Selected Publications from the Group:


  • Refereed journal articles:

  1. T.L. Zheng, X.  Zheng, Y.Q. Zhang, Yao Deng, Rui Zhang, L. Xiao [2018] SmartVM: a SLA-aware Microservice Deployment Framework. World Wide Web (WWW) Journal. JIF: 1.69.  Q2 (CORE A) accepted
  2. *X.J. Zeng, G.Q. Xu, X. Zheng, Y. Xiang, W.L. Zhou, E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT, IEEE Internet of Things Journal, JIF: 7.633, 2018 Q1. accepted
  3. *Haiming X, Guangyu T,  Guangqian D, Yong Hu,  Hongxu Ch, X.  Zheng, Tom H. Luan (2018) A Hybrid Method Combining Markov Prediction and Fuzzy Classification For Driving Condition Recognition.  IEEE Transactions on Vehicular Technology. in-press, accepted Feb/2018. JIF: 4.17. Q1.
  4. G.Q. Xu, Y. Zhang, A.K. Sangaiah, X.H. Li, A. Castiglione, X. Zheng (2018) CSP-E2: An abuse-free Contract Signing Protocol with low-storage TTP for energy-efficient electronic transaction ecosystems. Journal of Information Science. in-press, accepted Feb/2018. INFORMATION SCIENCES, JIF: 4.81, Q1
  5. *D.J. Yu, Yike Jin, Y.Q. Zhang, X. Zheng (2018)  A Survey on Security Issues in Services Communication of Microservices.  Concurrency and Computation: Practice and Experience. in-press, accepted Jan/2018,  JIF: 1.19.  Q3 (CORE A)
  6. *X. Zheng, C. Julien,  H.X. Chen, R. Podorozhny, f. Cassez (2017)  Real-Time Simulation Support for Runtime Verification of Cyber-Physical Systems.  ACM Transactions on Embedded Computing Systems (TECS) 16(4), p.106. JIF: 1.69. Q2 (CORE A)
  7. L. Pan, X. Zheng,  P. Kolar, S. Bangay (2017)  Object Localization through Clustering Unreliable Ultrasonic Range Sensors.  International Journal of Sensor Networks pp.1-14.
  8. A. Anvari, L. Pan, X. Zheng (2017) Generating security questions for better protection of user privacy. International Journal of Computers and Applications  pp.1-22.
  9. *H. Radhappa, L. Pan, X. Zheng, W. Sheng (2017) Practical overview of security issues in wireless sensor network applications.  International Journal of Computers and Applications  pp.1-12.
  10. X. Zheng, M. Fu, Mohit Chugh (2017) Big data storage and management in SaaS applications. Journal of Communications and Information Networks 2(3) pp.18-29.
  11. *L. Pan, X. Zheng, H.X. Chen, T. Luan, H. Bootwala, L. Batten (2017)  Cyber Security Attacks to Modern Vehicular Systems. Journal of Information Security and Application 36, pp.90-100.
  12. *X. Zheng, C. Julien, R. Podorozhny, F. Cassez, T. Rakotoarivelo (2016)  Efficient and Scalable Runtime Monitoring for Cyber–Physical System.  IEEE Systems Journal Volume: PP issue:99.  JIF: 3.15. Q1.
  13. * X.Zheng, C. Julien, M. Kim, S. Khurshid (2015) Perceptions on the State of the Art in Verification and Validation in Cyber Physical Systems.  IEEE Systems Journal Volume: 11  Issue: 4.  JIF: 3.15. Q1.
  14. C. Zhang, X.P. Wu, X. Zheng, Shui Yu. Driver Drowsiness Detection using Multi-channel Second Order Blind Identification, IEEE Access, 2019, Q1.
  15. X. Zhou, X.L. Cai, Y.H. Bu, X. Zheng, J. Jin, T.H. Luan, C.L. Li. When Road Information Meets Data Mining: A Novel Approach to Discover Knowledge, IEEE ACCESS, 2019, Q1.
  16. Tian Wang, Hao Luo, Xi Zheng, Mande Xie. Crowdsourcing Mechanism for Trust Evaluation in CPCS based on Intelligent Mobile Edge Computing. ACM Transactions on Intelligent Systems and Technology, 2019, Q1.


  • Fully refereed conference proceedings

  1. *M. Fu, C.M. Wong, H. Zhu, Y.J. Huang, Y.P. Li, X. Zheng, J. Wu, J. Yang, C.M. Vong, DAliM: Machine Learning Based Intelligent Lucky Money Determination for Large-Scale E-Commerce Businesses, ICSOC 2018, CORE AACCEPTANCE RATE < 15%
  2. *D. Wang, S. Wen, Wanlei Z., X. Zheng (2018) Who Spread to Whom? Inferring Online Social Networks   with User Features.  IEEE International Conference on Communications, Kansas City, MO, USA. in-press, accepted Jan/2018, CORE B
  3. *X. Zheng, Jiao Jiao Jiang, Y.Q. Zhang,  Yao Deng, Min Fu, TianLei Zheng, Liu Xiao (2017)  SmartVM: A Multi-Layer Microservice-Based Platform for Deploying SaaS.  International Symposium on Parallel and Distributed Processing with Applications (ISPA),  Guangzhou, China. in-press, accepted Nov/2017, CORE B
  4. *Y.Q. Zhang, M.S. Zhang, X. Zheng, D. E. Perry (2017) Service2vec: A Vector Representation for Web Services.  International Conference on Web Services (ICWS) Honolulu pp. 890-893, Hawaii, USA. CORE A
  5. *B. Bhandari, C. Lu, X. Zheng, S. Rajasegara, C. Karmakar (2017)  Non-Invasive Sensor Based Automated Smoking Activity Detection. International Conference of the IEEE Engineering in Medicine and Biology Society pp. 845-848,  Jeju, Korea. CORE A
  6. X.Zheng, A. Bansal, M. Lease (2017)  Bullseye: Structured Passage Retrieval and Document Highlighting for Scholarly Search,  Proc. of Asia-Pacific Conference on Conceptual Modelling p.32  , Geelong, Australia, 2017. CORE B
  7. *V. Pham, X. Liu, X.Zheng,  M. Fu, S. Deshpande, W.D. Xia, M. Abdelrazek (2017)  PaaS – Black or White: An Investigation into Software Development Model for Building Retail Industry SaaS. Proc. of  International Conference on Software Engineering Companion (ICSE-C), Buenos Aires, Argentina.
  8. B. Abkenar, S. W. Loke, X. Zheng, A. Zaslavasky (2017) Service-Mediated On-Road Situation-Awareness for Group Activity Safety. International Workshop on Next Generation Computing (NGCom), In Conjunction with MobiQuitous. Melbourne, Australia.
  9. *T.L. Zheng, Y.Q. Zhang, X.Zheng, M. Fu, L. Xiao, L.M. Zhu (2017) BigVM: A Multi-Layer-Microservice-Based Platform for Deploying SaaS.  International Conference on Advanced Cloud and Big Data (CBD) pp. 45-50.   Shanghai, China.
  10. *X. Zheng,  Pan, H.X. Chen, R. D. Pietro, L. Batten (2017)  A Testbed for Security Analysis of Modern Vehicle Systems.   International Symposium on Security, Privacy and Trust in Internet of Things, In Conjunction with TrustCom pp. 1090-1095,  Sydney, Australia.
  11. * X.Zheng, L. Pan, E. Yilmaz (2017)  Security Analysis of Modern Mission Critical Android Mobile Applications.  Proc. of Australasian Computing Doctoral Consortium p.2, Geelong, Australia.  Best paper award
  12. *X. Zheng, Pan,  H.X.,  Chen, P.Y. Wang, L. Batten (2016) Investigating security vulnerabilities in modern vehicle systems.  Proc. of International Conference on Applications and Techniques in Information Security pp. 29-40,  Cairns,  Australia.
  13. * X.Zheng, C. Julien (2015) Verification and Validation in Cyber Physical Systems:  Research Challenges and Our Solution.  Proc. of International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS) pp. 15-18, Florence, Italy.
  14. * X.X.Zheng, C. Julien, R. Podorozhny, F. Cassez (2015) BraceAssertion: Runtime Verification of Cyber-Physical Systems.  Proc. of International Conference on Mobile Ad-hoc and Sensor Systems (MASS) pp. 298-306, Berlin,  Germany. CORE B
  15. *X. Zheng (2014) Physically Informed Assertions for Cyber Physical Systems Development and Debugging.  International Conference on Pervasive Computing and Communications Workshops. pp. 181-183, Budapest, Hungary.
  16. *X. Zheng, D. Perry, C. Julien, (2014) BraceForce: Software Engineering Support for Sensing in CPS Applications, Proc. of International Conference on Cyber-Physical Systems (ICCPS) – WiP Track pp. 228, Berlin,
  17. *X. Zheng, D. Perry, C. Julien (2014) BraceForce: a middleware to enable sensing integration in mobile applications for novice.  of International Conference on Mobile Software Engineering and Systems (MobileSoft) pp. 8-17,  In Conjunction with ICSE,  Hyderabad, India.
  18. M.D. Liu, G.Q. Xu, J. Zhang, R. Shankaran, G. Luo, X. Zheng, Z.H. Zhang, Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-scale Recommendation Systems, ICA3PP 2018, CORE B
  19. Xuejun Li, Ruimiao Ding, Xiao Liu, Wenqiang Yan, Jia Xu, Han Gao and Xi Zheng, COMEC: Computation Offloading for Video-based Heart Rate Detection APP in Mobile Edge Computing, IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA) – DEMO TRACK 2018, CORE B
  20. J.C. Lu, J.X. Wang, X. Zheng, C. Karmakar, S. Rajasegarar, Detection of smoking events from confounding activities of daily living, Australasian Conference on Health Informatics and Knowledge Management (HIKM) 2019
  21. Zhang Ning, Guangquan Xu, Guozhu Meng, and Xi Zheng. “SoProtector: Securing Native C/C++ Libraries for Mobile Applications.” In International Conference on Algorithms and Architectures for Parallel Processing, pp. 417-431. Springer, Cham, 2018. CORE B


  • Other publication outputs:

  1. X.Zheng, C.L. Fok, C. Julien, S. Khurshid, M. Kim (2014)  On the state of the art in verification and validation in cyber physical systems. The University of Texas at Austin, The Center for Advanced Research in Software Engineering, Tech. Rep. TR-ARiSE-2014-001, 1485.
  2. X.Zheng, C. Julien, R. Podorozhny, F. Cassez (2014) Braceassertion: Behavior-driven development for cps application. Tech. Report TR-ARiSE-2014-008.
  3. *X. Zheng, D.E. Perry, C. Julien (2013) Braceforce: A middleware enabling novice programmers to integrate sensing in cps applications. Tech. Report TR-ARiSE-2013-003, University of Texas at Austin.
  4. *X. Zheng, C.L. Fok, Julien, S. Khurshid, M. Kim (2013)  Brace: Assertion-driven development of cyber-physical systems applications. Tech. Report TR-ARiSE-2013-001, University of Texas at Austin.
  5. S Deep, X Zheng, L Hamey, A survey of security and privacy issues in the Internet of Things from the layered context. arXiv preprint arXiv:1903.00846
  6. LS Revadi, X Zheng, Y Jiang, Investigating Key User Experiencing Engineering Aspects in Software-as-a-Service Service Delivery Model. arXiv preprint arXiv:1812.03660
  7. X Zheng, Database as a Service-Current Issues and Its Future. arXiv preprint arXiv:1804.00465


  • Papers under review:

  1. *X. Zheng, H. Bootwala, W. Sheng, L. Pan, J.C. Lu, H. X. Chen, Security and Privacy Analysis on Vehicular Ad Hoc Network and its Way Forward, International Journal of Ad Hoc and Ubiquitous Computing, 2018 CORE B
  2. Jianchao Lu, Jiaxing Wang, Yupeng Jiang, Yao Deng, Chandan Karmakar, Sutharshan Rajasegarar, Wanlei Zhou, Shui Yu, and Xi Zheng, MFEHAR: Multiscale Feature Engineering for Human Activity Recognition Using Wearable Sensors, IEEE Internet of Things Journal, 2019. Q1.
  3. Jianchao Lu, Xi Zheng, Jiaxing Wang, Jiong Jin, Wanlei Zhou, Combining Global and Local Features to Detect Human Daily Activities, ACM Transactions on IoT, 2019. Q1.