Associate Professor Paul Pang
Associate Professor, Cyber Security
Campus
Find me on
- Publications
An Approach to Determine Cluster in Tensor-Based K-Means Clustering for Disease Diagnosis
- Conference Proceedings
- DOI reference: 10.1007/978-981-96-6960-8_20
Tensor Mutual Information for Similarity Measurement of High-Dimensional Data: An Image Classification Perspective
- Conference Proceedings
- DOI reference: 10.1007/978-981-96-6606-5_19
The Path to Defence: A Roadmap to Characterising Data Poisoning Attacks on Victim Models
- Journals
- DOI reference: 10.1145/3627536
Preface - ICSIM 2024: Proceedings of the 2024 7th International Conference on Software Engineering and Information Management
Assessment of IIoT Sensor Security Vulnerabilities in Digital Wine Manufacturing Leveraging the CVSS
- Journals
- DOI reference: 10.1109/ACCESS.2024.3467248
A survey on evaluation of blockchain-based agricultural traceability
- Journals
- DOI reference: 10.1016/j.compag.2024.109548
Discriminating Malware Families using Partitional Clustering
- Conference Proceedings
- DOI reference: 10.1109/TrustCom63139.2024.00311
Crop monitoring by multimodal remote sensing: A review
- Journals
- DOI reference: 10.1016/j.rsase.2023.101093
Critical Data Detection for Dynamically Adjustable Product Quality in IIoT-Enabled Manufacturing
- Journals
- DOI reference: 10.1109/ACCESS.2023.3276942
MCSNet+: Enhanced Convolutional Neural Network for Detection and Classification of Tribolium and Sitophilus Sibling Species in Actual Wheat Storage Environments
- Journals
- DOI reference: 10.3390/foods12193653
Auto-identification of two Sitophilus sibling species on stored wheat using deep convolutional neural network
- Journals
- DOI reference: 10.1002/ps.6810
S-Box Construction Method Based on the Combination of Quantum Chaos and PWLCM Chaotic Map
- Journals
- DOI reference: 10.4018/IJCINI.20211001.oa24
Privacy-Aware Data Fusion and Prediction with Spatial-Temporal Context for Smart City Industrial Environment
- Journals
- DOI reference: 10.1109/TII.2020.3012157
Indoor emission sources detection by pollutants interaction analysis
- Journals
- DOI reference: 10.3390/app11167542
Coding Observer Nodes for Sybil Attacks Detection in Mobile Wireless Sensor Networks
- Conference Proceedings
- DOI reference: 10.1109/EUC53437.2021.00021
Diversified and Scalable Service Recommendation With Accuracy Guarantee
- Journals
- DOI reference: 10.1109/TCSS.2020.3007812
CDMC’19—The 10th International Cybersecurity Data Mining Competition
- Conference Proceedings
- DOI reference: 10.1007/978-3-030-63833-7_20
Privacy-preserving matrix product based static mutual exclusive roles constraints violation detection in interoperable role-based access control
- Journals
- DOI reference: 10.1016/j.future.2018.10.017
Image Encryption Based on Fractional-order Chen Hyperchaotic System
- Conference Proceedings
- DOI reference: 10.1109/ICIEA48937.2020.9248115
S-boxes Construction Based on Quantum Chaos and PWLCM Chaotic Mapping
- Conference Proceedings
- DOI reference: 10.1109/ICCICC46617.2019.9146028
A Comprehensive Review of Computational Methods for Automatic Prediction of Schizophrenia With Insight Into Indigenous Populations
- Journals
- DOI reference: 10.3389/fpsyt.2019.00659
Deep learning for combo object detection
- Conference Proceedings
- DOI reference: 10.1007/978-3-030-36708-4_11
Editorial-Computational Intelligence Volume 35, Issue 3
- Journals
- DOI reference: 10.1111/coin.12235
Urban air pollution alert service for smart cities
- Conference Proceedings
- DOI reference: 10.1145/3277593.3277599
Online Max-flow Learning via Augmenting and De-augmenting Path
- Conference Proceedings
- DOI reference: 10.1109/IJCNN.2018.8489405
Merging weighted SVMs for parallel incremental learning
- Journals
- DOI reference: 10.1016/j.neunet.2018.01.001
Task and instance quadratic ordering for active online multitask learning
- Conference Proceedings
- DOI reference: 10.1007/978-3-030-04182-3_38
Deep transfer learning via minimum enclosing balls
- Conference Proceedings
- DOI reference: 10.1007/978-3-030-04182-3_18
Message from Smart Data 2016 Program Chairs
- Conference Proceedings
- DOI reference: 10.1109/iThings-GreenCom-CPSCom-SmartData.2016.23
Malicious Events Grouping via Behavior Based Darknet Traffic Flow Analysis
- Journals
- DOI reference: 10.1007/s11277-016-3744-4
New mutation strategies of differential evolution based on clearing niche mechanism
- Journals
- DOI reference: 10.1007/s00500-016-2318-4
Privacy-preserving detection of statically mutually exclusive roles constraints violation in interoperable role-based access control
- Conference Proceedings
- DOI reference: 10.1109/Trustcom/BigDataSE/ICESS.2017.277
A sandpile model for reliable actor-critic reinforcement learning
- Conference Proceedings
- DOI reference: 10.1109/IJCNN.2017.7966362
Class-Wised Image Enhancement for Moving Object Detection at Maritime Boat Ramps
- Conference Proceedings
- DOI reference: 10.1007/978-3-319-70090-8_68
UnitecDEAMP: Flow feature profiling for malicious events identification in darknet space
- Conference Proceedings
- DOI reference: 10.1007/978-981-10-5421-1_13
Detection of botnet activities through the lens of a large-scale darknet
- Conference Proceedings
- DOI reference: 10.1007/978-3-319-70139-4_45
Online feature extraction for evolving intelligent systems
- Book Chapters
- DOI reference: 10.1002/9780470569962.ch7
Planetlab europe as geographically-distributed testbed for software development and evaluation
- Journals
- DOI reference: 10.15598/aeee.v13i2.1245
COR-Honeypot: Copy-On-Risk, virtual machine as Honeypot in the cloud
- Conference Proceedings
- DOI reference: 10.1109/CLOUD.2016.0134
Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet
- Conference Proceedings
- DOI reference: 10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0068
Reverse replication of virtual machines (rRVM) for low latency and high availability services
- Conference Proceedings
- DOI reference: 10.1145/2996890.2996894
Generalized compatible function approximation for policy gradient search
- Conference Proceedings
- DOI reference: 10.1007/978-3-319-46687-3_68
A combo object model for maritime boat ramps traffic monitoring
- Conference Proceedings
- DOI reference: 10.1007/978-3-319-46687-3_69
Object trajectory association rules for tracking trailer boat in low-frame-rate videos
- Conference Proceedings
- DOI reference: 10.1007/978-3-319-40663-3_38
A federated network online network traffics analysis engine for cybersecurity
- Conference Proceedings
- DOI reference: 10.1109/IJCNN.2015.7280563
Reinforcement learning in continuous spaces by using learning fuzzy classifier systems
- Conference Proceedings
- DOI reference: 10.1007/978-3-319-26535-3_37
Adaptive background modeling for land and water composition scenes
- Conference Proceedings
- DOI reference: 10.1007/978-3-319-23234-8_10
Behavior based darknet traffic decomposition for malicious events identification
- Conference Proceedings
- DOI reference: 10.1007/978-3-319-26555-1_29
STRATUS: Towards returning data control to cloud users
- Conference Proceedings
- DOI reference: 10.1007/978-3-319-27161-3_6
Incremental and decremental max-flow for online semi-supervised learning
- Journals
- DOI reference: 10.1109/TKDE.2016.2550042
Constructing support vector machine ensemble
- Journals
- DOI reference: 10.1016/S0031-3203(03)00175-4
Membership authentication in the dynamic group by face classification using SVM ensemble
- Journals
- DOI reference: 10.1016/S0167-8655(02)00213-1
One-pass incremental membership authentication by face classification
- Journals
- DOI reference: 10.1007/978-3-540-25948-0_22
Dynamic neuro-fuzzy inference and statistical models for risk analysis of pest insect establishment
- Journals
- DOI reference: 10.1007/978-3-540-30499-9_150
Incremental linear discriminant analysis for classification of data streams
- Journals
- DOI reference: 10.1109/TSMCB.2005.847744
Face membership authentication using SVM classification tree generated by membership-based LLE data partition
- Journals
- DOI reference: 10.1109/TNN.2004.841776
Classifying microRNAs by Gabor filter features from 2D structure bitmap images on a case study of human microRNAs
- Journals
- DOI reference: 10.1166/jctn.2005.005
Classification consistency analysis for bootstrapping gene selection
- Journals
- DOI reference: 10.1007/s00521-007-0110-1
SVMT-rule: Association rule mining over SVM classification trees
- Journals
- DOI reference: 10.1007/978-3-540-75390-2_6
Incremental learning of chunk data for online pattern classification systems
- Journals
- DOI reference: 10.1109/TNN.2007.2000059
Encoding and decoding the knowledge of association rules over SVM classification trees
- Journals
- DOI reference: 10.1007/s10115-008-0147-1
Personalized mode transductive spanning SVM classification tree
- Journals
- DOI reference: 10.1016/j.ins.2011.01.008
Correlation-aided support vector regression for forex time series prediction
- Journals
- DOI reference: 10.1007/s00521-010-0482-5
LDA merging and splitting with applications to multiagent cooperative learning and system alteration
- Journals
- DOI reference: 10.1109/TSMCB.2011.2169056
The effects of different representations on static structure analysis of computer malware signatures
- Journals
- DOI reference: 10.1155/2013/671096
Service provision control in federated service providing systems
- Journals
- DOI reference: 10.1109/TPDS.2012.150
Dynamic class imbalance learning for incremental LPSVM
- Journals
- DOI reference: 10.1016/j.neunet.2013.02.007
A Learner-Independent Knowledge Transfer Approach to Multi-task Learning
- Journals
- DOI reference: 10.1007/s12559-013-9238-8
Malicioius software detection using multiple sequence alignment and data mining
- Conference Proceedings
- DOI reference: 10.1109/AINA.2012.62
Referential kNN regression for financial time series forecasting
- Conference Proceedings
- DOI reference: 10.1007/978-3-642-42054-2_75
Multiple sequence alignment and artificial neural networks for malicious software detection
- Conference Proceedings
- DOI reference: 10.1109/ICNC.2012.6234576
Chunk incremental IDR/QR LDA learning
- Conference Proceedings
- DOI reference: 10.1109/IJCNN.2013.6707018
Class imbalance robust incremental LPSVM for data streams learning
- Conference Proceedings
- DOI reference: 10.1109/IJCNN.2012.6252836
Handwritten digits recognition using HMM and PSO based on storks
- Conference Proceedings
- DOI reference: 10.1117/12.869532
A modified fuzzy C-means with particle swarm optimization adaptive image segmentation algorithm
- Conference Proceedings
- DOI reference: 10.1117/12.869522
SDE-driven service provision control
- Conference Proceedings
- DOI reference: 10.1007/978-3-642-34475-6_32
Training minimum enclosing balls for cross tasks knowledge transfer
- Conference Proceedings
- DOI reference: 10.1007/978-3-642-34475-6_45
Behavior analysis of long-term cyber attacks in the darknet
- Conference Proceedings
- DOI reference: 10.1007/978-3-642-34500-5_73
Exploring crude oil impacts to oil stocks through graphical computational correlation analysis
- Conference Proceedings
- DOI reference: 10.1007/978-3-642-34500-5_37
The effects of different representations on malware motif identification
- Conference Proceedings
- DOI reference: 10.1109/CIS.2012.27
Incremental and decremental LDA learning with applications
- Conference Proceedings
- DOI reference: 10.1109/IJCNN.2010.5596727
Factorizing class characteristics via group MEBs construction
- Conference Proceedings
- DOI reference: 10.1007/978-3-642-17534-3_35
Tuning N-gram string kernel SVMs via meta learning
- Conference Proceedings
- DOI reference: 10.1007/978-3-642-17534-3_12
An incremental learning approach to continuous image change detection
- Conference Proceedings
- DOI reference: 10.1109/FSKD.2013.6816294
Incremental learning in autonomous systems: Evolving connectionist systems for on-line image and speech recognition
- Conference Proceedings
- DOI reference: 10.1109/ARSO.2005.1511636
Spatio-temporal PM2.5 prediction by spatial data aided incremental support vector regression
- Conference Proceedings
- DOI reference: 10.1109/IJCNN.2014.6889521
Squantum inspired evolutionary algorithm by representing candidate solution as normal distribution
- Conference Proceedings
- DOI reference: 10.1007/978-3-319-12643-2_38
Stochastic decision making in learning classifier systems through a natural policy gradient method
- Conference Proceedings
- DOI reference: 10.1007/978-3-319-12643-2_37
Analysis and configuration of boundary difference calculations
- Conference Proceedings
- DOI reference: 10.1007/978-3-319-12643-2_41
An intelligent agent based land encroachment detection approach
- Conference Proceedings
- DOI reference: 10.1007/978-3-642-42054-2_73
