- Blockchain Technology Applications and Security
- Privacy-Preserving Technologies in Data
- Cloud Computing and Resource Management
- FinTech, Crowdfunding, Digital Finance
- Cloud Data Security Solutions
- Ethics and Social Impacts of AI
- IoT and Edge/Fog Computing
- Web Data Mining and Analysis
- Software System Performance and Reliability
- Digital Platforms and Economics
- Caching and Content Delivery
- Artificial Intelligence in Healthcare and Education
- Educational Technology and Assessment
- Energy Efficient Wireless Sensor Networks
- Explainable Artificial Intelligence (XAI)
- Hydrocarbon exploration and reservoir analysis
- Software Engineering Research
- Recommender Systems and Techniques
- Cryptography and Data Security
- Advanced Image and Video Retrieval Techniques
- Evaluation and Optimization Models
- Software Reliability and Analysis Research
- QR Code Applications and Technologies
- Petroleum Processing and Analysis
- Sentiment Analysis and Opinion Mining
Data61
2020-2025
Commonwealth Scientific and Industrial Research Organisation
2020-2025
Macao Polytechnic University
2023-2025
Fujian Medical University
2025
Beijing University of Technology
2011-2024
Shenyang Ligong University
2018-2024
Chang'an University
2024
UNSW Sydney
2008-2024
China University of Petroleum, East China
2018-2023
University of Electronic Science and Technology of China
2013-2023
Device failure detection is one of most essential problems in Industrial Internet Things (IIoT). However, conventional IIoT device detection, client devices need to upload raw data the central server for model training, which might lead disclosure sensitive business data. Therefore, this article, ensure privacy, we propose a blockchain-based federated learning approach IIoT. First, present platform architecture systems IIoT, enables verifiable integrity In architecture, each periodically...
Large Language Models (LLMs) have significantly impacted numerous domains, including Software Engineering (SE). Many recent publications explored LLMs applied to various SE tasks. Nevertheless, a comprehensive understanding of the application, effects, and possible limitations on is still in its early stages. To bridge this gap, we conducted systematic literature review LLM4SE, with particular focus how can be exploited optimize processes outcomes. We collect analyze 229 research papers from...
Quick Response Code has been widely used in the automatic identification fields. In order to adapting various sizes, a little dirty or damaged, and lighting conditions of bar code image, this paper proposes novel implementation real-time recognition using mobile, which is an efficient technology for data transferring. An image processing system based on mobile described be able binarize, locate, segment, decode QR Code. Our experimental results indicate that these algorithms are robust real...
The Internet of Things (IoT) aims at connecting things to the in a peer-to-peer paradigm for data collecting and sharing our daily life. A blockchain is an immutable append-only ledger maintained by network, where whole network needs reach consensus on transactional stored ledger. With decentralization nature, design IoT aligns with each other well. Blockchain has been integrated solve existing problems. Our research focuses analyzing solutions proposed academia methodologies used integrate...
Abstract Lipidomics research could provide insights of pathobiological mechanisms in Alzheimer’s disease. This study explores a battery plasma lipids that can differentiate disease (AD) patients from healthy controls and determines whether lipid profiles correlate with genetic risk for AD. AD samples were collected the Sydney Memory Ageing Study (MAS) Sydney, Australia (aged range 75–97 years; 51.2% male). Untargeted lipidomics analysis was performed by liquid chromatography coupled–mass...
Federated learning is an emerging privacy-preserving AI technique where clients (i.e., organizations or devices) train models locally and formulate a global model based on the local updates without transferring data externally. However, federated systems struggle to achieve trustworthiness embody responsible principles. In particular, face accountability fairness challenges due multistakeholder involvement heterogeneity in client distribution. To enhance of systems, we present...
Artificial Intelligence (AI), particularly through the advent of large-scale generative AI (GenAI) models such as Large Language Models (LLMs), has become a transformative element in contemporary technology. While these have unlocked new possibilities, they simultaneously present significant challenges, concerns over data privacy and propensity to generate misleading or fabricated content. Current frameworks for Responsible (RAI) often fall short providing granular guidance necessary...
Internet of Things (IoT) devices facilitate intelligent service delivery in a broad range settings, such as smart offices, homes and cities. However, the existing IoT access control solutions are mainly based on conventional identity management schemes use centralized architectures. There known security privacy limitations with architectures, single-point failure or surveillance (e.g., device tracking). Hence, this paper, we present an architecture for capability-based utilizing blockchain...
Self-sovereign identity (SSI) is considered to be a "killer application" of blockchain.However, there lack systematic architecture designs for blockchain-based SSI systems support methodical development.An aspect such gap demonstrated in current solutions, which are coarse grained and may increase data security risks.In this paper, we first identify the lifecycles three major objects (i.e., key, identifier, credential) present fine-grained design patterns critical application...
In industrial wireless sensor networks, an energy-efficient quality-of-service (QoS) routing algorithm is very important to ensure that the key sensing data can be forwarded in a reliable path and solve energy balance problem. this paper, we classify into three types set their priority. Furthermore, give reliability parameters timeliness parameters, propose establish candidate forwarding node order consumption. Subsequently, QoS aware designed, algorithm, different kinds of with strategies....
The automatic recognition algorithm of quick response code is discussed in this paper. An image processing system based on embedded described to be able binarization, location, segment, and decoding the QR code. In order adapting various sizes, gray-level values, under lighting conditions real bar image, a high-speed, high-accuracy binarization method developed, which can locate finder pattern accurately integrate local thresholding with global thresholding. Experiments have shown that over...
Self-sovereign identity is a new management paradigm that allows entities to really have the ownership of their data and control use without involving any intermediary. Blockchain an enabling technology for building self-sovereign systems by providing neutral trustable storage computing infrastructure, can be viewed as component systems. Both blockchain are emerging technologies which could present steep learning curve architects. We collect propose 12 design patterns blockchain-based help...
The advent of Generative AI has marked a significant milestone in artificial intelligence, demonstrating remarkable capabilities generating realistic images, texts, and data patterns. However, these advancements come with heightened concerns over privacy copyright infringement, primarily due to the reliance on vast datasets for model training. Traditional approaches like differential privacy, machine unlearning, poisoning only offer fragmented solutions complex issues. Our paper delves into...
Individuals working in process facilities containing toxic gases may face gas releases and poisoning risks. Many studies regarding individual risk (IR) have been carried out on a worst scenario basis. However, the scenario‐based approach cannot represent realistic release risks overestimate IR. In this study, an based complete accident set (CASS) computational fluid dynamics (CFD) is proposed to quantitatively assess IR of facilities. By combining leakage probability joint distribution wind...
Vascular dementia (VaD) is a complex neurocognitive disorder secondary to variety of cerebrovascular lesions. Numerous studies have shown that lipid metabolism involved in the pathobiology disease. We examined plasma profiles VaD, with expectation identifying reliable biomarkers for VaD. 49 VaD patients and 48 healthy controls were recruited from Bankstown-Lidcombe Hospital Sydney, Australia. Lipids extracted by single phase 1-butanol/methanol, untargeted analysis was performed liquid...