Publications
Impulsive Artificial Defense Against Advanced Persistent Threat
H Sun, X Yang, L Yang, K Huang, G Li
(2023), Vol. 18, pp. 3506-3516, IEEE Transactions on Information Forensics and Security, Piscataway, N.J., C1
A Novel Diagnosis Scheme against Collusive False Data Injection Attack
Jiamin Hu, Xiaofan Yang, Luxing Yang
(2023), Vol. 23, pp. 1-14, Sensors, Basel, Switzerland, C1
Blockchain‐based reliable image copyright protection
Xiangli Xiao, Xiaotong He, Yushu Zhang, Xuewen Dong, Lu‐Xing Yang, Yong Xiang
(2023), pp. 1-16, IET Blockchain, London, Eng., C1
Effective Multiplatform Advertising Policy
K Huang, L Yang, X Yang, Y Tang
(2022), Vol. 52, pp. 4483-4493, IEEE Transactions on Systems, Man, and Cybernetics: Systems, Piscataway, N.J., C1
L Li, J Bi, K Yang, F Luo, L Yang
(2022), pp. 2557-2562, SMC 2022 : Proceedings of the IEEE International Conference on Systems, Man and Cybernetics 2022, Prague, Czech Republic, E1
Effective Quarantine and Recovery Scheme against Advanced Persistent Threat
L Yang, P Li, X Yang, Y Xiang, F Jiang, W Zhou
(2021), Vol. 51, pp. 5977-5991, IEEE Transactions on Systems, Man, and Cybernetics: Systems, C1
Developing Cost-Effective Rumor-Refuting Strategy through Game-Theoretic Approach
D Huang, L Yang, P Li, X Yang, Y Tang
(2021), Vol. 15, pp. 5034-5045, IEEE Systems Journal, C1
Defense against Advanced Persistent Threat through Data Backup and Recovery
L Yang, K Huang, X Yang, Y Zhang, Y Xiang, Y Tang
(2021), Vol. 8, pp. 2001-2013, IEEE Transactions on Network Science and Engineering, C1
A Risk Management Approach to Defending Against the Advanced Persistent Threat
L Yang, P Li, X Yang, Y Tang
(2020), Vol. 17, pp. 1163-1172, IEEE Transactions on Dependable and Secure Computing, C1
Cost-effective anti-rumor message-pushing schemes
J Chen, L Yang, X Yang, Y Tang
(2020), Vol. 540, Physica A: Statistical Mechanics and its Applications, C1
Evaluating the Performance of a Static Patching Strategy against Computer Viruses
D Huang, L Yang, X Yang, X Zhong, Y Tang
(2020), Vol. 2020, Complexity, C1
Secure and efficient outsourcing of PCA-based face recognition
Y Zhang, X Xiao, L Yang, Y Xiang, S Zhong
(2020), Vol. 15, pp. 1683-1695, IEEE transactions on information forensics and security, Piscataway, N.J., C1
A Low-Cost Distributed Denial-of-Service Attack Architecture
K Huang, L Yang, X Yang, Y Xiang, Y Tang
(2020), Vol. 8, pp. 42111-42119, IEEE Access, C1
Simultaneous benefit maximization of conflicting opinions: modeling and analysis
L Yang, P Li, X Yang, Y Xiang, Y Tang
(2020), Vol. 14, pp. 1623-1634, IEEE systems journal, Piscataway, N.J., C1
Dynamic Maintenance Strategy for Word-of-Mouth Marketing
H Peng, K Huang, L Yang, X Yang, Y Tang
(2020), Vol. 8, pp. 126496-126503, IEEE Access, Piscataway, N.J., C1
Defending against Online Social Network Rumors through Optimal Control Approach
D Huang, L Yang, X Yang, Y Tang, J Bi
(2020), Vol. 2020, Discrete Dynamics in Nature and Society, C1
Effective repair strategy against advanced persistent threat: A differential game approach
L Yang, P Li, Y Zhang, X Yang, Y Xiang, W Zhou
(2019), Vol. 14, pp. 1713-1728, IEEE transactions on information forensics and security, Piscataway, N.J., C1
Energy-efficient patching strategy for wireless sensor networks
P Li, L Yang, X Yang, X Zhong, J Wen, Q Xiong
(2019), Vol. 19, Sensors (Switzerland), Switzerland, C1
A discount strategy in word-of-mouth marketing
T Zhang, P Li, L Yang, X Yang, Y Tang, Y Wu
(2019), Vol. 74, pp. 167-179, Communications in nonlinear science and numerical simulation, Amsterdam, The Netherlands, C1
Minimizing the impact of a rumor via isolation and conversion
J Zhao, L Yang, X Zhong, X Yang, Y Wu, Y Tang
(2019), Vol. 526, Physica A: Statistical Mechanics and its Applications, C1
Towards understanding the effectiveness of patch injection
D Huang, L Yang, X Yang, Y Wu, Y Tang
(2019), Vol. 526, Physica A: Statistical Mechanics and its Applications, C1
Efficiently and securely outsourcing compressed sensing reconstruction to a cloud
Yushu Zhang, Yong Xiang, Leo Zhang, Lu-Xing Yang, Jiantao Zhou
(2019), Vol. 496, pp. 150-160, Information sciences, Amsterdam, The Netherlands, C1
Seeking best-balanced patch-injecting strategies through optimal control approach
K Huang, P Li, L Yang, X Yang, Y Tang
(2019), Vol. 2019, Security and Communication Networks, C1
Enhanced smart meter privacy protection using rechargeable batteries
M Hossain, I Natgunanathan, Y Xiang, L Yang, G Huang
(2019), Vol. 6, pp. 7079-7092, IEEE internet of things journal, Piscataway, N.J., C1
Y Zhang, H Huang, L Yang, Y Xiang, M Li
(2019), Vol. 33, pp. 41-45, IEEE Network, Piscataway, N.J., C1
Dynamic discount pricing in competitive marketing
J Chen, L Yang, D Huang, X Yang, Y Tang
(2019), Vol. 7, pp. 145340-145347, IEEE Access, Piscataway, N.J., C1-1
Maximum profit of viral marketing: an optimal control approach
J Zhao, L Yang, X Yang
(2019), pp. 209-214, ICMAI 2019: Proceedings of the 4th International Conference on Mathematics and Artificial Intelligence, Chegndu, China, E1
A Bi-Virus Competing Spreading Model with Generic Infection Rates
L Yang, X Yang, Y Tang
(2018), Vol. 5, pp. 2-13, IEEE Transactions on Network Science and Engineering, C1-1
A tradeoff between the losses caused by computer viruses and the risk of the manpower shortage
J Bi, L Yang, X Yang, Y Wu, Y Tang
(2018), Vol. 13, PLoS ONE, United States, C1-1
On the competition of two conflicting messages
L Yang, P Li, X Yang, Y Wu, Y Tang
(2018), Vol. 91, pp. 1853-1869, Nonlinear dynamics, Dordrecht, The Netherlands, C1-1
The modeling and analysis of the word-of-mouth marketing
P Li, X Yang, L Yang, Q Xiong, Y Wu, Y Tang
(2018), Vol. 493, pp. 1-16, Physica A: statistical mechanics and its applications, Amsterdam, The Netherlands, C1-1
An effective rumor-containing strategy
C Pan, L Yang, X Yang, Y Wu, Y Tang
(2018), Vol. 500, pp. 80-91, Physica a: statistical mechanics and its applications, Amsterdam, The Netherlands, C1
Effectiveness analysis of a mixed rumor-quelling strategy
L Yang, T Zhang, X Yang, Y Wu, Y Yan Tang
(2018), Vol. 355, pp. 8079-8105, Journal of the Franklin Institute, C1
A differential game approach to patch injection
L Yang, P Li, X Yang, Y Xiang, W Zhou
(2018), Vol. 6, pp. 58924-58938, IEEE Access, C1
A dynamic discount pricing strategy for viral marketing
X Zhong, J Zhao, L Yang, X Yang, Y Wu, Y Tang
(2018), Vol. 13, PLoS ONE, United States, C1
Defending against advanced persistent threat: a risk management perspective
X Zhong, L Yang, X Yang, Q Xiong, J Wen, Y Tang
(2018), Vol. 11287, pp. 207-215, SciSec 2018 : Proceedings of the 1st International Conference on Science of Cyber Security, Beijing, China, E1
L Yang, X Yang, Y Wu
(2017), Vol. 43, pp. 110-125, Applied mathematical modelling, Amsterdam, The Netherlands, C1-1
Heterogeneous virus propagation in networks: a theoretical study
L Yang, M Draief, X Yang
(2017), Vol. 40, pp. 1396-1413, Mathematical methods in the applied sciences, Chichester, Eng., C1-1
Security Evaluation of the Cyber Networks under Advanced Persistent Threats
L Yang, P Li, X Yang, Y Tang
(2017), Vol. 5, pp. 20111-20123, IEEE Access, C1-1
A theoretical method for assessing disruptive computer viruses
Y Wu, P Li, L Yang, X Yang, Y Tang
(2017), Vol. 482, pp. 325-336, Physica A: statistical mechanics and its applications, Amsterdam, The Netherlands, C1-1
Dynamic malware containment under an epidemic model with alert
T Zhang, L Yang, X Yang, Y Wu, Y Tang
(2017), Vol. 470, pp. 249-260, Physica A: statistical mechanics and its applications, Amsterdam, The Netherlands, C1-1
The effect of network topology on the spread of computer viruses: a modelling study
L Yang, X Yang
(2017), Vol. 94, pp. 1591-1608, International journal of computer mathematics, Abingdon, Eng., C1-1
X Yang, Y Zhu, J Hong, L Yang, Y Wu, Y Tang
(2016), Vol. 11, PLoS ONE, United States, C1-1
Reducing the spectral radius of a torus network by link removal
X Yang, P Li, L Yang, Y Wu
(2016), Vol. 11, PLoS ONE, United States, C1-1
The optimal dynamic immunization under a controlled heterogeneous node-based SIRS model
L Yang, M Draief, X Yang
(2016), Vol. 450, pp. 403-415, Physica A: statistical mechanics and its applications, Amsterdam, The Netherlands, C1-1
A novel virus-patch dynamic model
Lu-Xing Yang, Xiaofan Yang
(2015), Vol. 10, pp. 1-16, PLoS one, San Francisco, Calif., C1-1
The impact of nonlinear infection rate on the spread of computer virus
L Yang, X Yang
(2015), Vol. 82, pp. 85-95, Nonlinear dynamics, Cham, Switzerland, C1-1
The impact of the network topology on the viral prevalence: a node-based approach
Lu-Xing Yang, Moez Draief, Xiaofan Yang
(2015), Vol. 10, pp. 1-15, PLoS one, San Francisco, Calif., C1-1
The pulse treatment of computer viruses: a modeling study
L Yang, X Yang
(2014), Vol. 76, pp. 1379-1393, Nonlinear Dynamics, Dordrecht, The Netherlands, C1-1
A new epidemic model of computer viruses
L Yang, X Yang
(2014), Vol. 19, pp. 1935-1944, Communications in nonlinear science and numerical simulation, Amsterdam, The Netherlands, C1-1
The spread of computer viruses over a reduced scale-free network
L Yang, X Yang
(2014), Vol. 396, pp. 173-184, Physica A: Statistical Mechanics and its Applications, Amsterdam, The Netherlands, C1-1
Implementing duplex crossed cube communication patterns on optical linear arrays
J Zhang, X Yang, C Yu, L He, L Yang
(2013), Vol. 124, pp. 6496-6500, Optik, Amsterdam, The Netherlands, C1-1
The effect of infected external computers on the spread of viruses: a compartment modeling study
L Yang, X Yang
(2013), Vol. 392, pp. 6523-6535, Physica a: statistical mechanics and its applications, Amsterdam, The Netherlands, C1-1
A mixing propagation model of computer viruses and countermeasures
Q Zhu, X Yang, L Yang, X Zhang
(2013), Vol. 73, pp. 1433-1441, Nonlinear dynamics, Dordrecht, The Netherlands, C1-1
Epidemics of computer viruses: a complex-network approach
L Yang, X Yang, J Liu, Q Zhu, C Gan
(2013), Vol. 219, pp. 8705-8717, Applied mathematics and computation, Amsterdam, The Netherlands, C1-1
A computer virus model with graded cure rates
L Yang, X Yang, Q Zhu, L Wen
(2013), Vol. 14, pp. 414-422, Nonlinear analysis: real world applications, Amsterdam, The Netherlands, C1-1
The spread of computer viruses under the influence of removable storage devices
L Yang, X Yang
(2012), Vol. 219, pp. 3914-3922, Applied mathematics and computation, Philadelphia, Pa., C1-1
Towards the epidemiological modeling of computer viruses
X Yang, L Yang
(2012), Vol. 2012, pp. 1-11, Discrete dynamics in nature and society, Cairo, Egypt, C1-1
A novel computer virus propagation model and its dynamics
L Yang, X Yang, L Wen, J Liu
(2012), Vol. 89, pp. 2307-2314, International Journal of Computer Mathematics, Abingdon, Eng., C1-1
Optimal control of computer virus under a delayed model
Q Zhu, X Yang, L Yang, C Zhang
(2012), Vol. 218, pp. 11613-11619, Applied mathematics and computation, Philadelphia, Pa., C1-1
Routing and wavelength assignment for 3-ary n-cube in array-based optical network
C Yu, X Yang, L Yang, J Zhang
(2012), Vol. 112, pp. 252-256, Information processing letters, Amsterdam, The Netherlands, C1-1
Optimal broadcasting for locally twisted cubes
X Yang, L Wang, L Yang
(2012), Vol. 112, pp. 129-134, Information processing letters, Amsterdam, The Netherlands, C1-1
A delayed computer virus propagation model and its dynamics
J Ren, X Yang, L Yang, Y Xu, F Yang
(2012), Vol. 45, pp. 74-79, Chaos, solitons and fractals, Amsterdam, The Netherlands, C1-1
A novel computer virus model and its dynamics
J Ren, X Yang, Q Zhu, L Yang, C Zhang
(2012), Vol. 13, pp. 376-384, Nonlinear analysis: real world applications, London, Eng., C1-1
An efficient therapy strategy under a novel HIV model
C Zhang, X Yang, W Liu, L Yang
(2011), Vol. 2011, pp. 1-19, Discrete dynamics in nature and society, Cairo, Egypt, C1-1
Global behavior of two families of nonlinear symmetric difference equations
W Liu, X Yang, L Yang
(2010), Vol. 2010, pp. 1-15, Discrete dynamics in nature and society, Cairo, Egypt, C1-1
Funded Projects at Deakin
Other Funding Sources
Augmenting Cyber Defence Capability (ACDC).
Prof Gang Li, Dr Luxing Yang, Dr Nayyar Zaidi, Dr Ye Zhu, Prof Rajesh Vasa, Prof Kon Mouzakis, Prof Robin Ram Mohan Doss, Dr Thanh Thi Nguyen
Cyber Security Research Centre Limited
- 2023: $156,000
- 2022: $32,199
Privacy Respecting and Compliant Digital Credential wAlleT (PRCDCATT)
Prof Robin Ram Mohan Doss, Dr Jay Jeong, Dr Luxing Yang, Dr Anh Dinh, A/Prof Mohamed Abdelrazek, Dr Yanjun Zhang
Cyber Security Research Centre Limited
- 2023: $81,250
Supervisions
Lu Zhou
Thesis entitled: New Methods for Distributed Denial-of-Service Attack Detection
Doctor of Philosophy (Information Technology), School of Information Technology
Shu Li
Thesis entitled: Detection and Prevention of Harmful Information Propagation in Cyberspace
Doctor of Philosophy (Information Technology), School of Information Technology
Nisha Nisha
Thesis entitled: Location Privacy Protection Ensuring Utility of Services
Doctor of Philosophy (Information Technology), School of Information Technology
Ahmed Falah
Thesis entitled: Improving PDF Maldoc Detection via Data-Driven Feature Engineering
Doctor of Philosophy (Information Technology), School of Information Technology