Skip to main content

Associate Professor Paul Pang

Associate Professor, Cyber Security

Cyber Security

Section/Portfolio:

Location:

Mt Helen Campus, Online

Crop monitoring by multimodal remote sensing: A review

Critical Data Detection for Dynamically Adjustable Product Quality in IIoT-Enabled Manufacturing

MCSNet+: Enhanced Convolutional Neural Network for Detection and Classification of Tribolium and Sitophilus Sibling Species in Actual Wheat Storage Environments

Auto-identification of two Sitophilus sibling species on stored wheat using deep convolutional neural network

Coding Observer Nodes for Sybil Attacks Detection in Mobile Wireless Sensor Networks

(Conference) Preface

  • Conference Proceedings

Indoor emission sources detection by pollutants interaction analysis

This study employs the correlation coefficients technique to support emission sources detection...

Privacy-Aware Data Fusion and Prediction with Spatial-Temporal Context for Smart City Industrial Environment

As one of the cyber-physical-social systems that plays a key role in people's daily activities, a...

S-Box Construction Method Based on the Combination of Quantum Chaos and PWLCM Chaotic Map

CDMC’19—The 10th International Cybersecurity Data Mining Competition

CDMC-International Cybersecurity Data Mining Competition (http://www.csmining.org) is a world...

Diversified and Scalable Service Recommendation With Accuracy Guarantee

As one of the most successful recommendation techniques, neighborhood-based collaborative...

Image Encryption Based on Fractional-order Chen Hyperchaotic System

This paper proposes a novel image encryption algorithm with the encrypted sequence encoded based...

Privacy-preserving matrix product based static mutual exclusive roles constraints violation detection in interoperable role-based access control

Secure interoperation is an important technology to protect shared data in multi-domain...

A Comprehensive Review of Computational Methods for Automatic Prediction of Schizophrenia With Insight Into Indigenous Populations

Psychiatrists rely on language and speech behavior as one of the main clues in psychiatric...

Deep learning for combo object detection

Convolutional neural networks (CNNs) have become the most vigorous technique for a variety of...

Editorial-Computational Intelligence Volume 35, Issue 3

[No abstract available]

S-boxes Construction Based on Quantum Chaos and PWLCM Chaotic Mapping

For a security system built on symmetric-key cryptography algorithms, the substitution box...

Deep transfer learning via minimum enclosing balls

Training of deep learning algorithms such as CNN, LSTM, or GRU often requires large amount of...

Merging weighted SVMs for parallel incremental learning

Parallel incremental learning is an effective approach for rapidly processing large scale data...

Online Max-flow Learning via Augmenting and De-augmenting Path

This paper presents an augmenting path based online max-flow algorithm. The proposed algorithm...

Task and instance quadratic ordering for active online multitask learning

For online multitask learning (oMTL), when a chunk of tasks consisting of multiple related...

Urban air pollution alert service for smart cities

With the advent of small, energy-efficient, interconnected and cheap air pollution sensors,...

A sandpile model for reliable actor-critic reinforcement learning

Actor-Critic algorithms have been increasingly researched for tackling challenging reinforcement...

Class-Wised Image Enhancement for Moving Object Detection at Maritime Boat Ramps

In the context of marine boat ramps traffic surveillance, we propose in this paper a novel image...

Detection of botnet activities through the lens of a large-scale darknet

The growing cyber-threats from botnets compel us to devise proper countermeasures to detect...

Malicious Events Grouping via Behavior Based Darknet Traffic Flow Analysis

This paper proposes a host behavior based darknet traffic decomposition approach to identifying...

Message from Smart Data 2016 Program Chairs

[No abstract available]

New mutation strategies of differential evolution based on clearing niche mechanism

Abstract: Although differential evolution (DE) algorithms have been widely proposed for tackling...

Privacy-preserving detection of statically mutually exclusive roles constraints violation in interoperable role-based access control

Secure interoperation is an important technology to protect shared data in multi-domain...

UnitecDEAMP: Flow feature profiling for malicious events identification in darknet space

This paper proposes a traffic decomposition approach called UnitecDEAMP based on flow feature...

A combo object model for maritime boat ramps traffic monitoring

Conventional tracking methods are incapable of tracking boats towed by vehicles on boat ramps...

COR-Honeypot: Copy-On-Risk, virtual machine as Honeypot in the cloud

This paper proposes Copy-On-Risk (COR) honeypot solution and implementation. Our prototype...

Generalized compatible function approximation for policy gradient search

Reinforcement learning aims at solving stochastic sequential decision making problems through...

Incremental and decremental max-flow for online semi-supervised learning

Max-flow has been adopted for semi-supervised data modelling, yet existing algorithms were...

Object trajectory association rules for tracking trailer boat in low-frame-rate videos

Tracking object accurately in one frame per minute (1-fpm) video is believed to be impossible,...

Reverse replication of virtual machines (rRVM) for low latency and high availability services

Virtualization supplies a straightforward approach to high availability through iterative...

Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet

Darknet monitoring provides a cost-effective way to monitor the global trend of cyber-threats in...

Adaptive background modeling for land and water composition scenes

In the context of maritime boat ramps surveillance, this paper proposes an Adaptive Background...

A federated network online network traffics analysis engine for cybersecurity

Agent-oriented techniques are being increasingly used in a range of networking security...

Behavior based darknet traffic decomposition for malicious events identification

This paper proposes a host (corresponding to a source IP) behavior based traffic decomposition...

Planetlab europe as geographically-distributed testbed for software development and evaluation

In this paper, we analyse the use of PlanetLab Europe for development and evaluation of...

Reinforcement learning in continuous spaces by using learning fuzzy classifier systems

Agent-oriented techniques are being increasingly used in a range of networking security...

STRATUS: Towards returning data control to cloud users

When we upload or create data into the cloud or the web, we immediately lose control of our data....

A Learner-Independent Knowledge Transfer Approach to Multi-task Learning

This paper proposes a learner-independent multi-task learning (MTL) scheme in which knowledge...

Analysis and configuration of boundary difference calculations

In the field of land management, stakeholders (people) everywhere have many disputes over the...

Spatio-temporal PM2.5 prediction by spatial data aided incremental support vector regression

Machine learning requires sufficient and reliable data to enhance the prediction performance....

Squantum inspired evolutionary algorithm by representing candidate solution as normal distribution

Application of Quantum principles on evolutionary algorithms was started as early as late 1990s...

Stochastic decision making in learning classifier systems through a natural policy gradient method

Learning classifier systems (LCSs) are rule-based machine learning technologies designed to learn...

An incremental learning approach to continuous image change detection

This paper proposes a novel incremental learning based image change detection method capable of...

An intelligent agent based land encroachment detection approach

Land management and planning is essential to assist the economic growth, sustainable resource use...

Chunk incremental IDR/QR LDA learning

Training data in real world is often presented in random chunks. Yet existing sequential...

Dynamic class imbalance learning for incremental LPSVM

Linear Proximal Support Vector Machines (LPSVMs), like decision trees, classic SVM, etc. are...

Referential kNN regression for financial time series forecasting

In this paper we propose a new multivariate regression approach for financial time series...

Service provision control in federated service providing systems

Different from traditional P2P systems, individuals nodes of a Federated Service Providing (FSP)...

The effects of different representations on static structure analysis of computer malware signatures

The continuous growth of malware presents a problem for internet computing due to increasingly...

Behavior analysis of long-term cyber attacks in the darknet

Darknet monitoring provides us an effective way to countermeasure cyber attacks that pose a...

Class imbalance robust incremental LPSVM for data streams learning

Linear Proximal Support Vector Machines (LPSVM), like decision trees, classic SVM, etc. are...

Exploring crude oil impacts to oil stocks through graphical computational correlation analysis

This paper presented the relationship between the world price of crude oil and oil related stocks...

LDA merging and splitting with applications to multiagent cooperative learning and system alteration

To adapt linear discriminant analysis (LDA) to real-world applications, there is a pressing need...

Malicioius software detection using multiple sequence alignment and data mining

Malware is currently a major threat to information and computer security, with the volume and...

Multiple sequence alignment and artificial neural networks for malicious software detection

Malware is currently a major threat to information and computer security, with the volume and...

SDE-driven service provision control

The service-oriented architecture (SOA) allows distributed resources to be provided through...

The effects of different representations on malware motif identification

Sequence alignment is widely used in bioinformatics for revealing the genetic diversity of...

Training minimum enclosing balls for cross tasks knowledge transfer

This paper proposes a learner independent multi-task learning (MTL) scheme such that M L = L(T i,...

Correlation-aided support vector regression for forex time series prediction

Market is often found behaving surprisingly similar to history, which implies that correlation...

Personalized mode transductive spanning SVM classification tree

Personalized transductive learning (PTL) builds a unique local model for classification of...

A modified fuzzy C-means with particle swarm optimization adaptive image segmentation algorithm

A new method which the numbers of cluster is self-adapted and use up and down cut-off of FCM...

Factorizing class characteristics via group MEBs construction

Classic MEB (minimum enclosing ball) models characteristics of each class for classification by...

Handwritten digits recognition using HMM and PSO based on storks

A new method for handwritten digits recognition based on hidden markov model (HMM) and particle...

Incremental and decremental LDA learning with applications

To adapt linear discriminant analysis (LDA) to real world applications, there is a pressing...

Online feature extraction for evolving intelligent systems

[No abstract available]

Tuning N-gram string kernel SVMs via meta learning

Even though Support Vector Machines (SVMs) are capable of identifying patterns in high...

Encoding and decoding the knowledge of association rules over SVM classification trees

This paper presents a constructive method for association rule extraction, where the knowledge of...

Curiosity-driven multi-agent competitive and cooperative lda learning

This paper presents a novel multi-agent competitive and cooperative learning method using...

  • Journals

Incremental learning of chunk data for online pattern classification systems

This paper presents a pattern classification system in which feature extraction and classifier...

SVMT-rule: Association rule mining over SVM classification trees

Since support vector machines (SVM) [7-9] demonstrate a good accuracy in classification and...

Classification consistency analysis for bootstrapping gene selection

Consistency modelling for gene selection is a new topic emerging from recent cancer...

Classifying microRNAs by Gabor filter features from 2D structure bitmap images on a case study of human microRNAs

MicroRNAs are recently discovered small, 20-24 basepairs long non-coding RNA molecules in plants...

Face membership authentication using SVM classification tree generated by membership-based LLE data partition

This paper presents a new membership authentication method by face classification using a support...

Incremental learning in autonomous systems: Evolving connectionist systems for on-line image and speech recognition

The paper presents an integrated approach to incremental learning in autonomous systems, that...

Incremental linear discriminant analysis for classification of data streams

This paper presents a constructive method for deriving an updated discriminant eigenspace for...

Constructing SVM multiple tree for face membership authentication

In membership authentication problem that has a complicated and mixed data distribution, the...

  • Journals

Dynamic neuro-fuzzy inference and statistical models for risk analysis of pest insect establishment

The paper introduces a statistical model and a DENFIS-based model for estimating the potential...

One-pass incremental membership authentication by face classification

Real membership authentication applications require machines to learn from stream data while...

Constructing support vector machine ensemble

Even the support vector machine (SVM) has been proposed to provide a good generalization...

Membership authentication in the dynamic group by face classification using SVM ensemble

This paper presents a method for authenticating an individual's membership in a dynamic group...