Selected Publications from the Group:

  • book chapters

  1. Zheng, X 2020, ‘Real-time simulation support for real-time systems’, Handbook of Real-Time Computing, Springer
  • referred journal articles  

  1. Li, Y., Zhou, Y.P., Jolfaei, A., Yu. D.J., Xu, G.C., Zheng, X. 2020. ‘Privacy-Preserving Federated Learning Framework Based on Chained Secure Multi-party Computing’, IEEE Internet of Things Journal. Q1 (JIF: 9.51).
  2. Dibaei, M., Zheng, X., Xia, Y.H., Xu, X.W., Jolfaei, A., Bashir, A.K., Tariq, U., Yu. D.J., Vasilakos, A. 2020. ‘Investigating the Prospect of Leveraging Blockchain and Machine Learning to Secure Vehicular Networks: A survey’, IEEE Transactions on Intelligent Transportation Systems. Q1 (JIF: 7.42).
  3. Xu, G., Li, X., Jiao, L., Wang, W., Liu, A., Su, C., Zheng, X., Liu, S., Cheng, X.  2020. ‘BAGKD: A Batch Authentication and Group Key Distribution Protocol for VANETs’,  IEEE Communications Magazine. Q1 (JIF: 10.356).
  4. Zhang, C., Lu, J.C., Zheng, X., Yu. D.J., Sheng, Q.Z, Jolfaei, A. 2020. ‘RICA-MD: A Refined ICA algorithm for Motion Detection’, ACM Transactions on Multimedia Computing, Communications, and Applications. Q2 (JIF: 2.87).
  5. Liang, H.R., Wu, J., Zheng, X., Zhang, M.S., Li, J.H., Jolfaei, A. 2020. ‘Fog based Secure Service Discovery for Internet of Multimedia Things: A Cross-Blockchain Approach’, ACM Transactions on Multimedia Computing, Communications, and Applications. 2020. Q2 (JIF: 2.87).
  6. Jing, Z.J., Gu, C.S., Li, Y., Zhang, M.S., Xu, G.Q., Jolfaei, A., Shi, P.Z., Tan, C.K., Zheng, X. 2020. ‘Security Analysis of Indistinguishable Obfuscation for Internet of Medical Things Applications’, Computer Communications. Q2 (JIF: 2.766).
  7. Zhang, T., Shen, Z., Jin, J., Zheng, X., Tagami, A., Cao, X., 2020. ‘Achieving Democracy in Edge Intelligence: A Fog-based Collaborative Learning Scheme’, IEEE Internet of Things Journal. Q1 (JIF: 9.51).
  8. Xu, J., Meng, Q.Y., Wu, J., Zheng, X., Zhang, X.Y., Sharma, S., 2020. ‘Efficient and Lightweight Data Streaming Authentication in Industrial Automation and Control Systems’, IEEE Transactions on Industrial Informatics, in-press. Q1 (JIF: 7.38).
  9. Li, L., Li, X.J., Yang, S.L., Ding, S., Jolfaei, A., Zheng, X., 2020. ‘Unsupervised Learning-Based Continuous Depth and Motion Estimation with Monocular Endoscopy for Virtual Reality Minimally Invasive Surgery’. IEEE Transactions on Industrial Informatics. Q1 (JIF:7.38)
  10. Xu, G., Zhao, Y., Jiao, L., Feng, M., Ji, Z., Panaousis, E., Chen, S., Zheng, X., 2020. ‘TTSVD: an Efficient Sparse Decision Making Model with Two-way Trust Recommendation in the AI Enabled IoT Systems’,  IEEE Internet of ThingsQ1 (JIF: 9.51).
  11. Wang, C., Wu, J., Zheng, X., Pei, B., Zhang, X.Y., Yu, D.J., Tang, J.H., 2020. ‘Leveraging ICN with Network Sensing for Intelligent Transportation Systems: A Dynamic Naming Approach’, IEEE Sensors Journal, in-press, Q1(JIF: 3.07).
  12. Huang, K., Zhang, X., Wang, X., Mu, Y., REZAEIBAGHA, F., Du, X., Xu, G., Wang, H., Zheng, X., 2020.‘HUCDO: A Hybrid User-Centric Data Outsourcing Scheme’, ACM Transactions on Cyber-Physical Systems
  13. Lu, J., Zheng, X., Sheng, M., Jin, J., Yu, S., 2020. ‘Efficient human activity recognition using a single wearable sensor’,  IEEE Internet of ThingsQ1 (JIF: 9.51).

  14. Wang, T., Liang, Y.Z., Zheng, X., Arif, M., Wang, J., Jin, Q.,  2020.  ‘An Intelligent Dynamic Offloading from Cloud to Edge for Smart IoT Systems with Big Data’, IEEE Transactions on Network Science and Engineering, in-press. Q1 (JIF: 2.47).
  15. Xu, G.Q., Zhang,  Y., Zheng, X.,  2020.  ‘A Security-Enhanced Certificateless Aggregate Signature Authentication Protocol for InVANETs’, IEEE Network, in-press. Q1 (JIF: 7.50).
  16. Xu, G.Q., Liu, B.Y., Zheng.X.,  2020.  ‘Trust2Privacy: A Novel Fuzzy Trust-to-Privacy Mechanism for Mobile Social Networks’, IEEE Wireless Communications, in-press. Q1 (JIF: 11).
  17. Dibae, M., Zheng, X., Jiang, K., Abbas, R., Liu, S., Zhang, Y., Xiang, Y & Yu, S, 2020. ‘Attacks and Defences on Intelligent Connected Vehicles: A Survey’, Digital Communications and Networks, in-press. Q1 (JIF: 3.41).
  18. Wang, K, Wu, J, Zheng, X, Jolfaei, A, Li, J.H. & Yu, D.J.,  2020.  ‘Leveraging Energy Function Virtualization with Game Theory for Fault-Tolerant Smart Grid’, IEEE Transactions on Industrial Informatics, in-press. Q1 (JIF: 7.38).
  19. Wang, T, Lu, T, Cao, Z, Shu, L, Zheng, X & Liu, A.,  2020. ‘When Sensor-Cloud Meets Mobile Edge Computing’, Sensors, in-press. Q1 (JIF: 3.03).
  20. Deng, X.C., Zheng, X., Xu, G.Q. & Jolfaei, A., 2020. ‘Dynamic Clustering Method for Imbalanced Learning Based on Adaboost’, The Journal of Supercomputing, in-press. Q2 (JIF: 3.03).
  21. Deep, S. & Zheng, X., Jolfaei, A., Yu, D.J. & Zheng, X., 2020. ‘A survey of security and privacy issues in the Internet of Things from the layered context’, Transactions on Emerging Telecommunications Technologies, in-press. Q2 (JIF: 1.26).
  22. Yue, Z.J., Ding, S., Zhao, L., Zhang, Y.T., Tanveer, M., Jolfaei, A. & Zheng, X., 2020. ‘Privacy-preserving time series medical images analysis using a hybrid deep learning framework’, ACM Transactions on Internet Technology, in-press. CORE A (JIF: 2.39)
  23. Wang, T., Mei, Y., Jia, W., Zheng, X., Wang, G. and Xie, M., 2020. Edge-based differential privacy computing for sensor–cloud systems. Journal of Parallel and Distributed Computing, 136, pp.75-8. CORE A*. (JIF: 1.81).
  24. Zhang, Chao, Wu, Xiaopei, Zheng, X. & Yu, Shui, 2019. ‘Driver Drowsiness Detection Using Multi-Channel Second Order Blind Identifications’, IEEE Access, vol. 7, pp. 11829–11843. Q1 (JIF: 4.09).
  25. Zheng, Tianlei, Zheng, X., Zhang, Yuqun, Deng, Yao, Dong, Erxi, Zhang, Rui & Liu, Xiao, 2019. ‘SmartVM: a SLA-aware microservice deployment framework’, World Wide Web, vol. 22, no. 1, pp. 275–293. CORE A (JIF: 1.77).
  26. Xun Zhou, Xuelian Cai, Yuehang Bu, Zheng, X., Jiong Jin, Tom H. Luan & Changle Li, 2019. ‘When Road Information Meets Data Mining: Precision Detection for Heading and Width of Roads’, IEEE Access, vol. 7, pp. 60399–60410, doi:10.1109/access.2019.2903195. Q1 (JIF: 4.09).
  27.  Wang, J., Cao, B., Zheng, X., Tan, D. and Fan, J., 2019. Detecting Difference Between Process Models Using Edge Network. IEEE Access, 7, pp.142916-142925. Q1 (JIF: 4.09).
  28. Xu, G.Q., Guo, B.J., Su, C.H., Zheng, X, Liang, K.T., S, W.D. & Wang, H 2019, ‘Am I Eclipsed? A Smart Detector of Eclipse Attacks for Ethereum’, Computers & Security, vol. 88 (2020)101604, pp.1-10. Q2 (JIF: 3.06).
  29. Xu, G.Q., Wang, W, Jiao, L, Zhang, N, Liang, K, Zheng, X, Lian, W, Xian, H & Gao, H 2019, ‘SoProtector: Safeguard Privacy fo Native SO Files in Evolving Mobile IoT Applications’, IEEE Internet of Things Journal. vol. 7, pp. 2539-2552 (2020). Q1 (JIF: 9.51).
  30. Zhang, R, Chen, X, Wen, S & Zheng, X 2019, ‘Using AI to Attack VA: A Stealthy Spyware against Voice Assistances in Smart Phones’, IEEE Access, vol 7, pp. 2169-3536. Q1 (JIF: 4.0).
  31. Zhang, Y, Qu, Y, Gao, L, Luan, T.H., Zheng, X, Chen, S & Xiang, Y 2019, ‘APDP: Attack-proof Personalized Differential Privacy Model for a Smart Home’, IEEE Access, vol. 7, pp. 166593-166605. doi:10.1109/acess.2019.2953133. Q1 (JIF: 4.0).
  32. Deep, S., Zheng, X., Karmakar, C. & Jin, J. 2019, ‘A Survey on Anomalous Behavior Detection for Elderly Care using Dense-sensing Networks’, IEEE Communications Surveys and Tutorials, vol. 22, pp. 352-370. doi: 10.1109/COMST.2019.2948204. Q1 (JIF:22.97).
  33. Yu, D., Jin, Y., Zhang, Y., & Zheng, X. 2019, ‘A survey on security issues in services communication of Microservices‐enabled fog applications’, Concurrency and Computation: Practice and Experience, 31(22), e4436. Q3 (JIF:1.167)
  34. Li, X, Xu, G, Zheng, X, Liang, K, Papaousis, E, Li, T & Wang, W 2019, ‘Using Sparse Representation to Detect Anomalies in Complex WSNs’, ACM Transactions on Intelligent Systems and Technology, vol. 10, pp. 64:1-64:18. doi.org/10.1145/3331147. Q2 (JIF:9.39).
  35. Zhou, G, Xu, G, Hao, J, Chen, S, Xu, J & Zheng, X 2019, ‘Generalized Centered Two-Dimensional Principal Component Analysis’, IEEE Transactions on Cybernetics, pp. 1-12. doi: 10.1109/TCYB.2019.2931957. Q1 (JIF:10.38).
  36. Wang, T, Ke, H.X. & Zheng, X 2019, ‘Big Data Cleaning Based on Mobile Edge Computing in industrial Sensor-Cloud’, IEEE Transactions on Industrial Informatics, vol. 16, pp. 1321-1329. doi: 10.1109/TII.2019.2938861. Q1 (JIF:8.70).
  37. Wang, T, Luo, H & Zheng, X 2019 ‘Crowdsourcing Mechanism for Trust Evaluation in CPCS based on Intelligent Mobile Edge Computing’, ACM Transactions on Intelligent Systems and Technology, vol. 10, pp.62:1-62:19. doi.org/10.1145/3324926. Q2 (JIF:3.82).
  38. Zheng, Xi, Julien, Christine, Chen, Hongxu, Podorozhny, Rodion & Cassez, Franck 2017, ‘Real-time simulation support for runtime verification of cyber-physical systems’, ACM Transactions on Embedded Computing Systems (TECS), vol. 16, pp. 106 :1-106:24. doi.org/10.1145/3063382, CORE A (JIF: 1.36).
  39. Hu, Z, Xu, G.Q., Zheng, X, Liu, J, Li, Z & Sheng, Q.Z. 2019, ‘SSL-SVD: Semi-Supervised Learning Based Sparse Trust Recommendation’, ACM Transactions on Internet Technology, vol. 20, pp. 4:1-4:20, CORE A (JIF: 2.38).
  40. Xie, Haiming, Tian, Guangyu, Du, Guangqian, Huang, Yong, Chen, Hongxu, Zheng, Xi & Luan, Tom H 2018, ‘A Hybrid Method Combining Markov Prediction and Fuzzy Classification for Driving Condition Recognition’, IEEE Transactions on Vehicular Technology, vol. 67, pp. 10411–10424. Q1 (JIF: 5.33).
  41. Pan, Lei, Zheng, Xi, Kolar, Philip & Bangay, Shaun 2018, ‘Object localisation through clustering unreliable ultrasonic range sensors’, International journal of sensor networks, vol. 27, pp. 268–280.
  42. Radhappa, Harish, Pan, Lei, Zheng, Xi, James & Wen, Sheng 2018, ‘Practical overview of security issues in wireless sensor network applications’, International journal of computers and applications, vol. 40, no. 4, pp. 202–213.
  43. Yu, Dongjin, Jin, Yike, Zhang, Yuqun & Zheng, Xi 2018, ‘A survey on security issues in services communication of Microservices enabled fog applications’, Concurrency and Computation: Practice and Experience, pp. 1-19.  CORE A (JIF:1.16).
  44. Zeng, Xianjiao, Xu, Guangquan, Zheng, Xi, Xiang, Yang & Zhou, Wanlei 2018, ‘E-AUA: An efficient anonymous user authentication protocol for mobile IoT’, IEEE Internet of Things Journal, vol.6, pp. 1506-1519. Q1 (JIF: 9.51).
  45. Xu, G.Q., Zhang, Y, Arun, K & Zheng, X 2018, ‘CSP-E 2 : An abuse-free Contract Signing Protocol with low-storage TTP for energy efficient electronic transaction ecosystems’, Information Sciences, vol. 476, pp. 505-515. Q1 (JIF:5.52).
  46. Anvari, Armin, Pan, Lei & Zheng, Xi 2017, ‘Generating security questions for better protection of user privacy’, International Journal of Computers and Applications, vol. 42, pp. 329-350.
  47. Pan, Lei, Zheng, Xi, Chen, HX, Luan, T, Bootwala, Huzefa & Batten, Lynn 2017, ‘Cyber security attacks to modern vehicular systems’, Journal of information security and applications, vol. 36, pp. 90–100. Q2 (JIF:1.53).
  48. Zheng, Xi, Julien, Christine, Podorozhny, Rodion, Cassez, Franck & Rakotoarivelo, Thierry 2016, ‘Efficient and scalable runtime monitoring for cyber–physical system’, IEEE Systems Journal, vol. 12, no. 2, pp. 1667–1678. Q1 (JIF:2.11).
  49. Zheng, Xi, Julien, Christine, Kim, Miryung & Khurshid, Sarfraz 2015, ‘Perceptions on the state of the art in verification and validation in cyber-physical systems’, IEEE Systems Journal, vol. 11, no. 4, pp. 2614–2627. Q1 (JIF:2.11).
  50. Wu, J, Li, J.N., Xu, G.Q., Li, J.H., Zheng, X & Jolfaei, A., ‘Integrating NFV and ICN for advanced driver assistance systems’, IEEE Internet of Things Journal, pp.1-1. doi:10.1109/JIOT.2019.2953988. Q1 (JIF: 9.51).
  • referred conference proceedings

[1] Yao, D, Zheng, X, Zhang, T.Y., Chen, C, Nan, L.G. & Kim, M 2020, ‘An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models’, IEEE International Conference on Pervasive Computing and Communications (PerCom) (Fully Refereed Conference Proceeding). CORE A*.

[2] Zhang, C, Liu, X, Zheng, X, Li, R & Liu, H 2020, ‘FengHuoLun: A Federated Learning based Edge Computing Platform for Cyber-Physical Systems’, IEEE International Conferene on Pervasive Computing and Communications (PerCom). CORE A*.

[3] Zhang, T.H., Shen, Z.S., Jin, J & Zheng, X 2020, ‘A Democratically Collaborative Learning Scheme for Fog-enabled Pervasive Environments’, IEEE International Conferene on Pervasive Computing and Communications (PerCom). CORE A*.

[4] Lu, Jianchao, Wang, Jiaxing, Zheng, Xi, Karmakar, Chandan & Rajasegarar, Sutharshan 2019, ‘Detection of Smoking Events from Confounding Activities of Daily Living’, Proceedings of the Australasian Computer Science Week Multiconference, pp. 1-9.

[5] Deep, S & Zheng, X 2019, ‘Leveraging CNN and Transfer Learning for Vision-based Human Activity Recognition’, International Telecommunication Networks and Application Conference. pp. 1-4.

[6] Hu, Z, Xu, G.Q., Zheng, X, Liu, J & Li, Z 2019, ‘SSL-STR: Semi-Supervised Learning for Sparse Trust Recommendation’, IEEE Global Communications Conference. pp. 1-6. CORE B.

[7] Lu, J.C., Zheng, X, Wang, J.X., Sheng, Q.Z. & Zhou, W.L. 2019, ‘MFE-HAR: Multiscale Feature Engineering for Human Activity Recognition Using Wearable Sensors’, International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. pp. 180-189. CORE A.

[8] Luo, G, Zheng, X, Liu, H, Xu, R.B., Nagumothu, D, Janapareddi, R, Zhuang, E & Liu, X 2019, ‘Verication of Microservices Using Metamorphic Testing’, International Conference on Algorithms and Architectures for Parallel Processing, pp. 138—152. CORE B.

[9] Samundra, D & Zheng, X 2019, ‘Hybrid model featuring CNN and LSTM architecture for Human Activity Recognition on smartphone sensor data’, International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 259-264. CORE B.

[10] Zhang, T, Shen, Z, Jin, J, Tagami, A, Zheng, X & Yang, Y 2019, ‘ESDA: An Energy-Saving Data Analytics Fog Service Platform’, International Conference on Service-Oriented Computing. pp. 171-185. CORE A.

[11] Fu, Min, Wong, Chi Man, Zhu, Hai, Huang, Yanjun, Li, Yuanping, Zheng, Xi, Wu, Jia, Yang, Jian & Vong, Chi Man 2018, ‘DAliM: Machine Learning Based Intelligent Lucky Money Determination for Large-Scale E-Commerce Businesses’, International Conference on Service-Oriented Computing, pp. 740–755. CORE A.

[12] Liu, Mengdi, Xu, Guangquan, Zhang, Jun, Shankaran, Rajan, Luo, Gang, Zheng, Xi & Zhang, Zonghua 2018, ‘Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-Scale Recommendation Systems’, International Conference on Algorithms and Architectures for Parallel Processing, pp. 495–510. CORE B.

[13] Wang, Derek, Zhou, Wanlei, Zheng,  Xi, Wen, Sheng, Zhang, Jun & Xiang, Yang 2018, ‘Who Spread to Whom? Inferring Online Social Networks with User Features’, 2018 IEEE International Conference on Communications (ICC), pp. 1–6. CORE B.

[14] Zhang, Ning, Xu, Guangquan, Meng, Guozhu & Zheng, Xi 2018, ‘SoProtector: Securing Native C/C++ Libraries for Mobile Applications’, International Conference on Algorithms and Architectures for Parallel Processing, pp. 417–431. CORE B.

[15] Wang, D, Zhou, W, Zheng, X, Wen, S, Zhang, J & Xiang, Y 2018, ‘Who Spread to Whom? Inferring Online Social Networks with User Features Sign In or Purchase’, IEEE International Conference on Communications. pp. 1-6. CORE B.

[16] Pham, Vu Viet Hoang, Liu, Xiao, Zheng, Xi, Fu, Min, Deshpande, Sahil Vikas, Xia, Weidong, Zhou, Roger & Abdelrazek, Mohamed 2017, ‘PaaS-black or white: an investigation into software development model for building retail industry SaaS’, 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE), pp. 285–287. CORE A*.

[17] Zhang, Yuqun, Zhang, Mengshi, Zheng, Xi & Perry, Dewayne E 2017, ‘Service2vec: a vector representation for Web services’, 2017 IEEE International Conference on Web Services (ICWS), pp. 890–893. CORE A.

[18] Zheng, Tianlei, Zhang, Yuqun, Zheng, Xi, Fu, Min & Liu, Xiao 2017, ‘Bigvm: A multi-layer-microservice-based platform for deploying saas’, 2017 Fifth International Conference on Advanced Cloud and Big Data (CBD), pp. 45–50.

[19] Zheng, Xi, Bansal, Akanksha & Lease, Matthew 2017, ‘Bullseye: structured passage retrieval and document highlighting for scholarly search’, Proceedings of the Australasian Computer Science Week Multiconference, pp. 1-4.

[20] Zheng, Xi, Pan, Lei & Yilmaz, Erdem 2017, ‘Security analysis of modern mission critical android mobile applications’, Proceedings of the Australasian Computer Science Week Multiconference, pp. 1-9.

[21] Zheng, Xi, Jiang, Jiaojiao, Zhang, Yuqun, Deng, Yao, Fu, Min, Zheng, Tianlei & Liu, Xiao 2017, ‘Smartvm: A multi-layer microservice-based platform for deploying saas’, 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), pp. 470–474. CORE B.

[22] Zheng, Xi, Pan, Lei, Chen, Hongxu, Di Pietro, Rick & Batten, Lynn 2017, ‘A testbed for security analysis of modern vehicle systems’, 2017 IEEE Trustcom/BigDataSE/ICESS, pp. 1090–1095. CORE A.

[23] Bhandari, Babin, Lu, JianChao, Zheng, Xi, Rajasegarar, Sutharshan & Karmakar, Chandan 2017, ‘Non-invasive sensor based automated smoking activity detection’, 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp. 845–848.

[24] Zheng, Xi, Pan, Lei, Chen, Hongxu & Wang, Peiyin 2016, ‘Investigating security vulnerabilities in modern vehicle systems’, International Conference on Applications and Techniques in Information Security, pp. 29–40.

[25] Zheng, Xi & Julien, Christine 2015, ‘Verification and validation in cyber physical systems: research challenges and a way forward’, 2015 IEEE/ACM 1st International Workshop on Software Engineering for Smart Cyber-Physical Systems, pp. 15–18.

[26] Zheng, Xi, Julien, Christine, Podorozhny, Rodion & Cassez, Franck 2015, ‘Braceassertion: Runtime verification of cyber-physical systems’, 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems, pp. 298–306. CORE B.

[27]  Zheng, Xi 2014, ‘Physically informed assertions for cyber physical systems development and debugging’, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS), pp. 181–183. CORE A*.

[28] Zheng, Xi, Perry, Dewayne E & Julien, Christine 2014, ‘WiP abstract: BraceForce: Software engineering support for sensing in CPS applications’, 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), pp. 228–228.

[29] Zheng, Xi, Perry, Dewayne E & Julien, Christine 2014, ‘Braceforce: A middleware to enable sensing integration in mobile applications for novice programmers’, Proceedings of the 1st International Conference on Mobile Software Engineering and Systems, pp. 8–17.

[30] Li, Rui, Liu, Xiao, Zheng, Xi, Zhang, Chong, Liu, Huai 2020, ‘TDD4Fog: A Test-Driven Software Development Platform for Fog Computing Systems’, IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID). CORE A.

[31] Fu, M., Guan, J.W., Zheng, X., Zhou, J., Lu, J.C.; Zhang, T.Y., Zhuo, S.J., Zhan, L.J., Yang, J. 2020, ‘ICS-Assist: Intelligent Customer Inquiry Resolution Recommendation in Online Customer Service for Large E-Commerce Businesses’, International Conference on Service Oriented Computing (ICSOC).  CORE A. (ACCEPTANCE RATE < 17%)

 


  • Other program leaders key publication outputs:

  1. Shengchao Liu, Jianping Weng, Hui Wang, Changqing An, Yipeng Zhou and Jinlong Wang: An Adaptive Online Scheme for Scheduling and Resource Enforcement in Storm. To appear in IEEE/ACM Transactions on Networking.
  2. Miao Hu, Lei Zhuang, Di Wu, Yipeng Zhou, Xu Chen and Liang Xiao: Learning Driven Computation Offloading for Asymmetrically Informed Edge Computing. IEEE Transactions on Parallel and Distributed Systems, Volume 30, Issue 8, Pages 1802-1815, 2019.
  3. Yipeng Zhou, Jiqiang Wu, Terence Chan, Siu Wai Ho, Dah Ming Chiu and Di Wu: Interpreting Video Recommendation Mechanisms via Mining View Count Traces [J]. IEEE Transactions on Multimedia, volume 20, issue 8, pages 2153-2165, 2018.
  4. Yipeng Zhou, Xuhong Gu, Di Wu, Min Chen, Terence Chan and Siu Wai Ho: Statistical Study of View Preferences for Online Videos with Cross-platform Information [J]. IEEE Transactions on Multimedia, volume 20, issue 6, pages 15121524, 2017.
  5. Yipeng Zhou, Terence Chan, Siu Wai Ho, Guoqiao Ye and Di Wu: Replicating Coded Content in Crowdsourcing-Based CDN Systems [J]. IEEE Transactions on Circuits and Systems for Video Technology, Volume 28, Issue 12, Pages 3492-3503, 2017.
  6. Yuedong Xu, Zhujun Xiao, Hui Feng, Tao Yang, Bo Hu and Yipeng Zhou: Modeling Buffer Starvations of Video Streaming in Cellular Networks with Large-Scale Measurement of User Behavior [J]. IEEE Transactions on Mobile Computing, volume 16, issue 8, pages 2228-2245, 2017.
  7. Jiqiang Wu, Yipeng Zhou*, Dah Ming Chiu and Zirong Zhu. Modeling Dynamics of Online Video Popularity [J]. IEEE Transactions on Multimedia, volume 18, issue 9, pages 1882-1895.
  8. Yipeng Zhou, Tom Z.J. Fu and Dah Ming Chiu. A Unifying Model and Analysis of P2P VoD Replication and Scheduling [J]. IEEE/ACM Transactions on Networking, volume 23, issue 4, pages 1163-1175, 2015.
  9. Yuedong Xu, Yipeng Zhou and Dah Ming Chiu. Analytical QoE Models for BitRate Switching in Dynamic Adaptive Streaming Systems [J]. IEEE Transactions on Mobile Computing, volume 13, issue 12, pages 2734-2748, 2014. (JCR Q1, IF 4.098)
  10. Yipeng Zhou, Tom Z. J. Fu and Dah Ming Chiu. On Replication Algorithms in P2P VoD [J]. IEEE/ACM Transactions on Networking, volume 21, issue 1, pages 233243, 2013.
  11. Zhanpeng Wu, Yipeng Zhou, Di Wu, Min Chen and Yuedong Xu: Towards Personalized Time-Aware Recommendation for Over-The-Top Videos. In Proceedings of ACM NOSSDAV 2019.
  12. Xuhong Gu, Yipeng Zhou, Di Wu, Terence H. Chan and Min Chen: Unveiling Latent Behaviors of Video Viewers with Cross-Platform Information. In Proceedings of ACM NOSSDAV 2017.
  13. Jiaming Zhang, Yipeng Zhou, Di Wu and Chunfeng Yang: Context-aware Video Recommendation by Mining Users View Preferences Based on Access Points. In Proceedings of ACM NOSSDAV 2017.
  14. Lei Huang, Wenbo Ding, Yuedong Xu and Yipeng Zhou: Analysis of User Behavior in a Large-scale VoD System. In Proceedings of ACM NOSSDAV 2017.
  15. Chunfeng Yang, Yipeng Zhou, Liang Chen and Dah Ming Chiu. Social Group Based Video Recommendation Addressing the Cold-Start Problem [C]. In Proceedings of PAKDD 2016.
  16. Jiqiang Wu, Yipeng Zhou*, Dah Ming Chiu and Zirong Zhu: Modeling Dynamics of Online Video Popularity [C]. In: Proceedings of IEEE/ACM IWQoS 2015 (short paper), Portland, USA.
  17. Liang Chen, Yipeng Zhou*, Mi Jing and Tianbai Ma. Thunder Crystal: A Novel Crowdsourcing-based Content Distribution Platform [C]. In: Proceedings of ACM NOSSDAV 2015, USA.
  18. Liang Chen, Yipeng Zhou* and Dah Ming Chiu. Fake View Analytics in Online Video Services [C]. In: Proceedings of ACM NOSSDAV 2014, Singapore.
  19. Yipeng Zhou , Tom Z. J. Fu and Dah Ming Chiu. A Unifying Model and Analysis of P2P VoD Replication and Scheduling [C]. In: Proceeding of IEEE Infocom 2012, Orlando, Florida USA.
  20. Yipeng Zhou , Tom Z. J. Fu and Dah Ming Chiu. Statistical Modeling and Analysis of P2P Replication to Support VoD Service [C]. In: Proceeding of IEEE  Infocom 2011, Shanghai China.
  21. Jolfaei A, Wu XW, Muthukkumarasamy V. Comments on the security of “Diffusion– substitution based gray image encryption” scheme. Digital signal processing. 2014 Sep 1;32:34-6.
  22. Jolfaei A, Mirghadri A. Image encryption using chaos and block cipher. Computer and Information Science. 2011 Jan 1;4(1):172.
  23. Jolfaei A, Wu XW, Muthukkumarasamy V. On the security of permutation-only image encryption schemes. IEEE transactions on information forensics and security. 2015 Oct 9;11(2):235-46.
  24. Jolfaei A, Mirghadri A. An image encryption approach using chaos and stream cipher. Journal of Theoretical and Applied Information Technology. 2010;19(2):117-25.
  25. Jolfaei A, Mirghadri A. Survey: image encryption using Salsa20. International Journal of Computer Science Issues (IJCSI). 2010 Sep 1;7(5):213.
  26. Jolfaei A, Mirghadri A. A new approach to measure quality of image encryption. International Journal of Computer and Network Security. 2010;2(8):38-44.
  27. Jolfaei A, Mirghadri A. A novel image encryption scheme using pixel shuffler and A5/1. In2010 International Conference on Artificial Intelligence and Computational Intelligence 2010 Oct 23 (Vol. 2, pp. 369-373). IEEE.
  28. Jolfaei A, Mirghadri A. An applied imagery encryption algorithm based on shuffling and bakers map. InProceedings of the 2010 International Conference on Artificial Intelligence and Pattern Recognition (AIPR-10), Florida, USA 2010 (pp. 279-285).
  29. Jolfaei A, Wu XW, Muthukkumarasamy V. A 3D object encryption scheme which maintains dimensional and spatial stability. IEEE Transactions on Information Forensics and Security. 2014 Dec 4;10(2):409-22.
  30. Jolfaei A, Mirghadri A. Survey: image encryption using A5/1 and W7. Journal of Computing. 2010;2(8):1-7.
  31. Zhang, Y, Ren, W, Zhu, T & Bi, W 2018, ‘MoSa: A modeling and sentiment analysis system for mobile application big data’, ICA3PP 2018: Algorithms and Architectures for Parallel Processing (LNCS), International Conference on Algorithms and Architectures for Parallel Processing, Springer, Guangzhou, China, pp. 582-595.
  32. Liu, B, Ding, M, Zhu, T, Xiang, Y & Zhou, W 2018, ‘Using Adversarial Noises to Protect Privacy in Deep Learning Era’, 2018 IEEE Global Communications Conference GLOBECOM 2018, IEEE Global Communications Conference, IEEE, Unuted Arab Emirates, pp. 2276-2281.
  33. Zhu, T, Xiong, P, Li, G, Zhou, W & Yu, PS 2017, ‘Differentially private query learning: From data publishing to model publishing’, Proceedings – 2017 IEEE International Conference on Big Data, Big Data 2017, IEEE International Conference on Big Data, IEEE, Boston, MA, USA, pp. 1117-1122.
  34. Yao, S, Chen, J, He, K, Du, R, Zhu, T & Chen, X 2019, ‘PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage Management’, IEEE Access, vol. 7, pp. 6117-6128.
  35. Zhang, L, Xiong, P, Ren, W & Zhu, T 2019, ‘A differentially private method for crowdsourcing data submission’, Concurrency Computation.
  36. Zhang, Y, Ren, W, Zhu, T & Faith, E 2019, ‘MoSa: A modeling and sentiment analysis system for mobile application big data’, Symmetry, vol. 11, no. 1.
  37. Zhang, Y, Ren, W, Zhu, T & Ren, Y 2019, ‘SaaS: A situational awareness and analysis system for massive android malware detection’, Future Generation Computer Systems, vol. 95, pp. 548-559.
  38. Zheng, R, Jiang, J, Hao, X, Ren, W, Xiong, F & Zhu, T 2019, ‘CaACBIM: A context-aware access control model for BIM’, Information (Switzerland), vol. 10, no. 2.
  39. Yang, M, Zhu, T, Liang, K, Zhou, W & Deng, RH 2019, ‘A blockchain-based location privacy-preserving crowdsensing system’, Future Generation Computer Systems, vol. 94, pp. 408-418.
  40. Guo, J, Ren, W, Ren, Y & Zhu, T 2018, ‘A watermark-based in-situ access control model for image big data’, Future Internet, vol. 10, no. 8.
  41. X. Li, Y. Wu, X. Liu, E. Zhu, H. Yi, F. Wang, C. Zhang and Y. Yang, A Novel Workflow-Level Data Placement Strategy for Data-Sharing Scientific Cloud Workflows, IEEE Transactions on Services Computing, 12(3), pp. 370-383, 2019.
  42. X. Liu, L. Fan, J. Xu, X. Li, L. Gong, J. Grundy, Y. Yang, FogWorkflowSim: An Automated Simulation Toolkit for Workflow Performance Evaluation in Fog Computing, 34th IEEE/ACM International Conference on Automated Software Engineering (Demo Track), accepted on 13 August 2019.
  43. P. Zhou, J. Liu, Z. Yang, X. Liu, J. Grundy, FastTagRec: Fast Tag Recommendation for Software Information Sites, Automated Software Engineering, Vol. 25, pp. 675-701, 2018.
  44. D. Yuan, L. Cui, W. Li, X. Liu and Y. Yang, An Algorithm for Finding the Minimum Cost of Storing and Regenerating Datasets in Multiple Clouds. IEEE Transactions on Cloud Computing, 6(2), pp.519 – 531, 2018.
  45. V. Pham, X. Liu, J. Zheng, M. Fu, S. Deshpande, W.  Xia, R. Zhou and M. Abdelrazek, PaaS – Black or White: An Investigation into Software Development Model for Building Retail Industry SaaS, 39th International Conference on Software Engineering (Poster Track), Buenos Aires, Argentina, May 20-28, 2017.
  46. W. Zhang, X. Liu and Y. Yang, Let Smart Ants Help You Reduce the Delay Penalty of Multiple Software Projects, 39th International Conference on Software Engineering (Poster Track), Buenos Aires, Argentina, May 20-28, 2017.
  47. M. Chen, S. Huang, X. Fu, X. Liu and J. He, Statistical Model Checking-Based Evaluation and Optimization for Cloud Workflow Resource Allocation, IEEE Transactions on Cloud Computing, published online: http://dx.doi.org/10.1109/ TCC.2016.2586067, 2016.
  48. G. Zhang, X. Liu and Y. Yang, Time-Series Pattern based Effective Noise Generation for Privacy Protection on Cloud. IEEE Transactions on Computers, 64(5):1456-1469, 2015.
  49. D. Yuan, X. Liu and Y. Yang, Dynamic on-the-fly Minimum Cost Benchmarking for Storing Generated Scientific Datasets in the Cloud, IEEE Transactions on Computers, 64(10):2781-2795, 2015.
  50. X. Liu, Y. Yang, D. Yuan and J. Chen, Do We Need to Handle Every Temporal Violation in Scientific Workflow Systems? ACM Transactions on Software Engineering and Methodology, 23(1): Article 5, 2014.
  51. D. Du, M. Chen, X. Liu and Y. Yang, A Novel Quantitative Evaluation Approach for Software Project Schedules using Statistical Model Checking, 36th International Conference on Software Engineering (NIER Track), pp. 476-479, Hyderabad, India, June 2014.
  52. X. Liu, Y. Yang, D. Cao and D. Yuan, Selecting Checkpoints along the Timeline: A Novel Temporal Checkpoint Selection Strategy for Monitoring a Batch of Parallel Business Processes, 35th International Conference on Software Engineering (NIER Track), pp. 1281-1284, San Francisco, USA, May 2013.
  53. D. Yuan, Y. Yang, X. Liu, W. Li, L. Cui, M. Xu and J. Chen, A Highly Practical Approach towards Achieving Minimum Datasets Storage Cost in the Cloud. IEEE Transactions on Parallel and Distributed Systems, 24(6):1234-1244, 2013.
  54. X. Liu, Y. Yang, Y. Jiang and J. Chen, Preventing Temporal Violations in Scientific Workflows: Where and How, IEEE Transactions on Software Engineering, 37(6):805-825, 2011.
  55. D. Yuan, Y. Yang, X. Liu and J. Chen, On-demand Minimum Cost Benchmarking for Intermediate Datasets Storage in Scientific Cloud Workflow Systems. Journal of Parallel and Distributed Computing, 71(1):316-332, 2011. CORE A*
  56. Wen, Sheng ; Castiglione, Aniello ; Wang, Tian ; Bhuiyan, Md Zakirul Alam ; 2019. Forward to the special issue of the 9th International Symposium on Cyberspace Safety and Security (CSS 2017), 9th International Symposiumon Cyberspace Safety and Security (CSS20), ‘Concurrency and Computation: Practice and Experience’, Xi’an, China, 23–25 October 2017 / Sheng Wen, Wei Wu and Aniello Castiglione (eds.), Vol. 31, no. 22, article no. e5535
  57. Zhang, Rongjunchen ; Chen, Xiao ; Wen, Sheng ; Zheng, James ; 2019. Who activated my voice assistant? A stealthy attack on Android phones without users’ awareness, Lecture Notes in Computer Science: 2nd International Conference on Machine Learning for Cyber Security (ML4CS 2019), ‘Machine Learning for Cyber Security’, Xi’an, China, 19-21 September 2019 / X. Chen, X. Huang and J. Zhang (eds.), Vol. 11806 LNCS, pp. 378-396
  58. Zhu, Xiaogang ; Feng, Xiaotao ; Jiao, Tengyun ; Wen, Sheng ; Xiang, Yang ; Camtepe, Seyit ; Xue, Jingling ; 2019. A feature-oriented corpus for understanding, evaluating and improving fuzz testing, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security (AsiaCCS ’19), Auckland, New Zealand, 9-12 July 2019 , pp. 658-663
  59. Chen, Xiao ; Li, Chaoran ; Wang, Derui ; Wen, Sheng ; Zhang, Jun ; Nepal, Surya ; Xiang, Yang ; Ren, Kui ; 2019. Android HIV: A study of repackaging malware for evading machine-learning detection, IEEE Transactions on Information Forensics and Security, Vol. 14, no. 8 (Aug 2019)
  60. Xu, Zhiyu ; Jiao, Tengyun ; Wang, Qin ; Van, Cuong Bui ; Wen, Sheng ; Xiang, Yang ; 2019. An efficient supply chain architecture based on blockchain for high-value commodities, BSCI ’19: Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, Auckland, New Zealand, 08 July 2019, pp. 81-88
  61. Tang, Lihong ; Ma, Wanlun ; Grobler, Marthie ; Meng, Weizhi ; Wang, Yu ; Wen, Sheng ; 2019. Faces are protected as privacy: An automatic tagging framework against unpermitted photo sharing in social media, IEEE Access, Vol. 7 (2019), pp. 75556-75567
  62. Wang, Tian ; Peng, Zhen ; Wen, Sheng ; Wang, Guojun ; Wang, Baowei ; Liu, Anfeng ; 2019. A survey of fog computing in wireless sensor networks: Concepts, frameworks, applications and issues, Ad-Hoc & Sensor Wireless Networks, Vol. 44, no. 1-2 (2019), pp. 109-130
  63. Zhai, Xuemeng ; Zhou, Wanlei ; Fei, Gaolei ; Lu, Cai ; Wen, Sheng ; Hu, Guangmin ; 2019. Edge-based stochastic network model reveals structural complexity of edges, Future Generation Computer Systems, Vol. 100 (Nov 2019), pp. 1073-1087
  64. Jiang, Jiaojiao ; Wen, Sheng ; Liu, Bo ; Yu, Shui ; Xiang, Yang ; Zhou, Wanlei ; 2019. Malicious Attack Propagation and Source Identification, Series: Advances in Information Security, vol. 73
  65. Miao, Meixia ; Wang, Jianfeng ; Wen, Sheng ; Ma, Jianfeng ; 2019. Publicly verifiable database scheme with efficient keyword search, Information Sciences, Vol. 475 (Feb 2019), pp. 18-28
  66. Analyzing and Supporting Adaptation of Online Code Examples Tianyi Zhang, Di Yang, Cristina Lopes, Miryung Kim In Proceedings of the 41th International Conference on Software Engineering, pages 316-327, IEEE, 2019.
  67. Active Inductive Logic Programming for Code Search Aishwarya Sivaraman, Tianyi Zhang, Guy Van den Broeck, Miryung Kim In Proceedings of the 41th International Conference on Software Engineering, pages 292-303, IEEE, 2019.
  68. An Empirical Study of Common Challenges in Developing Deep Learning Applications Tianyi Zhang, Cuiyun Gao, Lei Ma, Michael R. Lyu, Miryung Kim In Proceedings of the 30th International Symposium on Software Reliability Engineering, 12 pages, IEEE, 2019.
  69. Are Code Examples on an Online Q&A Forum Reliable? A Study of API Misuse on Stack Overflow Tianyi Zhang, Ganesha Upadhyaya, Anastasia Reinhardt, Hridesh Rajan, Miryung Kim In Proceedings of the 40th International Conference on Software Engineering, pages 886-896, ACM, 2018.
  70. Visualizing API Usage Examples at Scale Elena Glassman, Tianyi Zhang, Bjoern Hartmann, Miryung Kim In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pages 580-591, ACM, 2018.
  71. Automated Transplantation and Differential Testing for Clones Tianyi Zhang, Miryung Kim In Proceedings of the 39th International Conference on Software Engineering, pages 665-676, IEEE, 2017.
  72. Interactive Code Review for Systematic Changes Tianyi Zhang, Myoungkyu Song, Joseph Pinedo, Miryung Kim In Proceedings of the 37th International Conference on Software Engineering, Volume 1, pages 111-122. IEEE, 2015.
  73. Chang-ai Sun, An Fu, Pak-Lok Poon, Xiaoyuan Xie, Huai Liu, and Tsong Yueh Chen, “METRIC+: A metamorphic relation identification Technique Based on Input plus Output Domains.” Accepted to appear in IEEE Transactions on Software Engineering. Acceptance date: 8/08/2019.
  74. Chang-ai Sun, Hepeng Dai, Huai Liu, Tsong Yueh Chen, and Kai-Yuan Cai, “Adaptive partition testing.” IEEE Transactions on Computers, 68(2):157-169, 2019.
  75. Chang-ai Sun, Yan Zhao, Lin Pan, Huai Liu, and Tsong Yueh Chen, “Automated testing of WS-BPEL service compositions: A scenario-oriented approach.” IEEE Transactions on Services Computing, 11(4):616-629, 2018.
  76. Tsong Yueh Chen, Fei-Ching Kuo, Huai Liu, Pak-Lok Poon, Dave Towey, T.H. Tse, and Zhi Quan Zhou, “Metamorphic testing: A review of challenges and opportunities.” ACM Computing Surveys, 51(1):4:1-4:27, 2018.
  77. Arlinta Barus, Tsong Yueh Chen, Fei-Ching Kuo, Huai Liu, Robert Merkel, and Gregg Rothermel, “A cost-effective random testing method for programs with non-numeric inputs.” IEEE Transactions on Computers, 62(12):3509-3523, 2016.
  78. Huai Liu and Tsong Yueh Chen, “Randomized quasi-random testing.” IEEE Transactions on Computers, 65(6):1896-1909, 2016.
  79. Huai Liu, Fei-Ching Kuo, Dave Towey, and Tsong Yueh Chen, “How effectively does metamorphic testing alleviate the oracle problem?” IEEE Transactions on Software Engineering, 40(1):4-22, 2014.
  80. Huai Liu, Iman I. Yusuf, Heinz W. Schmidt, and Tsong Yueh Chen, “Metamorphic fault tolerance: An automated and systematic methodology for fault tolerance in the absence of test oracle.” In: Companion Proceedings of the 36th International Conference on Software Engineering (ICSE2014), pages 420-423, 2014.
  81. Tsong Yueh Chen, Fei-Ching Kuo, Huai Liu, and W. Eric Wong, “Code coverage of adaptive random testing.” IEEE Transactions on Reliability, 62(1):226-237, 2013.
  82. Tsong Yueh Chen, Fei-Ching Kuo, and Huai Liu, “Application of a failure driven test profile in random testing.” IEEE Transactions on Reliability, 58(1):179-192, 2009.
  83. Xiwei Xu, Cesare Pautasso, Liming Zhu, Qinghua Lu, and Ingo Weber. “A Pattern Language for Blockchain-based Applications”. In: EuroPLoP2018: The 23rd European Conference on Pattern Languages of Programs. Bavaria, Germany, 2018.
  84. Xiwei Xu, Ingo Weber, Mark Staples, Liming Zhu, Jan Bosch, Len Bass, Cesare Pautasso, and Paul Rimba. “A Taxonomy of Blockchain-Based Systems for Architecture Design”. In: ICSA2017: IEEE International Conference on Software Architecture. Gothenburg, Sweden, Apr. 2017.
  85. Ingo Weber, Xiwei Xu, R´egis Riveret, Guido Governatori, Alexander Ponomarev, and Jan Mendling. “Untrusted Business Process Monitoring and Execution Using Blockchain”. In: BPM2016: The 14th International Conference on Business Process Management. Rio de Janeiro, Brazil, Sept. 2016.
  86. Xiwei Xu, Cesare Pautasso, Liming Zhu, Vincent Gramoli, Alexander Ponomarev, An Binh Tran, and Shiping Chen. “The blockchain as a software connector”. In: WICSA2016: The 13th Working IEEE/IFIP Conference on Software Architecture. IEEE. Venice, Italy, 2016, pp.182–191.
  87. Qinghua Lu and Xiwei Xu. “Adaptable Blockchain-based Systems: A Case Study for Product Traceability”. In: IEEE Software 34.6 (2017), pp. 21–27.
  88. J. Jin, M. Palaniswami, D. Yuan, Y. Dong, and K. Moessner, “Priority service provisioning and max-min fairness: a utility-based flow control approach,” Journal of Network and Systems Management, vol. 25, no. 2, pp. 397-415, April 2017.
  89. J. Jin, J. Gubbi, S. Marusic, and M. Palaniswami, “An information framework of creating a smart city through Internet of Things,” IEEE Internet of Things Journal, vol. 1, no. 2, pp. 112-121, April 2014.
  90. J. Jin, M. Palaniswami, and B. Krishnamachari, “Rate control for heterogeneous wireless sensor networks: characterization, algorithms and performance,” Computer Networks, vol. 56, no. 17, pp. 3783-3794, November 2012.
  91. Rahman, J. Jin, A. Rahman, A. Cricenti, M. Afrin, and Y. Dong, “Energy-efficient optimal task offloading in cloud networked multi-robot systems,” Computer Networks, vol. 160, pp. 11-32, September 2019.
  92. Afrin, J. Jin, A. Rahman, Y.-C. Tian, and A. Kulkarni, “Multi-objective resource allocation for edge cloud based robotic workflow in smart factory,” Future Generation Computer Systems, vol. 97, pp. 119-130, August 2019.
  93. Lyu, J. C. Bezdek, X. He, and J. Jin, “Fog-embedded deep learning for the Internet of Things,” IEEE Transactions on Industrial Informatics, vol. 15, no. 7, pp. 4206-4215, July 2019.
  94. R. Pokhrel, J. Jin, and H. L. Vu, “Mobility-aware multipath communication for unmanned aerial surveillance systems,” IEEE Transactions on Vehicular Technology, vol. 68, no. 6, pp. 6088-6098, June 2019.
  95. Rahman, J. Jin, A. Rahman, A. Cricenti, and A. Kulkarni, “Communication-aware cloud robotic task offloading with on-demand mobility for smart factory maintenance,” IEEE Transactions on Industrial Informatics, vol. 15, no. 5, pp. 2500-2511, May 2019.
  96. V. Philip, T. Alpcan, J. Jin, and M. Palaniswami, “Distributed real-time IoT for autonomous vehicles,” IEEE Transactions on Industrial Informatics, vol. 15, no. 2, pp. 1131-1140, February 2019.
  97. Zhou Z Q, Sun L. Metamorphic testing of driverless cars[J]. Communications of the ACM, 2019, 62(3): 61-67.CORE A*