- Blockchain Technology Applications and Security
- IoT and Edge/Fog Computing
- Privacy-Preserving Technologies in Data
- Mobile Crowdsensing and Crowdsourcing
- Network Security and Intrusion Detection
- Indoor and Outdoor Localization Technologies
- Caching and Content Delivery
- Advanced Malware Detection Techniques
- Privacy, Security, and Data Protection
- Cryptography and Data Security
- Energy Efficient Wireless Sensor Networks
- Human Mobility and Location-Based Analysis
- Vehicular Ad Hoc Networks (VANETs)
- Internet Traffic Analysis and Secure E-voting
- Mobile Ad Hoc Networks
- Network Traffic and Congestion Control
- Opportunistic and Delay-Tolerant Networks
- Energy Harvesting in Wireless Networks
- UAV Applications and Optimization
- Cloud Data Security Solutions
- Software-Defined Networks and 5G
- Anomaly Detection Techniques and Applications
- Adversarial Robustness in Machine Learning
- Interconnection Networks and Systems
- Smart Grid Security and Resilience
UNSW Sydney
2015-2024
Data61
2014-2024
Commonwealth Scientific and Industrial Research Organisation
2016-2024
Mohamed bin Zayed University of Artificial Intelligence
2023
Queensland University of Technology
2023
Khalifa University of Science and Technology
2023
University of Zurich
2023
Prince Sultan University
2023
Sydney Sexual Health Centre
2021-2022
ORCID
2020-2021
Internet of Things (IoT) security and privacy remain a major challenge, mainly due to the massive scale distributed nature IoT networks. Blockchain-based approaches provide decentralized privacy, yet they involve significant energy, delay, computational overhead that is not suitable for most resource-constrained devices. In our previous work, we presented lightweight instantiation BC particularly geared use in by eliminating Proof Work (POW) concept coins. Our approach was exemplified smart...
Interconnected smart vehicles offer a range of sophisticated services that benefit the vehicle owners, transport authorities, car manufacturers and other service providers. This potentially exposes to security privacy threats such as location tracking or remote hijacking vehicle. In this article, we argue BlockChain (BC), disruptive technology has found many applications from cryptocurrencies contracts, is potential solution these challenges. We propose BC-based architecture protect users...
A noise map facilitates monitoring of environmental pollution in urban areas. It can raise citizen awareness levels, and aid the development mitigation strategies to cope with adverse effects. However, state-of-the-art techniques for rendering maps areas are expensive rarely updated (months or even years), as they rely on population traffic models rather than real data. Participatory sensing be leveraged create an open inexpensive platform up-to-date maps.
Multi-agent systems (MASs) have received tremendous attention from scholars in different disciplines, including computer science and civil engineering, as a means to solve complex problems by subdividing them into smaller tasks. The individual tasks are allocated autonomous entities, known agents. Each agent decides on proper action the task using multiple inputs, e.g., history of actions, interactions with its neighboring agents, goal. MAS has found applications, modeling systems, smart...
There has been increasing interest in adopting BlockChain (BC), that underpins the crypto-currency Bitcoin, Internet of Things (IoT) for security and privacy. However, BCs are computationally expensive involve high bandwidth overhead delays, which not suitable most IoT devices. This paper proposes a lightweight BC-based architecture virtually eliminates overheads classic BC, while maintaining its privacy benefits. devices benefit from private immutable ledger, acts similar to BC but is...
The recent outbreak of COVID-19 has taken the world by surprise, forcing lockdowns and straining public health care systems. is known to be a highly infectious virus, infected individuals do not initially exhibit symptoms, while some remain asymptomatic. Thus, non-negligible fraction population can, at any given time, hidden source transmissions. In response, many governments have shown great interest in smartphone contact tracing apps that help automate difficult task all contacts newly...
Several anomalies can occur in wireless sensor networks that impair their desired functionalities i.e., sensing and communication. Different kinds of holes form such creating geographically correlated problem areas as coverage holes, routing jamming sink/black worm etc. We detail this paper different types discuss characteristics study effects on successful working a network. present state-of-the-art research for addressing the related problems relative strengths short-comings proposed...
The Internet of Things IoT is experiencing exponential growth in research and industry, but it still suffers from privacy security vulnerabilities. Conventional approaches tend to be inapplicable for IoT, mainly due its decentralized topology the resource-constraints majority devices. BlockChain BC that underpin crypto-currency Bitcoin have been recently used provide peer-to-peer networks with similar topologies IoT. However, BCs are computationally expensive involve high bandwidth overhead...
ChatGPT, an AI-based chatbot, was released to provide coherent and useful replies based on analysis of large volumes data. In this article, leading scientists, researchers engineers discuss the transformative effects ChatGPT modern education. This research seeks improve our knowledge capabilities its use in education sector, identifying potential concerns challenges. Our preliminary evaluation concludes that performed differently each subject area including finance, coding maths. While has...
Traceability and integrity are major challenges for the increasingly complex supply chains of today's world. Although blockchain technology has potential to address these through providing a tamper-proof audit trail chain events data associated with product life-cycle, it does not solve trust problem itself. Reputation systems an effective approach this problem. However, current reputation suited based applications as they on limited observations, lack granularity automation, their overhead...
Prior research has shown the potential of device-free WiFi sensing for human activity recognition. In this paper, we show first time signals can also be used to uniquely identify people. There is strong evidence that suggests all humans have a unique gait. An individual's gait will thus create perturbations in spectrum. We propose system called WiFi-ID analyses channel state information extract features are representative walking style individual and allow us person. implement on commercial...
Multi-step passenger demand forecasting is a crucial task in on-demand vehicle sharing services. However, predicting generally challenging due to the nonlinear and dynamic spatial-temporal dependencies. In this work, we propose model multi-step citywide prediction based on graph use hierarchical convolutional structure capture both spatial temporal correlations simultaneously. Our consists of three parts: 1) long-term encoder encode historical demands; 2) short-term derive next-step for...
Airborne relaying can extend wireless sensor networks (WSNs) to remote human-unfriendly terrains. However, lossy airborne channels and limited battery of unmanned aerial vehicles (UAVs) are critical issues, adversely affecting success rate network lifetime, especially in real-time applications. We propose an energy-efficient cooperative scheme which extends lifetime while guaranteeing the rate. The optimal transmission schedule UAVs is formulated minimize maximum (min-max) energy consumption...
An increased incidence of food mislabeling and handling in recent years has led to consumers demanding transparency how items are produced handled. The current traceability solutions suffer from issues such as scattering information across multiple silos susceptibility recording erroneous data thus often unable produce reliable farm fork stories products. Blockchain (BC) is a promising technology that could play an important role providing integrity due its salient features which include...
Over the past six decades, computing systems field has experienced significant transformations, profoundly impacting society with transformational developments, such as Internet and commodification of computing. Underpinned by technological advancements, computer systems, far from being static, have been continuously evolving adapting to cover multifaceted societal niches. This led new paradigms cloud, fog, edge computing, Things (IoT), which offer fresh economic creative opportunities....
The recent wave of sensor-rich, Internet-enabled, smart mobile devices such as the Apple iPhone has opened door for a novel paradigm monitoring urban landscape known participatory sensing. Using this paradigm, ordinary citizens can collect multi-modal data streams from surrounding environment using their and share same existing communication infrastructure (e.g., 3G service or WiFi access points). contributed multiple participants be combined to build spatiotemporal view phenomenon interest...
The sensing capabilities of networked sensors are affected by environmental factors in real deployment and it is imperative to have practical considerations at the design stage order anticipate this behavior. We investigate coverage issues wireless sensor networks based on probabilistic propose a distributed algorithm (PCA) evaluate degree confidence detection probability provided randomly deployed network. approach deviation from idealistic assumption uniform circular disc for used binary...
Participatory sensing is a revolutionary new paradigm in which volunteers collect and share information from their local environment using mobile phones. The inherent openness of this platform makes it easy to contribute corrupted data. This paper proposes novel reputation system that employs the Gompertz function for computing device score as reflection trustworthiness contributed We implement context participatory noise monitoring application conduct extensive real-world experiments Apple...