Selected Publications from the Group:

  • Referred journal articles:

  1. T.L. Zheng, X.  Zheng, Y.Q. Zhang, Yao Deng, Rui Zhang, L. Xiao [2018] SmartVM: a SLA-aware Microservice Deployment Framework. World Wide Web (WWW) Journal. JIF: 1.69.  Q2 (CORE A) accepted
  2. *X.J. Zeng, G.Q. Xu, X. Zheng, Y. Xiang, W.L. Zhou, E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT, IEEE Internet of Things Journal, 2018, JIF: 7.633, Q1. accepted
  3. *Haiming X, Guangyu T,  Guangqian D, Yong Hu,  Hongxu Ch, X.  Zheng, Tom H. Luan (2018) A Hybrid Method Combining Markov Prediction and Fuzzy Classification For Driving Condition Recognition.  IEEE Transactions on Vehicular Technology. in-press, accepted Feb/2018. JIF: 4.17. Q1.
  4. G.Q. Xu, Y. Zhang, A.K. Sangaiah, X.H. Li, A. Castiglione, X. Zheng (2018) CSP-E2: An abuse-free Contract Signing Protocol with low-storage TTP for energy-efficient electronic transaction ecosystems. in-press, accepted Feb/2018. INFORMATION SCIENCES, JIF: 4.81, Q1
  5. *D.J. Yu, Yike Jin, Y.Q. Zhang, X. Zheng (2018)  A Survey on Security Issues in Services Communication of Microservices.  Concurrency and Computation: Practice and Experience. in-press, accepted Jan/2018,  JIF: 1.19.  Q3 (CORE A)
  6. *X. Zheng, C. Julien,  H.X. Chen, R. Podorozhny, f. Cassez (2017)  Real-Time Simulation Support for Runtime Verification of Cyber-Physical Systems.  ACM Transactions on Embedded Computing Systems (TECS) 16(4), p.106. JIF: 1.69. Q2 (CORE A)
  7. L. Pan, X. Zheng,  P. Kolar, S. Bangay (2017)  Object Localization through Clustering Unreliable Ultrasonic Range Sensors.  International Journal of Sensor Networks. pp.1-14.
  8. A. Anvari, L. Pan, X. Zheng (2017) Generating security questions for better protection of user privacy. International Journal of Computers and Applications. pp.1-22.
  9. *H. Radhappa, L. Pan, X. Zheng, W. Sheng (2017) Practical overview of security issues in wireless sensor network applications.  International Journal of Computers and Applications. pp.1-12.
  10. X. Zheng, M. Fu, Mohit Chugh (2017) Big data storage and management in SaaS applications. Journal of Communications and Information Networks. 2(3). pp.18-29.
  11. *L. Pan, X. Zheng, H.X. Chen, T. Luan, H. Bootwala, L. Batten (2017)  Cyber Security Attacks to Modern Vehicular Systems. Journal of Information Security and Application 36, pp.90-100.
  12. *X. Zheng, C. Julien, R. Podorozhny, F. Cassez, T. Rakotoarivelo (2016)  Efficient and Scalable Runtime Monitoring for Cyber–Physical System.  IEEE Systems Journal Volume: PP issue:99.  JIF: 3.15. Q1.
  13. * X.Zheng, C. Julien, M. Kim, S. Khurshid (2015) Perceptions on the State of the Art in Verification and Validation in Cyber Physical Systems.  IEEE Systems Journal Volume: 11  Issue: 4.  JIF: 3.15. Q1.
  14. C. Zhang, X.P. Wu, X. Zheng, Shui Yu. Driver Drowsiness Detection using Multi-channel Second Order Blind Identification, IEEE Access, 2019, JIF: 4.098. Q1.
  15. X. Zhou, X.L. Cai, Y.H. Bu, X. Zheng, J. Jin, T.H. Luan, C.L. Li. When Road Information Meets Data Mining: A Novel Approach to Discover Knowledge, IEEE ACCESS, 2019, JIF: 4.098. Q1.
  16. Tian Wang, Hao Luo, Xi Zheng, Mande Xie. Crowdsourcing Mechanism for Trust Evaluation in CPCS based on Intelligent Mobile Edge Computing. ACM Transactions on Intelligent Systems and Technology, 2019, JIF: 2.861. Q2.
  17. Xiaoming Li, Guangquan Xu, Xi Zheng, Kaitai Liang, Emmanouil Panaousis, Tao Li, Wei Wang, Chao Shen. Using Sparse Representation to Detect Anomalies in Complex WSNs. ACM Transactions on Intelligent Systems and Technology, 2019, JIF: 2.861. Q2.
  18. Gongyu Zhou, Guangquan Xu, Jianye Hao, Shizhan Chen, Junfeng Xu, and Xi Zheng. Generalized Centered Two-Dimensional Principal Component Analysis. IEEE Transactions on Cybernetics, 2019, JIF:10.387. Q1.
  19. J.X. Wang, B. Cao, J. Fan, D.P. Tan, X. Zheng (2019) Detecting Difference between Process Models using Edge Network. IEEE Access, JIF: 4.098. Q1.
  20. Tian Wang, HaoXiong Ke, Xi Zheng. Big Data Cleaning Based on Mobile Edge Computing in Industrial Sensor-Cloud, IEEE Transactions on Industrial Informatics, 2019, JIF:7.377. Q1.
  21. G.Q. Xu, B.J. Guo, C.H. Su, X. Zheng, K.T. Liang, D.C. S. Wong, H. Wang (2019) Am I Eclipsed? A Smart Detector of Eclipse Attacks for Ethereum. Computers & Security, JIF:3.062. Q2.
  22. Deep, Samundra; Zheng, Xi; Karmakar, Chandan; Yu, Dongjin; Hamey, Len; Jin, Jiong. (2019) A Survey on Anomalous Behavior Detection for Edlerly Care using Dense-sensing Networks. IEEE Communications Surveys and Tutorials. JIF:22.937. Q1.
  23. Xu, Guangquan; Wang, Weizhe; Jiao, Litao; Zhang, Ning; Liang, Kaitai; Zheng, Xi; Lian, Wenjuan; Xian, Hequn; Gao, Honghao. (2019)SoProtector: Safeguard Privacy fo Native SO Files in Evolving Mobile IoT Applications. IEEE Internet of Things Journal. JIF:9.515. Q1.
  24. Zhang, R.J.C.; Chen, X.; Wen, S.; Zheng, X.; Ding, T. 2019. Using AI to Attack VA: A Stealthy Spyware against Voice Assistances in Smart Phones. IEEE Access. JIF: 4.098. Q1.
  25. TH Zhang, J Jin, X Zheng, Y Yang. Rate Adaptive Fog Service Platform for Heterogeneous IoT Applications. IEEE Internet of Things Journal, 2019, JIF:9.515. Q1.
  26. Hu, Zhengdi; Xu, Guangquan; Zheng, Xi; Liu, Jiang; Li, Zhangbing; Quan Z. Sheng. SSL-SVD: Semi-Supervised Learning Based Sparse Trust Recommendation. ACM Transactions on Internet Technology. 2019. JIF: 2.382. Q2
  27. Mei, Yaxin; Jia, Weijia; Zheng, Xi; Wang, Guojun; Xie, Mande. Edge-based Differenital Privacy Computing for Sensor-Cloud Systems. Journal of Parallel and Distributed Computing. 2019. JIF: 1.891. Q2
  28. Zhang, Yuping; Qu, Youyang; Gao, Longxiang;  Luan, T.H.; Zheng, Xi; Chen, Shiping; Xiang, Yong.  APDP: Attack-proof Personalized Differential Privacy Model for a Smart Home.  IEEE Access 2019. JIF: 4.098. Q1

  29. Dibae, Mahdi; Zheng, Xi; Jiang, Kun; Abbas, Robert; Liu, Shigang; Zhang, Yuexin; Xiang, Yang; Yu, Shui. Attacks and Defences on Intelligent Connected Vehicles: A Survey. Digital Communications and Networks. 2019. JIF: 3.410. Q1. (Hardware And Architecture Track)
  30. Jun Wu, Li, Jianan; Wu, Jun; Xu, Guangquan; Li, Jianhua; Zheng, Xi; Jolfaei, Alireza.  Integrating NFV and ICN for advanced driver assistance systems.  IEEE Internet of Things Journal. 2019.JIF:9.515. Q1

  31. Wang, Tian; Lu,Yucheng; Cao, Zhihan; Shu, Lei; Zheng, Xi; Liu, Anfeng. When Sensor-Cloud Meets Mobile Edge Computing. Sensors.2019. JIF:3.031. Q2
  32. Guangquan Xu;Wang Weizhe; Litao Jiao; N. Zhang; Kaitai Liang; X. Zheng; SoProtector: Safeguard Privacy fo Native SO Files in Evolving Mobile IoT Applications. IEEE Internet of Things Journal, 2019.JIF:9.515. Q1

  • Fully referred conference proceedings

  1. *M. Fu, C.M. Wong, H. Zhu, Y.J. Huang, Y.P. Li, X. Zheng, J. Wu, J. Yang, C.M. Vong, DAliM: Machine Learning Based Intelligent Lucky Money Determination for Large-Scale E-Commerce Businesses, ICSOC 2018, CORE AACCEPTANCE RATE < 15%
  2. *D. Wang, S. Wen, Wanlei Z., X. Zheng (2018) Who Spread to Whom? Inferring Online Social Networks   with User Features.  IEEE International Conference on Communications, Kansas City, MO, USA. in-press, accepted Jan/2018.
  3. *X. Zheng, Jiao Jiao Jiang, Y.Q. Zhang,  Yao Deng, Min Fu, TianLei Zheng, Liu Xiao (2017)  SmartVM: A Multi-Layer Microservice-Based Platform for Deploying SaaS.  International Symposium on Parallel and Distributed Processing with Applications (ISPA),  Guangzhou, China. in-press, accepted Nov/2017.
  4. *Y.Q. Zhang, M.S. Zhang, X. Zheng, D. E. Perry (2017) Service2vec: A Vector Representation for Web Services.  International Conference on Web Services (ICWS) Honolulu pp. 890-893, Hawaii, USA. CORE A
  5. *B. Bhandari, C. Lu, X. Zheng, S. Rajasegara, C. Karmakar (2017)  Non-Invasive Sensor Based Automated Smoking Activity Detection. International Conference of the IEEE Engineering in Medicine and Biology Society pp. 845-848,  Jeju, Korea. CORE A
  6. X.Zheng, A. Bansal, M. Lease (2017)  Bullseye: Structured Passage Retrieval and Document Highlighting for Scholarly Search,  Proc. of Asia-Pacific Conference on Conceptual Modelling p.32  , Geelong, Australia, 2017.
  7. *V. Pham, X. Liu, X.Zheng,  M. Fu, S. Deshpande, W.D. Xia, M. Abdelrazek (2017)  PaaS – Black or White: An Investigation into Software Development Model for Building Retail Industry SaaS. Proc. of  International Conference on Software Engineering Companion (ICSE-C), Buenos Aires, Argentina.
  8. B. Abkenar, S. W. Loke, X. Zheng, A. Zaslavasky (2017) Service-Mediated On-Road Situation-Awareness for Group Activity Safety. International Workshop on Next Generation Computing (NGCom), In Conjunction with MobiQuitous. Melbourne, Australia.
  9. *T.L. Zheng, Y.Q. Zhang, X.Zheng, M. Fu, L. Xiao, L.M. Zhu (2017) BigVM: A Multi-Layer-Microservice-Based Platform for Deploying SaaS.  International Conference on Advanced Cloud and Big Data (CBD) pp. 45-50.   Shanghai, China.
  10. *X. Zheng,  Pan, H.X. Chen, R. D. Pietro, L. Batten (2017)  A Testbed for Security Analysis of Modern Vehicle Systems.   International Symposium on Security, Privacy and Trust in Internet of Things, In Conjunction with TrustCom pp. 1090-1095,  Sydney, Australia.
  11. * X.Zheng, L. Pan, E. Yilmaz (2017)  Security Analysis of Modern Mission Critical Android Mobile Applications.  Proc. of Australasian Computing Doctoral Consortium p.2, Geelong, Australia.  Best paper award
  12. *X. Zheng, Pan,  H.X.,  Chen, P.Y. Wang, L. Batten (2016) Investigating security vulnerabilities in modern vehicle systems.  Proc. of International Conference on Applications and Techniques in Information Security. pp. 29-40,  Cairns,  Australia.
  13. * X.Zheng, C. Julien (2015) Verification and Validation in Cyber Physical Systems:  Research Challenges and Our Solution.  Proc. of International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS) pp. 15-18, Florence, Italy.
  14. * X.Zheng, C. Julien, R. Podorozhny, F. Cassez (2015) BraceAssertion: Runtime Verification of Cyber-Physical Systems.  Proc. of International Conference on Mobile Ad-hoc and Sensor Systems (MASS) pp. 298-306, Berlin,  Germany.
  15. *X. Zheng (2014) Physically Informed Assertions for Cyber Physical Systems Development and Debugging.  International Conference on Pervasive Computing and Communications Workshops. pp. 181-183, Budapest, Hungary.
  16. *X. Zheng, D. Perry, C. Julien, (2014) BraceForce: Software Engineering Support for Sensing in CPS Applications, Proc. of International Conference on Cyber-Physical Systems (ICCPS) – WiP Track pp. 228, Berlin,
  17. *X. Zheng, D. Perry, C. Julien (2014) BraceForce: a middleware to enable sensing integration in mobile applications for novice.  of International Conference on Mobile Software Engineering and Systems (MobileSoft) pp. 8-17,  In Conjunction with ICSE,  Hyderabad, India.
  18. M.D. Liu, G.Q. Xu, J. Zhang, R. Shankaran, G. Luo, X. Zheng, Z.H. Zhang, Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-scale Recommendation Systems, ICA3PP 2018.
  19. Xuejun Li, Ruimiao Ding, Xiao Liu, Wenqiang Yan, Jia Xu, Han Gao and Xi Zheng, COMEC: Computation Offloading for Video-based Heart Rate Detection APP in Mobile Edge Computing, IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA) – DEMO TRACK 2018.
  20. J.C. Lu, J.X. Wang, X. Zheng, C. Karmakar, S. Rajasegarar, Detection of smoking events from confounding activities of daily living, Australasian Conference on Health Informatics and Knowledge Management (HIKM) 2019
  21. Zhang Ning, Guangquan Xu, Guozhu Meng, and Xi Zheng. “SoProtector: Securing Native C/C++ Libraries for Mobile Applications.” In International Conference on Algorithms and Architectures for Parallel Processing, pp. 417-431. Springer, Cham, 2018.
  22. Tiehua Zhang, Zhishu Shen, Jiong Jin, Atsushi Tagami, Xi Zheng, Yun Yang. ESDA: An Energy-Saving Data Analytics Fog Service Platform. ICSOC 2019. CORE A
  23. Zhengdi Hu, Guangquan Xu, Xi Zheng, Jiang Liu, Zhangbing Li. SSL-STR: Semi-Supervised Learning for Sparse Trust Recommendation. GLOBECOM 2019.
  24. J.C. Lu, X. Zheng, J.X. Wang, M. Sheng, W.L. Zhou (2019) MFE-HAR: Multiscale Feature Engineering for Human Activity Recognition Using Wearable Sensors, Mobiquitous. CORE A
  25. Rongjunchen Zhang, Xiao Chen, Sheng Wen and Xi Zheng (2019) Who Activated My Voice Assistant? A Stealthy Attack on Android phones without Users’ Awareness, International Conference on Machine Learning for Cyber Security.
  26. Samundra Deep and Xi Zheng (2019) Hybrid model featuring CNN and LSTM architecture for Human Activity Recognition on smartphone sensor data. International Conference on Parallel and Distributed Computing, Applications and Technologies.
  27. Yuwei Xia, Min Fu and Xi Zheng. TrORF: Building Trading Areas around Organizations Based on Machine Learning Techniques. The 2019 4th International Conference on Artificial Intelligence, Electronics and Computing Technology.

  • Other program leaders key publication outputs:

  1. Shengchao Liu, Jianping Weng, Hui Wang, Changqing An, Yipeng Zhou and Jinlong Wang: An Adaptive Online Scheme for Scheduling and Resource Enforcement in Storm. To appear in IEEE/ACM Transactions on Networking.
  2. Miao Hu, Lei Zhuang, Di Wu, Yipeng Zhou, Xu Chen and Liang Xiao: Learning Driven Computation Offloading for Asymmetrically Informed Edge Computing. IEEE Transactions on Parallel and Distributed Systems, Volume 30, Issue 8, Pages 1802-1815, 2019.
  3. Yipeng Zhou, Jiqiang Wu, Terence Chan, Siu Wai Ho, Dah Ming Chiu and Di Wu: Interpreting Video Recommendation Mechanisms via Mining View Count Traces [J]. IEEE Transactions on Multimedia, volume 20, issue 8, pages 2153-2165, 2018.
  4. Yipeng Zhou, Xuhong Gu, Di Wu, Min Chen, Terence Chan and Siu Wai Ho: Statistical Study of View Preferences for Online Videos with Cross-platform Information [J]. IEEE Transactions on Multimedia, volume 20, issue 6, pages 15121524, 2017.
  5. Yipeng Zhou, Terence Chan, Siu Wai Ho, Guoqiao Ye and Di Wu: Replicating Coded Content in Crowdsourcing-Based CDN Systems [J]. IEEE Transactions on Circuits and Systems for Video Technology, Volume 28, Issue 12, Pages 3492-3503, 2017.
  6. Yuedong Xu, Zhujun Xiao, Hui Feng, Tao Yang, Bo Hu and Yipeng Zhou: Modeling Buffer Starvations of Video Streaming in Cellular Networks with Large-Scale Measurement of User Behavior [J]. IEEE Transactions on Mobile Computing, volume 16, issue 8, pages 2228-2245, 2017.
  7. Jiqiang Wu, Yipeng Zhou*, Dah Ming Chiu and Zirong Zhu. Modeling Dynamics of Online Video Popularity [J]. IEEE Transactions on Multimedia, volume 18, issue 9, pages 1882-1895.
  8. Yipeng Zhou, Tom Z.J. Fu and Dah Ming Chiu. A Unifying Model and Analysis of P2P VoD Replication and Scheduling [J]. IEEE/ACM Transactions on Networking, volume 23, issue 4, pages 1163-1175, 2015.
  9. Yuedong Xu, Yipeng Zhou and Dah Ming Chiu. Analytical QoE Models for BitRate Switching in Dynamic Adaptive Streaming Systems [J]. IEEE Transactions on Mobile Computing, volume 13, issue 12, pages 2734-2748, 2014. (JCR Q1, IF 4.098)
  10. Yipeng Zhou, Tom Z. J. Fu and Dah Ming Chiu. On Replication Algorithms in P2P VoD [J]. IEEE/ACM Transactions on Networking, volume 21, issue 1, pages 233243, 2013.
  11. Zhanpeng Wu, Yipeng Zhou, Di Wu, Min Chen and Yuedong Xu: Towards Personalized Time-Aware Recommendation for Over-The-Top Videos. In Proceedings of ACM NOSSDAV 2019.
  12. Xuhong Gu, Yipeng Zhou, Di Wu, Terence H. Chan and Min Chen: Unveiling Latent Behaviors of Video Viewers with Cross-Platform Information. In Proceedings of ACM NOSSDAV 2017.
  13. Jiaming Zhang, Yipeng Zhou, Di Wu and Chunfeng Yang: Context-aware Video Recommendation by Mining Users View Preferences Based on Access Points. In Proceedings of ACM NOSSDAV 2017.
  14. Lei Huang, Wenbo Ding, Yuedong Xu and Yipeng Zhou: Analysis of User Behavior in a Large-scale VoD System. In Proceedings of ACM NOSSDAV 2017.
  15. Chunfeng Yang, Yipeng Zhou, Liang Chen and Dah Ming Chiu. Social Group Based Video Recommendation Addressing the Cold-Start Problem [C]. In Proceedings of PAKDD 2016.
  16. Jiqiang Wu, Yipeng Zhou*, Dah Ming Chiu and Zirong Zhu: Modeling Dynamics of Online Video Popularity [C]. In: Proceedings of IEEE/ACM IWQoS 2015 (short paper), Portland, USA.
  17. Liang Chen, Yipeng Zhou*, Mi Jing and Tianbai Ma. Thunder Crystal: A Novel Crowdsourcing-based Content Distribution Platform [C]. In: Proceedings of ACM NOSSDAV 2015, USA.
  18. Liang Chen, Yipeng Zhou* and Dah Ming Chiu. Fake View Analytics in Online Video Services [C]. In: Proceedings of ACM NOSSDAV 2014, Singapore.
  19. Yipeng Zhou , Tom Z. J. Fu and Dah Ming Chiu. A Unifying Model and Analysis of P2P VoD Replication and Scheduling [C]. In: Proceeding of IEEE Infocom 2012, Orlando, Florida USA.
  20. Yipeng Zhou , Tom Z. J. Fu and Dah Ming Chiu. Statistical Modeling and Analysis of P2P Replication to Support VoD Service [C]. In: Proceeding of IEEE  Infocom 2011, Shanghai China.
  21. Jolfaei A, Wu XW, Muthukkumarasamy V. Comments on the security of “Diffusion– substitution based gray image encryption” scheme. Digital signal processing. 2014 Sep 1;32:34-6.
  22. Jolfaei A, Mirghadri A. Image encryption using chaos and block cipher. Computer and Information Science. 2011 Jan 1;4(1):172.
  23. Jolfaei A, Wu XW, Muthukkumarasamy V. On the security of permutation-only image encryption schemes. IEEE transactions on information forensics and security. 2015 Oct 9;11(2):235-46.
  24. Jolfaei A, Mirghadri A. An image encryption approach using chaos and stream cipher. Journal of Theoretical and Applied Information Technology. 2010;19(2):117-25.
  25. Jolfaei A, Mirghadri A. Survey: image encryption using Salsa20. International Journal of Computer Science Issues (IJCSI). 2010 Sep 1;7(5):213.
  26. Jolfaei A, Mirghadri A. A new approach to measure quality of image encryption. International Journal of Computer and Network Security. 2010;2(8):38-44.
  27. Jolfaei A, Mirghadri A. A novel image encryption scheme using pixel shuffler and A5/1. In2010 International Conference on Artificial Intelligence and Computational Intelligence 2010 Oct 23 (Vol. 2, pp. 369-373). IEEE.
  28. Jolfaei A, Mirghadri A. An applied imagery encryption algorithm based on shuffling and bakers map. InProceedings of the 2010 International Conference on Artificial Intelligence and Pattern Recognition (AIPR-10), Florida, USA 2010 (pp. 279-285).
  29. Jolfaei A, Wu XW, Muthukkumarasamy V. A 3D object encryption scheme which maintains dimensional and spatial stability. IEEE Transactions on Information Forensics and Security. 2014 Dec 4;10(2):409-22.
  30. Jolfaei A, Mirghadri A. Survey: image encryption using A5/1 and W7. Journal of Computing. 2010;2(8):1-7.
  31. Zhang, Y, Ren, W, Zhu, T & Bi, W 2018, ‘MoSa: A modeling and sentiment analysis system for mobile application big data’, ICA3PP 2018: Algorithms and Architectures for Parallel Processing (LNCS), International Conference on Algorithms and Architectures for Parallel Processing, Springer, Guangzhou, China, pp. 582-595.
  32. Liu, B, Ding, M, Zhu, T, Xiang, Y & Zhou, W 2018, ‘Using Adversarial Noises to Protect Privacy in Deep Learning Era’, 2018 IEEE Global Communications Conference GLOBECOM 2018, IEEE Global Communications Conference, IEEE, Unuted Arab Emirates, pp. 2276-2281.
  33. Zhu, T, Xiong, P, Li, G, Zhou, W & Yu, PS 2017, ‘Differentially private query learning: From data publishing to model publishing’, Proceedings – 2017 IEEE International Conference on Big Data, Big Data 2017, IEEE International Conference on Big Data, IEEE, Boston, MA, USA, pp. 1117-1122.
  34. Yao, S, Chen, J, He, K, Du, R, Zhu, T & Chen, X 2019, ‘PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage Management’, IEEE Access, vol. 7, pp. 6117-6128.
  35. Zhang, L, Xiong, P, Ren, W & Zhu, T 2019, ‘A differentially private method for crowdsourcing data submission’, Concurrency Computation.
  36. Zhang, Y, Ren, W, Zhu, T & Faith, E 2019, ‘MoSa: A modeling and sentiment analysis system for mobile application big data’, Symmetry, vol. 11, no. 1.
  37. Zhang, Y, Ren, W, Zhu, T & Ren, Y 2019, ‘SaaS: A situational awareness and analysis system for massive android malware detection’, Future Generation Computer Systems, vol. 95, pp. 548-559.
  38. Zheng, R, Jiang, J, Hao, X, Ren, W, Xiong, F & Zhu, T 2019, ‘CaACBIM: A context-aware access control model for BIM’, Information (Switzerland), vol. 10, no. 2.
  39. Yang, M, Zhu, T, Liang, K, Zhou, W & Deng, RH 2019, ‘A blockchain-based location privacy-preserving crowdsensing system’, Future Generation Computer Systems, vol. 94, pp. 408-418.
  40. Guo, J, Ren, W, Ren, Y & Zhu, T 2018, ‘A watermark-based in-situ access control model for image big data’, Future Internet, vol. 10, no. 8.
  41. X. Li, Y. Wu, X. Liu, E. Zhu, H. Yi, F. Wang, C. Zhang and Y. Yang, A Novel Workflow-Level Data Placement Strategy for Data-Sharing Scientific Cloud Workflows, IEEE Transactions on Services Computing, 12(3), pp. 370-383, 2019.
  42. X. Liu, L. Fan, J. Xu, X. Li, L. Gong, J. Grundy, Y. Yang, FogWorkflowSim: An Automated Simulation Toolkit for Workflow Performance Evaluation in Fog Computing, 34th IEEE/ACM International Conference on Automated Software Engineering (Demo Track), accepted on 13 August 2019.
  43. P. Zhou, J. Liu, Z. Yang, X. Liu, J. Grundy, FastTagRec: Fast Tag Recommendation for Software Information Sites, Automated Software Engineering, Vol. 25, pp. 675-701, 2018.
  44. D. Yuan, L. Cui, W. Li, X. Liu and Y. Yang, An Algorithm for Finding the Minimum Cost of Storing and Regenerating Datasets in Multiple Clouds. IEEE Transactions on Cloud Computing, 6(2), pp.519 – 531, 2018.
  45. V. Pham, X. Liu, J. Zheng, M. Fu, S. Deshpande, W.  Xia, R. Zhou and M. Abdelrazek, PaaS – Black or White: An Investigation into Software Development Model for Building Retail Industry SaaS, 39th International Conference on Software Engineering (Poster Track), Buenos Aires, Argentina, May 20-28, 2017.
  46. W. Zhang, X. Liu and Y. Yang, Let Smart Ants Help You Reduce the Delay Penalty of Multiple Software Projects, 39th International Conference on Software Engineering (Poster Track), Buenos Aires, Argentina, May 20-28, 2017.
  47. M. Chen, S. Huang, X. Fu, X. Liu and J. He, Statistical Model Checking-Based Evaluation and Optimization for Cloud Workflow Resource Allocation, IEEE Transactions on Cloud Computing, published online: http://dx.doi.org/10.1109/ TCC.2016.2586067, 2016.
  48. G. Zhang, X. Liu and Y. Yang, Time-Series Pattern based Effective Noise Generation for Privacy Protection on Cloud. IEEE Transactions on Computers, 64(5):1456-1469, 2015.
  49. D. Yuan, X. Liu and Y. Yang, Dynamic on-the-fly Minimum Cost Benchmarking for Storing Generated Scientific Datasets in the Cloud, IEEE Transactions on Computers, 64(10):2781-2795, 2015.
  50. X. Liu, Y. Yang, D. Yuan and J. Chen, Do We Need to Handle Every Temporal Violation in Scientific Workflow Systems? ACM Transactions on Software Engineering and Methodology, 23(1): Article 5, 2014.
  51. D. Du, M. Chen, X. Liu and Y. Yang, A Novel Quantitative Evaluation Approach for Software Project Schedules using Statistical Model Checking, 36th International Conference on Software Engineering (NIER Track), pp. 476-479, Hyderabad, India, June 2014.
  52. X. Liu, Y. Yang, D. Cao and D. Yuan, Selecting Checkpoints along the Timeline: A Novel Temporal Checkpoint Selection Strategy for Monitoring a Batch of Parallel Business Processes, 35th International Conference on Software Engineering (NIER Track), pp. 1281-1284, San Francisco, USA, May 2013.
  53. D. Yuan, Y. Yang, X. Liu, W. Li, L. Cui, M. Xu and J. Chen, A Highly Practical Approach towards Achieving Minimum Datasets Storage Cost in the Cloud. IEEE Transactions on Parallel and Distributed Systems, 24(6):1234-1244, 2013.
  54. X. Liu, Y. Yang, Y. Jiang and J. Chen, Preventing Temporal Violations in Scientific Workflows: Where and How, IEEE Transactions on Software Engineering, 37(6):805-825, 2011.
  55. D. Yuan, Y. Yang, X. Liu and J. Chen, On-demand Minimum Cost Benchmarking for Intermediate Datasets Storage in Scientific Cloud Workflow Systems. Journal of Parallel and Distributed Computing, 71(1):316-332, 2011.
  56. Wen, Sheng ; Castiglione, Aniello ; Wang, Tian ; Bhuiyan, Md Zakirul Alam ; 2019. Forward to the special issue of the 9th International Symposium on Cyberspace Safety and Security (CSS 2017), 9th International Symposiumon Cyberspace Safety and Security (CSS20), ‘Concurrency and Computation: Practice and Experience’, Xi’an, China, 23–25 October 2017 / Sheng Wen, Wei Wu and Aniello Castiglione (eds.), Vol. 31, no. 22, article no. e5535
  57. Zhang, Rongjunchen ; Chen, Xiao ; Wen, Sheng ; Zheng, James ; 2019. Who activated my voice assistant? A stealthy attack on Android phones without users’ awareness, Lecture Notes in Computer Science: 2nd International Conference on Machine Learning for Cyber Security (ML4CS 2019), ‘Machine Learning for Cyber Security’, Xi’an, China, 19-21 September 2019 / X. Chen, X. Huang and J. Zhang (eds.), Vol. 11806 LNCS, pp. 378-396
  58. Zhu, Xiaogang ; Feng, Xiaotao ; Jiao, Tengyun ; Wen, Sheng ; Xiang, Yang ; Camtepe, Seyit ; Xue, Jingling ; 2019. A feature-oriented corpus for understanding, evaluating and improving fuzz testing, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security (AsiaCCS ’19), Auckland, New Zealand, 9-12 July 2019 , pp. 658-663
  59. Chen, Xiao ; Li, Chaoran ; Wang, Derui ; Wen, Sheng ; Zhang, Jun ; Nepal, Surya ; Xiang, Yang ; Ren, Kui ; 2019. Android HIV: A study of repackaging malware for evading machine-learning detection, IEEE Transactions on Information Forensics and Security, Vol. 14, no. 8 (Aug 2019)
  60. Xu, Zhiyu ; Jiao, Tengyun ; Wang, Qin ; Van, Cuong Bui ; Wen, Sheng ; Xiang, Yang ; 2019. An efficient supply chain architecture based on blockchain for high-value commodities, BSCI ’19: Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, Auckland, New Zealand, 08 July 2019, pp. 81-88
  61. Tang, Lihong ; Ma, Wanlun ; Grobler, Marthie ; Meng, Weizhi ; Wang, Yu ; Wen, Sheng ; 2019. Faces are protected as privacy: An automatic tagging framework against unpermitted photo sharing in social media, IEEE Access, Vol. 7 (2019), pp. 75556-75567
  62. Wang, Tian ; Peng, Zhen ; Wen, Sheng ; Wang, Guojun ; Wang, Baowei ; Liu, Anfeng ; 2019. A survey of fog computing in wireless sensor networks: Concepts, frameworks, applications and issues, Ad-Hoc & Sensor Wireless Networks, Vol. 44, no. 1-2 (2019), pp. 109-130
  63. Zhai, Xuemeng ; Zhou, Wanlei ; Fei, Gaolei ; Lu, Cai ; Wen, Sheng ; Hu, Guangmin ; 2019. Edge-based stochastic network model reveals structural complexity of edges, Future Generation Computer Systems, Vol. 100 (Nov 2019), pp. 1073-1087
  64. Jiang, Jiaojiao ; Wen, Sheng ; Liu, Bo ; Yu, Shui ; Xiang, Yang ; Zhou, Wanlei ; 2019. Malicious Attack Propagation and Source Identification, Series: Advances in Information Security, vol. 73
  65. Miao, Meixia ; Wang, Jianfeng ; Wen, Sheng ; Ma, Jianfeng ; 2019. Publicly verifiable database scheme with efficient keyword search, Information Sciences, Vol. 475 (Feb 2019), pp. 18-28
  66. Analyzing and Supporting Adaptation of Online Code Examples Tianyi Zhang, Di Yang, Cristina Lopes, Miryung Kim In Proceedings of the 41th International Conference on Software Engineering, pages 316-327, IEEE, 2019.
  67. Active Inductive Logic Programming for Code Search Aishwarya Sivaraman, Tianyi Zhang, Guy Van den Broeck, Miryung Kim In Proceedings of the 41th International Conference on Software Engineering, pages 292-303, IEEE, 2019.
  68. An Empirical Study of Common Challenges in Developing Deep Learning Applications Tianyi Zhang, Cuiyun Gao, Lei Ma, Michael R. Lyu, Miryung Kim In Proceedings of the 30th International Symposium on Software Reliability Engineering, 12 pages, IEEE, 2019.
  69. Are Code Examples on an Online Q&A Forum Reliable? A Study of API Misuse on Stack Overflow Tianyi Zhang, Ganesha Upadhyaya, Anastasia Reinhardt, Hridesh Rajan, Miryung Kim In Proceedings of the 40th International Conference on Software Engineering, pages 886-896, ACM, 2018.
  70. Visualizing API Usage Examples at Scale Elena Glassman, Tianyi Zhang, Bjoern Hartmann, Miryung Kim In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pages 580-591, ACM, 2018.
  71. Automated Transplantation and Differential Testing for Clones Tianyi Zhang, Miryung Kim In Proceedings of the 39th International Conference on Software Engineering, pages 665-676, IEEE, 2017.
  72. Interactive Code Review for Systematic Changes Tianyi Zhang, Myoungkyu Song, Joseph Pinedo, Miryung Kim In Proceedings of the 37th International Conference on Software Engineering, Volume 1, pages 111-122. IEEE, 2015.
  73. Chang-ai Sun, An Fu, Pak-Lok Poon, Xiaoyuan Xie, Huai Liu, and Tsong Yueh Chen, “METRIC+: A metamorphic relation identification Technique Based on Input plus Output Domains.” Accepted to appear in IEEE Transactions on Software Engineering. Acceptance date: 8/08/2019.
  74. Chang-ai Sun, Hepeng Dai, Huai Liu, Tsong Yueh Chen, and Kai-Yuan Cai, “Adaptive partition testing.” IEEE Transactions on Computers, 68(2):157-169, 2019.
  75. Chang-ai Sun, Yan Zhao, Lin Pan, Huai Liu, and Tsong Yueh Chen, “Automated testing of WS-BPEL service compositions: A scenario-oriented approach.” IEEE Transactions on Services Computing, 11(4):616-629, 2018.
  76. Tsong Yueh Chen, Fei-Ching Kuo, Huai Liu, Pak-Lok Poon, Dave Towey, T.H. Tse, and Zhi Quan Zhou, “Metamorphic testing: A review of challenges and opportunities.” ACM Computing Surveys, 51(1):4:1-4:27, 2018.
  77. Arlinta Barus, Tsong Yueh Chen, Fei-Ching Kuo, Huai Liu, Robert Merkel, and Gregg Rothermel, “A cost-effective random testing method for programs with non-numeric inputs.” IEEE Transactions on Computers, 62(12):3509-3523, 2016.
  78. Huai Liu and Tsong Yueh Chen, “Randomized quasi-random testing.” IEEE Transactions on Computers, 65(6):1896-1909, 2016.
  79. Huai Liu, Fei-Ching Kuo, Dave Towey, and Tsong Yueh Chen, “How effectively does metamorphic testing alleviate the oracle problem?” IEEE Transactions on Software Engineering, 40(1):4-22, 2014.
  80. Huai Liu, Iman I. Yusuf, Heinz W. Schmidt, and Tsong Yueh Chen, “Metamorphic fault tolerance: An automated and systematic methodology for fault tolerance in the absence of test oracle.” In: Companion Proceedings of the 36th International Conference on Software Engineering (ICSE2014), pages 420-423, 2014.
  81. Tsong Yueh Chen, Fei-Ching Kuo, Huai Liu, and W. Eric Wong, “Code coverage of adaptive random testing.” IEEE Transactions on Reliability, 62(1):226-237, 2013.
  82. Tsong Yueh Chen, Fei-Ching Kuo, and Huai Liu, “Application of a failure driven test profile in random testing.” IEEE Transactions on Reliability, 58(1):179-192, 2009.
  83. Xiwei Xu, Cesare Pautasso, Liming Zhu, Qinghua Lu, and Ingo Weber. “A Pattern Language for Blockchain-based Applications”. In: EuroPLoP2018: The 23rd European Conference on Pattern Languages of Programs. Bavaria, Germany, 2018.
  84. Xiwei Xu, Ingo Weber, Mark Staples, Liming Zhu, Jan Bosch, Len Bass, Cesare Pautasso, and Paul Rimba. “A Taxonomy of Blockchain-Based Systems for Architecture Design”. In: ICSA2017: IEEE International Conference on Software Architecture. Gothenburg, Sweden, Apr. 2017.
  85. Ingo Weber, Xiwei Xu, R´egis Riveret, Guido Governatori, Alexander Ponomarev, and Jan Mendling. “Untrusted Business Process Monitoring and Execution Using Blockchain”. In: BPM2016: The 14th International Conference on Business Process Management. Rio de Janeiro, Brazil, Sept. 2016.
  86. Xiwei Xu, Cesare Pautasso, Liming Zhu, Vincent Gramoli, Alexander Ponomarev, An Binh Tran, and Shiping Chen. “The blockchain as a software connector”. In: WICSA2016: The 13th Working IEEE/IFIP Conference on Software Architecture. IEEE. Venice, Italy, 2016, pp.182–191.
  87. Qinghua Lu and Xiwei Xu. “Adaptable Blockchain-based Systems: A Case Study for Product Traceability”. In: IEEE Software 34.6 (2017), pp. 21–27.
  88. J. Jin, M. Palaniswami, D. Yuan, Y. Dong, and K. Moessner, “Priority service provisioning and max-min fairness: a utility-based flow control approach,” Journal of Network and Systems Management, vol. 25, no. 2, pp. 397-415, April 2017.
  89. J. Jin, J. Gubbi, S. Marusic, and M. Palaniswami, “An information framework of creating a smart city through Internet of Things,” IEEE Internet of Things Journal, vol. 1, no. 2, pp. 112-121, April 2014.
  90. J. Jin, M. Palaniswami, and B. Krishnamachari, “Rate control for heterogeneous wireless sensor networks: characterization, algorithms and performance,” Computer Networks, vol. 56, no. 17, pp. 3783-3794, November 2012.
  91. Rahman, J. Jin, A. Rahman, A. Cricenti, M. Afrin, and Y. Dong, “Energy-efficient optimal task offloading in cloud networked multi-robot systems,” Computer Networks, vol. 160, pp. 11-32, September 2019.
  92. Afrin, J. Jin, A. Rahman, Y.-C. Tian, and A. Kulkarni, “Multi-objective resource allocation for edge cloud based robotic workflow in smart factory,” Future Generation Computer Systems, vol. 97, pp. 119-130, August 2019.
  93. Lyu, J. C. Bezdek, X. He, and J. Jin, “Fog-embedded deep learning for the Internet of Things,” IEEE Transactions on Industrial Informatics, vol. 15, no. 7, pp. 4206-4215, July 2019.
  94. R. Pokhrel, J. Jin, and H. L. Vu, “Mobility-aware multipath communication for unmanned aerial surveillance systems,” IEEE Transactions on Vehicular Technology, vol. 68, no. 6, pp. 6088-6098, June 2019.
  95. Rahman, J. Jin, A. Rahman, A. Cricenti, and A. Kulkarni, “Communication-aware cloud robotic task offloading with on-demand mobility for smart factory maintenance,” IEEE Transactions on Industrial Informatics, vol. 15, no. 5, pp. 2500-2511, May 2019.
  96. V. Philip, T. Alpcan, J. Jin, and M. Palaniswami, “Distributed real-time IoT for autonomous vehicles,” IEEE Transactions on Industrial Informatics, vol. 15, no. 2, pp. 1131-1140, February 2019.