Dr Frank Jiang

STAFF PROFILE

Position

Senior Lecturer in Cyber Security

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Qualifications

Doctor of Philosophy, Univ. of Technology Sydney, 2008

Contact

frank.jiang@deakin.edu.au
+61 3 924 46677

Biography

Dr Frank Jiang is a mature and active mid-career researcher with over 15 years teaching experiences within Australia, holding a senior lectureship in cyber security at School of IT at Deakin University, Australia.  He completed his PhD degree in communication engineering and cyber security at University of Technology, Sydney (UTS). In 2011, he was awarded a highly prestigious UNSW Vice-Chancellor's Postdoctoral Fellowship (successful rate less than 4.5%) by University of New South Wales at Australian Defence Force Academy for four years (2011-2014). Frank received the research impact award from the School of IT at Deakin in 2019. Frank has been successful in securing a number of commercialised funds, he also has a deep understanding of business requirements and pressures, governance and risk management and worked with a number of organisations in Sydney area including government agencies and business corporations.

His broad research expertise and interests span across IoT security and privacy, Bio-inspired context-awareness, Quantum Cryptography, Embedded hardware FPGA and motes, Human factorised next generation authentication for the Critical Infrastructure, Active defence systems in V2X, Social behaviour-based personalised anomaly detection, Blockchain-based supply chain/logistics, Medical image segmentation for 3D electron microscopy-based (EM) images, High frequency modulation/demodulation for Underwater Communications. He holds one Australian invention patent in computer IDS security industry as the 1st inventor, published so far over 120 highly reputed journal and conference articles (H-index 18), which includes 78 papers in venues ranked A*/A by the 2020 CORE ranking, primarily published in IEEE Trustcom, AAAI, ICDM, BIBM, ICSOC, WCCI, ACM Computing Surveys, KBS, IEEE TNSM, IEEE TSMCS, EA of AI, PLA. 

Read more on Frank's profile

Career highlights

  • 2024: His PhD student (Chengzu Dong) is recently awarded the School of IT - Postgraduate Research Award.
  • 2023: His PhD student (Angela Qi) won the Best student paper in an International conference on new engery vehicular systems.  Angela also won the 'Cyber Security Tertiary Student of the Year 2023' by the Australian Information Security Association (AISA)
  • 2020: Two papers accepted for publications in International Conference - IEEE Trustcom 2020 (Core A)
  • 2019: Research Impact Award from the School of IT at Deakin
  • 2019: One paper published at ACM Computing Survey titled "Applications of distributed ledger technologies to the internet of things: a survey" (Q1)
  • 2018, 2019: two papers published in International Conference - ICSOC (Core A)
  • 2013: The leading 1st inventor for one Australian patent on real-time FPGA-based computer intrusion detection security system
  • 2013: UNSW Early Career Researcher Award 2013 (AUD$23,000)
  • 2012: UNSW Early Career Researcher Award 2012 (AUD$ 15,260)
  • 2011: UNSW Vice-chancellor Postdoctoral Fellow
  • 2007: Highly-commended Student Paper award in the International conference on  Wireless Broadband and Ultra Wideband Communication (Auswireless'07) in Sydney, Australia
  • 2006: IEEE/IFIP Best student paper award for NOMs in Vancouver, Canada

Research interests

Frank's currently primary research interests include

  • IoT security and privacy, OT security in MEC.
  • Human factorised next generation authentication/IDS for the Critical Infrastructure.
  • Personalised behavior-based anomaly detection in Social Nets. 
  • Quantum Cryptography and Quantum-inspired computing including Quantum reinforcement learning
  • Active defence systems for connected autonomous vehicles,
  • Social behaviour-based personalised anomaly detection;
  • Fake news early stage detection and source traceability,
  • Blockchain-enabled Social Trustworthy Schemes
  • Blockchain-based supply chain/logistics.
  • Medical image segmentation for 3D EM images
  • High frequency modulation/demodulation for Underwater Communications

Teaching interests

  • SIT327,
  • SIT326,
  • SIT382,
  • SIT719,
  • SIT735,
  • SIT321,
  • SIT105.

Research groups

  • Centre for Cyber Security Research and Innovation (CSRI)
  • Internet of Things (IoT) Research Cluster
  • Smart Ed Tech Innovation Lab

Projects

1. Chief Investigator (5th CI), Cyber-Safe Connected Vehicles: Ensuring Secure, Trusted, and Robust Cooperative Automotive Systems, AEGP Grant, 2019 - 2021 ($494,900)

2. Chief Investigator (1st CI), An Advanced Blockchain-Based Authentication Scheme for Autonomous Vehicular Fog Infrastructure, SEBE RGS (2020), ($15000)

3. Chief Investigator (1st CI), A New Blockchain-based Social Media Users Anomaly Detection System, SEBE RGS (2019) , ($18000)

4. Chief Investigator (1st CI), Analytics Engagement Framework for NSW Trustee and Guardian – AUD200K; NSW Trustee & Guardian (NSW Trustee and Guardian) (2016)

5. Chief Investigator (3rd CI), Building Deep Insights and Advanced Care Giver - Client Workforce Modeling – AUD 250K; KinCare Health Services Pty Ltd (2015)

6. Chief Investigator (4th CI), Discovering Deep Insights Into Customer Retention in Colonial First State (CFS) – AUD 400K; Colonial Mutual (2015)

Publications

Filter by

2024

A hybrid cyber defense framework for reconnaissance attack in industrial control systems

X Qin, F Jiang, C Dong, R Doss

(2024), Vol. 136, Computers and Security, C1

journal article

Ransomware early detection: A survey

M Cen, F Jiang, X Qin, Q Jiang, R Doss

(2024), Vol. 239, Computer Networks, C1

journal article

Securing Smart UAV Delivery Systems Using Zero Trust Principle-Driven Blockchain Architecture

C Dong, S Pal, Q An, A Yao, F Jiang, Z Xu, J Li, M Lu, Y Song, S Chen, X Liu

(2024), pp. 315-322, Proceedings of the 2023 IEEE International Conference on Blockchain 2023, Danzhou, China, E1

conference

TBAF: A Two-Stage Biometric-Assisted Authentication Framework in Edge-Integrated UAV Delivery System

Z Zhang, H Wang, A Yao, X Li, F Jiang, J Xu, X Liu

(2024), Vol. 14493 LNCS, pp. 168-188, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), E1

conference
2023

A reputation mechanism based Deep Reinforcement Learning and blockchain to suppress selfish node attack motivation in Vehicular Ad-Hoc Network

Bowei Zhang, Xiaoliang Wang, Ru Xie, Chuncao Li, Huazheng Zhang, Frank Jiang

(2023), Vol. 139, pp. 17-28, Future Generation Computer Systems, Amsterdam, The Netherlands, C1

journal article

Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks

Keshav Sood, Mohammad Nosouhi, Dinh Nguyen, Frank Jiang, Morshed Chowdhury, Robin Doss

(2023), Vol. 18, pp. 965-979, IEEE Transactions on Information Forensics and Security, Piscataway, N.J., C1

journal article

Hybrid cyber defense strategies using Honey-X: A survey

X Qin, F Jiang, M Cen, R Doss

(2023), Vol. 230, Computer Networks, C1

journal article

Differential privacy in edge computing-based smart city Applications:Security issues, solutions and future directions

A Yao, G Li, X Li, F Jiang, J Xu, X Liu

(2023), Vol. 19, pp. 1-22, Array, Amsterdam, The Netherlands, C1

journal article

Optimizing Performance in Federated Person Re-Identification through Benchmark Evaluation for Blockchain-Integrated Smart UAV Delivery Systems

Chengzu Dong, Jingwen Zhou, Qi An, Frank Jiang, Shiping Chen, Lei Pan, Xiao Liu

(2023), Vol. 7, pp. 1-17, Drones, Basel, Switzerland, C1

journal article

Zero trust cybersecurity: Critical success factors and A maturity assessment framework

W Yeoh, M Liu, M Shore, F Jiang

(2023), Vol. 133, Computers and Security, C1

journal article

Improving National Digital Identity Systems Usage: Human-Centric Cybersecurity Survey

M Hilowle, W Yeoh, M Grobler, G Pye, F Jiang

(2023), pp. 1-15, Journal of Computer Information Systems, London, Eng., C1

journal article

Improved reinforcement learning-based real-time energy scheduling for prosumer with elastic loads in smart grid

D Liu, P Cheng, J Cheng, J Liu, M Lu, F Jiang

(2023), Vol. 280, pp. 1-14, Knowledge-Based Systems, Amsterdam, The Netherlands, C1-1

journal article

Multi-Featured Anomaly Detection for Mobile Edge Computing Based UAV Delivery Systems

Leilei Xu, Xiao Liu, Frank Jiang, Yi Xu, Aiting Yao, Jia Xu, Xuejun Li

(2023), pp. 58-65, ACSW 2023 : Proceedings of the Australasian Computer Science Week, Melbourne, Victoria, E1

conference

A Secure and Efficient Renewable Energy Sharing Framework for Distributed Prosumers

Q An, C Dong, J Li, F Jiang

(2023), 2023 IEEE IAS Global Conference on Renewable Energy and Hydrogen Technologies, GlobConHT 2023, E1

conference

BDFL: A Blockchain-Enabled FL Framework for Edge-based Smart UAV Delivery Systems

Chengzu Dong, Zhiyu Xu, Frank Jiang, Shantanu Pal, Chong Zhang, Shiping Chen, Xiao Liu

(2023), pp. 1-11, ASSS '23 : Proceedings of the Third International Symposium on Advanced Security on Software and Systems, Melbourne, Vic., E1

conference

Revolutionizing Virtual Shopping Experiences: A Blockchain-Based Metaverse UAV Delivery Solution

C Dong, J Zhou, Q An, F Jiang, S Chen, X Liu

(2023), pp. 658-661, Proceedings - 2023 IEEE International Conference on Metaverse Computing, Networking and Applications, MetaCom 2023, E1

conference

Secure Data Provenance for Internet of Vehicles with Verifiable Credentials

A Nepal, R Doss, F Jiang

(2023), pp. 210-218, 2023 IEEE 14th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, UEMCON 2023, E1

conference

A Federated Multi-Modal Learning Framework Powered by Distributed Ledgers for Cyber-safe and Efficient UAV Delivery Systems

C Dong, J Zhou, A Yao, Z Xu, F Jiang, S Chen, X Liu

(2023), pp. 1032-1039, ICDM Workshops 2023 : Proceedings of the IEEE International Conference on Data Mining Workshops, Shanghai, China, E1

conference

Multi-Factor Continuous Authentication of Drivers Leveraging Smartphone

Y Song, F Jiang, S Ali Shah, R Doss

(2023), pp. 1-9, SWC 2023 : Smart World Congress : Proceedings of the 20th IEEE Autonomous and Trusted Vehicles Conference, Portsmouth, United Kingdom, E1

conference
2022

Solving the last mile problem in logistics: A mobile edge computing and blockchain-based unmanned aerial vehicle delivery system

X Li, L Gong, X Liu, F Jiang, W Shi, L Fan, H Gao, R Li, J Xu

(2022), Vol. 34, Concurrency and Computation: Practice and Experience, C1

journal article

An Improved SLIC Algorithm for Segmentation of Microscopic Cell Images

F He, M Mahmud, A Kouzani, A Anwar, F Jiang, S Ling

(2022), Vol. 73, pp. 1-6, Biomedical Signal Processing and Control, Amsterdam, The Netherlands, C1

journal article

Rolling Surface Defect Inspection for Drum-Shaped Rollers Based on Deep Learning

J Tao, Y Zhu, F Jiang, H Liu, H Liu

(2022), Vol. 22, pp. 8693-8700, IEEE Sensors Journal, Piscataway, N.J., C1-1

journal article

Sensitive Information Protection Model Based on Bayesian Game

Y Liu, Z Liu, X Wang, Q Yang, G Zuo, F Jiang

(2022), Vol. 73, pp. 883-898, Computers, Materials and Continua, Henderson, Nev., C1-1

journal article

Users' Adoption of National Digital Identity Systems: Human-Centric Cybersecurity Review

M Hilowle, W Yeoh, M Grobler, G Pye, F Jiang

(2022), pp. 1-16, Journal of Computer Information Systems, London, Eng., C1

journal article

A New Zero-Trust Aided Smart Key Authentication Scheme in IoV

Y Song, F Jiang, S Ali Shah, R Doss

(2022), pp. 630-636, Proceedings of the IEEE Conference on Pervasive Computing and Communications 2022 Conference, Workshops and other Affiliated Events, Pisa, Italy, E1

conference

A Scheme to Improve the Security of IoT Communication

J Fu, X Wang, Y Liu, Q Yang, F Jiang

(2022), Vol. 13340, pp. 455-468, ICAIS 2022 : Proceedings of the Artificial Intelligence and Security 2022 Conference, Qinghai, China and Online, E1

conference

Continuous Authentication for UAV Delivery Systems under Zero-Trust Security Framework

C Dong, F Jiang, S Chen, X Liu

(2022), pp. 123-132, IEEE EDGE 2022 : Proceedings of the 6th IEEE International Conference on Edge Computing 2022, Barcelona, Spain, E1

conference

A Decentralised Blockchain-Based Secure Authentication Scheme for IoT Devices

E Haqani, Z Baig, F Jiang

(2022), Vol. 436, pp. 123-144, Lecture Notes in Networks and Systems, E1

conference

Demo:Dynamic Suppression of Selfish Node Attack Motivation in the Process of VANET Communication

B Zhang, X Wang, R Xie, H Zhang, F Jiang

(2022), pp. 1288-1291, ICDCS 2022 : Proceedings of the IEEE International Conference on Distributed Computing Systems 2022, Bologna, Italy, E1

conference

Towards Improving the Adoption and Usage of National Digital Identity Systems

Malyun Hilowle, William Yeoh, Marthie Grobler, Graeme Pye, Frank Jiang

(2022), pp. 1-6, ASE 2022 : Automated Software Engineering : Proceedings of Institute of Electrical and Electronics Engineers 2022 conference, Rochester, Michigan, U.S., E1

conference
2021

Effective Quarantine and Recovery Scheme against Advanced Persistent Threat

L Yang, P Li, X Yang, Y Xiang, F Jiang, W Zhou

(2021), Vol. 51, pp. 5977-5991, IEEE Transactions on Systems, Man, and Cybernetics: Systems, C1

journal article

Energy-aware decision-making for dynamic task migration in MEC-based unmanned aerial vehicle delivery system

R Li, X Li, J Xu, F Jiang, Z Jia, D Shao, L Pan, X Liu

(2021), Vol. 33, Concurrency and Computation: Practice and Experience, C1

journal article

A neuron image segmentation method based Deep Boltzmann Machine and CV model

F He, X Huang, X Wang, S Qiu, F Jiang, S Ling

(2021), Vol. 89, Computerized Medical Imaging and Graphics, United States, C1

journal article

Improving Language Translation Using the Hidden Markov Model

Y Chang, X Wang, M Xue, Y Liu, F Jiang

(2021), Vol. 67, pp. 3921-3931, Computers, Materials and Continua, C1

journal article

A Novel Anonymous Authentication Scheme Based on Edge Computing in Internet of Vehicles

X Wang, X She, L Bai, Y Qing, F Jiang

(2021), Vol. 67, pp. 3349-3361, Computers, Materials and Continua, C1

journal article

Smooth Surface Defect Detection by Deep Learning Based on Wrapped Phase Map

J Tao, Y Zhu, W Liu, F Jiang, H Liu

(2021), Vol. 21, pp. 16236-16244, IEEE Sensors Journal, C1

journal article

LSTM android malicious behavior analysis based on feature weighting

Q Yang, X Wang, J Zheng, W Ge, M Bai, F Jiang

(2021), Vol. 15, pp. 2188-2203, KSII transactions on internet and information systems, Seoul, Republic of Korea, C1

journal article

Design of intelligent mosquito nets based on deep learning algorithms

Y Liu, X Wang, X She, M Yi, Y Li, F Jiang

(2021), Vol. 69, pp. 2261-2276, Computers, Materials and Continua, C1

journal article

EEG-based emotion recognition via capsule network with channel-wise attention and LSTM models

L Deng, X Wang, F Jiang, R Doss

(2021), Vol. 3, pp. 425-435, CCF Transactions on Pervasive Computing and Interaction, C1

journal article

Blockchain for Cybersecurity: Systematic Literature Review and Classification

M Liu, W Yeoh, F Jiang, K Choo

(2021), Journal of Computer Information Systems, C1

journal article

A Blockchain-aided Self-Sovereign Identity Framework for Edge-based UAV Delivery System

Chengzu Dong, Frank Jiang, Xuejun Li, Aiting Yao, Gang Li, Xiao Liu

(2021), pp. 622-624, CCGrid 2021 : Proceedings of the 21st IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing, Melbourne, Victoria, E1

conference

Federated Learning with Extreme Label Skew: A Data Extension Approach

Saheed Tijani, Xingjun Ma, Ran Zhang, Frank Jiang, Robin Ram Mohan Doss

(2021), pp. 1-8, IJCNN 2021 : Proceedings of the International Joint Conference on Neural Networks, Shenzhen, China, E1

conference

An Edge based Federated Learning Framework for Person Re-identification in UAV Delivery Service

Chong Zhang, Xiao Liu, Jia Xu, Tianxiang Chen, Gang Li, Frank Jiang, Xuejun Li

(2021), pp. 500-505, IEEE ICWS 2021 : Proceedings of the 2021 IEEE International Conference on Web Services, Chicago, Ill., E1

conference

Evaluating the Current State of Application Programming Interfaces for Verifiable Credentials

N Lalchandani, F Jiang, J Jeong, Y Zolotavkin, R Doss

(2021), pp. 1-11, PST 2021: Proceedings of the 18th Privacy, Security and Trusts 2021 International Conference, Auckland, N.Z., E1

conference

A Novel Security Framework for Edge Computing based UAV Delivery System

Aiting Yao, Frank Jiang, Xuejun Li, Chengzu Dong, Jia Xu, Yi Xu, Gang Li, Xiao Liu

(2021), pp. 1-8, TrustCom 2021 : Proceedings of the 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications 2021, Shenyang, China, E1

conference

A Blockchain Scheme Based on DAG Structure Security Solution for IIoT

P Zeng, X Wang, L Dong, X She, F Jiang

(2021), pp. 935-943, Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, E1

conference

Social Spammer Detection Based on Semi-Supervised Learning

X Zhang, F Jiang, R Zhang, S Li, Y Zhou

(2021), pp. 849-855, TrustCom 2021 : Proceedings of the 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, Shenyang, China, E1

conference
2020

A New Markov Decision Process Based Behavioral Prediction System for Airborne Crews

Y Zhang, K Yao, J Zhang, F Jiang, M Warren

(2020), Vol. 8, pp. 28021-28032, IEEE Access, C1

journal article

A Scheme of Intelligent Traffic Light System Based on Distributed Security Architecture of Blockchain Technology

Pengjie Zeng, Xiaoliang Wang, Hao Li, Frank Jiang, Robin Doss

(2020), Vol. 8, pp. 33644-33657, IEEE Access, Piscataway, N.J., C1

journal article

VoterChoice: A ransomware detection honeypot with multiple voting framework

C Keong Ng, S Rajasegarar, L Pan, F Jiang, L Zhang

(2020), Vol. 32, Concurrency and Computation: Practice and Experience, C1

journal article

Uav swarm mission planning in dynamic environment using consensus-based bundle algorithm

Y Zhang, W Feng, G Shi, F Jiang, M Chowdhury, S Ling

(2020), Vol. 20, Sensors (Switzerland), Switzerland, C1

journal article

Responsible use of technology to combat cyberbullying among young people

C Kaluarachchi, M Warren, F Jiang

(2020), Vol. 24, Australasian Journal of Information Systems, Melbourne, AUSTRALIA, C1

journal article

Image super-resolution based on generative adversarial networks: A brief review

K Fu, J Peng, H Zhang, X Wang, F Jiang

(2020), Vol. 64, pp. 1977-1997, Computers, Materials and Continua, C1

journal article

BlockMeds: a Blockchain-based online prescription system with privacy protection

M He, X Han, F Jiang, R Zhang, X Liu, X Liu

(2020), Vol. 12019, pp. 299-303, ICSOC 2019 : Proceedings of the 17th International Conference on Service-Oriented Computing 2019, Toulouse, France, E1

conference

Malware classifications based on static-dynamic features and factorization machines

H Long, Z Li, F Jiang

(2020), Vol. 1254, pp. 246-257, ICAIS 2020 : Proceedings of the 6th International Conference on Artificial Intelligence and Security, Hohhot, China, E1

conference

Biologically inspired smart contract: A blockchain-based DDoS detection system

Xu Han, Rongbai Zhang, Xingzi Liu, Frank Jiang

(2020), ICNSC 2020 : Proceedings of IEEE International Conference on Networking, Sensing and Control, Nanjing, Chine (online), E1

conference

A new social user anomaly behavior detection system based on blockchain and smart contract

Xingzi Liu, Frank Jiang, Rongbai Zhang

(2020), ICNSC 2020 : Proceedings of IEEE International Conference on Networking, Sensing and Control, Nanjing, China (Online), E1

conference

A Feedback-Driven Lightweight Reputation Scheme for IoV

Rohan Dahiya, Frank Jiang, Robin Ram Mohan Doss

(2020), pp. 1060-1068, TrustCom 2020 : Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, E1

conference

Avoiding Geographic Regions in Tor

Matthew Ryan, Morshed Chowdhury, Frank Jiang, Robin Ram Mohan Doss

(2020), pp. 802-809, TrustCom 2020 : Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, E1

conference
2019

An improved authentication scheme for internet of vehicles based on blockchain technology

X Wang, P Zeng, N Patterson, F Jiang, R Doss

(2019), Vol. 7, pp. 45061-45072, IEEE Access, C1

journal article

An early warning system for curved road based on oV7670 image acquisition and STM32

X Wang, W Song, B Zhang, B Mausler, F Jiang

(2019), Vol. 59, pp. 135-147, Computers, Materials and Continua, C1

journal article

Static malware clustering using enhanced deep embedding method

C Ng, F Jiang, L Zhang, W Zhou

(2019), Vol. 31, Concurrency and Computation: Practice and Experience, C1

journal article

A dual privacy-preservation scheme for cloud-based eHealth systems

X Wang, L Bai, Q Yang, L Wang, F Jiang

(2019), Vol. 47, pp. 132-138, Journal of information security and applications, Amsterdam, The Netherlands, C1-1

journal article

Applications of distributed ledger technologies to the internet of things: a survey

Q Zhu, S Loke, R Trujillo Rasua, F Jiang, Y Xiang

(2019), Vol. 52, pp. 1-34, ACM computing surveys, New York, N.Y., C1

journal article

Cyber security insights into self-proclaimed virtual world hackers

Nicholas Patterson, M Hobbs, F Jiang, L Pan

(2019), pp. 73-87, CSITEC 2019 : Proceedings of the 5th International Conference on Computer Science, Information Technology, Vienna, Austria, E1

conference

An efficient dynamic group-based batch verification scheme for vehicular sensor networks

L Jiang, Y Wang, J Tian, F Jiang, Nicholas Patterson, R Ram Mohan Doss

(2019), pp. 52-64, FNSS 2019 : Proceedings of the 5th International Conference of Future Network Systems and Security, Melbourne, Victoria, E1

conference

Quorum chain-based malware detection in android smart devices

F Gao, F Jiang, Y Zhang, R Doss

(2019), Vol. 1113, pp. 212-224, FNSS 2019 : Future Network Systems and Security : 5th International Conference, FNSS 2019 Melbourne, VIC, Australia, November 27–29, 2019 Proceedings, Melbourne, Vic., E1

conference

Responsible use of technology to protect young people who are experiencing cyberbullying in Australia

Chintha Kaluarachchi, Matthew Warren, Frank Jiang

(2019), pp. 1-6, AiCE 2019 : Proceedings of 8th Australian Institute of Computer Ethics Conference, Melbourne, Victoria, E1

conference
2018

Mapping Functions Driven Robust Retinal Vessel Segmentation via Training Patches

H Xia, F Jiang, S Deng, J Xin, R Doss

(2018), Vol. 6, pp. 61973-61982, IEEE Access, C1

journal article

A double-image encryption scheme based on amplitude-phase encoding and discrete complex random transformation

Y Luo, S Tang, X Qin, L Cao, F Jiang, J Liu

(2018), Vol. 6, pp. 77740-77753, IEEE access, Piscataway, N.J., C1

journal article

Single image rain removal via a simplified residual dense network

H Xia, R Zhuge, H Li, S Song, F Jiang, M Xu

(2018), Vol. 8, pp. 66522-66535, IEEE Access, Piscataway, N.J., C1-1

journal article

Classification of cardiovascular disease via a new softMax model

L Hao, S Ling, F Jiang

(2018), pp. 486-489, EMBC 2018 : Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Honolulu, Hi., E1-1

conference
2017

A new binary hybrid particle swarm optimization with wavelet mutation

F Jiang, H Xia, Q Anh Tran, Q Minh Ha, N Quang Tran, J Hu

(2017), Vol. 130, pp. 90-101, Knowledge-Based Systems, Amsterdam, The Netherlands, C1-1

journal article

Constrained NMF-based semi-supervised learning for social media spammer detection

D Yu, N Chen, F Jiang, B Fu, A Qin

(2017), Vol. 125, pp. 64-73, Knowledge-Based Systems, Amsterdam, The Netherlands, C1-1

journal article

Dynamic power allocation for a multiuser transmitter with hybrid energy sources

D Liu, J Lin, J Wang, F Jiang

(2017), Vol. 2017, pp. 1-12, EURASIP Journal on Wireless Communications and Networking, Berlin, Germany, C1-1

journal article

Road vehicle alert system using IOT

Z Chaczko, F Jiang, B Ahmed

(2017), pp. 488-493, ICSEng 2017 : Proceedings of the 25th International Conference on Systems Engineering, Las Vegas, Nev., E1-1

conference

Deformable template matching using proposal-based best-buddies similarity

H Xia, W Zhao, Z Zhou, F Jiang, H Li, X He

(2017), pp. 517-521, Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017, Sydney, N.S.W., E1-1

conference
2016

Quality and robustness improvement for real world industrial systems using a fuzzy particle swarm optimization

S Ling, K Chan, F Leung, F Jiang, H Nguyen

(2016), Vol. 47, pp. 68-80, Engineering Applications of Artificial Intelligence, Amsterdam, The Netherlands, C1-1

journal article

Classifying sybil in MSNs using C4.5

A Chinchore, G Xu, F Jiang

(2016), pp. 1-6, BESC 2016 - Proceedings of the 2016 International Conference on Behavioral, Economic, Socio - Cultural Computing, Durham, N.C., E1-1

conference

Coupled behavioral analysis for user preference-based email spamming

F Jiang, J Gan, Y Xu, G Xu

(2016), pp. 1-5, BESC 2016 - Proceedings of IEEE 2016 International Conference on Behavioral, Economic, Socio - Cultural Computing, Durham, N.C., E1-1

conference

Robust retinal vessel segmentation via clustering-based patch mapping functions

H Xia, S Deng, M Li, F Jiang

(2016), pp. 520-523, BIBM 2016 : Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, Shenzhen, China, E1-1

conference

A novel method of cervical cell image segmentation via region merging and SLIC

H Xia, K Jin, F Jiang, Q Tran

(2016), pp. 153-158, SoICT '16 : Proceedings of the Seventh Symposium on Information and Communication Technology, Ho Chi Minh City, Vietnam, E1-1

conference

User preference-based spamming detection with coupled behavioral analysis

F Jiang, M Tang, Q Tran

(2016), Vol. 10066, pp. 466-477, SpaCCS 2016 : Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage 9th International Conference, Zhangjiajie, China, E1-1

conference
2015

A gradient learning optimization for dynamic power management

Y Li, F Jiang

(2015), pp. 2061-2066, SMC 2015 : Proceedings of the 2015 IEEE International Conference on Systems, Man, and Cybernetics, Hong Kong, E1-1

conference

Effectively predicting whether and when a topic will become prevalent in a social network

W Liu, Z Deng, X Gong, F Jiang, I Tsang

(2015), Vol. 1, pp. 210-216, AAAI 2015 : Proceedings of the 29th AAAI Conference on Artificial Intelligence, Austin, Texax, E1-1

conference

Binary hybrid particle swarm optimization withwavelet mutation

Q Tran, Q Dinh, F Jiang

(2015), Vol. 326, pp. 261-272, KSE 2014 : Knowledge and Systems Engineering : Proceedings of the Sixth International Conference, Hanoi, Vietnam, E1-1

conference

Intelligent Sybil attack detection on abnormal connectivity behavior in mobile social networks

A Chinchore, F Jiang, G Xu

(2015), Vol. 224, pp. 602-617, KMO 2015 : Knowledge management in organizations : 10th International Conference, KMO 2015, Maribor, Slovenia, August 24-28, 2015, Proceedings, Maribor, Slovenia, E1-1

conference
2014

Multi-qudit information splitting with multiple controllers

S Li, M Jiang, F Jiang, X Chen

(2014), Vol. 13, pp. 1057-1066, Quantum Information Processing, Berlin, Germany, C1-1

journal article

Automated generation of ham rules for Vietnamese spam filtering

Q Dang Dinh, Q Tran, F Jiang

(2014), pp. 1-5, CISDA 2014 : Proceedings of the Seventh IEEE Symposium on Computational Intelligence for Security and Defense Applications, Hanoi, Vietnam, E1-1

conference

Application on self-provisioning of communication network service using fuzzy particle swarm optimization

S Ling, F Jiang

(2014), pp. 1245-1250, ICARCV 2014 : Proceedings of the 13th International Conference on Control Automation Robotics & Vision, Singapore, E1-1

conference

A new coupled metric learning for real-time anomalies detection with high-frequency field programmable gate arrays

F Jiang, D Luo

(2014), pp. 1254-1261, ICDMW 2014 : Proceedings of the IEEE International Conference on Data Mining Workshop, Shenzhen, China, E1-1

conference

Quantum information splitting with many-party controllers

M Jiang, F Jiang

(2014), pp. 1247-1251, WCICA 2014 : Proceeding of the 11th World Congress on Intelligent Control and Automation, Shenyang, China, E1-1

conference

A New Coupled Metric Learning for Real-time Anomalies Detection with High-Frequency Field Programmable Gate Arrays

F Jiang, D Luo

(2014), pp. 1254-1261, Proceedings of the 2014 IEEE International Conference on Data Mining Workshop (ICDMW 2014), Shenzhen, China, E1-1

conference
2013

Agent-based self-adaptable context-aware network vulnerability assessment

F Jiang, D Dong, L Cao, M Frater

(2013), Vol. 10, pp. 255-270, IEEE transactions on network and service management, Piscataway, N.J., C1-1

journal article

Deterministic joint remote preparation of arbitrary multi-qudit states

M Jiang, F Jiang

(2013), Vol. 377, pp. 2524-2530, Physics Letters A, Amsterdam, The Netherlands, C1-1

journal article

LOARP: A low overhead routing protocol for underwater acoustic sensor networks

R Rahman, C Benson, F Jiang, M Frater

(2013), Vol. 8, pp. 317-330, Journal of networks, Oulu, Finland, C1-1

journal article

Towards a reliable aquatic-based cyber physical system: A new context-situation aware low overhead routing scheme

F Jiang, M Frater

(2013), pp. 30-35, IEEE-CYBER 2013 : 2013 IEEE International Conference on Cyber Technology in Automation, Control and Intelligent System : May 26-29, 2013, Nanjing, China, Nanjing, China, E1-1

conference

Cooperative multi-target tracking in passive sensor-based networks

F Jiang, J Hu

(2013), pp. 4340-4345, WCNC 2013 : Proceedings of the IEEE Wireless Communications and Networking Conference, Shanghai, China, E1-1

conference
2012

The Implementation of 3TZ Model of Software Development

Z Chaczko, S Aslanzadeh, F Jiang, R Klempous

(2012), Vol. 58, pp. 433-439, International Journal of Electronics and Telecommunications, C1-1

journal article

A comparison of two IPv4/IPv6 transition mechanisms - OpenVPN and IVI

C Vu, Q Tran, F Jiang

(2012), Vol. 1479, pp. 1532-1538, International Conference on Numerical Analysis and Applied Mathematics 2012 (ICNAAM-2012), Kos, Greece, E1-1

conference

Threshold-based image segmentation through an improved particle swarm optimisation

F Jiang, M Frater, M Pickering

(2012), 2012 International Conference on Digital Image Computing Techniques and Applications, DICTA 2012, Fremantle, W.A., E1-1

conference

Hybrid control of uncertain quantum systems via fuzzy estimation and quantum reinforcement learning

C Chen, F Jiang, D Dong

(2012), pp. 7177-7182, 2012 31st Chinese Control Conference (CCC 2012), Hefei, China, E1-1

conference

Email user ranking based on email networks

Q Tran, M Vu, M Frater, F Jiang

(2012), Vol. 1479, pp. 1512-1517, International Conference on Numerical Analysis and Applied Mathematics 2012 (ICNAAM-2012), Kos, Greece, E1-1

conference

Comparative study of key exchange and authentication methods in application, transport and network level security mechanisms

I Fathirad, J Devlin, F Jiang

(2012), Vol. 1479, pp. 1524-1531, International Conference on Numerical Analysis and Applied Mathematics 2012 (ICNAAM-2012), Kos, Greece, E1-1

conference

The application of extreme learning machines to the network intrusion detection problem

G Creech, F Jiang

(2012), Vol. 1479, pp. 1506-1511, International Conference on Numerical Analysis and Applied Mathematics 2012 (ICNAAM-2012), Kos, Greece, E1-1

conference

Semantics based multi-layered networks for spam email detection

G Creech, F Jiang

(2012), Vol. 1479, pp. 1518-1523, International Conference on Numerical Analysis and Applied Mathematics 2012 (ICNAAM-2012), Kos, Greece, E1-1

conference

Self-provisioning of network services with quantum-inspired reinforcement learning and adaptation

F Jiang, D Dong, M Frater

(2012), pp. 169-174, Proceedings of 2012 9th IEEE International Conference on Networking, Sensing and Control, ICNSC 2012, E1-1

conference

Evolving block-based neural network and field programmable gate arrays for host-based intrusion detection system

Q Tran, F Jiang, Q Ha

(2012), pp. 86-92, Proceedings - 4th International Conference on Knowledge and Systems Engineering, KSE 2012, E1-1

conference

A real-time NetFlow-based intrusion detection system with improved BBNN and high-frequency field programmable gate arrays

Q Tran, F Jiang, J Hu

(2012), pp. 201-208, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, E1-1

conference

An immunology-inspired multi-engine anomaly detection system with hybrid particle swarm optimisations

F Jiang, S Ling, K Chan, Z Chaczko, F Leung, M Frater

(2012), IEEE International Conference on Fuzzy Systems, E1-1

conference

A hypoglycemic episode diagnosis system based on neural networks for type 1 diabetes mellitus

K Chan, S Ling, H Nguyen, F Jiang

(2012), 2012 IEEE Congress on Evolutionary Computation, CEC 2012, Brisbane, QLD, E1-1

conference

Intelligent fuzzy particle swarm optimization with cross-mutated operation

S Ling, H Nguyen, F Leung, K Chan, F Jiang

(2012), 2012 IEEE Congress on Evolutionary Computation, CEC 2012, Brisbane, QLD, E1-1

conference
2011

Hybrid fuzzy logic-based particle swarm optimization for flow shop scheduling problem

S Ling, F Jiang, H Nguyen, K Chan

(2011), Vol. 10, pp. 335-356, International Journal of Computational Intelligence and Applications, C1-1

journal article

A nature inspired anomaly detection system using multiple detection engines

F Jiang, S Ling, J Agbinya

(2011), pp. 200-205, IB2COM 2011 - 6th International Conference on Broadband Communications and Biomedical Applications, Program, E1-1

conference

A bio-inspired host-based multi-engine detection system with sequential pattern recognition

F Jiang, M Frater, J Hu

(2011), pp. 145-150, Proceedings - IEEE 9th International Conference on Dependable, Autonomic and Secure Computing, DASC 2011, E1-1

conference

A distributed smart routing scheme for terrestrial sensor networks with hybrid Neural Rough Sets

F Jiang, M Frater, S Ling

(2011), pp. 2238-2244, IEEE International Conference on Fuzzy Systems, E1-1

conference

Permutation flow shop scheduling: Fuzzy particle swarm optimization approach

S Ling, F Jiang, H Nguyen, K Chan

(2011), pp. 572-578, IEEE International Conference on Fuzzy Systems, E1-1

conference
2009

A biologically inspired service architecture in ubiquitous computing environments

F Chiang, R Braun

(2009), Vol. 4388 LNCS, pp. 253-258, Active and Programmable Networks, B1-1

book chapter
2008

Risk and Vulnerability Assessment of Secure Autonomic Communication Networks in Large-Scale Distributed Environments

Frank Jiang

(2008), pp. 345-387, Advances in Broadband Communication and Networks, Gistrup, Denmark, B1-1

book chapter
2007

Self-configuration of network services with biologically inspired learning and adaptation

F Chiang, R Braun, J Agbinya

(2007), Vol. 15, pp. 87-116, Journal of Network and Systems Management, C1

journal article

A biologically-inspired multi-agent framework for autonomic service management

F Chiang, R Braun, J Hughes

(2007), Vol. 2, pp. 261-276, International Journal of Pervasive Computing and Communications, C1-1

journal article

Self-adaptability and vulnerability assessment of secure autonomic communication networks

F Chiang, R Braun

(2007), Vol. 4773, pp. 112-122, Managing next generation networks and services : 10th Asia-Pacific Network Operations and Management Symposium, APNOMS 2007, Sapporo, Japan, October 10-12, 2007 : proceedings, Sapporo-shi, Japan, E1-1

conference

Ant-based topology convergence algorithms for resource management in VANETs

F Chiang, Z Chaczko, J Agbinya, R Braun

(2007), Vol. 4739, pp. 992-1000, Computer aided systems theory-- EUROCAST 2007 : 11th International Conference on Computer Aided Systems Theory, Las Palmas de Gran Canaria, Spain, February 12-16, 2007 : revised selected papers, Las Palmas, Canary Islands, E1-1

conference

Towards a management paradigm with a constrained benchmark for autonomic communications

F Chiang, R Braun

(2007), Vol. 4456, pp. 250-258, Computational Intelligence and Security : International Conference, CIS 2006. Guangzhou, China, November 3-6, 2006. Revised Selected Papers, Guangzhou, Peoples Republic of China, E1-1

conference

Integrating object-oriented O:XML semantics into autonomic decentralised functionalities

F Chiang, H Fernandez, R Braun, J Agbinya

(2007), pp. 768-773, ISCIT 2007 - 2007 International Symposium on Communications and Information Technologies Proceedings, E1-1

conference
2005

Autonomic service configuration for telecommunication MASs with extended role-based GAIA and JADEx

F Chiang, R Braun, Z Huaug, S Magrath, S Markovits

(2005), Vol. 2, pp. 1319-1324, 2005 International Conference on Services Systems and Services Management, Proceedings of ICSSSM'05, Chongquing, China, E1-1

conference

Implementing an autonomic service activation paradigm through market-based design mechanisms

F Chiang

(2005), Vol. 2005, pp. 802-807, 2005 3rd IEEE International Conference on Industrial Informatics, INDIN, Perth, W.A., E1-1

conference

Autonomics in telecommunications service activation

Shane Magrath, Frank Chiang, Shmuel Markovits, Robin Braun, Fernando Cuervo

(2005), pp. 731-737, ISADS 2005 : Proceedings of the International Symposium on Autonomous Decentralized Systems 2005 conference, Chengdu, China, E1-1

conference

Funded Projects at Deakin

Other Public Sector Funding

Cyber-Safe Connected Vehicles: Ensuring Secure, Trusted, and Robust Cooperative Automotive systems.

Prof Robin Ram Mohan Doss, Prof Seng Loke, A/Prof Lei Pan, Dr Rolando Trujillo Rasua, Dr Frank Jiang, Dr Leo Zhang

Department of Industry, Innovation and Science

  • 2022: $74,235
  • 2021: $123,725
  • 2019: $296,940

Build Al into Edge Computing with Blockchain.

A/Prof Xiao Liu, Dr Frank Jiang

CSIRO Scholarship - Commonwealth Scientific and Industrial Research Organisation

  • 2023: $20,000
  • 2022: $4,906
  • 2021: $3,066

Industry and Other Funding

A FPGA/DSP Demonstrator for OT / IT Converged ICS Security, Trustworthiness in Industry 4.0

Dr Frank Jiang

BCU World Pty Ltd

  • 2021: $31,068

Learning Based Cyberbullying Dissemination and Source Identification Across Multiple Online Platforms.

Dr Frank Jiang

MDP Technology Pty Ltd

  • 2021: $14,316

A Decentralised Intrinsic Authentication and Privacy Preserved FPGA System with Context Fingerprints for Trustworthy IoT Ecosystem.

Dr Frank Jiang

Smartface Fintech Pty Ltd

  • 2021: $15,000

Australian Guide to Implementing Food Traceability (AGIFT) - Seafood.

Ms Rose Elphick-Darling, Mr David Downie, Dr Patricia Mclean, Mr Ruben Rendon Benavides, Dr Frank Jiang

Wayfinder - Woolworths Group

  • 2022: $200,000

Trace-2-Place

Ms Rose Elphick-Darling, Dr Patricia Mclean, Dr Frank Jiang

Agribusiness Connect Ltd

  • 2023: $74,200

Other Funding Sources

National Authentication Governance and Human Framework.

Prof Robin Ram Mohan Doss, A/Prof William Yeoh, Dr Graeme Pye, Dr Frank Jiang

Cyber Security Research Centre Limited

  • 2023: $23,500
  • 2022: $38,803
  • 2021: $47,000
  • 2020: $23,500

A Decentralised Blockchain-based Secure Authentication Scheme for IoT.

Dr Zubair Baig, Dr Frank Jiang

Cyber Security Research Centre Limited

  • 2021: $10,700

Robust Authentication using Ambient Intelligence in Smart Environments (RAAISE).

Prof Robin Ram Mohan Doss, Dr Zubair Baig, Dr Adnan Anwar, Dr Frank Jiang

Cyber Security Research Centre Limited

  • 2023: $259,606
  • 2022: $159,674

Secure Data Provenance in the Internet of Vehicles.

Prof Robin Ram Mohan Doss, Dr Frank Jiang, Mr Anuj Nepal

iMove Australia Limited

  • 2024: $2,700
  • 2023: $13,500
  • 2022: $4,507

Sharing Cybersecurity Data for Australian Research (SCReeD).

Prof Jemal Abawajy, Prof Chang-Tsun Li, Prof Gang Li, A/Prof William Yeoh, Dr Shamsul Huda, Dr Frank Jiang, Dr Jack Li

Cyber Security Research Centre Limited

  • 2024: $25,000
  • 2023: $12,500
  • 2022: $10,320

Socrates: Software Security with a focus on critical technologies.

A/Prof Lei Pan, Dr Syed Wajid Ali Shah, Prof Robin Ram Mohan Doss, Dr Zubair Baig, Prof Jemal Abawajy, Prof Shiri Krebs, Dr Jayson Lamchek, Dr Shamsul Huda, Dr Muna Al-Hawawreh, Dr Naeem Syed, Dr Jack Li, Dr Ye Zhu, Dr Frank Jiang, A/Prof William Yeoh, Prof Chang-Tsun Li, A/Prof Lennon Chang, Prof Patrick Emerton, Dr Hourieh Khalajzadeh, Dr Van-Hau Trieu, Dr Yanjun Zhang, Dr Leo Zhang

Cyber Security Research Centre Limited

  • 2024: $60,488
  • 2023: $120,976

Supervisions

Co-supervisor
2022

Akanksha Saini

Thesis entitled: Decentralised and lightweight blockchain-based framework for smart healthcare system

Doctor of Philosophy (Information Technology), School of Information Technology

Associate Supervisor
2023

Malyun Muhudin Hilowle

Thesis entitled: National Digital Identity Systems: A Perspective of Human-Centric Cybersecurity

Doctor of Philosophy (Information Technology), School of Information Technology

2021

Muhmmad Abbas Kazim Al-Khiza'ay

Thesis entitled: Personalized Review Selection Using Micro-Reviews in Social Networks

Doctor of Philosophy (Information Technology), School of Information Technology

2019

Chee Keong (Allan) Ng

Thesis entitled: VoterChoice: A Ransomware Detection Honeypot with Multiple Voting Concept

Doctor of Philosophy (Information Technology), School of Information Technology