- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Internet Traffic Analysis and Secure E-voting
- Blockchain Technology Applications and Security
- User Authentication and Security Systems
- Security and Verification in Computing
- Advanced Authentication Protocols Security
- IoT and Edge/Fog Computing
- Cryptographic Implementations and Security
- Biometric Identification and Security
- Network Security and Intrusion Detection
- Chaos-based Image/Signal Encryption
- Smart Agriculture and AI
- Advanced Malware Detection Techniques
- Distributed systems and fault tolerance
- FinTech, Crowdfunding, Digital Finance
- Caching and Content Delivery
- Vehicular Ad Hoc Networks (VANETs)
- Recommender Systems and Techniques
- Wireless Body Area Networks
- Financial Risk and Volatility Modeling
- Stroke Rehabilitation and Recovery
- Face recognition and analysis
- Ferroptosis and cancer prognosis
- Organizational and Employee Performance
Victoria University
2023-2024
RMIT University
2014-2023
Nantong University
2023
Zhejiang Pharmaceutical College
2022
Over the past decade, Internet of Things (IoT) is widely adopted in various domains, including education, commerce, government, and healthcare. There are also many IoT-based applications drawn significant attentions recent years. With increasing numbers connected devices IoT system, one challenging tasks to ensure devices' authenticity, which allows users have a high confidence decision. In addition, due heterogeneity system resource-constrained devices, how efficiently manage such guarantee...
Advanced security methods are necessary to introduce effective online voting in the whole world. Elections conducted on paper consume a lot of resources and contribute destruction forests, which leads climate deterioration. Recent experiences countries, such as United States, India, Brazil, demonstrated that further research is needed improve guarantees for future elections, ensure confidentiality votes enable verification their integrity validity. In this paper, we propose ranked choice...
Reputation-based authentication is a mechanism used to establish trust and ensure the reliability of vehicle communication in vehicular ad hoc networks (VANETs). However, existing schemes ignore importance privacy protection face issues such as malicious vehicles spreading false or duplicate messages. To address these issues, this paper proposes secure anonymous reputation-based scheme based on ElGamal cryptosystem for system, which promotes cooperative behavior encourages vehicles' positive...
Recommender systems have become ubiquitous in many application domains such as e-commerce and entertainment to recommend items that are interesting the users. Collaborative Filtering is one of most widely known techniques for implementing a recommender system, it models user–item interactions using data ratings predict user preferences, which could potentially violate privacy expose sensitive data. Although there exist solutions protecting systems, utilising cryptography, they less practical...
Functional movement screening (FMS) is a crucial testing method that evaluates fundamental patterns in the human body and identifies functional limitations. However, due to inherent complexity of movements, automated assessment FMS poses significant challenges. Prior methodologies have struggled effectively capture model critical features video data. To address this challenge, paper introduces an automatic approach for by leveraging deep learning techniques. The proposed harnesses I3D...
Establishing trust in the election outcome is a very important problem. In order to solve it, we propose practical ranked choice online voting system where every user can verify validity of outcomes. The proposed combines use public blockchain and Intel Software Guard Extensions (SGX) ensure that all standard requirements for systems are met, at same time provide protection against malicious adversaries with administrative access. Each cast vote submitted SGX via secure communication...
Abstract Recommender systems have been widely used for implementing personalised content on many mobile online services to reduce computational overload and preserve wireless data users. The underlying mechanisms building recommender analyse collected from users make recommendations. This poses concerns over the privacy of as both service providers cloud will access. Privacy-preserving protect user information by incorporating various cryptographic prevent accessing data. However, existing...
Summary Anonymous authentication technique receives wide attention in recent years since it can protect users' privacy. web browsing refers to utilization of the World Wide Web that hides a user's personally identifiable information from websites visited. Even if user hide IP address and other physical with anonymity programs such as Tor, server always monitor on basis identity. In this paper, we firstly give an overview cryptanalysis protocol Yang et al point out security weaknesses their...
For users who rely heavily on social networks for entertaining or making friends, sensitive information such as ages, incomes and addresses will be stored in a database without protection. While many companies try their best to protect user privacy, data breaches still happen, resulting the loss of millions billions dollars faith customers. Therefore, we propose solution that guarantees confidentiality integrity while preserving ability perform matching over encrypted values. Our is built...
The market of wearable healthcare monitoring devices has exploded in recent years as consciousness increased. These types usually consist several biosensors, which can be worn on human bodies, such the head, arms, and feet. health status a user analyzed according to user's real-time vital signs that are collected from different biosensors. Due personal medical data being transmitted through wireless network, have encrypted. In this paper, key agreement protocol for biosensors within Wireless...