Skip to main content

Research Repository

Advanced Search

All Outputs (120)

A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing (2023)
Journal Article
Zhao, L., Zhao, Z., Zhang, E., Hawbani, A., Al-Dubai, A., Tan, Z., & Hussain, A. (2023). A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing. IEEE Journal on Selected Areas in Communications, 41(11), 3386-3400. https://doi.org/10.1109/jsac.2023.3310062

Vehicle Edge Computing (VEC) is a promising paradigm that exposes Mobile Edge Computing (MEC) to road scenarios. In VEC, task offloading can enable vehicles to offload the computing tasks to nearby Roadside Units (RSUs) that deploy computing capabili... Read More about A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing.

MedOptNet: Meta-Learning Framework for Few-shot Medical Image Classification (2023)
Journal Article
Lu, L., Cui, X., Tan, Z., & Wu, Y. (2024). MedOptNet: Meta-Learning Framework for Few-shot Medical Image Classification. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 21(4), 725-736. https://doi.org/10.1109/TCBB.2023.3284846

In the medical research domain, limited data and high annotation costs have made efficient classification under few-shot conditions a popular research area. This paper proposes a meta-learning framework, termed MedOptNet, for few-shot medical image c... Read More about MedOptNet: Meta-Learning Framework for Few-shot Medical Image Classification.

A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs (2023)
Presentation / Conference Contribution
McLaren, R. A., Babaagba, K., & Tan, Z. (2022, September). A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs. Presented at The 8th International Conference on machine Learning, Optimization and Data science - LOD 2022, Certosa di Pontignano, Siena – Tuscany, Italy

As the field of malware detection continues to grow, a shift in focus is occurring from feature vectors and other common, but easily obfuscated elements to a semantics based approach. This is due to the emergence of more complex malware families that... Read More about A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs.

An omnidirectional approach to touch-based continuous authentication (2023)
Journal Article
Aaby, P., Giuffrida, M. V., Buchanan, W. J., & Tan, Z. (2023). An omnidirectional approach to touch-based continuous authentication. Computers and Security, 128, Article 103146. https://doi.org/10.1016/j.cose.2023.103146

This paper focuses on how touch interactions on smartphones can provide a continuous user authentication service through behaviour captured by a touchscreen. While efforts are made to advance touch-based behavioural authentication, researchers often... Read More about An omnidirectional approach to touch-based continuous authentication.

Preserving Differential Privacy in Deep Learning Based on Feature Relevance Region Segmentation (2023)
Journal Article
Wang, F., Xie, M., Tan, Z., Li, Q., & Wang, C. (2024). Preserving Differential Privacy in Deep Learning Based on Feature Relevance Region Segmentation. IEEE Transactions on Emerging Topics in Computing, 12(1), 307 - 315. https://doi.org/10.1109/TETC.2023.3244174

In the era of big data, deep learning techniques provide intelligent solutions for various problems in real-life scenarios. However, deep neural networks depend on large-scale datasets including sensitive data, which causes the potential risk of priv... Read More about Preserving Differential Privacy in Deep Learning Based on Feature Relevance Region Segmentation.

CDTier:A Chinese Dataset of Threat Intelligence Entity Relationships (2023)
Journal Article
Zhou, Y., Ren, Y., Yi, M., Xiao, Y., Tan, Z., Moustafa, N., & Tian, Z. (2023). CDTier:A Chinese Dataset of Threat Intelligence Entity Relationships. IEEE Transactions on Sustainable Computing, 8(4), 627-638. https://doi.org/10.1109/TSUSC.2023.3240411

Cyber Threat Intelligence (CTI), which is knowledge of cyberspace threats gathered from security data, is critical in defending against cyberattacks.However, there is no open-source CTI dataset for security researchers to effectively apply enormous C... Read More about CDTier:A Chinese Dataset of Threat Intelligence Entity Relationships.

Special Issue on Adversarial AI to IoT Security and Privacy Protection: Attacks and Defenses (2022)
Journal Article
Gao, H., & Tan, Z. (2022). Special Issue on Adversarial AI to IoT Security and Privacy Protection: Attacks and Defenses. Computer Journal, 65(11), 2847-2848. https://doi.org/10.1093/comjnl/bxac128

The prosperity of social IoT data brings revolutionary changes to our daily lives and greatly increases the existing data volume. But IoT data are vulnerable due to security and privacy issues. Over the past few years, malicious adversaries exploited... Read More about Special Issue on Adversarial AI to IoT Security and Privacy Protection: Attacks and Defenses.

A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling (2022)
Presentation / Conference Contribution
Turnbull, L., Tan, Z., & Babaagba, K. (2022, June). A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling. Presented at The 2022 5th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022), Edinburgh [Online]

Malicious software trends show a persistent yearly increase in volume and cost impact. More than 350,000 new malicious or unwanted programs that target various technologies were registered daily over the past year. Metamorphic malware is a specifical... Read More about A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling.

Ensemble learning-based IDS for sensors telemetry data in IoT networks (2022)
Journal Article
Naz, N., Khan, M. A., Alsuhibany, S. A., Diyan, M., Tan, Z., Khan, M. A., & Ahmad, J. (2022). Ensemble learning-based IDS for sensors telemetry data in IoT networks. Mathematical Biosciences and Engineering, 19(10), 10550-10580. https://doi.org/10.3934/mbe.2022493

The Internet of Things (IoT) is a paradigm that connects a range of physical smart devices to provide ubiquitous services to individuals and automate their daily tasks. IoT devices collect data from the surrounding environment and communicate with ot... Read More about Ensemble learning-based IDS for sensors telemetry data in IoT networks.

Evaluation Mechanism for Decentralised Collaborative Pattern Learning in Heterogeneous Vehicular Networks (2022)
Journal Article
Qiao, C., Qiu, J., Tan, Z., Min, G., Zomaya, A. Y., & Tian, Z. (2023). Evaluation Mechanism for Decentralised Collaborative Pattern Learning in Heterogeneous Vehicular Networks. IEEE Transactions on Intelligent Transportation Systems, 24(11), 13123 - 13132. https://doi.org/10.1109/TITS.2022.3186630

Collaborative machine learning, especially Feder-ated Learning (FL), is widely used to build high-quality Machine Learning (ML) models in the Internet of Vehicles (IoV). In this paper, we study the performance evaluation problem in an inherently hete... Read More about Evaluation Mechanism for Decentralised Collaborative Pattern Learning in Heterogeneous Vehicular Networks.

Building Towards Automated Cyberbullying Detection: A Comparative Analysis (2022)
Journal Article
Al Harigy, L. M., Al Nuaim, H. A., Moradpoor, N., & Tan, Z. (2022). Building Towards Automated Cyberbullying Detection: A Comparative Analysis. Computational Intelligence and Neuroscience, 2022, Article 4794227. https://doi.org/10.1155/2022/4794227

The increased use of social media between digitally anonymous users, sharing their thoughts and opinions, can facilitate participation and collaboration. However, it’s this anonymity feature which gives users freedom of speech and allows them to cond... Read More about Building Towards Automated Cyberbullying Detection: A Comparative Analysis.

A novel flow-vector generation approach for malicious traffic detection (2022)
Journal Article
Hou, J., Liu, F., Lu, H., Tan, Z., Zhuang, X., & Tian, Z. (2022). A novel flow-vector generation approach for malicious traffic detection. Journal of Parallel and Distributed Computing, 169, 72-86. https://doi.org/10.1016/j.jpdc.2022.06.004

Malicious traffic detection is one of the most important parts of cyber security. The approaches of using the flow as the detection object are recognized as effective. Benefiting from the development of deep learning techniques, raw traffic can be di... Read More about A novel flow-vector generation approach for malicious traffic detection.

Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT (2022)
Journal Article
Wang, F., Yang, S., Wang, C., Li, Q., Babaagba, K., & Tan, Z. (2022). Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT. International Journal of Intelligent Systems, 37(10), 7058-7078. https://doi.org/10.1002/int.22871

Internet of Things (IoT) is fast growing. Non-PC devices under the umbrella of IoT have been increasingly applied in various fields and will soon account for a significant share of total Internet traffic. However, the security and privacy of IoT and... Read More about Toward Machine Intelligence that Learns to Fingerprint Polymorphic Worms in IoT.

A Novel Nomad Migration-Inspired Algorithm for Global Optimization (2022)
Journal Article
Lin, N., Fu, L., Zhao, L., Hawbani, A., Tan, Z., Al-Dubai, A., & Min, G. (2022). A Novel Nomad Migration-Inspired Algorithm for Global Optimization. Computers and Electrical Engineering, 100, Article 107862. https://doi.org/10.1016/j.compeleceng.2022.107862

Nature-inspired computing (NIC) has been widely studied for many optimization scenarios. However, miscellaneous solution space of real-world problem causes it is challenging to guarantee the global optimum. Besides, cumbersome structure and complex p... Read More about A Novel Nomad Migration-Inspired Algorithm for Global Optimization.

Guest Editorial: Special Issue on "Advance in Mobile Edge Computing" (2021)
Journal Article
Yang, X., Tan, Z., & Xu, Y. (2021). Guest Editorial: Special Issue on "Advance in Mobile Edge Computing". Journal of Internet Technology, 22(5),

Cloud computing has a problem for communication-intensive applications, which need to meet the delay requirements. The problem becomes more intense with the huge application of the Internet of Things. Mobile Edge Computing processes data at the neare... Read More about Guest Editorial: Special Issue on "Advance in Mobile Edge Computing".

A VMD and LSTM based hybrid model of load forecasting for power grid security (2021)
Journal Article
Lv, L., Wu, Z., Zhang, J., Tan, Z., Zhang, L., & Tian, Z. (2022). A VMD and LSTM based hybrid model of load forecasting for power grid security. IEEE Transactions on Industrial Informatics, 18(9), 6474-6482. https://doi.org/10.1109/tii.2021.3130237

As the basis for the static security of the power grid, power load forecasting directly affects the safety of grid operation, the rationality of grid planning, and the economy of supply-demand balance. However, various factors lead to drastic changes... Read More about A VMD and LSTM based hybrid model of load forecasting for power grid security.

Conceptual Text Region Network: Cognition-Inspired Accurate Scene Text Detection (2021)
Journal Article
Cui, C., Lu, L., Tan, Z., & Hussain, A. (2021). Conceptual Text Region Network: Cognition-Inspired Accurate Scene Text Detection. Neurocomputing, 464, 252-264. https://doi.org/10.1016/j.neucom.2021.08.026

Segmentation-based methods are widely used for scene text detection due to their superiority in describing arbitrary-shaped text instances. However, two major problems still exist: (1) current label generation techniques are mostly empirical and lack... Read More about Conceptual Text Region Network: Cognition-Inspired Accurate Scene Text Detection.