Yang Xiang's photo Professor Yang Xiang
()
PhD, SMIEEE

Director, Centre for Cyber Security Research
Deakin University
221 Burwood Highway, Burwood, VIC 3125, Australia
email: my first name@deakin.edu.au
http://nsclab.org/yang
Phone: +61 3 9251 7482
Fax: +61 3 9244 6440
Deakin University logo

Biographical Sketch

Professor Yang Xiang received his PhD in Computer Science from Deakin University, Australia. He is the Director of Centre for Cyber Security Research, Deakin University. His research interests include network and system security, data analytics, distributed systems, and networking. In particular, he is currently leading his team developing active defense systems against large-scale distributed network attacks. He is the Chief Investigator of several projects in network and system security, funded by the Australian Research Council (ARC). He has published more than 200 research papers in many international journals and conferences, such as IEEE Transactions on Computers, IEEE Transactions on Parallel and Distributed Systems, IEEE Transactions on Information Security and Forensics, and IEEE Journal on Selected Areas in Communications. Two of his papers were selected as the featured articles in the April 2009 and the July 2013 issues of IEEE Transactions on Parallel and Distributed Systems. Two of his papers were selected as the featured articles in the Jul/Aug 2014 and the Nov/Dec 2014 issues of IEEE Transactions on Dependable and Secure Computing. He has published two books, Software Similarity and Classification (Springer) and Dynamic and Advanced Data Mining for Progressing Technological Development (IGI-Global). He has served as the Program/General Chair for many international conferences such as SocialSec 15, IEEE DASC 15/14, IEEE UbiSafe 15/14, IEEE TrustCom 13, ICA3PP 12/11, IEEE/IFIP EUC 11, IEEE TrustCom 13/11, IEEE HPCC 10/09, IEEE ICPADS 08, NSS 11/10/09/08/07. He has been the PC member for more than 60 international conferences in distributed systems, networking, and security. He serves as the Associate Editor of IEEE Transactions on Computers, IEEE Transactions on Parallel and Distributed Systems, Security and Communication Networks (Wiley), and the Editor of Journal of Network and Computer Applications. He is the Coordinator, Asia for IEEE Computer Society Technical Committee on Distributed Processing (TCDP). He is a Senior Member of the IEEE.


News

Alfred Deakin Fellowship Open now - close 29 May 2017. 2 years of salary support at Level A Step 6 in Year 1 ($80,490) and Level A Step 7 in Year 2 ($83,396) plus a one-off research support grant of $10,000. Please email me your CV if interested.

PhD Scholarships Vacant - PhD scholarships available. Please email me your CV if interested.

News from industry


New Book: Software Similarity and Classification (Springer)
http://dx.doi.org/10.1007/978-1-4471-2909-7

Positions Vacant - If you are interested in Network and System Security and are looking for an supervisor for your PhD, Master, or Honours study, please send me an email with your CV. I am always happy to discuss with you about the research topics and the funding opportunities such as scholarships and teaching assistant positions. Please read this for details. If you are looking for PostDoc research fellow or visiting scholar positions, please email me for details.


Associate Editor / Editor

  • IEEE Transactions on Computers
  • IEEE Transactions on Parallel and Distributed Systems
  • Security and Communication Networks (Wiley)
  • Journal of Network and Computer Applications (Elsevier) - Best Paper Awards available in this journal

  • Research Grants


    Selected Publications

    My publications at Google Scholar, at DBLP.
    Before you download the papers, please carefully read this copyright page.

    Accepted, in press

    1. C Chen, Y Wang, J Zhang, Y Xiang, W Zhou, and G Min, "Statistical Features Based Real-Time Detection of Drifted Twitter Spam ", IEEE Transactions on Information Forensics and Security, vol. 12, no. 4, pp. 914-925, 2017.
    2. J Zhang, X Chen, Y Xiang, W Zhou, and J Wu, "Robust Network Traffic Classification", IEEE/ACM Transactions on Networking, accepted, in press. Download PDF
    3. Y Xie, Y Wang, H He, Y Xiang, S Yu, and X Liu, "A General Collaborative Framework for Modeling and Perceiving Distributed Network Behavior", IEEE/ACM Transactions on Networking, vol. 24, no. 5, pp. 3162-3176, 2016.
    4. Y Zhang, Y Xiang, and X Huang, "Password Authenticated Group Key Exchange: A Cross-Layer Design", ACM Transactions on Internet Technology, accepted, in press.
    5. J Jiang, S Wen, S Yu, Y Xiang, and W Zhou, "Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies", IEEE Communications Surveys and Tutorials, accepted, in press. Download PDF
    6. M S Haghighi, S Wen, Y Xiang, B Quinn, and W Zhou, "On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks", IEEE Transactions on Information Forensics and Security, accepted, in press.
    7. S Wen, M S Haghighi, C Chen, Y Xiang, W Zhou, and W Jia, "A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks", IEEE Transactions on Computers, accepted, in press. Download PDF
    8. S Wen, J Jiang, Y Xiang, S Yu, W Zhou, and W Jia, "To Shut Them up or to Clarify: Restraining the Spread of Rumors in Online Social Networks", IEEE Transactions on Parallel and Distributed Systems, accepted, in press.
    9. S Wen, J Jiang, Y Xiang, S Yu, and W Zhou, "Are the Popular Users Always Important for the Information Dissemination in Online Social Networks?", IEEE Network, vol. 28, no. 5, pp. 64-67, 2014. Download PDF
    10. J Jiang, S Wen, S Yu, Y Xiang, and W Zhou, "K-Center: An Approach on the Multi-Source Identification of Information Diffusion", IEEE Transactions on Information Forensics and Security, accepted, in press.
    11. J Jiang, S Wen, S Yu, Y Xiang, and W Zhou, "Rumor Source Identification in Social Networks with Time-Varying Topology", IEEE Transactions on Dependable and Secure Computing, accepted, in press.
    12. T Wang, C Xia, S Wen, H Xue, Y Xiang, and S Tu, "SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks", IEEE Transactions on Dependable and Secure Computing, accepted, in press.
    13. M S Haghighi, Y Xiang, V Varadharajan, and B Quinn, "A Stochastic Time-Domain Model for Burst Data Aggregation in IEEE 802.15.4 Wireless Sensor Networks", IEEE Transactions on Computers, accepted, in press.
    14. X Huang, X Chen, J Li, Y Xiang, and L Xu, "Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems", IEEE Transactions on Parallel and Distributed Systems, accepted, in press.
    15. J Li, X Huang, J Li, X Chen, and Y Xiang, "Securely Outsourcing Attribute-Based Encryption with Checkability", IEEE Transactions on Parallel and Distributed Systems, accepted, in press.
    16. J Chen, J Teh, Z Liu, C Su, A Samsudin, and Y Xiang, "Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks", IEEE Transactions on Computers, accepted, in press.
    17. J Baek, Q-H Vu, J Liu, X Huang, Y Xiang, "A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid", IEEE Transactions on Cloud Computing, accepted, in press.
    18. Y Zhang, L Xu, Y Xiang, and X Huang, "A Matrix-Based Pairwise Key Establishment Scheme for Wireless Mesh Networks Using Pre Deployment Knowledge", IEEE Transactions on Emerging Topics in Computing, accepted, in press.
    19. X Chen, J Li, X Huang, J Li, Y Xiang, and D S. Wong, "Secure Outsourced Attribute-Based Signatures", IEEE Transactions on Parallel and Distributed Systems, accepted, in press.
    20. J Wang, W Bao, X Zhu, L T. Yang, and Y Xiang, "FESTAL: Fault-Tolerant Elastic Scheduling Algorithm for Real-Time Tasks in Virtualized Clouds", IEEE Transactions on Computers, accepted, in press.
    21. S Tang, X Li, X Huang, Y Xiang, and L Xu, "Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing", IEEE Transactions on Computers, accepted, in press.
    22. X Zhu, C Chen, L T. Yang, and Y Xiang, "ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds", IEEE Transactions on Computers, accepted, in press.
    23. M Qiu, M Zhong, J Wang, L T. Yang, and Yang Xiang, "Enabling Cloud Computing in Emergency Management Systems: Design and Optimization", IEEE Cloud Computing, accepted, in press.
    24. X Yao, H Liu, H Ning, L T. Yang, and Y Xiang, "Anonymous Credential-Based Access Control Scheme for Clouds", IEEE Cloud Computing, accepted, in press.
    25. W Chen, L Xu, G Li, and Y Xiang, "A Lightweight Virtualization Solution for Android Devices", IEEE Transactions on Computers, accepted, in press.
    26. X Ma, L T. Yang, Y Xiang, W Zeng, D Zou, and H Jin, "Fully Reversible Privacy Region Protection for Cloud Video Surveillance", IEEE Transactions on Cloud Computing, accepted, in press.
    27. J Wang, X Chen, X Huang, I You, and Y Xiang, "Verifiable Auditing for Outsourced Database in Cloud Computing", IEEE Transactions on Computers, accepted, in press.
    28. J K. Liu, K Liang, W Susilo, J Liu, and Y Xiang, "Two-Factor Data Security Protection Mechanism for Cloud Storage System", IEEE Transactions on Computers, accepted, in press.
    29. C Chen, J Zhang, Y Xie, Y Xiang, W Zhou, M M Hassan, and A AlElaiwi, "A Performance Evaluation of Machine Learning Based Streaming Spam Tweets Detection", IEEE Transactions on Computational Social Systems, accepted, in press.
    30. G Wei, J Shao, Y Xiang, P Zhu, and R Lu, "Obtain Confidentiality or/and Authenticity in Big Data by Id-Based Generalized Signcryption", Information Sciences, accepted, in press.
    31. L Lin, L Xu, S Zhou, and Y Xiang, "Trustworthiness-Hypercube-Based Reliable Communication in Mobile Social Networks", Information Sciences, accepted, in press.
    32. C Chen, S Wen, J Zhang, Y Xiang, J Oliver, M M Hassan, and A Alelaiwi, "Investigating the Deceptive Information in Twitter Spam Future Generation Computer Systems", Future Generation Computer Systems, accepted, in press.
    33. B Wang, Y Cheng, W Chen, Q He, Y Xiang, M M Hassan, and A Alelaiwi, "Efficient Consolidation-Aware Vcpu Scheduling on Multicore Virtualization Platform", Future Generation Computer Systems, accepted, in press.
    34. Y Wang, Y Xiang, J Zhang, W Zhou, and B Xie, "Internet Traffic Clustering with Side Information", Journal of Computer and System Sciences, accepted, in press.
    35. S Wen, D Wu, P Li, Y Xiang, W Zhou, and G Wei, "Detecting Stepping Stones by Abnormal Causality Probability", Security and Communication Networks, accepted, in press.
    36. X Chen, C Chen, J Zhang, Y Xiang, and W Zhou, "A Unified Aggregation Method for Network Traffic Classification", Concurrency and Computation: Practice and Experience, accepted, in press.
    37. Y Cheng, W Chen, Z Wang, X Yu, R Jin, and Y Xiang, "AMC: An Adaptive Multi-Level Cache Algorithm in Hybrid Storage Systems", Concurrency and Computation: Practice and Experience, accepted, in press.
    38. Y Cheng, W Chen, Z Wang, and Y Xiang, "Precise Contention-Aware Performance Prediction on Virtualized Multicore System", Journal of Systems Architecture, accepted, in press.
    39. M Sookhak, R F. Yu, M Khurram Khan, Y Xiang, and R Buyya, "Attribute-Based Data Access Control in Mobile Cloud Computing: Taxonomy and Open Issues", Future Generation Computer Systems, accepted, in press.
    40. X Chen, X Huang, Y Xiang, D Zhang, R Ranjan, and C Liao, "A Cps Framework Based Perturbation Constrained Buffer Planning Approach in Vlsi Design", Journal of Parallel and Distributed Computing, accepted, in press.
    41. S Liu, Y Wang, J Zhang, C Chen, and Y Xiang, "Addressing the Class Imbalance Problem in Twitter Spam Detection Using Ensemble Learning", Computers & Security, accepted, in press.
    42. W Meng, W Li, Y Xiang, and K-K R Choo, "A Bayesian Inference-Based Detection Mechanism to Defend Medical Smartphone Networks against Insider Attacks", Journal of Network and Computer Applications, vol. 78, pp. 162-169, 2017.
    43. Y Zhang, Y Xiang, W Wu, and A Alelaiwi, "A Variant of Password Authenticated Key Exchange Protocol", Future Generation Computer Systems, accepted, in press.

    2015

    1. X Huang, J K. Liu, S Tang, Y Xiang, K Liang, L Xu, and J Zhou, "Cost-Effective Authentic and Anonymous Data Sharing with Forward Security", IEEE Transactions on Computers, vol. 64, no. 4, pp. 971-983, 2015. Download PDF
    2. J Chen, K He, R Du, M Zheng, Y Xiang, and Q Yuan, "Dominating Set and Network Coding-Based Routing in Wireless Mesh Networks", IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 2, pp. 423-433, 2015.
    3. M Zheng, Y Xiang, and H Zhou,"A Strong Provably Secure Ibe Scheme without Bilinear Map", Journal of Computer and System Sciences, vol. 81, no. 1, pp. 125-131, 2015.
    4. X Wang, J Cao, and Y Xiang, "Dynamic Cloud Service Selection Using an Adaptive Learning Mechanism in Multi-Cloud Computing", Journal of Systems and Software, vol. 100, no. 2, pp. 195-210, 2015.
    5. K Zhao, H Jin, D Zou, W Dai, and Y Xiang, "A Privacy-Preserving Location Tracking System for Smartphones Based on Cloud Storage", Security and Communication Networks, vol. 8, no. 3, pp. 446-458, 2015.
    6. Y Wang, C Chen, and Y Xiang, "Unknown Pattern Extraction for Statistical Network Protocol Identification", in 40th Annual IEEE Conference on Local Computer Networks (LCN 2015).
    7. C Chen, J Zhang, X Chen, Y Xiang, and W Zhou, "6 Million Spam Tweets: A Large Ground Truth for Timely Twitter Spam Detection", in IEEE International Conference on Communications (ICC 2015). Download paper and data here Download PDF and Data
    8. C Chen, J Zhang, Y Xiang, and W Zhou, "Asymmetric Self-Learning for Tackling Twitter Spam Drift", in Third International Workshop on Security and Privacy in Big Data (BigSecurity 2015). Download paper and data here Download PDF and Data

    2014

    1. Y Wang, S Wen, Y Xiang, and W Zhou, "Modeling the Propagation of Worms in Networks: A Survey", IEEE Communications Surveys and Tutorials, vol. 16, no. 2, pp. 942-960, 2014. Download PDF
    2. Y Wang, Y Xiang, J Zhang, W Zhou, G Wei, and L T Yang, "Internet Traffic Classification Using Constrained Clustering", IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 11, pp. 2932-2943, 2014. Download PDF (supplementary file Download PDF)
    3. S Cesare, Y Xiang, and W Zhou, "Control Flow-Based Malware Variant Detection", IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 4, pp. 307-317, 2014. Download PDF
    4. S Wen, W Zhou, J Zhang, Y Xiang, W Zhou, W Jia, and C C. Zou,"Modeling and Analysis on the Propagation Dynamics of Modern Email Malware", IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 4, pp. 361-374, 2014. (Featured Article) Download PDF
    5. X Huang, Y Xiang, E Bertino, J Zhou, and L Xu, "Robust Multi-Factor Authentication for Fragile Communications", IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 6, pp. 568-581, 2014. (Featured Article)
    6. S Guo, D Zeng, and Y Xiang, "Chameleon Hashing for Secure and Privacy-Preserving Vehicular Communications", IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 11, pp. 2794-2803, 2014.
    7. W Zhou, S Wen, Y Xiang, W Zhou, and W Jia, "Detection and Defense of Application-Layer DDoS Attacks in Backbone Web Traffic", Future Generation Computer Systems, vol. 38, pp. 36-46, 2014. Download PDF
    8. G Wei, Y Xiang, M Ji, and P Zhu, "An Analytical Model for Optimal Spectrum Leasing under Constraints of Quality of Service in CRNs", Computer Networks, vol. 74, no. Part B, pp. 71-80, 2014.
    9. Y Zhang, Y Xiang, X Huang, and L Xu, "A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks", 19th European Symposium on Research in Computer Security (ESORICS 2014).
    10. D Wu, X Chen, C Chen, J Zhang, Y Xiang, and W Zhou, "On Addressing the Imbalance Problem: A Correlated Knn Approach for Network Traffic Classification", 8th International Conference on Network and System Security (NSS 2014).
    11. Y Zhang, J Chen, R Du, Q Zhou, and Y Xiang, "FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing", 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2014).
    12. W Li, W Meng, Z Tan, and Y Xiang,"Towards Designing an Email Classification System Using Multi-View Based Semi-Supervised Learning", 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2014).
    13. W Z Khan, M Y Aalsalem, M N M Saad, Y Xiang, and T H Luan, "Detecting Replicated Nodes in Wireless Sensor Networks using Random Walks and Network Division", IEEE WCNC 2014.
    14. I Natgunanathan, Y Xiang, T Zong, and Y Xiang, "Robustness Enhancement of Quantization Based Audio Watermarking Method Using Adaptive Safe-Band", IEEE ICC 2014.

    2013

    1. J Zhang, Y Xiang, Y Wang, W Zhou, Y Xiang, and Y Guan, "Network Traffic Classification Using Correlation Information", IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 104-117, 2013. Download PDF
    2. S Cesare, Y Xiang, and W Zhou, "Malwise - An Effective and Efficient Classification System for Packed and Polymorphic Malware", IEEE Transactions on Computers, vol. 62, no. 6, pp. 1193-1206, 2013. Download PDF
    3. J Zhang, C Chen, Y Xiang, W Zhou, and Y Xiang, "Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions", IEEE Transactions on Information Forensics and Security, vol. 8, no. 1, pp. 5-15, 2013. Download PDF
    4. Y Xiang, D Peng, Y Xiang, and S Guo, "A Novel Z-Domain Precoding Method for Blind Separation of Spatially Correlated Signals", IEEE Transactions on Neural Networks and Learning Systems, vol. 24, no. 1, pp. 94-105, 2013.
    5. Y Xie, S Tang, Y Xiang, and J Hu, "Resisting Web Proxy-based HTTP Attacks by Temporal and Spatial Locality Behavior", IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 7, pp. 1401-1410, 2013. (Featured Article)
    6. W Khan, Y Xiang, M Aalsalem, and Q Arshad, "Mobile Phone Sensing Systems: A Survey", IEEE Communications Surveys and Tutorials, vol. 15, no. 1, pp. 402-427, 2013.
    7. J Zhang, C Chen, Y Xiang, W Zhou, and A V. Vasilakos, "An Effective Network Traffic Classification Method with Unknown Flow Detection", IEEE Transactions on Network and Service Management, vol. 10, no. 2, pp. 133-147, 2013. Download PDF
    8. S Wen, W Zhou, J Zhang, Y Xiang, W Zhou, and W Jia, "Modeling Propagation Dynamics of Social Network Worms", IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 8, pp. 1633-1643, 2013. Download PDF
    9. Y Xie, J Hu, Y Xiang, S Yu, S Tang, and Y Wang, "Modeling Oscillation Behavior of Network Traffic by Nested Hidden Markov Model with Variable State-Duration", IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 9, pp. 1807-1817, 2013.
    10. J Zhang, Y Xiang, W Zhou, and Y Wang, "Unsupervised Traffic Classification Using Flow Statistical Properties and IP Packet Payload", Journal of Computer and System Sciences, vol. 79, no. 5, pp. 573-585, 2013.
    11. J Zhang, L Ye, Y Xiang, and W Zhou, "Robust Image Retrieval with Hidden Classes", Computer Vision and Image Understanding, vol. 117, no. 6, pp. 670-679, 2013.
    12. W Wu, J Zhou, Y Xiang, and L Xu, "How to Achieve Non-Repudiation of Origin with Privacy Protection in Cloud Computing", Journal of Computer and System Sciences, vol. 79, no. 8, pp. 1200-1213, 2013. Download PDF
    13. Y Ren, M Li, Y Xiang, Y Cui, and K Sakurai, "Evolution of Cooperation in Reputation System by Group-Based Scheme", The Journal of Supercomputing, vol. 63, no. 1, pp. 171-190, 2013.
    14. S Cesare, Y Xiang and J Zhang, "Clonewise - Detecting Package-level Clones Using Machine Learning", 9th International Conference on Security and Privacy in Communication Networks (SecureComm 2013). Download PDF
    15. J Zhang, C Chen, Y Xiang, and W Zhou, "Robust Network Traffic Identification with Unknown Applications", 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013).
    16. S Cesare, and Y Xiang, "Simseer and Bugwise - Web Services for Binary-level Software Similarity and Defect Detection", 11th Australasian Symposium on Parallel and Distributed Computing (AusPDC 2013).
    17. N Toorchi, M Ahmadian, M S Haghighi, and Y Xiang, "A Markov Model of Safety Message Broadcasting for Vehicular Networks", 2013 IEEE Wireless Communications and Networking Conference (WCNC).
    18. Y Wang, Y Xiang, and J Zhang, "Network Traffic Clustering Using Random Forest Proximities", IEEE ICC 2013.
    19. Y Zhang, L Xu, Y Xiang, and X Huang, "Matrix-based Pairwise Key Establishment in Wireless Mesh Networks Using Deployment Knowledge", IEEE ICC 2013.
    20. I Natgunanathan, Y Xiang, S S. M. Elbadry, W Zhou, and Y Xiang, "Analysis of a Patchwork-Based Audio Watermarking Scheme", IEEE ICIEA 2013.

    2012

    1. Book Silvio Cesare, and Yang Xiang, Software Similarity and Classification, ISBN:978-1-4471-2908-0, Springer, 2012 [http://www.springer.com/computer/security+and+cryptology/book/978-1-4471-2908-0].[http://dx.doi.org/10.1007/978-1-4471-2909-7]
    2. Sheng Wen, Wei Zhou, Yini Wang, Wanlei Zhou, and Yang Xiang, "Locating Defense Positions for Thwarting the Propagation of Topological Worms", IEEE Communications Letters, vol. 16, no. 4, pp. 560-563, 2012. Download PDF
    3. Yu Wang, Yang Xiang, Wanlei Zhou, and Shunzheng Yu, "Generating Regular Expression Signatures for Network Traffic Classification in Trusted Network Management", Journal of Network and Computer Applications, vol. 35, no. 3, pp. 992-1000, 2012. Download PDF
    4. Jun Zhang, Chao Chen, Yang Xiang, and Wanlei Zhou, "Semi-Supervised and Compound Classification of Network Traffic", International Workshop on Network Forensics, Security and Privacy (NFSP 2012), 2012.
    5. Yu Wang, Yang Xiang, Jun Zhang, and Shunzheng Yu, "Internet Traffic Clustering with Constraints", The 3rd International Workshop on TRaffic Analysis and Classification (TRAC 2012), 2012.
    6. Jun Zhang, Chao Chen, Yang Xiang, and Wanlei Zhou, "Classification of Correlated Internet Traffic Flows", The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), 2012.
    7. Wei Zhou, Sheng Wen, Yini Wang, Yang Xiang, and Wanlei Zhou, "An Analytical Model on the Propagation of Modern Email Worms", The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), 2012.
    8. Silvio Cesare, and Yang Xiang, "Wire - A Formal Intermediate Language for Binary Analysis", The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), 2012.

    2011

    1. Xinyi Huang, Yang Xiang, Ashley Chonka, Jianying Zhou, and Robert H. Deng, "A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems", IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 8, pp. 1390-1397, 2011. Download PDF
    2. Yang Xiang, Ke Li, and Wanlei Zhou, "Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics", IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 426-437, 2011. Download PDF
    3. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, and Yang Xiang, "Optimistic Fair Exchange with Strong Resolution-Ambiguity", IEEE Journal on Selected Areas in Communications, vol. 29, no. 7, pp. 1491-1502, 2011. Download PDF
    4. Yini Wang, Sheng Wen, Silvio Cesare, Wanlei Zhou, and Yang Xiang, "Eliminating Errors in Worm Propagation Models", IEEE Communications Letters, vol. 15, no. 9, pp. 1022-1024, 2011. Download PDF
    5. Yini Wang, Sheng Wen, Silvio Cesare, Wanlei Zhou, and Yang Xiang, "The Microcosmic Model of Worm Propagation", The Computer Journal, Oxford, vol. 54, no. 10, pp. 1700-1720, 2011. doi:10.1093/comjnl/bxr082. Download PDF
    6. Jun Zhang, Yang Xiang, Wanlei Zhou, Lei Ye, Yi Mu, "Secure Image Retrieval Based on Visual Content and Watermarking Protocol", The Computer Journal, Oxford, vol. 54, no. 10, pp. 1661-1674, 2011. doi: 10.1093/comjnl/bxr078. Download PDF
    7. Ashley Chonka, Yang Xiang, Wanlei Zhou, and Alessio Bonti, "Cloud Security Defence to Protect Cloud Computing against HTTP-DoS and XML-DoS Attacks", Journal of Network and Computer Applications, Elsevier, vol. 34, no. 4, pp. 1097-1107, 2011. Download PDF
    8. Wen Tao Zhu, Fei Gao, and Yang Xiang, "A Secure and Efficient Data Aggregation Scheme for Wireless Sensor Networks", Concurrency and Computation: Practice and Experience, Wiley, vol. 23, no. 12, pp. 1414-1430, 2011. Download PDF
    9. Wen Tao Zhu, Yang Xiang, Jianying Zhou, Robert Deng, and Feng Bao, "Secure Localization with Attack Detection in Wireless Sensor Networks", International Journal of Information Security, Springer, vol. 10, no. 3, pp. 155-171, 2011. Download PDF
    10. Yongrui Cui, Mingchu Li, Yang Xiang, Yizhi Ren, and Silvio Cesare, "A Quality-of-Service based Fine-grained Reputation System in the Grid Environment", Concurrency and Computation: Practice and Experience, Wiley, accepted, in press.
    11. Sheng Wen, Wei Zhou, Yang Xiang, and Wanlei Zhou, "CAFS: A Novel Lightweight Cache-based Scheme for Large-Scale Intrusion Alert Fusion", Concurrency and Computation: Practice and Experience, Wiley, accepted, in press.
    12. Yu Wang, Yang Xiang, Jun Zhang, and Shunzheng Yu, "A Novel Semi-Supervised Approach for Network Traffic Clustering", in The 5th International Conference on Network and System Security (NSS 2011), 2011. Download PDF
    13. Yu Wang, Yang Xiang, and Shunzheng Yu, "Internet Traffic Classification Using Machine Learning: A Token-based Approach", in The 14th IEEE International Conference on Computational Science and Engineering (CSE 2011), 2011.
    14. Yini Wang, Sheng Wen, Wanlei Zhou, and Yang Xiang, "Modeling Worms Propagation on Probability", in The 5th International Conference on Network and System Security (NSS 2011), 2011. Download PDF
    15. Yini Wang, Sheng Wen, Wei Zhou, Wanlei Zhou, and Yang Xiang, "The Probability Model of Peer-to-Peer Botnet Propagation", in The 11th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2011), 2011. Download PDF
    16. Silvio Cesare, and Yang Xiang, "Malware Variant Detection Using Similarity Search over Sets of Control Flow Graphs", in The 10th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (IEEE TrustCom 2011), 2011. Download PDF
    17. Mahbub Ahmed, and Yang Xiang, "Trust Ticket Deployment: A Notion of Data Owner's Trust in Cloud Computing", in The 10th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (IEEE TrustCom 2011), 2011. Download PDF

    2010

    1. Yang Xiang, Daxin Tian, and Wanlei Zhou, "A Microscopic Competition Model and Its Dynamics Analysis on Network Attacks", Concurrency and Computation: Practice and Experience, Wiley, vol. 22, no. 4, pp. 503-517, http://doi.wiley.com/10.1002/cpe.1499, 2010. Download PDF
    2. Yu Wang, Yang Xiang, and Shun-Zheng Yu, "An Automatic Application Signature Construction System for Unknown Traffic", Concurrency and Computation: Practice and Experience, Wiley, vol. 22, no. 13, pp. 1927-1944, http://doi.wiley.com/10.1002/cpe.1603 2010. Download PDF
    3. Xiang Fan, and Yang Xiang, "Modeling the Propagation of Peer-to-Peer Worms", Future Generation Computer Systems, Elsevier, vol. 26, no. 8, pp. 1433-1443, 2010. http://dx.doi.org/10.1016/j.future.2010.04.009. Download PDF
    4. Xiang Fan, and Yang Xiang, “Defending against the Propagation of Active Worms”, The Journal of Supercomputing, Springer, vol. 51, no. 2, pp. 167-200, 2010. Download PDF
    5. Sheng Wen, Yang Xiang, and Wanlei Zhou, "A Lightweight Intrusion Alert Fusion System", 12th IEEE International Conference on High Performance Computing and Communications (HPCC 2010), pp. 695-700, 2010. Download PDF
    6. Laiping Zhao, Yizhi Ren, Yang Xiang, and Kouichi Sakurai, "Fault-Tolerant Scheduling with Dynamic Number of Replicas in Heterogeneous Systems", 12th IEEE International Conference on High Performance Computing and Communications (HPCC 2010), pp. 434-441, 2010. Download PDF
    7. Rafiqul Islam, and Yang Xiang, "Email Classification Using Data Reduction Method", 5th International ICST Conference on Communications and Networking in China (ChinaCom 2010), 2010. (Best Paper Award) Download PDF
    8. Mahbub Ahmed, Yang Xiang, and Shawkat Ali, "Above the Trust and Security in Cloud Computing: A Notion towards Innovation", 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2010), 2010.
    9. Xiang Fan, and Yang Xiang, "Modeling the Propagation of Peer-to-Peer Worms under Quarantine", IEEE/IFIP 12th Network Operations & Management Symposium (NOMS 2010), IEEE, pp. 942-945, 2010. Download PDF
    10. Silvio Cesare, and Yang Xiang, "Classification of Malware Using Structured Control Flow", 8th Australasian Symposium on Parallel and Distributed Computing (AusPDC 2010), pp. 61-70, 2010. Download PDF
    11. Silvio Cesare, and Yang Xiang, "A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the Endhost", IEEE 24th International Conference on Advanced Information Networking and Application (AINA 2010), IEEE, pp. 721-728, 2010. Download PDF
    12. Xiang Fan, and Yang Xiang, "Propagation Modeling of Peer-to-Peer Worms", IEEE 24th International Conference on Advanced Information Networking and Application (AINA 2010), IEEE, pp. 1128-1135, 2010. Download PDF
    13. Yu Wang, Shun-Zheng Yu, and Yang Xiang, "Automatic Application Signature Construction from Unknown Traffic", IEEE 24th International Conference on Advanced Information Networking and Application (AINA 2010), IEEE, pp. 1115-1120, 2010. Download PDF
    14. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, and Yang Xiang, "Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting ", 13th International Conference on Practice and Theory in Public Key Cryptography (PKC 2010), Springer, LNCS 6056, pp. 124-141, 2010. Download PDF
    15. BookShawkat Ali, Yang Xiang, Dynamic and Advanced Data Mining for Progressing Technological Development, ISBN:978-1-60566-908-3, IGI Global, 2010 [http://www.igi-global.com/bookstore/TitleDetails.aspx?TitleId=283].

    2009

    1. Yang Xiang, Wanlei Zhou, and Minyi Guo, "Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks", IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 4, pp. 567-580, Apr. 2009. (Featured Article) Download PDF
    2. Rafiqul Islam, Wanlei Zhou, Minyi Guo, and Yang Xiang, "An Innovative Analyser for Multi-classifier E-mail Classification Based on Grey List Analysis", Journal of Network and Computer Applications, Elsevier, vol. 32, no. 2, pp. 357-366, 2009. Download PDF
    3. Rafiqul Islam, Wanlei Zhou, Yang Xiang, and Abdun Naser Mahmood, "Spam Filtering for Network Traffic Security on A Multi-core Environment", Concurrency and Computation: Practice and Experience, Wiley, vol. 21, no. 10, pp. 1307-1320, 2009. Download PDF
    4. Yang Xiang, and Daxin Tian, "Multi-core Supported Deep Packet Inspection", The Handbook of Research on Scalable Computing Technologies, K.-C. Li, C.-H. Hsu, L. T. Yang et al., eds., pp. 858-873, IGI Global, 2009. Download PDF
    5. Daxin Tian, Yanheng Liu, and Yang Xiang, "Large-scale Network Intrusion Detection Based on Distributed Learning Algorithm", International Journal of Information Security, Springer, vol. 8, no. 1, pp. 25-35, 2009. Download PDF
    6. Yang Xiang, Xiang Fan, and Wen Tao Zhu, "Propagation of Active Worms: A Survey", International Journal of Computer Systems Science and Engineering, CRL, vol. 24, no. 2, pp. 157-172, 2009. Download PDF
    7. Wen Tao Zhu, and Yang Xiang, "Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks ", 6th International Conference on Autonomic and Trusted Computing (ATC 2009), Springer, LNCS 5586, pp. 164-178, 2009. Download PDF
    8. Xiang Fan, and Yang Xiang, “Modeling the Propagation Process of Topology-Aware Worms: An Innovative Logic Matrix Formulation”, 6th IFIP International Conference on Network and Parallel Computing (NPC 2009), IEEE, pp. 182-189, 2009. Download PDF

    Conferences


    Research Team

    Current Members

  • Please see at NSCLab site

  • Locations of visitors to this page