default search action
Frank Jiang 0001
Person information
- affiliation: Deakin University, Faculty of Science, Engineering and Built Environment, Geelong, Australia
- affiliation (former): University of Technology Sydney, Australia
- affiliation (former): Guangxi Normal University, Faculty of Electronic Engineering, Guilin, China
- affiliation (former): University of New South Wales, Sydney, Australia
Other persons with the same name
- Frank Jiang 0002 — Georgia Institute of Technology, USA
- Frank Jiang 0003 (aka: Frank J. Jiang) — University of California, Berkeley, Department of Electrical Engineering and Computer Sciences, CA, USA
- Frank Jiang 0004 — KTH Royal Institute of Technology, School of Electrical Engineering and Computer Science, Stockholm, Sweden
- Frank Jiang 0005 — Facebook, Menlo Park, CA, USA
- Frank Jiang 0006 — AT&T Labs, San Ramon, CA, USA
- Frank Jiang 0007 — Cleveland State University, OH, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j45]Aiting Yao, Shantanu Pal, Xuejun Li, Zheng Zhang, Chengzu Dong, Frank Jiang, Xiao Liu:
A privacy-preserving location data collection framework for intelligent systems in edge computing. Ad Hoc Networks 161: 103532 (2024) - [j44]Mingcan Cen, Frank Jiang, Xingsheng Qin, Qinghong Jiang, Robin Doss:
Ransomware early detection: A survey. Comput. Networks 239: 110138 (2024) - [j43]Xingsheng Qin, Frank Jiang, Xingguo Qin, Lina Ge, Meiqu Lu, Robin Doss:
CGAN-based cyber deception framework against reconnaissance attacks in ICS. Comput. Networks 251: 110655 (2024) - [j42]Xingsheng Qin, Frank Jiang, Chengzu Dong, Robin Doss:
A hybrid cyber defense framework for reconnaissance attack in industrial control systems. Comput. Secur. 136: 103506 (2024) - [j41]Mingcan Cen, Xizhen Deng, Frank Jiang, Robin Doss:
Zero-Ran Sniff: A zero-day ransomware early detection method based on zero-shot learning. Comput. Secur. 142: 103849 (2024) - [j40]Fangfang Zhu, Ji Ding, Xiang Li, Yuer Lu, Xiao Liu, Frank Jiang, Qi Zhao, Honghong Su, Jianwei Shuai:
MEAs-Filter: a novel filter framework utilizing evolutionary algorithms for cardiovascular diseases diagnosis. Health Inf. Sci. Syst. 12(1): 8 (2024) - [j39]Sheraz Mazhar, Abdur Rakib, Lei Pan, Frank Jiang, Adnan Anwar, Robin Doss, Jeremy W. Bryans:
State-of-the-art authentication and verification schemes in VANETs: A survey. Veh. Commun. 49: 100804 (2024) - 2023
- [j38]Aiting Yao, Gang Li, Xuejun Li, Frank Jiang, Jia Xu, Xiao Liu:
Differential privacy in edge computing-based smart city Applications:Security issues, solutions and future directions. Array 19: 100293 (2023) - [j37]Xingsheng Qin, Frank Jiang, Mingcan Cen, Robin Doss:
Hybrid cyber defense strategies using Honey-X: A survey. Comput. Networks 230: 109776 (2023) - [j36]William Yeoh, Marina Liu, Malcolm Shore, Frank Jiang:
Zero trust cybersecurity: Critical success factors and A maturity assessment framework. Comput. Secur. 133: 103412 (2023) - [j35]Bowei Zhang, Xiaoliang Wang, Ru Xie, Chuncao Li, Huazheng Zhang, Frank Jiang:
A reputation mechanism based Deep Reinforcement Learning and blockchain to suppress selfish node attack motivation in Vehicular Ad-Hoc Network. Future Gener. Comput. Syst. 139: 17-28 (2023) - [j34]Didi Liu, Pengpeng Cheng, Jun Cheng, Junxiu Liu, Meiqu Lu, Frank Jiang:
Improved reinforcement learning-based real-time energy scheduling for prosumer with elastic loads in smart grid. Knowl. Based Syst. 280: 111004 (2023) - [j33]Keshav Sood, Mohammad Reza Nosouhi, Dinh Duc Nha Nguyen, Frank Jiang, Morshed Chowdhury, Robin Doss:
Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks. IEEE Trans. Inf. Forensics Secur. 18: 965-979 (2023) - [j32]Keshav Sood, Dinh Duc Nha Nguyen, Mohammad Reza Nosouhi, Neeraj Kumar, Frank Jiang, Morshed Chowdhury, Robin Doss:
Performance Evaluation of a Novel Intrusion Detection System in Next Generation Networks. IEEE Trans. Netw. Serv. Manag. 20(3): 3831-3847 (2023) - 2022
- [j31]Fuyun He, M. A. Parvez Mahmud, Abbas Z. Kouzani, Adnan Anwar, Frank Jiang, Sai Ho Ling:
An Improved SLIC Algorithm for Segmentation of Microscopic Cell Images. Biomed. Signal Process. Control. 73: 103464 (2022) - [j30]Xuejun Li, Lina Gong, Xiao Liu, Frank Jiang, Wenyu Shi, Lingmin Fan, Han Gao, Rui Li, Jia Xu:
Solving the last mile problem in logistics: A mobile edge computing and blockchain-based unmanned aerial vehicle delivery system. Concurr. Comput. Pract. Exp. 34(7) (2022) - [j29]Marina Liu, William Yeoh, Frank Jiang, Kim-Kwang Raymond Choo:
Blockchain for Cybersecurity: Systematic Literature Review and Classification. J. Comput. Inf. Syst. 62(6): 1182-1198 (2022) - 2021
- [j28]Lina Deng, Xiaoliang Wang, Frank Jiang, Robin Doss:
EEG-based emotion recognition via capsule network with channel-wise attention and LSTM models. CCF Trans. Pervasive Comput. Interact. 3(4): 425-435 (2021) - [j27]Fuyun He, Xiaoming Huang, Xun Wang, Senhui Qiu, Frank Jiang, Sai-Ho Ling:
A neuron image segmentation method based Deep Boltzmann Machine and CV model. Comput. Medical Imaging Graph. 89: 101871 (2021) - [j26]Rui Li, Xuejun Li, Jia Xu, Frank Jiang, Zhao-hong Jia, Di Shao, Lei Pan, Xiao Liu:
Energy-aware decision-making for dynamic task migration in MEC-based unmanned aerial vehicle delivery system. Concurr. Comput. Pract. Exp. 33(22) (2021) - [j25]Qing Yang, Xiaoliang Wang, Jing Zheng, Wenqi Ge, Ming Bai, Frank Jiang:
LSTM Android Malicious Behavior Analysis Based on Feature Weighting. KSII Trans. Internet Inf. Syst. 15(6): 2188-2203 (2021) - [j24]Yunbai Qin, Jialiang Li, Pinqun Jiang, Frank Jiang:
Image stitching by feature positioning and seam elimination. Multim. Tools Appl. 80(14): 20869-20881 (2021) - [j23]Lu-Xing Yang, Pengdeng Li, Xiaofan Yang, Yong Xiang, Frank Jiang, Wanlei Zhou:
Effective Quarantine and Recovery Scheme Against Advanced Persistent Threat. IEEE Trans. Syst. Man Cybern. Syst. 51(10): 5977-5991 (2021) - 2020
- [j22]Yaozhong Zhang, Kangjia Yao, Jiandong Zhang, Frank Jiang, Matthew J. Warren:
A New Markov Decision Process Based Behavioral Prediction System for Airborne Crews. IEEE Access 8: 28021-28032 (2020) - [j21]Pengjie Zeng, Xiaoliang Wang, Hao Li, Frank Jiang, Robin Doss:
A Scheme of Intelligent Traffic Light System Based on Distributed Security Architecture of Blockchain Technology. IEEE Access 8: 33644-33657 (2020) - [j20]Yuling Luo, Qiang Fu, Juntao Xie, Yunbai Qin, Guopei Wu, Junxiu Liu, Frank Jiang, Yi Cao, Xuemei Ding:
EEG-Based Emotion Classification Using Spiking Neural Networks. IEEE Access 8: 46007-46016 (2020) - [j19]Chintha Kaluarachchi, Matthew J. Warren, Frank Jiang:
Review: Responsible use of technology to combat Cyberbullying among adolescents. Australas. J. Inf. Syst. 24 (2020) - [j18]Chee Keong Ng, Sutharshan Rajasegarar, Lei Pan, Frank Jiang, Leo Yu Zhang:
VoterChoice: A ransomware detection honeypot with multiple voting framework. Concurr. Comput. Pract. Exp. 32(14) (2020) - [j17]Qingyi Zhu, Seng W. Loke, Rolando Trujillo-Rasua, Frank Jiang, Yong Xiang:
Applications of Distributed Ledger Technologies to the Internet of Things: A Survey. ACM Comput. Surv. 52(6): 120:1-120:34 (2020) - [j16]Yaozhong Zhang, Wencheng Feng, Guoqing Shi, Frank Jiang, Morshed U. Chowdhury, Sai-Ho Ling:
UAV Swarm Mission Planning in Dynamic Environment Using Consensus-Based Bundle Algorithm. Sensors 20(8): 2307 (2020) - 2019
- [j15]Xiaoliang Wang, Pengjie Zeng, Nicholas Charles Patterson, Frank Jiang, Robin Doss:
An Improved Authentication Scheme for Internet of Vehicles Based on Blockchain Technology. IEEE Access 7: 45061-45072 (2019) - [j14]Chee Keong Ng, Frank Jiang, Leo Yu Zhang, Wanlei Zhou:
Static malware clustering using enhanced deep embedding method. Concurr. Comput. Pract. Exp. 31(19) (2019) - [j13]Xiaoliang Wang, Liang Bai, Qing Yang, Liu Wang, Frank Jiang:
A dual privacy-preservation scheme for cloud-based eHealth systems. J. Inf. Secur. Appl. 47: 132-138 (2019) - [j12]Haiying Xia, Wenxian Zhao, Frank Jiang, Hai-Sheng Li, Jing Xin, Zheng Zhou:
Fast template matching based on deformable best-buddies similarity measure. Multim. Tools Appl. 78(9): 11905-11925 (2019) - 2018
- [j11]Haiying Xia, Frank Jiang, Shuaifei Deng, Jing Xin, Robin Doss:
Mapping Functions Driven Robust Retinal Vessel Segmentation via Training Patches. IEEE Access 6: 61973-61982 (2018) - [j10]Haiying Xia, Ruibin Zhuge, Hai-Sheng Li, Shuxiang Song, Frank Jiang, Min Xu:
Single Image Rain Removal via a Simplified Residual Dense Network. IEEE Access 6: 66522-66535 (2018) - [j9]Yuling Luo, Shunbin Tang, Xingsheng Qin, Lvchen Cao, Frank Jiang, Junxiu Liu:
A Double-Image Encryption Scheme Based on Amplitude-Phase Encoding and Discrete Complex Random Transformation. IEEE Access 6: 77740-77753 (2018) - 2017
- [j8]Didi Liu, Jiming Lin, Junyi Wang, Frank Jiang:
Dynamic power allocation for a multiuser transmitter with hybrid energy sources. EURASIP J. Wirel. Commun. Netw. 2017: 203 (2017) - [j7]Dingguo Yu, Nan Chen, Frank Jiang, Bin Fu, Aihong Qin:
Constrained NMF-based semi-supervised learning for social media spammer detection. Knowl. Based Syst. 125: 64-73 (2017) - [j6]Frank Jiang, Haiying Xia, Quang-Anh Tran, Quang Minh Ha, Nhat-Quang Tran, Jiankun Hu:
A new binary hybrid particle swarm optimization with wavelet mutation. Knowl. Based Syst. 130: 90-101 (2017) - 2016
- [j5]Sai-Ho Ling, Kit Yan Chan, Frank Hung-Fat Leung, Frank Jiang, Hung T. Nguyen:
Quality and robustness improvement for real world industrial systems using a fuzzy particle swarm optimization. Eng. Appl. Artif. Intell. 47: 68-80 (2016) - 2014
- [j4]Shu-Wen Li, Min Jiang, Frank Jiang, Xiao-Ping Chen:
Multi-qudit information splitting with multiple controllers. Quantum Inf. Process. 13(5): 1057-1066 (2014) - 2013
- [j3]Rony Hasinur Rahman, Craig R. Benson, Frank Jiang, Michael R. Frater:
LOARP: A Low Overhead Routing Protocol for Underwater Acoustic Sensor Networks. J. Networks 8(2): 317-330 (2013) - [j2]Frank Jiang, Daoyi Dong, Longbing Cao, Michael R. Frater:
Agent-Based Self-Adaptable Context-Aware Network Vulnerability Assessment. IEEE Trans. Netw. Serv. Manag. 10(3): 255-270 (2013) - 2011
- [j1]Sai-Ho Ling, Frank Jiang, Hung T. Nguyen, Kit Yan Chan:
Hybrid Fuzzy Logic-Based Particle Swarm Optimization for Flow shop Scheduling Problem. Int. J. Comput. Intell. Appl. 10(3): 335-356 (2011)
Conference and Workshop Papers
- 2024
- [c62]Anuj Nepal, Mohamed Ahzam Amanullah, Robin Doss, Frank Jiang:
Secure Data Provenance in Internet of Vehicles with Data Plausibility for Security and Trust. AIIoT 2024: 612-618 - [c61]Manu Jo Varghese, Adnan Anwar, Frank Jiang, Robin Doss:
Novel CAN Bus Fuzzing Framework for Finding Vulnerabilities in Automotive Systems. DSN-S 2024: 56-58 - [c60]Anuj Nepal, Robin Doss, Frank Jiang:
Secure Data Provenance in Internet of Vehicles with Verifiable Credentials for Security and Privacy. DSN-S 2024: 59-61 - [c59]Xuefei Chen, Xiao Liu, Frank Jiang, Aiting Yao, Jia Xu, Hui Zhang, Xiang Wu, Xuejun Li:
Bio-CEC: A Secure and Efficient Cloud-Edge Collaborative Biometrics System using Cancelable Biometrics. ICWS 2024: 833-843 - [c58]Manu Jo Varghese, Frank Jiang, Robin Doss, Adnan Anwar, Abdur Rakib:
DEMO: Adaptive Fuzz Testing for Automotive ECUs: A Modular Testbed Approach for Enhanced Vulnerability Detection. SIGCOMM (Posters and Demos) 2024: 110-112 - 2023
- [c57]Leilei Xu, Xiao Liu, Frank Jiang, Yi Xu, Aiting Yao, Jia Xu, Xuejun Li:
Multi-Featured Anomaly Detection for Mobile Edge Computing Based UAV Delivery Systems. ACSW 2023: 58-65 - [c56]Chengzu Dong, Zhiyu Xu, Frank Jiang, Shantanu Pal, Chong Zhang, Shiping Chen, Xiao Liu:
BDFL: A Blockchain-Enabled FL Framework for Edge-based Smart UAV Delivery Systems. ASSS@AsiaCCS 2023: 4:1-4:11 - [c55]Chengzu Dong, Shantanu Pal, Qi An, Aiting Yao, Frank Jiang, Zhiyu Xu, Jianhua Li, Meiqu Lu, Yangxu Song, Shiping Chen, Xiao Liu:
Securing Smart UAV Delivery Systems Using Zero Trust Principle-Driven Blockchain Architecture. Blockchain 2023: 315-322 - [c54]Zheng Zhang, Huabin Wang, Aiting Yao, Xuejun Li, Frank Jiang, Jia Xu, Xiao Liu:
TBAF: A Two-Stage Biometric-Assisted Authentication Framework in Edge-Integrated UAV Delivery System. ICA3PP (7) 2023: 168-188 - [c53]Chengzu Dong, Jingwen Zhou, Aiting Yao, Zhiyu Xu, Frank Jiang, Shiping Chen, Xiao Liu:
A Federated Multi-Modal Learning Framework Powered by Distributed Ledgers for Cyber-safe and Efficient UAV Delivery Systems. ICDM (Workshops) 2023: 1032-1039 - [c52]Chengzu Dong, Jingwen Zhou, Qi An, Frank Jiang, Shiping Chen, Xiao Liu:
Revolutionizing Virtual Shopping Experiences: A Blockchain-Based Metaverse UAV Delivery Solution. MetaCom 2023: 658-661 - [c51]Anuj Nepal, Robin Doss, Frank Jiang:
Secure Data Provenance for Internet of Vehicles with Verifiable Credentials. UEMCON 2023: 210-218 - 2022
- [c50]Chengzu Dong, Frank Jiang, Shiping Chen, Xiao Liu:
Continuous Authentication for UAV Delivery Systems Under Zero-Trust Security Framework. EDGE 2022: 123-132 - [c49]Junjie Fu, Xiaoliang Wang, Yuzhen Liu, Qing Yang, Frank Jiang:
A Scheme to Improve the Security of IoT Communication. ICAIS (3) 2022: 455-468 - [c48]Bowei Zhang, Xiaoliang Wang, Ru Xie, Huazheng Zhang, Frank Jiang:
Demo: Dynamic Suppression of Selfish Node Attack Motivation in the Process of VANET Communication. ICDCS 2022: 1288-1291 - [c47]Malyun Muhudin Hilowle, William Yeoh, Marthie Grobler, Graeme Pye, Frank Jiang:
Towards Improving the Adoption and Usage of National Digital Identity Systems. ASE 2022: 223:1-223:6 - [c46]Xiaoliang Wang, Frank Jiang, Robin Doss:
The First International Workshop on Cryptographic Security and Information Hiding Technology for IoT System (CSIHTIS 2022): Preface. MSN 2022: 1 - [c45]Yangxu Song, Frank Jiang, Syed Wajid Ali Shah, Robin Doss:
A New Zero-Trust Aided Smart Key Authentication Scheme in IoV. PerCom Workshops 2022: 630-636 - [c44]Jie Liu, Xingsheng Qin, Frank Jiang:
A quantum inspired differential evolution algorithm with multiple mutation strategies. TrustCom 2022: 927-934 - 2021
- [c43]Chengzu Dong, Frank Jiang, Xuejun Li, Aiting Yao, Gang Li, Xiao Liu:
A Blockchain-aided Self-Sovereign Identity Framework for Edge-based UAV Delivery System. CCGRID 2021: 622-624 - [c42]Chong Zhang, Xiao Liu, Jia Xu, Tianxiang Chen, Gang Li, Frank Jiang, Xuejun Li:
An Edge based Federated Learning Framework for Person Re-identification in UAV Delivery Service. ICWS 2021: 500-505 - [c41]Saheed A. Tijani, Xingjun Ma, Ran Zhang, Frank Jiang, Robin Doss:
Federated Learning with Extreme Label Skew: A Data Extension Approach. IJCNN 2021: 1-8 - [c40]Nikesh Lalchandani, Frank Jiang, Jongkil Jay Jeong, Yevhen Zolotavkin, Robin Doss:
Evaluating the Current State of Application Programming Interfaces for Verifiable Credentials. PST 2021: 1-7 - [c39]Xulong Zhang, Frank Jiang, Ran Zhang, Shupeng Li, Yang Zhou:
Social Spammer Detection Based on Semi-Supervised Learning. TrustCom 2021: 849-855 - [c38]Pengjie Zeng, Xiaoliang Wang, Liangzuo Dong, Xinhui She, Frank Jiang:
A Blockchain Scheme Based on DAG Structure Security Solution for IIoT. TrustCom 2021: 935-943 - [c37]Aiting Yao, Frank Jiang, Xuejun Li, Chengzu Dong, Jia Xu, Yi Xu, Gang Li, Xiao Liu:
A Novel Security Framework for Edge Computing based UAV Delivery System. TrustCom 2021: 1031-1038 - 2020
- [c36]D. T. Li, Frank Jiang, Y. B. Qin:
A New Facial Expression Recognition Scheme Based on Parallel Double Channel Convolutional Neural Network. ACIIDS (2) 2020: 560-569 - [c35]Xu Han, Rongbai Zhang, Xingzi Liu, Frank Jiang:
Biologically Inspired Smart Contract: A Blockchain-Based DDoS Detection System. ICNSC 2020: 1-6 - [c34]Xingzi Liu, Frank Jiang, Rongbai Zhang:
A New Social User Anomaly Behavior Detection System Based on Blockchain and Smart Contract. ICNSC 2020: 1-5 - [c33]Matthew J. Ryan, Morshed U. Chowdhury, Frank Jiang, Robin Doss:
Avoiding Geographic Regions in Tor. TrustCom 2020: 802-809 - [c32]Rohan Dahiya, Frank Jiang, Robin Doss:
A Feedback-Driven Lightweight Reputation Scheme for IoV. TrustCom 2020: 1060-1068 - 2019
- [c31]Liming Jiang, Yan Wang, Jiajun Tian, Frank Jiang, Nicholas Charles Patterson, Robin Doss:
An Efficient Dynamic Group-Based Batch Verification Scheme for Vehicular Sensor Networks. FNSS 2019: 52-64 - [c30]Fei Gao, Frank Jiang, Yuping Zhang, Robin Doss:
Quorum Chain-Based Malware Detection in Android Smart Devices. FNSS 2019: 212-224 - [c29]Minhua He, Xu Han, Frank Jiang, Rongbai Zhang, Xingzi Liu, Xiao Liu:
BlockMeds: A Blockchain-Based Online Prescription System with Privacy Protection. ICSOC Workshops 2019: 299-303 - [c28]Min Qin, Yuhang Xi, Frank Jiang:
A New Improved Convolutional Neural Network Flower Image Recognition Model. SSCI 2019: 3110-3117 - 2018
- [c27]Long Hao, Sai-Ho Ling, Frank Jiang:
Classification of Cardiovascular Disease via A New SoftMax Model. EMBC 2018: 486-489 - [c26]Shizhen Zhang, Frank Jiang, Min Qin:
Application of System Calls in Abnormal User Behavioral Detection in Social Networks. ICSOC Workshops 2018: 89-101 - 2017
- [c25]Zenon Chaczko, Frank Jiang, Benazir Ahmed:
Road Vehicle Alert System Using IOT. ICSEng 2017: 488-493 - [c24]Haiying Xia, Wenxian Zhao, Zheng Zhou, Frank Jiang, Hai-Sheng Li, Xiangjian He:
Deformable Template Matching Using Proposal-Based Best-Buddies Similarity. TrustCom/BigDataSE/ICESS 2017: 517-521 - 2016
- [c23]Anand Chinchore, Guandong Xu, Frank Jiang:
Classifying sybil in MSNs using C4.5. BESC 2016: 1-6 - [c22]Frank Jiang, Jin Gan, Yuanyuan Xu, Guandong Xu:
Coupled behavioral analysis for user preference-based email spamming. BESC 2016: 1-5 - [c21]Haiying Xia, Shuaifei Deng, Minqi Li, Frank Jiang:
Robust retinal vessel segmentation via clustering-based patch mapping functions. BIBM 2016: 520-523 - [c20]Haiying Xia, Kaiyue Jin, Frank Jiang, Quang-Anh Tran:
A novel method of cervical cell image segmentation via region merging and SLIC. SoICT 2016: 153-158 - [c19]Frank Jiang, Mingdong Tang, Quang-Anh Tran:
User Preference-Based Spamming Detection with Coupled Behavioral Analysis. SpaCCS 2016: 466-477 - 2015
- [c18]Weiwei Liu, Zhi-Hong Deng, Xiuwen Gong, Frank Jiang, Ivor W. Tsang:
Effectively Predicting Whether and When a Topic Will Become Prevalent in a Social Network. AAAI 2015: 210-216 - [c17]Anand Chinchore, Frank Jiang, Guandong Xu:
Intelligent Sybil Attack Detection on Abnormal Connectivity Behavior in Mobile Social Networks. KMO 2015: 602-617 - [c16]Yanjie Li, Frank Jiang:
A Gradient Learning Optimization for Dynamic Power Management. SMC 2015: 2061-2066 - 2014
- [c15]Quan Dang Dinh, Quang-Anh Tran, Frank Jiang:
Automated generation of ham rules for Vietnamese spam filtering. CISDA 2014: 1-5 - [c14]Sai-Ho Ling, Frank Jiang:
Application on self-provisioning of communication network service using fuzzy particle swarm optimization. ICARCV 2014: 1245-1250 - [c13]Frank Jiang, Dan Luo:
A New Coupled Metric Learning for Real-time Anomalies Detection with High-Frequency Field Programmable Gate Arrays. ICDM Workshops 2014: 1254-1261 - [c12]Quang-Anh Tran, Quan Dang Dinh, Frank Jiang:
Binary Hybrid Particle Swarm Optimization with Wavelet Mutation. KSE 2014: 261-272 - 2013
- [c11]Frank Jiang, Jiankun Hu:
Cooperative multi-target tracking in passive sensor-based networks. WCNC 2013: 4340-4345 - 2012
- [c10]Kit Yan Chan, Sai-Ho Ling, Hung T. Nguyen, Frank Jiang:
A hypoglycemic episode diagnosis system based on neural networks for Type 1 diabetes mellitus. IEEE Congress on Evolutionary Computation 2012: 1-6 - [c9]Sai-Ho Ling, Hung T. Nguyen, Frank H. F. Leung, Kit Yan Chan, Frank Jiang:
Intelligent fuzzy particle swarm optimization with cross-mutated operation. IEEE Congress on Evolutionary Computation 2012: 1-8 - [c8]Frank Jiang, Michael R. Frater, Mark R. Pickering:
Threshold-Based Image Segmentation through an Improved Particle Swarm Optimisation. DICTA 2012: 1-5 - [c7]Frank Jiang, Sai-Ho Ling, Kit Yan Chan, Zenon Chaczko, Frank Hung-Fat Leung, Michael R. Frater:
An immunology-inspired multi-engine anomaly detection system with hybrid particle swarm optimisations. FUZZ-IEEE 2012: 1-8 - [c6]Frank Jiang, Daoyi Dong, Michael R. Frater:
Self-provisioning of network services with quantum-inspired reinforcement learning and adaptation. ICNSC 2012: 169-174 - [c5]Quang-Anh Tran, Frank Jiang, Quang Minh Ha:
Evolving Block-Based Neural Network and Field Programmable Gate Arrays for Host-Based Intrusion Detection System. KSE 2012: 86-92 - [c4]Quang-Anh Tran, Frank Jiang, Jiankun Hu:
A Real-Time NetFlow-based Intrusion Detection System with Improved BBNN and High-Frequency Field Programmable Gate Arrays. TrustCom 2012: 201-208 - 2011
- [c3]Frank Jiang, Michael R. Frater, Jiankun Hu:
A Bio-inspired Host-Based Multi-engine Detection System with Sequential Pattern Recognition. DASC 2011: 145-150 - [c2]Sai-Ho Ling, Frank Jiang, Hung T. Nguyen, Kit Yan Chan:
Permutation flow shop scheduling: Fuzzy particle swarm optimization approach. FUZZ-IEEE 2011: 572-578 - [c1]Frank Jiang, Michael R. Frater, Steve S. H. Ling:
A distributed smart routing scheme for terrestrial sensor networks with hybrid Neural Rough Sets. FUZZ-IEEE 2011: 2238-2244
Editorship
- 2024
- [e1]Jun Feng, Frank Jiang, Min Luo, Liang-Jie Zhang:
Edge Computing - EDGE 2023 - 7th International Conference, Held as Part of the Services Conference Federation, SCF 2023 Shenzhen, China, December 17-18, 2023, Proceedings. Lecture Notes in Computer Science 14205, Springer 2024, ISBN 978-3-031-51825-6 [contents]
Informal and Other Publications
- 2023
- [i2]Jianhua Li, Sophie McKenzie, Richard Dazeley, Frank Jiang, Keshav Sood:
Current Status and Trends of Engineering Entrepreneurship Education in Australian Universities. CoRR abs/2308.06943 (2023) - 2019
- [i1]Nicholas Charles Patterson, Michael Hobbs, Frank Jiang, Lei Pan:
Cyber security insights into self-proclaimed virtual world hackers. CoRR abs/1908.11010 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint