- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Security and Verification in Computing
- Cloud Data Security Solutions
- Advanced Malware Detection Techniques
- Blockchain Technology Applications and Security
- Internet Traffic Analysis and Secure E-voting
- Complexity and Algorithms in Graphs
- Cryptographic Implementations and Security
- Fluid Dynamics Simulations and Interactions
- Spacecraft and Cryogenic Technologies
- Network Security and Intrusion Detection
- Advanced Authentication Protocols Security
- Access Control and Trust
- Cavitation Phenomena in Pumps
- Geothermal Energy Systems and Applications
- User Authentication and Security Systems
- Service-Oriented Architecture and Web Services
- Semantic Web and Ontologies
- Chaos-based Image/Signal Encryption
- Hydraulic and Pneumatic Systems
- Advanced Database Systems and Queries
- Water Systems and Optimization
- Advanced Software Engineering Methodologies
- Advanced Steganography and Watermarking Techniques
Commonwealth Scientific and Industrial Research Organisation
2015-2024
Shanghai Maritime University
2018-2024
Data61
2015-2024
PetroChina Southwest Oil and Gas Field Company (China)
2022-2024
Oil and Gas Center
2022-2024
Guangxi University
2023-2024
Tianjin University
2022-2024
Australian Government
2023-2024
South China Sea Institute Of Oceanology
2022
Institute of Oceanology
2022
Cyberspace has become an indispensable factor for all areas of the modern world. The world is becoming more and dependent on internet everyday living. increasing dependency also widened risks malicious threats. On account growing cybersecurity risks, most pivotal element in cyber to battle against threats, attacks, frauds. expanding cyberspace highly exposed intensifying possibility being attacked by interminable objective this survey bestow a brief review different machine learning (ML)...
The internet of things (IoT) is transforming major industries including but not limited to healthcare, agriculture, finance, energy, and transportation. IoT platforms are continually improving with innovations such as the amalgamation software-defined networks (SDN) network function virtualization (NFV) in edge-cloud interplay. Deep learning (DL) becoming popular due its remarkable accuracy when trained a massive amount data, generated by IoT. However, DL algorithms tend leak privacy on...
Industrial Internet of Things (IIoT) is revolutionizing many leading industries such as energy, agriculture, mining, transportation, and healthcare. IIoT a major driving force for Industry 4.0, which heavily utilizes machine learning (ML) to capitalize on the massive interconnection large volumes data. However, ML models that are trained sensitive data tend leak privacy adversarial attacks, limiting its full potential in 4.0. This article introduces framework named PriModChain enforces...
The metamodel techniques and model transformation provide a standard way to represent transform data, especially the software artifacts in development. However, after is applied, source target usually co-exist evolve independently. How propagate modifications across models different formats still remains as an open problem.
The recently proposed Oblivious Cross-Tags (OXT) protocol (CRYPTO 2013) has broken new ground in designing efficient searchable symmetric encryption (SSE) with support for conjunctive keyword search a single-writer single-reader framework. While the OXT offers high performance by adopting number of specialised data-structures, it also trades-off security leaking 'partial' database information to server. Recent attacks have exploited similar partial leakage breach confidentiality....
The Internet of Things (IoT) provides transparent and seamless incorporation heterogeneous different end systems. It has been widely used in many applications including smart cities such as public water system, power grid, management, vehicle traffic control system. In these city applications, a large number IoT devices are deployed that can sense, communicate, compute, potentially actuate. uninterrupted accurate functioning critical to crucial decisions will be made based on the data...
Privacy is supreme in cryptocurrencies since most users do not want to reveal their identities or the transaction amount financial transactions. Nevertheless, achieving privacy blockchain-based remains challenging blockchain by default a public ledger. For instance, Bitcoin provides builtin pseudonymity rather than true anonymity, which can be compromised analyzing Several solutions have been proposed enhance of Bitcoin. Unfortunately, full anonymity always desirable, because malicious are...
The present-day world has become all dependent on cyberspace for every aspect of daily living. use is rising with each passing day. spending more time the Internet than ever before. As a result, risks cyber threats and cybercrimes are increasing. term `cyber threat' referred to as illegal activity performed using Internet. Cybercriminals changing their techniques pass through wall protection. Conventional not capable detecting zero-day attacks sophisticated attacks. Thus far, heaps machine...
Monero provides a high level of anonymity for both users and their transactions. However, many criminal activities might be committed with the protection in cryptocurrency Thus, user accountability (or traceability) is also important transactions, which unfortunately lacking current literature. In this paper, we fill gap by introducing new named Traceable to balance accountability. Our framework relies on tracing authority, but optimistic, that it only involved when investigations certain...
The proliferation of Internet Things (IoT) devices has made people's lives more convenient, but it also raised many security concerns. Due to the difficulty obtaining and emulating IoT firmware, in absence internal execution information, black-box fuzzing become a viable option. However, existing fuzzers cannot form effective mutation optimization mechanisms guide their testing processes, mainly due lack feedback. In addition, because prevalent use various non-standard communication message...
The Internet of Things (IoT) is experiencing explosive growth and has gained extensive attention from academia industry in recent years. However, most the existing IoT infrastructures are centralized, which may cause issues unscalability single-point-of-failure. Consequently, decentralized been proposed by taking advantage emerging technology called blockchain. Voting systems widely adopted IoT, for example a leader election wireless sensor networks. Self-tallying voting alternatives to...
The rising demand for portable near-infrared (NIR) light sources has accelerated the exploration of NIR luminescent materials with high efficiency and excellent thermal stability. Inspired by structural-modulated ion substitution strategy, herein, a high-performance Cs2KIn0.8Al0.1F6:0.1Cr3+ phosphor peak at 794 nm full width half-maximum (fwhm) 117 was successfully synthesized introducing Al3+ ions. performance is reflected in its internal quantum (IQE) 88.06% good quenching resistance...
It is attractive for an organization to outsource its data analytics a service provider who has powerful platforms and advanced skills. However, the (data owner) may have concerns about privacy of data. In this paper, we present method that allows owner encrypt with homomorphic encryption scheme perform k-means clustering directly over encrypted since ciphertexts resulting from do not preserve order distances between objects cluster centers, propose approach enables compare trapdoor...
We introduce MatRiCT, an efficient RingCT protocol for blockchain confidential transactions, whose security is based on "post-quantum'' (module) lattice assumptions. The proof length of the around two orders magnitude shorter than existing post-quantum proposal, and scales efficiently to large anonymity sets, unlike proposal. Further, we provide first full implementation a RingCT, demonstrating practicality our scheme. In particular, typical transaction can be generated in fraction second...
Abstract The realization of dual‐wavelength Mn 2+ upconversion (UC) luminescence that exhibits different thermal responsive behaviors is promising for non‐invasive optical temperature sensing applications. However, it remains challenging to achieve such ions. Herein, due the site preference characteristics , color tunable and UC achieved in K 2 NaScF 6 :Yb 3+ by simply adjusting doping concentration. Structural spectral analysis as well theoretical calculations reveal green red emissions...
The database services on cloud are appearing as an attractive way of outsourcing databases. When a is deployed service, the data security and privacy becomes big concern for users. A straightforward to address this encrypt database. However, encrypted cannot be easily queried. In paper, we propose order-preserving scheme indexing data, which facilitates range queries over secure since it randomizes each index with noises, such that original recovered from indexes. Moreover, our allows...
SUMMARY The database services on cloud are appearing as an attractive way of outsourcing databases. When a is deployed service, the data security and privacy becomes big concern for users. A straightforward to address this encrypt database. However, after encryption, cannot be easily queried. In paper, we propose nonlinear order preserving scheme indexing encrypted data, which facilitates range queries over secure even there large number duplicates in plaintexts. Moreover, our allows...
Many techniques for privacy-preserving data mining (PPDM) have been investigated over the past decade. Such techniques, however, usually incur heavy computational and communication cost on participating parties thus entities with limited resources may to refrain from in PPDM process. To address this issue, one promising solution is outsource tasks cloud environment. In paper, we propose a novel efficient outsourced distributed clustering (PPODC) multiple users based k-means algorithm. The...
The personalized Web service recommendation based on Quality of Service (QoS) is gaining increasing popularity due to its promising ability help users find high quality services. Studies suggest that it beneficial use Collaborative Filtering (CF)-based techniques facilitate recommendations which can achieve accuracy in predicting the QoS for unobserved With QoS, location and services has been another significant factor values. more factors are available providers, accurate predictions be...
Rowhammer is a hardware vulnerability in DRAM memory, where repeated access to memory can induce bit flips neighboring locations. Being vulnerability, rowhammer bypasses all of the system protection, allowing adversaries compromise integrity and confidentiality data. attacks have shown enable privilege escalation, sandbox escape, cryptographic key disclosures.Recently, several proposals suggest exploiting spatial proximity between accessed location flip for defense against rowhammer. These...