Yang Xiang's photo

Professor Yang Xiang ()

PhD, SMIEEE


Director, Network Security and Computing Laboratory (NSCLab)
Associate Head of School (Industry Engagement)
School of Information Technology, Deakin University
221 Burwood Highway, Burwood, VIC 3125, Australia
email: my first name@deakin.edu.au

Yang


Phone: +61 3 9251 7482
Fax: +61 3 9244 6440

Deakin University logo

 

Biographical Sketch

Professor Yang Xiang received his PhD in Computer Science from Deakin University, Australia. He is currently a full professor at School of Information TechnologyDeakin University. He is the Director of the Network Security and Computing Lab (NSCLab) and the Associate Head of School (Industry Engagement). His research interests include network and system security, distributed systems, and networking. In particular, he is currently leading his team developing active defense systems against large-scale distributed network attacks. He is the Chief Investigator of several projects in network and system security, funded by the Australian Research Council (ARC). He has published more than 150 research papers in many international journals and conferences, such as IEEE Transactions on ComputersIEEE Transactions on Parallel and Distributed SystemsIEEE Transactions on Information Security and Forensics, and IEEE Journal on Selected Areas in Communications. Two of his papers were selected as the featured articles in the April 2009 and the July 2013 issues of IEEE Transactions on Parallel and Distributed Systems. He has published two books, Software Similarity and Classification (Springer) and Dynamic and Advanced Data Mining for Progressing Technological Development (IGI-Global). He has served as the Program/General Chair for many international conferences such as ICA3PP 12/11IEEE/IFIP EUC 11IEEE TrustCom 13/11IEEE HPCC 10/09IEEE ICPADS 08NSS 11/10/09/08/07. He has been the PC member for more than 60 international conferences in distributed systems, networking, and security. He serves as the Associate Editor of IEEE Transactions on ComputersIEEE Transactions on Parallel and Distributed SystemsSecurity and Communication Networks (Wiley), and the Editor of Journal of Network and Computer Applications. He is the Coordinator, Asia for IEEE Computer Society Technical Committee on Distributed Processing (TCDP). He is a Senior Member of the IEEE.


News

News from industry


New Book: Software Similarity and Classification (Springer)
http://dx.doi.org/10.1007/978-1-4471-2909-7

Positions Vacant – If you are interested in Network and System Security and are looking for an supervisor for your PhD, Master, or Honours study, please send me an email with your CV. I am always happy to discuss with you about the research topics and the funding opportunities such as scholarships and teaching assistant positions. If you are looking for PostDoc research fellow or visiting scholar positions, please email me for details.


Associate Editor / Editor

 

 


Research Grants

  • [2014-2016] ARC Discovery Project DP140103649, Wanlei Zhou, Yang Xiang, Modelling and defence against malware propagation
  • [2012-2015] ARC Linkage Project LP120200266, Yang Xiang, Wanlei Zhou, Vijay Varadharajan, Jonathan Oliver, Developing an active defence system to identify malicious domains and websites
  • [2010-2012] ARC Discovery Project DP1095498, Yang Xiang, Wanlei Zhou, Yong Xiang, Tracing real Internet attackers through information correlation
  • [2010-2012] ARC Linkage Project LP100100208, Wanlei Zhou, Yang Xiang, An active approach to detect and defend against peer-to-peer botnets
  • [2007-2009] ARC Discovery Project DP0773264, Wanlei Zhou, Yang Xiang, Development of methods to address internet crime

Selected Publications

My publications at Google Scholar, at DBLP.

Accepted, in press

  1. Y Wang, S Wen, Y Xiang, and W Zhou, “Modeling the Propagation of Worms in Networks: A Survey”, IEEE Communications Surveys and Tutorials, accepted, in press.
  2. S Wen, W Zhou, J Zhang, Y Xiang, W Zhou, W Jia, and C C. Zou,”Modeling and Analysis on the Propagation Dynamics of Modern Email Malware”, IEEE Transactions on Dependable and Secure Computing, accepted, in press.
  3. S Wen, M S Haghighi, C Chen, Y Xiang, W Zhou, and W Jia, “A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks”, IEEE Transactions on Computers, accepted, in press.
  4. S Wen, J Jiang, Y Xiang, S Yu, W Zhou, and W Jia, “To Shut Them up or to Clarify: Restraining the Spread of Rumors in Online Social Networks”, IEEE Transactions on Parallel and Distributed Systems, accepted, in press.
  5. S. Wen, J. Jiang, Y. Xiang, S. Yu, and W. Zhou, “Are the Popular Users Always Important for the Information Dissemination in Online Social Networks?”, IEEE Network, accepted, in press.
  6. M S Haghighi, Y Xiang, V Varadharajan, and B Quinn, “A Stochastic Time-Domain Model for Burst Data Aggregation in Ieee 802.15.4 Wireless Sensor Networks”, IEEE Transactions on Computers, accepted, in press.
  7. S Cesare, Y Xiang, and W Zhou, “Control Flow-Based Malware Variant Detection”, IEEE Transactions on Dependable and Secure Computing, accepted, in press.
  8. X Huang, J K. Liu, S Tang, Y Xiang, K Liang, L Xu, and J Zhou, “Cost-Effective Authentic and Anonymous Data Sharing with Forward Security”, IEEE Transactions on Computers, accepted, in press.
  9. X Huang, Y Xiang, E Bertino, J Zhou, and L Xu, “Robust Multi-Factor Authentication for Fragile Communications”, IEEE Transactions on Dependable and Secure Computing, accepted, in press.
  10. X Huang, X Chen, J Li, Y Xiang, and L Xu, “Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems”, IEEE Transactions on Parallel and Distributed Systems, accepted, in press.
  11. J Li, X Huang, J Li, X Chen, and Y Xiang, “Securely Outsourcing Attribute-Based Encryption with Checkability”, IEEE Transactions on Parallel and Distributed Systems, accepted, in press.
  12. S Guo, D Zeng, and Y Xiang, “Chameleon Hashing for Secure and Privacy-Preserving Vehicular Communications”, IEEE Transactions on Parallel and Distributed Systems, accepted, in press.
  13. Y Zhang, L Xu, Y Xiang, and X Huang, “A Matrix-Based Pairwise Key Establishment Scheme for Wireless Mesh Networks Using Pre Deployment Knowledge”, IEEE Transactions on Emerging Topics in Computing, accepted, in press.
  14. J Chen, K He, R Du, M Zheng, Y Xiang, and Q Yuan, “Dominating Set and Network Coding-Based Routing in Wireless Mesh Networks”, IEEE Transactions on Parallel and Distributed Systems, accepted, in press.
  15. Y Wang, Y Xiang, J Zhang, W Zhou, G Wei, and L T Yang, “Internet Traffic Classification Using Constrained Clustering”, IEEE Transactions on Parallel and Distributed Systems, accepted, in press.
  16. X Chen, J Li, X Huang, J Li, Y Xiang, and D S. Wong, “Secure Outsourced Attribute-Based Signatures”, IEEE Transactions on Parallel and Distributed Systems, accepted, in press.
  17. Y Wang, Y Xiang, J Zhang, W Zhou, and B Xie, “Internet Traffic Clustering with Side Information”, Journal of Computer and System Sciences, accepted, in press.
  18. S Wen, D Wu, P Li, Y Xiang, W Zhou, and G Wei, “Detecting Stepping Stones by Abnormal Causality Probability”, Security and Communication Networks, accepted, in press.
  19. X Chen, C Chen, J Zhang, Y Xiang, and W Zhou, “A Unified Aggregation Method for Network Traffic Classification”, Concurrency and Computation: Practice and Experience, accepted, in press.
  20. W Zhou, S Wen, Y Xiang, W Zhou, and W Jia, “Detection and Defense of Application-Layer Ddos Attacks in Backbone Web Traffic”, Future Generation Computer Systems, accepted, in press.

2014

  1. W Z Khan, M Y Aalsalem, M N M Saad, Y Xiang, and T H Luan, “Detecting Replicated Nodes in Wireless Sensor Networks using Random Walks and Network Division”, IEEE WCNC 2014.
  2. I Natgunanathan, Y Xiang, T Zong, and Y Xiang, “Robustness Enhancement of Quantization Based Audio Watermarking Method Using Adaptive Safe-Band”, IEEE ICC 2014.

2013

  1. J Zhang, Y Xiang, Y Wang, W Zhou, Y Xiang, and Y Guan, “Network Traffic Classification Using Correlation Information”, IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 104-117, 2013.
  2. S Cesare, Y Xiang, and W Zhou, “Malwise – An Effective and Efficient Classification System for Packed and Polymorphic Malware”, IEEE Transactions on Computers, vol. 62, no. 6, pp. 1193-1206, 2013.
  3. J Zhang, C Chen, Y Xiang, W Zhou, and Y Xiang, “Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions”, IEEE Transactions on Information Forensics and Security, vol. 8, no. 1, pp. 5-15, 2013.
  4. Y Xiang, D Peng, Y Xiang, and S Guo, “A Novel Z-Domain Precoding Method for Blind Separation of Spatially Correlated Signals”, IEEE Transactions on Neural Networks and Learning Systems, vol. 24, no. 1, pp. 94-105, 2013.
  5. Y Xie, S Tang, Y Xiang, and J Hu, “Resisting Web Proxy-based HTTP Attacks by Temporal and Spatial Locality Behavior”, IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 7, pp. 1401-1410, 2013.
  6. W Khan, Y Xiang, M Aalsalem, and Q Arshad, “Mobile Phone Sensing Systems: A Survey”, IEEE Communications Surveys and Tutorials, vol. 15, no. 1, pp. 402-427, 2013.
  7. J Zhang, C Chen, Y Xiang, W Zhou, and A V. Vasilakos, “An Effective Network Traffic Classification Method with Unknown Flow Detection”, IEEE Transactions on Network and Service Management, vol. 10, no. 2, pp. 133-147, 2013.
  8. S Wen, W Zhou, J Zhang, Y Xiang, W Zhou, and W Jia, “Modeling Propagation Dynamics of Social Network Worms”, IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 8, pp. 1633-1643, 2013.
  9. Y Xie, J Hu, Y Xiang, S Yu, S Tang, and Y Wang, “Modeling Oscillation Behavior of Network Traffic by Nested Hidden Markov Model with Variable State-Duration”, IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 9, pp. 1807-1817, 2013.
  10. J Zhang, Y Xiang, W Zhou, and Y Wang, “Unsupervised Traffic Classification Using Flow Statistical Properties and IP Packet Payload”, Journal of Computer and System Sciences, vol. 79, no. 5, pp. 573-585, 2013.
  11. J Zhang, L Ye, Y Xiang, and W Zhou, “Robust Image Retrieval with Hidden Classes”, Computer Vision and Image Understanding, vol. 117, no. 6, pp. 670-679, 2013.
  12. W Wu, J Zhou, Y Xiang, and L Xu, “How to Achieve Non-Repudiation of Origin with Privacy Protection in Cloud Computing”, Journal of Computer and System Sciences, vol. 79, no. 8, pp. 1200-1213, 2013.
  13. Y Ren, M Li, Y Xiang, Y Cui, and K Sakurai, “Evolution of Cooperation in Reputation System by Group-Based Scheme”, The Journal of Supercomputing, vol. 63, no. 1, pp. 171-190, 2013.
  14. S Cesare, Y Xiang and J Zhang, “Clonewise – Detecting Package-level Clones Using Machine Learning”, 9th International Conference on Security and Privacy in Communication Networks (SecureComm 2013).
  15. J Zhang, C Chen, Y Xiang, and W Zhou, “Robust Network Traffic Identification with Unknown Applications”, 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013).
  16. S Cesare, and Y Xiang, “Simseer and Bugwise – Web Services for Binary-level Software Similarity and Defect Detection”, 11th Australasian Symposium on Parallel and Distributed Computing (AusPDC 2013).
  17. N Toorchi, M Ahmadian, M S Haghighi, and Y Xiang, “A Markov Model of Safety Message Broadcasting for Vehicular Networks”, 2013 IEEE Wireless Communications and Networking Conference (WCNC).
  18. Y Wang, Y Xiang, and J Zhang, “Network Traffic Clustering Using Random Forest Proximities”, IEEE ICC 2013.
  19. Y Zhang, L Xu, Y Xiang, and X Huang, “Matrix-based Pairwise Key Establishment in Wireless Mesh Networks Using Deployment Knowledge”, IEEE ICC 2013.
  20. I Natgunanathan, Y Xiang, S S. M. Elbadry, W Zhou, and Y Xiang, “Analysis of a Patchwork-Based Audio Watermarking Scheme”, IEEE ICIEA 2013.

2012

  1. Book Silvio Cesare, and Yang Xiang, Software Similarity and Classification, ISBN:978-1-4471-2908-0, Springer, 2012 [http://www.springer.com/computer/security+and+cryptology/book/978-1-4471-2908-0].[http://dx.doi.org/10.1007/978-1-4471-2909-7]
  2. Sheng Wen, Wei Zhou, Yini Wang, Wanlei Zhou, and Yang Xiang, “Locating Defense Positions for Thwarting the Propagation of Topological Worms”, IEEE Communications Letters, vol. 16, no. 4, pp. 560-563, 2012.
  3. Yu Wang, Yang Xiang, Wanlei Zhou, and Shunzheng Yu, “Generating Regular Expression Signatures for Network Traffic Classification in Trusted Network Management”, Journal of Network and Computer Applications, vol. 35, no. 3, pp. 992-1000, 2012.
  4. Jun Zhang, Chao Chen, Yang Xiang, and Wanlei Zhou, “Semi-Supervised and Compound Classification of Network Traffic”, International Workshop on Network Forensics, Security and Privacy (NFSP 2012), 2012.
  5. Yu Wang, Yang Xiang, Jun Zhang, and Shunzheng Yu, “Internet Traffic Clustering with Constraints”, The 3rd International Workshop on TRaffic Analysis and Classification (TRAC 2012), 2012.
  6. Jun Zhang, Chao Chen, Yang Xiang, and Wanlei Zhou, “Classification of Correlated Internet Traffic Flows”, The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), 2012.
  7. Wei Zhou, Sheng Wen, Yini Wang, Yang Xiang, and Wanlei Zhou, “An Analytical Model on the Propagation of Modern Email Worms”, The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), 2012.
  8. Silvio Cesare, and Yang Xiang, “Wire – A Formal Intermediate Language for Binary Analysis”, The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), 2012.

2011

  1. Xinyi Huang, Yang Xiang, Ashley Chonka, Jianying Zhou, and Robert H. Deng, “A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems”, IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 8, pp. 1390-1397, 2011.
  2. Yang Xiang, Ke Li, and Wanlei Zhou, “Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics”, IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 426-437, 2011.
  3. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, and Yang Xiang, “Optimistic Fair Exchange with Strong Resolution-Ambiguity”, IEEE Journal on Selected Areas in Communications, vol. 29, no. 7, pp. 1491-1502, 2011.
  4. Yini Wang, Sheng Wen, Silvio Cesare, Wanlei Zhou, and Yang Xiang, “Eliminating Errors in Worm Propagation Models”, IEEE Communications Letters, vol. 15, no. 9, pp. 1022-1024, 2011.
  5. Yini Wang, Sheng Wen, Silvio Cesare, Wanlei Zhou, and Yang Xiang, “The Microcosmic Model of Worm Propagation”, The Computer Journal, Oxford, vol. 54, no. 10, pp. 1700-1720, 2011. doi:10.1093/comjnl/bxr082.
  6. Jun Zhang, Yang Xiang, Wanlei Zhou, Lei Ye, Yi Mu, “Secure Image Retrieval Based on Visual Content and Watermarking Protocol”, The Computer Journal, Oxford, vol. 54, no. 10, pp. 1661-1674, 2011. doi: 10.1093/comjnl/bxr078.
  7. Ashley Chonka, Yang Xiang, Wanlei Zhou, and Alessio Bonti, “Cloud Security Defence to Protect Cloud Computing against HTTP-DoS and XML-DoS Attacks”, Journal of Network and Computer Applications, Elsevier, vol. 34, no. 4, pp. 1097-1107, 2011.
  8. Wen Tao Zhu, Fei Gao, and Yang Xiang, “A Secure and Efficient Data Aggregation Scheme for Wireless Sensor Networks”, Concurrency and Computation: Practice and Experience, Wiley, vol. 23, no. 12, pp. 1414-1430, 2011.
  9. Wen Tao Zhu, Yang Xiang, Jianying Zhou, Robert Deng, and Feng Bao, “Secure Localization with Attack Detection in Wireless Sensor Networks”, International Journal of Information Security, Springer, vol. 10, no. 3, pp. 155-171, 2011.
  10. Yongrui Cui, Mingchu Li, Yang Xiang, Yizhi Ren, and Silvio Cesare, “A Quality-of-Service based Fine-grained Reputation System in the Grid Environment”, Concurrency and Computation: Practice and Experience, Wiley, accepted, in press.
  11. Sheng Wen, Wei Zhou, Yang Xiang, and Wanlei Zhou, “CAFS: A Novel Lightweight Cache-based Scheme for Large-Scale Intrusion Alert Fusion”, Concurrency and Computation: Practice and Experience, Wiley, accepted, in press.
  12. Yu Wang, Yang Xiang, Jun Zhang, and Shunzheng Yu, “A Novel Semi-Supervised Approach for Network Traffic Clustering”, in The 5th International Conference on Network and System Security (NSS 2011), 2011.
  13. Yu Wang, Yang Xiang, and Shunzheng Yu, “Internet Traffic Classification Using Machine Learning: A Token-based Approach”, in The 14th IEEE International Conference on Computational Science and Engineering (CSE 2011), 2011.
  14. Yini Wang, Sheng Wen, Wanlei Zhou, and Yang Xiang, “Modeling Worms Propagation on Probability”, in The 5th International Conference on Network and System Security (NSS 2011), 2011.
  15. Yini Wang, Sheng Wen, Wei Zhou, Wanlei Zhou, and Yang Xiang, “The Probability Model of Peer-to-Peer Botnet Propagation”, in The 11th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2011), 2011.
  16. Silvio Cesare, and Yang Xiang, “Malware Variant Detection Using Similarity Search over Sets of Control Flow Graphs”, in The 10th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (IEEE TrustCom 2011), 2011.
  17. Mahbub Ahmed, and Yang Xiang, “Trust Ticket Deployment: A Notion of Data Owner’s Trust in Cloud Computing”, in The 10th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (IEEE TrustCom 2011), 2011.

2010

  1. Yang Xiang, Daxin Tian, and Wanlei Zhou, “A Microscopic Competition Model and Its Dynamics Analysis on Network Attacks”, Concurrency and Computation: Practice and Experience, Wiley, vol. 22, no. 4, pp. 503-517, http://doi.wiley.com/10.1002/cpe.1499, 2010.
  2. Yu Wang, Yang Xiang, and Shun-Zheng Yu, “An Automatic Application Signature Construction System for Unknown Traffic”, Concurrency and Computation: Practice and Experience, Wiley, vol. 22, no. 13, pp. 1927-1944, http://doi.wiley.com/10.1002/cpe.1603 2010.
  3. Xiang Fan, and Yang Xiang, “Modeling the Propagation of Peer-to-Peer Worms”, Future Generation Computer Systems, Elsevier, vol. 26, no. 8, pp. 1433-1443, 2010. http://dx.doi.org/10.1016/j.future.2010.04.009.
  4. Xiang Fan, and Yang Xiang, “Defending against the Propagation of Active Worms”, The Journal of Supercomputing, Springer, vol. 51, no. 2, pp. 167-200, 2010.
  5. Sheng Wen, Yang Xiang, and Wanlei Zhou, “A Lightweight Intrusion Alert Fusion System”, 12th IEEE International Conference on High Performance Computing and Communications (HPCC 2010), pp. 695-700, 2010.
  6. Laiping Zhao, Yizhi Ren, Yang Xiang, and Kouichi Sakurai, “Fault-Tolerant Scheduling with Dynamic Number of Replicas in Heterogeneous Systems”, 12th IEEE International Conference on High Performance Computing and Communications (HPCC 2010), pp. 434-441, 2010.
  7. Rafiqul Islam, and Yang Xiang, “Email Classification Using Data Reduction Method”, 5th International ICST Conference on Communications and Networking in China (ChinaCom 2010), 2010. (Best Paper Award)
  8. Mahbub Ahmed, Yang Xiang, and Shawkat Ali, “Above the Trust and Security in Cloud Computing: A Notion towards Innovation”, 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2010), 2010.
  9. Xiang Fan, and Yang Xiang, “Modeling the Propagation of Peer-to-Peer Worms under Quarantine”, IEEE/IFIP 12th Network Operations & Management Symposium (NOMS 2010), IEEE, pp. 942-945, 2010.
  10. Silvio Cesare, and Yang Xiang, “Classification of Malware Using Structured Control Flow”, 8th Australasian Symposium on Parallel and Distributed Computing (AusPDC 2010), pp. 61-70, 2010.
  11. Silvio Cesare, and Yang Xiang, “A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the Endhost”, IEEE 24th International Conference on Advanced Information Networking and Application (AINA 2010), IEEE, pp. 721-728, 2010.
  12. Xiang Fan, and Yang Xiang, “Propagation Modeling of Peer-to-Peer Worms”, IEEE 24th International Conference on Advanced Information Networking and Application (AINA 2010), IEEE, pp. 1128-1135, 2010.
  13. Yu Wang, Shun-Zheng Yu, and Yang Xiang, “Automatic Application Signature Construction from Unknown Traffic”, IEEE 24th International Conference on Advanced Information Networking and Application (AINA 2010), IEEE, pp. 1115-1120, 2010.
  14. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, and Yang Xiang, “Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting “, 13th International Conference on Practice and Theory in Public Key Cryptography (PKC 2010), Springer, LNCS 6056, pp. 124-141, 2010.
  15. BookShawkat Ali, Yang Xiang, Dynamic and Advanced Data Mining for Progressing Technological Development, ISBN:978-1-60566-908-3, IGI Global, 2010 [http://www.igi-global.com/bookstore/TitleDetails.aspx?TitleId=283].

2009

  1. Yang Xiang, Wanlei Zhou, and Minyi Guo, “Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks”, IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 4, pp. 567-580, Apr. 2009. (Featured article from the April issue)
  2. Rafiqul Islam, Wanlei Zhou, Minyi Guo, and Yang Xiang, “An Innovative Analyser for Multi-classifier E-mail Classification Based on Grey List Analysis”, Journal of Network and Computer Applications, Elsevier, vol. 32, no. 2, pp. 357-366, 2009.
  3. Rafiqul Islam, Wanlei Zhou, Yang Xiang, and Abdun Naser Mahmood, “Spam Filtering for Network Traffic Security on A Multi-core Environment”, Concurrency and Computation: Practice and Experience, Wiley, vol. 21, no. 10, pp. 1307-1320, 2009.
  4. Yang Xiang, and Daxin Tian, “Multi-core Supported Deep Packet Inspection”, The Handbook of Research on Scalable Computing Technologies, K.-C. Li, C.-H. Hsu, L. T. Yang et al., eds., pp. 858-873, IGI Global, 2009.
  5. Daxin Tian, Yanheng Liu, and Yang Xiang, “Large-scale Network Intrusion Detection Based on Distributed Learning Algorithm”, International Journal of Information Security, Springer, vol. 8, no. 1, pp. 25-35, 2009.
  6. Yang Xiang, Xiang Fan, and Wen Tao Zhu, “Propagation of Active Worms: A Survey”, International Journal of Computer Systems Science and Engineering, CRL, vol. 24, no. 2, pp. 157-172, 2009.
  7. Wen Tao Zhu, and Yang Xiang, “Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks “, 6th International Conference on Autonomic and Trusted Computing (ATC 2009), Springer, LNCS 5586, pp. 164-178, 2009.
  8. Xiang Fan, and Yang Xiang, “Modeling the Propagation Process of Topology-Aware Worms: An Innovative Logic Matrix Formulation”, 6th IFIP International Conference on Network and Parallel Computing (NPC 2009), IEEE, pp. 182-189, 2009.

2008

  1. Zhongwen Li, and Yang Xiang, “Checkpointing Schemes for Grid Workflow Systems”, Concurrency and Computation: Practice and Experience, Wiley, vol. 20, no. 15, pp. 1773-1790.
  2. Zhongwen Li, Qiong Chen, and Yang Xiang, “A Cross-Authentication Model and Implementation”, International Journal of Computer Systems Science and Engineering, CRL, vol. 23, no. 3, pp. 167-182, 2008.
  3. Yang Xiang and Wanlei Zhou, “Using Multi-core Processors to Support Network Security Applications”, 12th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2008), IEEE, pp. 213-218, 2008.
  4. Wanlei Zhou and Yang Xiang, “Using Multi-core to Support Security-related Applications”, The 8th International Conference on Alg [Get Slides: [Part 1] [Part 2] [Part 3] [Part 4]]
  5. Xiang Fan and Yang Xiang, “Accelerating Propagation of Active Worms by Employing Multiple Target Discovery Techniques”, 2008 IFIP International Conference on Network and Parallel Computing (NPC 2008), Springer, LNCS 5245, pp. 150-161, 2008.
  6. Daxin Tian and Yang Xiang, “A Multi-core Supported Intrusion Detection System”, 2nd IFIP International Workshop on Network and System Security (NSS 2008), IEEE, pp. 50-55, 2008.
  7. Xiang Fan and Yang Xiang, “Defending against the Propagation of Active Worms”, 2008 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive Applications (TSP-08), IEEE, pp. 350-355, 2008.
  8. Xiang Fan, and Yang Xiang, “Shortening the Slow Start Phase in the Propagation of Active Worms”, The 2008 International Symposium on Computer Science and its Applications, IEEE, 2008.
  9. Ashley Chonka, Wanlei Zhou, Yang Xiang, and Jaipal Singh, “Detecting and Tracing DDoS attacks by Intelligent Decision Prototype (IDP)”, IEEE Workshop on Web and Pervasive Security, IEEE, 2008.
  10. Ashley Chonka, Wanlei Zhou, and Yang Xiang, “Protecting Web Services with Service Oriented Traceback Architecture”, IEEE 8th International Conference on Computer and Information Technology, IEEE, 2008.
  11. Ashley Chonka, Wanlei Zhou, Leanne Ngo, and Yang Xiang, “Ubiquitous Multicore (UM) Methodology for Multimedia”, The 2008 International Symposium on Computer Science and its Applications, IEEE, 2008.
  12. Ashley Chonka, Wanlei Zhou, Keith Knapp, and Yang Xiang, “Protecting Information Systems from DDoS Attack Using Multicore Methodology”, IEEE 8th International Conference on Computer and Information Technology, IEEE, 2008.
  13. Ashley Chonka, Wanlei Zhou, and Yang Xiang, “Protecting Web Services from DDoS attacks by SOTA”, IEEE 5th International Conference on Information Technology and Applications , IEEE, 2008.

Conferences

 

 

Previous Members

 

  • Wei Zhou (PhD) – Now at UNSW@ADFA as PhD student
  • Dr. Yini Wang – Now at IBM Australia
  • Dr. Wen Tao Zhu – Now at Chinese Academy of Sciences as Professor
  • Dr. Ashley Chonka – Now at Deakin University as Lecturer
  • Dr. Daxin Tian – Now at Beihang University, China, as Assistant Professor
  • Dr. Xinyi Huang – Now at Fujian Nomal University as Professor
  • Dr. Yongrui Cui – Now at Dalian University of Technology
  • Dr. Mohammad Haghighi – Now as Assistant Professor

 


Courses Taught at Deakin

 

  • SIT340/740 Research and Development in I.T.
  • SIT302 Projects
  • SIT704 Advanced Topics in Digital Security

 


Locations of visitors to this page