Dr Frank Jiang

STAFF PROFILE

Position

Senior Lecturer in Cyber Security

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Contact

frank.jiang@deakin.edu.au
+61 3 924 46677

Publications

Filter by

2020

A new Markov decision process based behavioral prediction system for airborne crews

Yaozhong Zhang, Kangjia Yao, Jiandong Zhang, Frank Jiang, Matthew Warren

(2020), Vol. 8, pp. 28021-28032, IEEE Access, Piscataway, N.J., C1

journal article

A Scheme of Intelligent Traffic Light System Based on Distributed Security Architecture of Blockchain Technology

Pengjie Zeng, Xiaoliang Wang, Hao Li, Frank Jiang, Robin Doss

(2020), Vol. 8, pp. 33644-33657, IEEE Access, Piscataway, N.J., C1

journal article

VoterChoice: A ransomware detection honeypot with multiple voting framework

Chee Ng, Sutharshan Rajasegarar, Lei Pan, Frank Jiang, Yu Zhang

(2020), pp. 1-29, Concurrency and Computation: Practice and Experience, Hoboken, N.J., C1

journal article

UAV swarm mission planning in dynamic environment using consensus-based bundle algorithm

Y Zhang, W Feng, G Shi, F Jiang, M Chowdhury, S Ling

(2020), Vol. 20, pp. 1-21, Sensors, Basel, Switzerland, C1

journal article

Responsible use of technology to combat cyberbullying among young people

C Kaluarachchi, M Warren, F Jiang

(2020), Vol. 24, pp. 1-17, Australasian journal of information systems, Bruce, A.C.T., C1

journal article

Image Super-Resolution Based on Generative Adversarial Networks: A Brief Review

Kui Fu, Jiansheng Peng, Hanxiao Zhang, Xiaoliang Wang, Frank Jiang

(2020), Vol. 64, pp. 1977-1997, Computers, Materials & Continua, Henderson, Nev., C1

journal article

BlockMeds: a Blockchain-based online prescription system with privacy protection

M He, X Han, F Jiang, R Zhang, X Liu, X Liu

(2020), Vol. 12019, pp. 299-303, ICSOC 2019 : Proceedings of the 17th International Conference on Service-Oriented Computing 2019, Toulouse, France, E1

conference

Malware classifications based on static-dynamic features and factorization machines

H Long, Z Li, F Jiang

(2020), Vol. 1254, pp. 246-257, ICAIS 2020 : Proceedings of the 6th International Conference on Artificial Intelligence and Security, Hohhot, China, E1

conference
2019

An improved authentication scheme for Internet of Vehicles based on blockchain technology

Xiaoliang Wang, Pengjie Zeng, Nick Patterson, Frank Jiang, Robin Doss

(2019), Vol. 7, pp. 45061-45072, IEEE access, Piscataway, N.J., C1

journal article

An early warning system for curved road based on OV7670 image acquisition and STM32

Xiaoliang Wang, Wenhua Song, Bowei Zhang, Brandon Mausler, Frank Jiang

(2019), Vol. 59, pp. 135-147, Computers, materials and continua, Duluth, Ga., C1

journal article

Static malware clustering using enhanced deep embedding method

Chee Ng, Frank Jiang, Leo Zhang, Wanlei Zhou

(2019), Vol. 31, pp. 1-16, Concurrency and computation: practice & experience, Chichester, Eng., C1

journal article

A dual privacy-preservation scheme for cloud-based eHealth systems

X Wang, L Bai, Q Yang, L Wang, F Jiang

(2019), Vol. 47, pp. 132-138, Journal of information security and applications, Amsterdam, The Netherlands, C1-1

journal article

Applications of distributed ledger technologies to the internet of things: a survey

Q Zhu, S Loke, R Trujillo Rasua, F Jiang, Y Xiang

(2019), Vol. 52, pp. 1-34, ACM computing surveys, New York, N.Y., C1

journal article

Effective quarantine and recovery scheme against advanced persistent threat

L Yang, P Li, X Yang, Y Xiang, F Jiang, W Zhou

(2019), pp. 1-15, IEEE transactions on systems, man, and cybernetics: systems, Piscataway, N.J., C1

journal article

Cyber security insights into self-proclaimed virtual world hackers

Nicholas Patterson, M Hobbs, F Jiang, L Pan

(2019), pp. 73-87, CSITEC 2019 : Proceedings of the 5th International Conference on Computer Science, Information Technology, Vienna, Austria, E1

conference

An efficient dynamic group-based batch verification scheme for vehicular sensor networks

L Jiang, Y Wang, J Tian, F Jiang, Nicholas Patterson, R Ram Mohan Doss

(2019), pp. 52-64, FNSS 2019 : Proceedings of the 5th International Conference of Future Network Systems and Security, Melbourne, Victoria, E1

conference

Quorum chain-based malware detection in android smart devices

F Gao, F Jiang, Y Zhang, R Doss

(2019), Vol. 1113, pp. 212-224, FNSS 2019 : Future Network Systems and Security : 5th International Conference, FNSS 2019 Melbourne, VIC, Australia, November 27?29, 2019 Proceedings, Melbourne, Vic., E1

conference

Responsible use of technology to protect young people who are experiencing cyberbullying in Australia

Chintha Kaluarachchi, Matthew Warren, Frank Jiang

(2019), pp. 1-6, AiCE 2019 : Proceedings of 8th Australian Institute of Computer Ethics Conference, Melbourne, Victoria, E1

conference
2018

Mapping functions driven robust retinal vessel segmentation via training patches

H Xia, F Jiang, S Deng, J Xin, R Doss

(2018), Vol. 6, pp. 61973-61982, IEEE access, Piscataway, N.J., C1

journal article

A double-image encryption scheme based on amplitude-phase encoding and discrete complex random transformation

Y Luo, S Tang, X Qin, L Cao, F Jiang, J Liu

(2018), Vol. 6, pp. 77740-77753, IEEE access, Piscataway, N.J., C1

journal article

Single image rain removal via a simplified residual dense network

H Xia, R Zhuge, H Li, S Song, F Jiang, M Xu

(2018), Vol. 8, pp. 66522-66535, IEEE Access, Piscataway, N.J., C1-1

journal article

Classification of cardiovascular disease via a new softMax model

L Hao, S Ling, F Jiang

(2018), pp. 486-489, EMBC 2018 : Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Honolulu, Hi., E1-1

conference
2017

A new binary hybrid particle swarm optimization with wavelet mutation

F Jiang, H Xia, Q Anh Tran, Q Minh Ha, N Quang Tran, J Hu

(2017), Vol. 130, pp. 90-101, Knowledge-Based Systems, Amsterdam, The Netherlands, C1-1

journal article

Constrained NMF-based semi-supervised learning for social media spammer detection

D Yu, N Chen, F Jiang, B Fu, A Qin

(2017), Vol. 125, pp. 64-73, Knowledge-Based Systems, Amsterdam, The Netherlands, C1-1

journal article

Dynamic power allocation for a multiuser transmitter with hybrid energy sources

D Liu, J Lin, J Wang, F Jiang

(2017), Vol. 2017, pp. 1-12, EURASIP Journal on Wireless Communications and Networking, Berlin, Germany, C1-1

journal article

Road vehicle alert system using IOT

Z Chaczko, F Jiang, B Ahmed

(2017), pp. 488-493, ICSEng 2017 : Proceedings of the 25th International Conference on Systems Engineering, Las Vegas, Nev., E1-1

conference

Deformable template matching using proposal-based best-buddies similarity

H Xia, W Zhao, Z Zhou, F Jiang, H Li, X He

(2017), pp. 517-521, Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017, Sydney, N.S.W., E1-1

conference
2016

Quality and robustness improvement for real world industrial systems using a fuzzy particle swarm optimization

S Ling, K Chan, F Leung, F Jiang, H Nguyen

(2016), Vol. 47, pp. 68-80, Engineering Applications of Artificial Intelligence, Amsterdam, The Netherlands, C1-1

journal article

Classifying sybil in MSNs using C4.5

A Chinchore, G Xu, F Jiang

(2016), pp. 1-6, BESC 2016 - Proceedings of the 2016 International Conference on Behavioral, Economic, Socio - Cultural Computing, Durham, N.C., E1-1

conference

Coupled behavioral analysis for user preference-based email spamming

F Jiang, J Gan, Y Xu, G Xu

(2016), pp. 1-5, BESC 2016 - Proceedings of IEEE 2016 International Conference on Behavioral, Economic, Socio - Cultural Computing, Durham, N.C., E1-1

conference

Robust retinal vessel segmentation via clustering-based patch mapping functions

H Xia, S Deng, M Li, F Jiang

(2016), pp. 520-523, BIBM 2016 : Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, Shenzhen, China, E1-1

conference

A novel method of cervical cell image segmentation via region merging and SLIC

H Xia, K Jin, F Jiang, Q Tran

(2016), pp. 153-158, SoICT '16 : Proceedings of the Seventh Symposium on Information and Communication Technology, Ho Chi Minh City, Vietnam, E1-1

conference

User preference-based spamming detection with coupled behavioral analysis

F Jiang, M Tang, Q Tran

(2016), Vol. 10066, pp. 466-477, SpaCCS 2016 : Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage 9th International Conference, Zhangjiajie, China, E1-1

conference
2015

A gradient learning optimization for dynamic power management

Y Li, F Jiang

(2015), pp. 2061-2066, SMC 2015 : Proceedings of the 2015 IEEE International Conference on Systems, Man, and Cybernetics, Hong Kong, E1-1

conference

Effectively predicting whether and when a topic will become prevalent in a social network

W Liu, Z Deng, X Gong, F Jiang, I Tsang

(2015), Vol. 1, pp. 210-216, AAAI 2015 : Proceedings of the 29th AAAI Conference on Artificial Intelligence, Austin, Texax, E1-1

conference

Binary hybrid particle swarm optimization withwavelet mutation

Q Tran, Q Dinh, F Jiang

(2015), Vol. 326, pp. 261-272, KSE 2014 : Knowledge and Systems Engineering : Proceedings of the Sixth International Conference, Hanoi, Vietnam, E1-1

conference

Intelligent Sybil attack detection on abnormal connectivity behavior in mobile social networks

A Chinchore, F Jiang, G Xu

(2015), Vol. 224, pp. 602-617, KMO 2015 : Knowledge management in organizations : 10th International Conference, KMO 2015, Maribor, Slovenia, August 24-28, 2015, Proceedings, Maribor, Slovenia, E1-1

conference
2014

Multi-qudit information splitting with multiple controllers

S Li, M Jiang, F Jiang, X Chen

(2014), Vol. 13, pp. 1057-1066, Quantum Information Processing, Berlin, Germany, C1-1

journal article

Automated generation of ham rules for Vietnamese spam filtering

Q Dang Dinh, Q Tran, F Jiang

(2014), pp. 1-5, CISDA 2014 : Proceedings of the Seventh IEEE Symposium on Computational Intelligence for Security and Defense Applications, Hanoi, Vietnam, E1-1

conference

Application on self-provisioning of communication network service using fuzzy particle swarm optimization

S Ling, F Jiang

(2014), pp. 1245-1250, ICARCV 2014 : Proceedings of the 13th International Conference on Control Automation Robotics & Vision, Singapore, E1-1

conference

A new coupled metric learning for real-time anomalies detection with high-frequency field programmable gate arrays

F Jiang, D Luo

(2014), pp. 1254-1261, ICDMW 2014 : Proceedings of the IEEE International Conference on Data Mining Workshop, Shenzhen, China, E1-1

conference

Quantum information splitting with many-party controllers

M Jiang, F Jiang

(2014), pp. 1247-1251, WCICA 2014 : Proceeding of the 11th World Congress on Intelligent Control and Automation, Shenyang, China, E1-1

conference
2013

Agent-based self-adaptable context-aware network vulnerability assessment

F Jiang, D Dong, L Cao, M Frater

(2013), Vol. 10, pp. 255-270, IEEE transactions on network and service management, Piscataway, N.J., C1-1

journal article

Deterministic joint remote preparation of arbitrary multi-qudit states

M Jiang, F Jiang

(2013), Vol. 377, pp. 2524-2530, Physics Letters A, Amsterdam, The Netherlands, C1-1

journal article

LOARP: A low overhead routing protocol for underwater acoustic sensor networks

R Rahman, C Benson, F Jiang, M Frater

(2013), Vol. 8, pp. 317-330, Journal of networks, Oulu, Finland, C1-1

journal article

Towards a reliable aquatic-based cyber physical system: A new context-situation aware low overhead routing scheme

F Jiang, M Frater

(2013), pp. 30-35, IEEE-CYBER 2013 : 2013 IEEE International Conference on Cyber Technology in Automation, Control and Intelligent System : May 26-29, 2013, Nanjing, China, Nanjing, China, E1-1

conference

Cooperative multi-target tracking in passive sensor-based networks

F Jiang, J Hu

(2013), pp. 4340-4345, WCNC 2013 : Proceedings of the IEEE Wireless Communications and Networking Conference, Shanghai, China, E1-1

conference
2012

A comparison of two IPv4/IPv6 transition mechanisms - OpenVPN and IVI

C Vu, Q Tran, F Jiang

(2012), Vol. 1479, pp. 1532-1538, AIP Conference Proceedings, E1-1

conference

Threshold-based image segmentation through an improved particle swarm optimisation

F Jiang, M Frater, M Pickering

(2012), 2012 International Conference on Digital Image Computing Techniques and Applications, DICTA 2012, E1-1

conference

Hybrid control of uncertain quantum systems via fuzzy estimation and quantum reinforcement learning

C Chen, F Jiang, D Dong

(2012), pp. 7177-7182, Chinese Control Conference, CCC, E1-1

conference

Email user ranking based on email networks

Q Tran, M Vu, M Frater, F Jiang

(2012), Vol. 1479, pp. 1512-1517, AIP Conference Proceedings, E1-1

conference

Comparative study of key exchange and authentication methods in application, transport and network level security mechanisms

I Fathirad, J Devlin, F Jiang

(2012), Vol. 1479, pp. 1524-1531, AIP Conference Proceedings, E1-1

conference

The application of extreme learning machines to the network intrusion detection problem

G Creech, F Jiang

(2012), Vol. 1479, pp. 1506-1511, AIP Conference Proceedings, E1-1

conference

Semantics based multi-layered networks for spam email detection

G Creech, F Jiang

(2012), Vol. 1479, pp. 1518-1523, AIP Conference Proceedings, E1-1

conference

Self-provisioning of network services with quantum-inspired reinforcement learning and adaptation

F Jiang, D Dong, M Frater

(2012), pp. 169-174, Proceedings of 2012 9th IEEE International Conference on Networking, Sensing and Control, ICNSC 2012, E1-1

conference

Evolving block-based neural network and field programmable gate arrays for host-based intrusion detection system

Q Tran, F Jiang, Q Ha

(2012), pp. 86-92, Proceedings - 4th International Conference on Knowledge and Systems Engineering, KSE 2012, E1-1

conference

A real-time NetFlow-based intrusion detection system with improved BBNN and high-frequency field programmable gate arrays

Q Tran, F Jiang, J Hu

(2012), pp. 201-208, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, E1-1

conference

An immunology-inspired multi-engine anomaly detection system with hybrid particle swarm optimisations

F Jiang, S Ling, K Chan, Z Chaczko, F Leung, M Frater

(2012), IEEE International Conference on Fuzzy Systems, E1-1

conference

A hypoglycemic episode diagnosis system based on neural networks for type 1 diabetes mellitus

K Chan, S Ling, H Nguyen, F Jiang

(2012), 2012 IEEE Congress on Evolutionary Computation, CEC 2012, E1-1

conference

Intelligent fuzzy particle swarm optimization with cross-mutated operation

S Ling, H Nguyen, F Leung, K Chan, F Jiang

(2012), 2012 IEEE Congress on Evolutionary Computation, CEC 2012, E1-1

conference

Funded Projects at Deakin

Other Public Sector Funding

Cyber-Safe Connected Vehicles: Ensuring Secure, Trusted, and Robust Cooperative Automotive systems.

Prof Robin Ram Mohan Doss, Prof Seng Loke, Dr Lei Pan, Dr Rolando Trujillo Rasua, Dr Frank Jiang, Dr Leo Zhang

  • 2019: $296,940

Other Funding Sources

National Authentication Governance and Human Framework.

Prof Robin Ram Mohan Doss, A/Prof William Yeoh, Dr Graeme Pye, Dr Frank Jiang

  • 2020: $23,500

Supervisions

Associate Supervisor
2019

Chee Keong (Allan) Ng

Thesis entitled: VoterChoice: A Ransomware Detection Honeypot with Multiple Voting Concept

Doctor of Philosophy (Information Technology), School of Information Technology