Selected Publications from the Group
Real-time simulation support for runtime verification of cyber-physical systems
ACM Transactions on Embedded Computing Systems (TECS), vol. 16, no. 4, pp. 1–24 (Refereed Journal Article)
An analysis of adversarial attacks and defenses on autonomous driving models
2020 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 1–10 (Fully Refereed Conference Proceeding)
Opportunistic Federated Learning: An Exploration of Egocentric Collaboration for Pervasive Computing Applications
2021 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 1–8 (Fully Refereed Conference Proceeding)
Braceassertion: Runtime verification of cyberphysical systems
2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems, pp. 298–306 (Fully Refereed Conference Proceeding)
Generalized Centered 2-D Principal Component Analysis
IEEE Transactions on Cybernetics, vol. 51, no. 3, pp. 1666–1677 (Refereed Journal Article)
DAliM: Machine Learning Based Intelligent Lucky Money Determination for Large-Scale E-Commerce Businesses
International Conference on Service-Oriented Computing, pp. 740–755 (Fully Refereed Conference Proceeding)
DynaComm: Accelerating Distributed CNN Training between Edges and Clouds through Dynamic Communication Scheduling
IEEE Journal on Selected Areas in Communications (Refereed Journal Article)
OFEI: A Semi-black-box Android Adversarial Sample Attack Framework Against DLaaS
IEEE Transactions on Computers (Refereed Journal Article)
A Hybrid Method Combining Markov Prediction and Fuzzy Classification for Driving Condition Recognition
IEEE Transactions on Vehicular Technology, vol. 67, no. 11, pp. 10411– 10424 (Refereed Journal Article)
Real-time simulation support for real-time systems
Handbook of Real-Time Computing, Springer
An Improved Genetic Algorithm to Construct Weightwise (Almost) Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity
ACM ASIA Conference on Computer and Communications Security (AsiaCCS)
Scenario-based Test Reduction and Prioritization for Multi-Module Autonomous Driving Systems
The ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE)
Testing of Autonomous Driving Systems: Where are we and where should we go?
The ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE)
Prototyping Opportunistic Learning in Resource Constrained Mobile Devices
IEEE International Conference on Pervasive Computing and Communications Workshops
Facilitating Decentralized and Opportunistic Learning in Pervasive Computing
IEEE International Conference on Pervasive Computing and Communications Workshops
Swarm: Playground for Large-scale Decentralized Learning Simulations
IEEE International Conference on Pervasive Computing and Communications Workshops
STFL: A Temporal-Spatial Federated Learning Framework for Graph Neural Networks
AAAI Conference on Artificial Intelligence Workshop on Deep Learning on Graphs: Methods and Applications
MFF-AMD: multivariate feature fusion for Android malware detection
In International Conference on Collaborative Computing: Networking, Applications and Worksharing (pp. 368-385). Springer, Cham
Robust Sensor Fusion Algorithms Against VoiceCommand Attacks in Autonomous Vehicles
International Conference on Trust, Security and Privacy in Computing and Communications
BMT: behavior driven development-based metamorphic testing for autonomous driving models
2021 IEEE/ACM 6th International Workshop on Metamorphic Testing (MET), pp. 32-36
Metamorphic Testing on Multi-module UAV Systems
2021 IEEE International Conference on Automated Software Engineering (ASE)
TDD4Fog: A Test-Driven Software Development Platform for Fog Computing Systems
2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID), pp. 673–676
Invited Talk: Software Engineering, AI and autonomous vehicles: Security assurance
2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 1–1
A democratically collaborative learning scheme for fog-enabled pervasive environments
2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 1–4
Fenghuolun: A federated learning based edge computing platform for cyber-physical systems
2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 1–4
ICS-Assist: Intelligent Customer Inquiry Resolution Recommendation in Online Customer Service for Large E-Commerce Businesses
Service-Oriented Computing: 18th International Conference, ICSOC 2020, Dubai, United Arab Emirates, December 14–17, 2020, Proceedings, pp. 370
Detection of Smoking Events from Confounding Activities of Daily Living
Proceedings of the Australasian Computer Science Week Multiconference, pp. 39
Hybrid model featuring CNN and LSTM architecture for human activity recognition on smartphone sensor data
2019 20th international conference on parallel and distributed computing, applications and technologies (PDCAT), pp. 259–264
Leveraging CNN and transfer learning for vision-based human activity recognition
2019 29th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1–4
SSL-STR: Semi-Supervised Learning for Sparse Trust Recommendation
2019 IEEE Global Communications Conference (GLOBECOM), pp. 1–6
Mfe-har: multiscale feature engineering for human activity recognition using wearable sensors
Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp. 180–189
Verification of microservices using metamorphic testing
International Conference on Algorithms and Architectures for Parallel Processing, pp. 138–152
ESDA: An energy-saving data analytics fog service platform
International Conference on Service-Oriented Computing, pp. 171–185
Who Spread to Whom? Inferring Online Social Networks with User Features
2018 IEEE International Conference on Communications (ICC), pp. 1–6
SoProtector: Securing Native C/C++ Libraries for Mobile Applications
International Conference on Algorithms and Architectures for Parallel Processing, pp. 417–431
Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-Scale Recommendation Systems
International Conference on Algorithms and Architectures for Parallel Processing, pp. 495–510
Non-invasive sensor based automated smoking activity detection
2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp. 845–848
PaaS-black or white: an investigation into software development model for building retail industry SaaS
2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C), pp. 285–287
Service2vec: a vector representation for Web services
2017 IEEE International Conference on Web Services (ICWS), pp. 890–893
Security analysis of modern mission critical android mobile applications
Proceedings of the Australasian Computer Science Week Multiconference, pp. 2
Smartvm: A multi-layer microservice-based platform for deploying saas
2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), pp. 470–474
A testbed for security analysis of modern vehicle systems
2017 IEEE Trustcom/BigDataSE/ICESS, pp. 1090–1095
Bigvm: A multi-layer-microservice-based platform for deploying saas
2017 Fifth International Conference on Advanced Cloud and Big Data (CBD), pp. 45–50
Bullseye: structured passage retrieval and document highlighting for scholarly search
Proceedings of the Australasian Computer Science Week Multiconference, pp. 32
Investigating security vulnerabilities in modern vehicle systems
International Conference on Applications and Techniques in Information Security, pp. 29–40
Verification and validation in cyber physical systems: research challenges and a way forward
2015 IEEE/ACM 1st International Workshop on Software Engineering for Smart Cyber-Physical Systems, pp. 15–18
Physically informed assertions for cyber physical systems development and debugging
2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS), pp. 181–183
WiP abstract: BraceForce: Software engineering support for sensing in CPS applications
2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), pp. 228–228
Trustworthy sensor fusion against inaudible command attacks in advanced driver-assistance systems
IEEE Internet of Things Journal, vol. 10, no. 19, pp. 17254~17264, 2023.
Real-time Diagnosis of Configuration Errors for Software of AI Server Infrastructure
IEEE Transactions on Dependable and Secure Computing
A Privacy-Preserving Medical Data Sharing Scheme Based on Blockchain
IEEE Journal of Biomedical and Health Informatics (CORE A*)
A Declarative Metamorphic Testing Framework for Autonomous Driving
IEEE Transactions on Software Engineering
SPRNN: A Spatial-Temporal Recurrent Neural Network for Crowd Flow Prediction
Information Sciences (CORE A), IF: 5.52
Collaborative Three-Tier Architecture Noncontact Respiratory Rate Monitoring Using Target Tracking and False Peaks Eliminating Algorithms
IEEE Transactions on Instrumentation and Measurement
ASQ-FastBM3D: An Adaptive Denoising Framework for Defending Adversarial Attacks in Machine Learning Enabled Systems
IEEE Transactions on Reliability
Non-Contact Negative Mood State Detection Using Reliability-Focused Multi-Modal Fusion Model
IEEE Journal of Biomedical and Health Informatics
DeCoP:Deep Learning for COVID-19 Prediction of Survival
IEEE Transactions on Molecular, Biological, and Multi-Scale Communications
Optimizing Video Caching at the Edge: A Hybrid Multi-Point Process Approach
IEEE Transactions on Parallel and Distributed Systems
Guided activity prediction for minimally invasive surgery safety improvement in the internet of medical things
IEEE Internet of Things Journal
SolGuard: Preventing external call issues in smart contract-based multi-agent robotic systems
Information Sciences, 579, pp.150-166
FNet: a two-stream model for detecting adversarial attacks against 5G-based deep learning services
Security and Communication Networks, 2021
An Energy-Efficient and Secure Data Inference Framework for Internet of Health Things: A Pilot Study
Sensors, vol. 21, no. 1, pp. 312
Can Steering Wheel Detect Your Driving Fatigue
IEEE Transactions on Vehicular Technology
Sparse Trust Data Mining
IEEE Transactions on Information Forensics and Security, vol. 16, pp. 4559–4573
SolGuard: Preventing external call issues in smart contract-based multi-agent robotic systems
Information Sciences, vol. 579, pp. 150–166
Edge-Based Communication Optimization for Distributed Federated Learning
IEEE Transactions on Network Science and Engineering
Mobile edge-enabled trust evaluation for the Internet of Things
Information Fusion, vol. 75, pp. 90–100
Gain without Pain: Offsetting DP-injected Nosies Stealthily in Cross-device Federated Learning
IEEE Internet of Things Journal
EIHDP: Edge-Intelligent Hierarchical Dynamic Pricing Based on Cloud-Edge-Client Collaboration for IoT Systems
IEEE Transactions on Computers
RICA-MD: A Refined ICA algorithm for Motion Detection
ACM Transactions on Multimedia Computing, Communications, and Applications
Deep Learning-Based Autonomous Driving Systems: A Survey of Attacks and Defenses
IEEE Transactions on Industrial Informatics
Resource Offload Consolidation Based on Deep-Reinforcement Learning Approach in Cyber-Physical Systems
IEEE Transactions on Emerging Topics in Computational Intelligence, pp. 1–10
Privacy-preserving time-series medical images analysis using a hybrid deep learning framework
ACM Transactions on Internet Technology (TOIT), vol. 21, no. 3, pp. 1–21
HUCDO: A Hybrid Usercentric Data Outsourcing Scheme
ACM Transactions on Cyber-Physical Systems, vol. 4, no. 3, pp. 1–23
Security analysis of indistinguishable obfuscation for internet of medical things applications
Computer Communications, vol. 161, pp. 202–211
Fog-based Secure Service Discovery for Internet of Multimedia Things: A Cross-blockchain Approach
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), vol. 16, no. 3s, pp. 1–23
Leveraging ICN with network sensing for intelligent transportation systems: a dynamic naming approach
IEEE Sensors Journal
Cluster-Enabled Cooperative Scheduling Based on Reinforcement Learning for High-Mobility Vehicular Networks
IEEE Transactions on Vehicular Technology, vol. 69, no. 11, pp. 12664–12678
BAGKD: A batch authentication and group key distribution protocol for vanets
IEEE Communications Magazine, vol. 58, no. 7, pp. 35–41
A Security-Enhanced Certificateless Aggregate Signature Authentication Protocol for InVANETs
IEEE Network, vol. 34, no. 2, pp. 22–29
Trust2Privacy: A Novel Fuzzy Trustto-Privacy Mechanism for Mobile Social Networks
IEEE Wireless Communications, vol. 27, no. 3, pp. 72–78
TT-SVD: an efficient sparse decision making model with two-way trust recommendation in the AI enabled IoT systems
IEEE Internet of Things Journal
A survey of security and privacy issues in the Internet of Things from the layered context
Transactions on Emerging Telecommunications Technologies, pp. e3935
Dynamic clustering method for imbalanced learning based on AdaBoost
The Journal of Supercomputing, vol. 76, no. 12, pp. 9716–9738
Attacks and defences on intelligent connected vehicles: a survey
Digital Communications and Networks, vol. 6, no. 4, pp. 399–421
Investigating the prospect of leveraging blockchain and machine learning to secure vehicular networks: A survey
IEEE Transactions on Intelligent Transportation Systems
SSL-SVD: semi-supervised learning–based sparse trust recommendation
ACM Transactions on Internet Technology (TOIT), vol. 20, no. 1, pp. 1–20
Privacy-Preserving Federated Learning Framework Based on Chained Secure Multiparty Computing
IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6178–6186
Unsupervised-Learning-Based Continuous Depth and Motion Estimation With Monocular Endoscopy for Virtual Reality Minimally Invasive Surgery
IEEE Transactions on Industrial Informatics, vol. 17, no. 6, pp. 3920–3928
Efficient human activity recognition using a single wearable sensor
IEEE Internet of Things Journal, vol. 7, no. 11, pp. 11137–11146
Edge-based differential privacy computing for sensor–cloud systems
Journal of Parallel and Distributed computing, vol. 136, pp. 75–85
An intelligent dynamic offloading from cloud to edge for smart iot systems with big data
IEEE Transactions on Network Science and Engineering, vol. 7, no. 4, pp. 2598– 2607
Am I eclipsed? A smart detector of eclipse attacks for Ethereum
Computers & Security, vol. 88, pp. 101604
Efficient and Lightweight Data Streaming Authentication in Industrial Control and Automation Systems
IEEE Transactions on Industrial Informatics, vol. 17, no. 6, pp. 4279–4287
Achieving democracy in edge intelligence: A fog-based collaborative learning scheme
IEEE Internet of Things Journal, vol. 8, no. 4, pp. 2751–2761
Leveraging Energy Function Virtualization with Game Theory for Fault-Tolerant Smart Grid
IEEE Transactions on Industrial Informatics, vol. 17, no. 1, pp. 678-687
Driver Drowsiness Detection Using Multi-Channel Second Order Blind Identifications
IEEE Access, vol. 7, pp. 11829–11843
SmartVM: a SLA-aware microservice deployment framework
World Wide Web, vol. 22, no. 1, pp. 275–293
When Road Information Meets Data Mining: Precision Detection for Heading and Width of Roads
IEEE Access, vol. 7, pp. 60399–60410 doi:10.1109/access.2019.2903195
Integrating NFV and ICN for advanced driverassistance systems
IEEE Internet of Things Journal, vol. 7, no. 7, pp. 5861–5873
Using sparse representation to detect anomalies in complex WSNs
ACM Transactions on Intelligent Systems and Technology (TIST), vol. 10, no. 6, pp. 1–18
Big data cleaning based on mobile edge computing in industrial sensor-cloud
IEEE Transactions on Industrial Informatics, vol. 16, no. 2, pp. 1321–1329
Crowdsourcing mechanism for trust evaluation in CPCS based on intelligent mobile edge computing
ACM Transactions on Intelligent Systems and Technology (TIST), vol. 10, no. 6, pp. 1–19
When sensor-cloud meets mobile edge computing
Sensors, vol. 19, no. 23, pp. 5324
CSP-E2: An abusefree contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems
Information Sciences, vol. 476, pp. 505–515
SoProtector: safeguard privacy for native SO files in evolving mobile IoT applications
IEEE Internet of Things Journal, vol. 7, no. 4, pp. 2539–2552
Rate-adaptive fog service platform for heterogeneous IoT applications
IEEE Internet of Things Journal, vol. 7, no. 1, pp. 176–188
Using AI to attack VA: a stealthy spyware against voice assistances in smart phones
IEEE Access, vol. 7, pp. 153542–153554
A Survey on Anomalous Behavior Detection for Elderly Care using Densesensing Networks
IEEE Communications Surveys and Tutorials
Object localisation through clustering unreliable ultrasonic range sensors
International journal of sensor networks, vol. 27, no. 4, pp. 268–280
Practical overview of security issues in wireless sensor network applications
International journal of computers and applications, vol. 40, no. 4, pp. 202–213
A survey on security issues in services communication of Microservicesenabled fog applications
Concurrency and Computation: Practice and Experience, pp. e4436
E-AUA: An efficient anonymous user authentication protocol for mobile IoT
IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1506–1519
Cyber security attacks to modern vehicular systems
Journal of information security and applications, vol. 36, pp. 90–100
Big data storage and management in SaaS applications
Journal of Communications and Information Networks, vol. 2, no. 3, pp. 18–29
Efficient and scalable runtime monitoring for cyber–physical system
IEEE Systems Journal, vol. 12, no. 2, pp. 1667–1678