8, pp. 10299-10307, IEEE Internet of Things Journal, C1

journal article

Private and trustworthy distributed lending model using Hyperledger Besu

Purathani Praitheeshan, Lei Pan, Robin Ram Mohan Doss

(2021), Vol. 2, pp. 1-19, SN computer science, Cham, Switzerland, C1

journal article

The importance of selecting clustering parameters in VANETs: A survey

R Kaur, R Ramachandran, R Doss, L Pan

(2021), Vol. 40, Computer Science Review, C1

journal article

Generating Trips and Assigning Route to a SUMO Network Through the Origin-Destination Matrix: A Case Study of Mobility Routing Model for VANETs

T Bhatia, R Ramachandran, R Doss, L Pan

(2021), IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India), C1

journal article

Deep learning algorithms for cyber security applications: A survey

G Li, P Sharma, L Pan, S Rajasegarar, C Karmakar, N Patterson

(2021), Vol. 29, pp. 447-471, Journal of Computer Security, C1

journal article

Two types of dynamic quantum state secret sharing based on tensor networks states

H Lai, J Pieprzyk, L Pan, M Orgun

(2021), Vol. 582, Physica A: Statistical Mechanics and its Applications, C1

journal article

SolGuard: Preventing External Call Issues in Smart Contract-based Multi-Agent Robotic Systems

Purathani Praitheeshan, Lei Pan, Xi Zheng, Alireza Jolfaei, Robin Doss

(2021), Vol. 579, pp. 150-166, Information Sciences, Amsterdam, The Netherlands, C1

journal article

Generating the Appropriate Route for the Detection of Data Congestion in VANETs using a Clustering Approach

Tarandeep Bhatia, Ramkumar Ketti Ramachandran, Robin Doss, Lei Pan

(2021), pp. 636-642, Confluence 2021 : Proceedings of the 11th International Conference on Cloud Computing, Data Science & Engineering, Online, E1

conference

Detecting and controlling the occurrence of data congestion in a high-density VANETs Environment

Tarandeep Bhatia, Ramkumar Ramachandran, Robin Ram Mohan Doss, Lei Pan

(2021), pp. 42-48, Proceedings of the 2021 29th Conference of Open Innovations Association (FRUCT), Tampere, Finland, E1

conference

On robustness of neural semantic parsers

S Huang, Z Li, L Qu, L Pan

(2021), pp. 3333-3342, EACL 2021 : Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics, Online, E1

conference

Microwave Link Failures Prediction via LSTM-based Feature Fusion Network

Zichan Ruan, Shuiqiao Yang, Lei Pan, Xingjun Ma, Wei Luo, Marthie Grobler

(2021), pp. 1-8, IJCNN 2021 : Proceedings of the International Joint Conference on Neural Networks, Shenzhen, China, E1

conference

ECG-Adv-GAN: Detecting ECG Adversarial Examples with Conditional Generative Adversarial Networks

K Hossain, S Kamran, A Tavakoli, Lei Pan, Daniel Ma, S Rajasegarar, Chandan Karmakar

(2021), pp. 50-56, ICMLA 2021 : Proceedings of the 2021 20th IEEE International Conference on Machine Learning and Applications, Pasadena, Calif., E1

conference
2020

Security test MOODLE: a penetration testing case study

A Mudiyanselage, L Pan

(2020), Vol. 42, pp. 372-382, International journal of computers and applications, Abingdon, Eng., C1

journal article

Generating security questions for better protection of user privacy

A Anvari, L Pan, X Zheng

(2020), Vol. 42, pp. 329-350, International journal of computers and applications, Abingdon, Eng., C1

journal article

Privacy protection in interactive content based image retrieval

Y Huang, J Zhang, L Pan, Y Xiang

(2020), Vol. 17, pp. 595-607, IEEE transactions on dependable and secure computing, Piscataway, N.J., C1

journal article

Data-driven cyber security in perspective-intelligent traffic analysis

Rory Coulter, Qing-Long Han, Lei Pan, Jun Zhang, Yang Xiang

(2020), Vol. 50, pp. 3081-3093, IEEE Transactions on Cybernetics, Piscataway, N.J., C1

journal article

Code Analysis for Intelligent Cyber Systems: A Data-Driven Approach

Rory Coulter, Qing-Long Han, Lei Pan, Jun Zhang, Yang Xiang

(2020), Vol. 524, pp. 46-58, Information Sciences, Amsterdam, The Netherlands, C1

journal article

High-capacity (2,3) threshold quantum secret sharing based on asymmetric quantum lossy channels

H Lai, J Pieprzyk, M Luo, C Zhan, L Pan, M Orgun

(2020), Vol. 19, Quantum Information Processing, C1

journal article

VoterChoice: A ransomware detection honeypot with multiple voting framework

C Keong Ng, S Rajasegarar, L Pan, F Jiang, L Zhang

(2020), Vol. 32, Concurrency and Computation: Practice and Experience, C1

journal article

Measurement device independent quantum key distribution based on orbital angular momentum under parametric light source

M Wang, H Lai, L Pan

(2020), Vol. 63, pp. 369-387, Computers, Materials and Continua, C1

journal article

An efficient voting based decentralized revocation protocol for vehicular ad hoc networks

M Asghar, L Pan, R Doss

(2020), Vol. 6, pp. 422-432, Digital Communications and Networks, C1

journal article

Trustworthy blockchain-based medical Internet of thing for minimal invasive surgery training simulator

Y Tai, Y Wang, Z Wang, F Li, L Wei, L Pan, J Zhang, J Shi

(2020), Vol. 34, Concurrency Computation, C1

journal article

Gathering intelligence on student information behavior using data mining

L Pan, N Patterson, S McKenzie, S Rajasegarar, G Wood-Bradley, J Rough, W Luo, E Lanham, J Coldwell-Neilson

(2020), Vol. 68, pp. 636-658, Library Trends, C1

journal article

Software vulnerability analysis and discovery using deep learning techniques: A survey

P Zeng, G Lin, L Pan, Y Tai, J Zhang

(2020), Vol. 8, pp. 197158-197172, IEEE Access, C1

journal article

Analysis of weighted quantum secret sharing based on matrix product states

H Lai, J Pieprzyk, L Pan

(2020), Vol. 19, Quantum Information Processing, C1

journal article

A review of simulators used for VANETs: The case-study of vehicular mobility generators

T Bhatia, R Ketti Ramachandran, R Ram Mohan Doss, L Pan

(2020), SPIN 2020 Proceedings of the 7th International Conference on Signal Processing and Integrated Networks, Noida, India, E1

conference

A survey on controlling the congestion in vehicle-to-vehicle communication

Tarandeep Bhatia, Ramkumar Ramachandran, Robin Doss, Lei Pan

(2020), pp. 573-578, ICRITO 2020 : Trends and future directions : Proceedings of the IEEE 8th International Conference on Reliability, Infocom Technologies and Optimization, Noida, India, E1

conference

Detection and control of data congestion in vehicular broadcast networks

Tarandeep Bhatia, Ramkumar Ramachandran, Robin Doss, Lei Pan

(2020), pp. 1044-1049, ICRITO 2020 : Trends and future directions : Proceedings of the 2020 8th International Conference on Reliability, Infocom Technologies and Optimization, Noida, India, E1

conference

A comprehensive review on the vehicular ad-hoc networks

Tarandeep Bhatia, Ramkumar Ramachandran, Robin Doss, Lei Pan

(2020), pp. 515-520, ICRITO 2020 : Trends and future directions : Proceedings of the 2020 8th International Conference on Reliability, Infocom Technologies and Optimization, Noida, India, E1

conference

Security evaluation of smart contract-based on-chain Ethereum wallets

P Praitheeshan, L Pan, R Doss

(2020), Vol. 12570, pp. 22-41, NSS 2020 : Proceedings of the 14th International Conference on Network and System Security, Online from Melbourne, Vic., E1

conference

Graph deep learning based anomaly detection in Ethereum blockchain network

V Patel, L Pan, S Rajasegarar

(2020), Vol. 12570, pp. 132-148, NSS 2020 : Proceedings of the 14th International Conference on Network and System Security, Online from Melbourne, Vic., E1

conference

Unmasking windows advanced persistent threat execution

Rory Coulter, Jun Zhang, Lei Pan, Yang Xiang

(2020), pp. 268-276, TrustCom 2020 : Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, E1

conference

Opportunistic Tracking in Cyber-Physical Systems

Samaneh Rashidibajgan, Thomas Hupperich, Robin Ram Mohan Doss, Lei Pan

(2020), pp. 1672-1679, TrustCom 2020 : Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, E1

conference

Sentiment Analysis of News Reports in the Period of New Coronavirus

Guangjun Li, Lei Pan

(2020), pp. 1-6, CCNT 2020 : Proceedings of the 2nd International Conference on Computer, Communication and Network Technology, Chengdu, China, E1

conference
2019

Noise-Resistant Statistical Traffic Classification

B Wang, J Zhang, Z Zhang, L Pan, Y Xiang, D Xia

(2019), Vol. 5, pp. 454-466, IEEE Transactions on Big Data, C1

journal article

Efficient quantum private queries based on quantum key distribution with pulse-position modulation

H Lai, M Luo, Y Xu, J Pieprzyk, L Pan, J Zhang, M Orgun

(2019), Vol. 29, Laser Physics, C1

journal article

Predicting the Impact of Android Malicious Samples via Machine Learning

J Qiu, W Luo, L Pan, Y Tai, J Zhang, Y Xiang

(2019), Vol. 7, pp. 66304-66316, IEEE Access, C1

journal article

Protean Authentication Scheme-A Time-Bound Dynamic KeyGen Authentication Technique for IoT Edge Nodes in Outdoor Deployments

S Sathyadevan, K Achuthan, R Doss, L Pan

(2019), Vol. 7, pp. 92419-92435, IEEE Access, C1

journal article

Automatic extraction and integration of behavioural indicators of malware for protection of cyber-physical networks

S Huda, J Abawajy, B Al-Rubaie, L Pan, M Hassan

(2019), Vol. 101, pp. 1247-1258, Future Generation Computer Systems, C1

journal article

A3CM: automatic capability annotation for android malware

Junyang Qiu, Jun Zhang, Wei Luo, Lei Pan, Surya Nepal, Yu Wang, Yang Xiang

(2019), Vol. 7, pp. 147156-147168, IEEE Access, Piscataway, N.J., C1

journal article

Multiple energy harvesting devices enabled joint computation offloading and dynamic resource allocation for mobile-edge computing systems

Wei Du, Qiwang Lei, Qiang He, Wei Liu, Feifei Chen, Lei Pan, Tao Lei, Hailiang Zhao

(2019), pp. 154-158, ICWS 2019 : Proceedings of the IEEE International Conference on Web Services, Milan, Italy, E1

conference

Cyber security insights into self-proclaimed virtual world hackers

Nicholas Patterson, M Hobbs, F Jiang, L Pan

(2019), pp. 73-87, CSITEC 2019 : Proceedings of the 5th International Conference on Computer Science, Information Technology, Vienna, Austria, E1

conference

A visualization-based analysis on classifying android malware

Rory Coulter, Lei Pan, Jun Zhang, Yang Xiang

(2019), Vol. 11806, ML4CS 2019 : Proceedings of the Second International Conference on Machine Learning for Cyber Security, Xi'an, China, E1

conference

Data-Driven Android Malware Intelligence: A Survey

J Qiu, S Nepal, W Luo, L Pan, Y Tai, J Zhang, Y Xiang

(2019), Vol. 11806, pp. 183-202, Machine Learning for Cyber Security, Xi’an, China, E1

conference

Attainable hacks on keystore files in ethereum wallets--a systematic analysis

Purathani Praitheeshan, Y Xin, Lei Pan, Robin Ram Mohan Doss

(2019), FNSS 2019 : Future Network Systems and Security, Melbourne, Australia, E1

conference

Password strength estimators trained on the leaked password lists

C Schaffer, Lei Pan

(2019), Vol. 1116, pp. 219-231, ATIS 2019: Applications and Techniques in Information Security, Thanjavur, India, E1

conference

Cloud Forensics Investigations Relationship: A Model And Instrument

Younis Al Husaini, Matthew Warren, Lei Pan, Mansoor Al Gharibi

(2019), pp. 778-788, ACIS 2019 : Security and Privacy : Proceedings of the 30th Australasian Conference on Information Systems, Perth, Western Australia, E1

conference

Domain-adversarial graph neural networks for text classification

Man Wu, Shirui Pan, Xingquan Zhu, Chuan Zhou, Lei Pan

(2019), pp. 648-657, ICDM 2019 : Proceedings of the IEEE International Conference on Data Mining, Beijing, China, E1

conference
2018

Honeypot frameworks and their applications: a new framework

Chee Ng, Lei Pan, Y Xiang

(2018), Singapore, A1

book

Comprehensive analysis of network traffic data

Y Miao, Z Ruan, L Pan, J Zhang, Y Xiang

(2018), Vol. 30, Concurrency and Computation: Practice and Experience, FIJI, C1

journal article

Intelligent agents defending for an IoT world: a review

R Coulter, L Pan

(2018), Vol. 73, pp. 439-458, Computers and security, Amsterdam, The Netherlands, C1

journal article

Cross-project transfer representation learning for vulnerable function discovery

G Lin, J Zhang, W Luo, L Pan, Y Xiang, O De Vel, P Montague

(2018), Vol. 14, pp. 3289-3297, IEEE transactions on industrial informatics, Piscataway, N.J., C1

journal article

Big network traffic data visualization

Z Ruan, Y Miao, L Pan, Y Xiang, J Zhang

(2018), Vol. 77, pp. 11459-11487, Multimedia Tools and Applications, C1

journal article

High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space

H Lai, M Luo, J Pieprzyk, J Zhang, L Pan, M Orgun

(2018), Vol. 61, Science China Information Sciences, C1

journal article

Identifying items for moderation in a peer assessment framework

S James, E Lanham, V Mak-Hau, L Pan, T Wilkin, G Wood-Bradley

(2018), Vol. 162, pp. 211-219, Knowledge-Based Systems, C1

journal article

A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement

H Lai, M Luo, J Zhang, J Pieprzyk, L Pan, M Orgun

(2018), Vol. 17, Quantum Information Processing, C1

journal article

Exploring feature coupling and model coupling for image source identification

Y Huang, L Cao, J Zhang, L Pan, Y Liu

(2018), Vol. 13, pp. 3108-3121, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal article

Object localisation through clustering unreliable ultrasonic range sensors

L Pan, X Zheng, P Kolar, S Bangay

(2018), Vol. 27, pp. 268-280, International journal of sensor networks, Olney, Eng., C1

journal article

Round-robin-differential-phase-shift quantum key distribution based on wavelength division multiplexing

H Lai, M Luo, Y Xu, J Pieprzyk, J Zhang, L Pan, M Orgun

(2018), Vol. 15, Laser Physics Letters, C1

journal article

A quantum secret sharing scheme using orbital angular momentum onto multiple spin states based on Fibonacci compression encoding

H Lai, M Luo, Y Xu, J Pieprzyk, J Zhang, L Pan, M Orgun

(2018), Vol. 70, pp. 384-390, Communications in theoretical physics, Bristol, Eng., C1

journal article

Practical overview of security issues in wireless sensor network applications

H Radhappa, L Pan, J Xi Zheng, S Wen

(2018), Vol. 40, pp. 202-213, International journal of computers and applications, Abingdon, Eng., C1

journal article

Distributed detection of zero-day network traffic flows

Y Miao, L Pan, S Rajasegarar, J Zhang, C Leckie, Y Xiang

(2018), Vol. 845, pp. 173-191, AusDM 2017 : Proceedings of the 15th Australasian Data Mining Conference 2017, Melbourne, Vic., E1

conference

Identifying drawbacks in malicious PDF detectors

A Falah, L Pan, M Abdelrazek, R Doss

(2018), Vol. 878, pp. 128-139, FNSS 2018 : Proceedings of the Future Network Systems and Security Conference 2018, Paris, France, E1

conference

Keep calm and know where to focus: measuring and predicting the impact of Android Malware

J Qiu, W Luo, S Nepal, J Zhang, Y Xiang, L Pan

(2018), Vol. 11323, pp. 238-254, ADMA 2018: Proceedings of the 14th International Conference on Advanced Data Mining and Applications, Nanjing, China, E1

conference

A quantitative approach to design special purpose systems to measure hacking skills

Ahmed Falah, Lei Pan, F Chen

(2018), pp. 54-61, TALE 2018 : Engineering next-generation learning : Proceedings of the 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering, Wollongong, N.S.W., E1

conference

A scalable and efficient PKI based authentication protocol for VANETs

M Asghar, R Doss, L Pan

(2018), pp. 1-3, ITNAC 2018 : Proceedings of the 2018 28th International Telecommunication Networks and Applications Conference, Sydney, N.S.W., E1

conference

A literature review of inter-enterprise SOA in small and medium business communities

A Andriyanto, R Doss, L Pan, P Yustianto

(2018), pp. 547-554, ICITSI 2018 : Proceedings of the 5th International Conference on Information Technology Systems and Innovation, Bandung and Padang, Indonesia, E1

conference

Cloud forensics relationship between the law enforcement and cloud service providers

Younis Al Husaini, Matthew Warren, Lei Pan

(2018), pp. 79-88, CWAR 2018 : Proceedings of the 17th Australian Cyber Warfare Conference, Melbourne, Victoria, E1

conference
2017

Fast and simple high-capacity quantum cryptography with error detection

H Lai, M Luo, J Pieprzyk, J Zhang, L Pan, S Li, M Orgun

(2017), Vol. 7, Scientific Reports, England, C1

journal article

Visualization of big data security: a case study on the KDD99 cup data set

Z Ruan, Y Miao, L Pan, N Patterson, J Zhang

(2017), Vol. 3, pp. 250-259, Digital Communications and Networks, C1

journal article

Cyber security attacks to modern vehicular systems

L Pan, X Zheng, H Chen, T Luan, H Bootwala, L Batten

(2017), Vol. 36, pp. 90-100, Journal of Information Security and Applications, C1

journal article

Visual representation of penetration testing actions and skills in a technical tree model

A Falah, L Pan, M Abdelrazek

(2017), pp. 1-10, ACSW 2017 : Proceedings of the Australasian Computer Science Week Multiconference, Geelong, Vic., E1

conference

Security analysis of modern mission critical android mobile applications

X zheng, L Pan, E Yilmaz

(2017), pp. 1-9, ACSW 2017 : Proceedings of the Australasian Computer Science Week Multiconference, Geelong, Victoria, E1

conference

Portguard - An authentication tool for securing ports in an IoT gateway

S Sathyadevan, V Vejesh, R Doss, L Pan

(2017), pp. 624-629, PerCom 2017 : IEEE International Conference on Pervasive Computing and Communications Workshops, Kona, Hawaii, E1

conference

Online peer marking with aggregation functions

S James, L Pan, T Wilkin, L Yin

(2017), pp. 1-6, FUZZ-IEEE 2017 : IEEE International Conference on Fuzzy Systems, Naples, Italy, E1

conference

A testbed for security analysis of modern vehicle systems

X Zheng, L Pan, H Chen, R Di Pietro, L Batten

(2017), pp. 1090-1095, trustcom/BigDataSE/ICESS 2017 : Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Sydney, N.S.W., E1

conference
2016

Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding

H Lai, J Zhang, M Luo, L Pan, J Pieprzyk, F Xiao, M Orgun

(2016), Vol. 6, Scientific Reports, England, C1

journal article

Investigating security vulnerabilities in modern vehicle systems

X Zheng, L Pan, H Chen, P Wang

(2016), Vol. 651, pp. 29-40, ATIS 2016 : Proceedings of the International Conference on Applications and Techniques in Information Security, Cairns, Queensland, E1

conference

Robustness and embedding capacity enhancement in time-spread echo-based audio watermarking

I Natgunanathan, Y Xiang, L Pan, P Chen, D Peng

(2016), pp. 1536-1541, ICIEA 2016: Proceedings of the IEEE 11th Conference on Industrial Electronics and Applications, Hefei, China, E1

conference
2015

The usefulness metrics of the most popular eReader used by higher education students

D Sari, E Lanham, L Pan

(2015), Vol. 12, pp. 203-212, Issues in informing science and information technology, Santa Rosa, Cailf., C1

journal article

Segregation-of-duties conflicts in the insider threat landscape: an overview and case study

S Ballesteros, L Pan, L Batten, G Li

(2015), pp. 367-370, ERMM 2015: Proceedings of the 2015 International Conference on Education Reform and Modern Management, Hong Kong, E1

conference

Enhanced Twitter sentiment analysis by using feature selection and combination

A Yang, J Zhang, L Pan, Y Xiang

(2015), pp. 52-57, SOCIALSEC 2015: Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, Hangzhou, China, E1

conference
2014

A novel method for detecting double compressed Facebook JPEG images

C Ng, L Pan, Y Xiang

(2014), Vol. 490, pp. 191-198, Communications in Computer and Information Science, Dordrecht , Germany, B1

book chapter

Privacy preserving in location data release: A differential privacy approach

P Xiong, T Zhu, L Pan, W Niu, G Li

(2014), Vol. 8862, pp. 183-195, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Berlin, Germany, B1

book chapter

Forensic identification of students outsourcing assignment projects from freelancer.com

M Monnik, L Pan

(2014), Vol. 490, pp. 183-190, Communications in Computer and Information Science, Berlin, Germany, B1

book chapter

A Novel Method for Detecting Double Compressed Facebook JPEG Images

Allan NG, Lei Pan, Yang Xiang

(2014), pp. 191-198, Applications and Techniques in Information Security, B1-1

book chapter

Privacy Preserving in Location Data Release: A Differential Privacy Approach

Ping Xiong, Tianqing Zhu, Lei Pan, Wenjia Niu, Gang Li

(2014), pp. 183-195, Lecture Notes in Computer Science, B1-1

book chapter

Forensic Identification of Students Outsourcing Assignment Projects from Freelancer.com

Michael Monnik, Lei Pan

(2014), pp. 183-190, Applications and Techniques in Information Security, B1-1

book chapter

Investigating Facebook groups through a random graph model

D Pallegedara, L Pan

(2014), Vol. 9, pp. 25-34, Journal of multimedia, Finland, C1

journal article

Privacy preserving collaborative filtering for KNN attack resisting

T Zhu, G Li, L Pan, Y Ren, W Zhou

(2014), Vol. 4, pp. 1-14, Social network analysis and mining, Berlin, Germany, C1-1

journal article

Generating repudiable, memorizable and privacy preserving security questions using the Propp Theory of Narrative

L Pan, S Bangay

(2014), pp. 66-72, CyberC 2014 : The 6th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Shanghai, China, E1

conference
2013

Developing a cloud computing based approach for forensic analysis using OCR

M Trojahn, L Pan, F Schmidt

(2013), pp. 59-68, IMF 2013 : Proceedings of the Seventh International Conference on IT Security Incident Management and IT Forensics, Nuremberg, Germany, E1

conference

Developing an empirical algorithm for protecting text-based CAPTCHAs against segmentation attacks

L Pan, Y Zhou

(2013), pp. 1-8, TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Vic., E1

conference
2012

Hypothesis generation and testing in event profiling for digital forensic investigations

L Batten, L Pan, N Khan

(2012), Vol. 4, pp. 1-14, International journal of digital crime and forensics, Hershey, Pa., C1

journal article

A Grobner-Shirshov Algorithm for Applications in Internet Security

A Kelarev, J Yearwood, P Watters, X Wu, L Ma, J Abawajy, L Pan

(2012), Vol. 36, pp. 87-100, SOUTHEAST ASIAN BULLETIN OF MATHEMATICS, C1-1

journal article

Using hypothesis generation in event profiling for digital forensic investigations

L Pan, N Khan, L Batten

(2012), pp. 76-86, WDFIA 2012 : Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis:, Crete, Greece, E1

conference

Detecting SMS-based control commands in a Botnet from infected android devices

A Nguyen, L Pan

(2012), pp. 23-27, ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop, Melbourne, Vic., E1

conference

Towards a sustainable assessment strategy for digital forensic education and training

L Pan, D Hutchinson, N Khan

(2012), TALE 2012 : Proceedings of the IEEE International Conference on Teaching, Assessment and Learning for Engineering, Hong Kong, E1

conference
2011

A Grobner-Shirshov algorithm for applications in internet security

A Kelarev, J Yearwood, P Watters, X Wu, L Ma, J Abawajy, L Pan

(2011), Vol. 35, pp. 807-820, Southeast Asian bulletin of mathematics, Hong Kong, C1

journal article

Image source detection : a case study on Facebook images taken by iPhones

L Pan, N Trepanic

(2011), pp. 39-46, ATIS 2011 : Workshop proceedingof ATIS 2011. Melbourne, November 9th, 2011. Second Applications and Techniques in Information Security Workshop, Melbourne, Vic., E1

conference
2010

Testing Digital Forensic Software Tools Used in Expert Testimony

Lynn Batten, Lei Pan

(2010), pp. 257-278, Handbook of Research on Computational Forensics, Digital Crime, and Investigation, B1-1

book chapter

Internet security applications of the Munn rings

A Kelarev, J Yearwood, P Watters, X Wu, J Abawajy, L Pan

(2010), Vol. 81, pp. 162-171, Semigroup forum, New York N.Y., C1

journal article

Dynamic addressing in wireless sensor networks without location awareness

R Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2010), Vol. 26, pp. 443-460, Journal of information science and engineering, Taipei, Taiwan, C1

journal article

Using relationship-building in event profiling for digital forensic investigations

L Batten, L Pan

(2010), e-Forensics 2010 : Proceedings of the 3rd International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, Shangai, China, E1

conference
2009

Robust performance testing for digital forensic tools

L Pan, L Batten

(2009), Vol. 6, pp. 71-81, Digital investigation, Kidlington, England, C1

journal article

Robust correctness testing for digital forensic tools

L Pan, L Batten

(2009), pp. 54-64, Forensics in telecommunications, information and multimedia : second international conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009 : revised selected papers, Berlin, Germany, E1

conference
2008

Teaching digital forensics to undergraduate students

L Batten, L Pan

(2008), Vol. 6, pp. 54-56, IEEE security & privacy, New York, N.Y., C1

journal article

Measure of integrity leakage in live forensic context

L Pan, A Savoldi, P Gubian, L Batten

(2008), pp. 534-537, IIH-MSP 2008 : Proceedings of the Intelligent Information Hiding and Multimedia Signal Processing 2008 international conference, Harbin, China, E1-1

conference
2007

A lower bound on effective performance testing for digital forensic tools

L Pan, L Batten

(2007), pp. 117-130, SADFE 2007 : Second International Workshop on Systematic Approaches to Digital Forensic Engineering : proceedings : 10-12 April 2007, Seattle, Washington, USA, Seattle, Washington, E1

conference

An effective and efficient testing methodology for correctness testing for file recovery tools

L Pan, L Batten

(2007), pp. 103-107, IIHMSP 2007 : Third International conference on Intelligent Information Hiding and Multimedia Signal Processing : proceedings : 26-28 November, 2007, Kaohsiung, Taiwan, Kaohsiung, Taiwan, E1

conference
2006

Lease based addressing for event-driven wireless sensor networks

R Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2006), pp. 251-256, ISCC 2006 proceedings : 11th IEEE Symposium on Computers and Communications : 26-29 June 2006, Cagliari, Sardinia, Italy, Cagliari, Sardinia, Italy, E1

conference

Address reuse in wireless sensor networks

R Chellappa Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2006), pp. 329-333, ATNAC, Australian Telecommuncation Networks and Applications Conference, 2006., Melbourne, Australia, E1

conference

A case for cross layer design: the impact of physical layer properties on routing protocol performance in MANETs

R Doss, L Pan

(2006), pp. 409-413, ATNAC, Australian Telecommuncation Networks and Applications Conference, 2006., Melbourne, Australia, E1

conference
2005

Reproducibility of digital evidence in forensic investigations

L Pan, L Batten

(2005), pp. 1-8, DFRWS 2005 : Proceedings of the 5th Annual Digital Forensic Research Workshop, New Orleans, La., E1

conference

Funded Projects at Deakin

Other Public Sector Funding

Cyber-Safe Connected Vehicles: Ensuring Secure, Trusted, and Robust Cooperative Automotive systems.

Prof Robin Ram Mohan Doss, Prof Seng Loke, A/Prof Lei Pan, Dr Rolando Trujillo Rasua, Dr Frank Jiang, Dr Leo Zhang

Department of Industry, Innovation and Science

  • 2022: $74,235
  • 2021: $123,725
  • 2019: $296,940

Graph-learning for group activity classification.

A/Prof Sutharshan Rajasegarar, A/Prof Lei Pan

CSIRO Scholarship - Commonwealth Scientific and Industrial Research Organisation

  • 2021: $10,000

Industry and Other Funding

Implementation of transaction privacy protocols on Distributed Ledger systems.

A/Prof Lei Pan, Ms Purathani Praitheeshan

Integrated Capital Pty Ltd

  • 2019: $14,500

Exploration of Algorand blockchain technologies in FinTech.

Dr Rui Wang, A/Prof Lei Pan

Chaining Pty Ltd

  • 2022: $10,000

Other Funding Sources

Traceability and Path Authentication in Dynamic Supply Chains.

Prof Robin Ram Mohan Doss, Dr Rolando Trujillo Rasua, A/Prof Lei Pan

Cyber Security Research Centre Limited

  • 2024: $15,000
  • 2023: $60,000
  • 2022: $61,921

Lightweight Continuous Authentication for Cloud Edge Integrated Platforms

Dr Zubair Baig, A/Prof Lei Pan, Prof Robin Ram Mohan Doss

CYBER SECURITY RESEARCH CENTRE

  • 2024: $15,000
  • 2023: $60,000
  • 2022: $49,536
  • 2021: $15,000

Secure and Authenticated Access to Remote Assets Within Critical Infrastructure.

Dr Zubair Baig, A/Prof Lei Pan, Dr Keshav Sood, Prof Robin Ram Mohan Doss

Cyber Security Research Centre Limited

  • 2024: $30,000
  • 2023: $165,000
  • 2022: $111,458

Next Generation Authentication Technologies.

Prof Robin Ram Mohan Doss, A/Prof Lei Pan, Dr Zubair Baig

Cyber Security Research Centre Limited

  • 2024: $175,000
  • 2023: $306,250
  • 2022: $216,724

Socrates: Software Security with a focus on critical technologies.

A/Prof Lei Pan, Dr Syed Wajid Ali Shah, Prof Robin Ram Mohan Doss, Dr Zubair Baig, Prof Jemal Abawajy, Prof Shiri Krebs, Dr Jayson Lamchek, Dr Shamsul Huda, Dr Muna Al-Hawawreh, Dr Naeem Syed, Dr Jack Li, Dr Ye Zhu, Dr Frank Jiang, A/Prof William Yeoh, Prof Chang-Tsun Li, A/Prof Lennon Chang, Prof Patrick Emerton, Dr Hourieh Khalajzadeh, Dr Van-Hau Trieu, Dr Yanjun Zhang, Dr Leo Zhang

Cyber Security Research Centre Limited

  • 2024: $30,244
  • 2023: $120,976

Supervisions

Principal Supervisor
2022

Zichan Ann Ruan

Thesis entitled: A Comprehensive Study on Microwave Links: through Microwave Link Security Needs to Modeling and Evaluation

Doctor of Philosophy (Information Technology), School of Information Technology

2021

Purathani Praitheeshan

Thesis entitled: Empirical Studies of Security and Privacy on Real World Ethereum Smart Contracts

Doctor of Philosophy (Information Technology), School of Information Technology

2020

Ahmed Falah

Thesis entitled: Improving PDF Maldoc Detection via Data-Driven Feature Engineering

Doctor of Philosophy (Information Technology), School of Information Technology

2019

Chee Keong (Allan) Ng

Thesis entitled: VoterChoice: A Ransomware Detection Honeypot with Multiple Voting Concept

Doctor of Philosophy (Information Technology), School of Information Technology

Associate Supervisor
2022

Ravneet Kaur

Thesis entitled: Emergency Message Dissemination in Vehicular Adhoc Networks

Doctor of Philosophy (Information Technology), School of Information Technology

2021

Tarandeep Bhatia

Thesis entitled: Data Congestion in Vehicular Ad-hoc Networks

Doctor of Philosophy (Information Technology), School of Information Technology

Miraj Asghar

Thesis entitled: Security and Privacy for Vehicular Adhoc Networks

Doctor of Philosophy (Information Technology), School of Information Technology

2020

Shiju Sathyadevan

Thesis entitled: Design of a Secure Architecture for the Internet of Things.

Doctor of Philosophy (Information Technology), School of Information Technology

Agustinus Andriyanto

Thesis entitled: Service-based Reference Architecture in the Context of Inter-Enterprise Architecture

Doctor of Philosophy (Information Technology), School of Information Technology

2019

Russul Dh. Abdul Jabar Al-Anni

Thesis entitled: Cancer Prognosis Based on Knowledge Discovery from Clinic and Biological Data Sets

Doctor of Philosophy (Information Technology), School of Information Technology

2018

Purnomo Yustianto

Thesis entitled: General Framework for Service Engineering Analysis and Design

Doctor of Philosophy (Information Technology), School of Information Technology

Ahmed Abdulateef Mohammed

Thesis entitled: Robust Approaches for Face Recognition

Doctor of Philosophy (Information Technology), School of Information Technology

2014

Moutaz Alazab

Thesis entitled: Analysis on Smartphone Devices for Detection and Prevention of Malware

Doctor of Philosophy (Information Technology), School of Information Technology