Obserwuj
Frank Jiang
Frank Jiang
Deakin University
Zweryfikowany adres z adfa.edu.au - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Applications of distributed ledger technologies to the internet of things: A survey
Q Zhu, SW Loke, R Trujillo-Rasua, F Jiang, Y Xiang
ACM computing surveys (CSUR) 52 (6), 1-34, 2019
1772019
An improved authentication scheme for internet of vehicles based on blockchain technology
X Wang, P Zeng, N Patterson, F Jiang, R Doss
IEEE access 7, 45061-45072, 2019
1422019
Robust stabilization of linear uncertain discrete-time systems via a limited capacity communication channel
VN Phat, F Jiang, AV Savkin, IR Petersen
Systems & control letters 53 (5), 347-360, 2004
822004
Constrained NMF-based semi-supervised learning for social media spammer detection
D Yu, N Chen, F Jiang, B Fu, A Qin
Knowledge-Based Systems 125, 64-73, 2017
732017
A new binary hybrid particle swarm optimization with wavelet mutation
F Jiang, H Xia, QA Tran, QM Ha, NQ Tran, J Hu
Knowledge-Based Systems 130, 90-101, 2017
702017
A real-time netflow-based intrusion detection system with improved BBNN and high-frequency field programmable gate arrays
JH Quang Anh Tran, Frank Jiang
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
632012
UAV swarm mission planning in dynamic environment using consensus-based bundle algorithm
Y Zhang, W Feng, G Shi, F Jiang, M Chowdhury, SH Ling
Sensors 20 (8), 2307, 2020
522020
Intrusion detection scheme with dimensionality reduction in next generation networks
K Sood, MR Nosouhi, DDN Nguyen, F Jiang, M Chowdhury, R Doss
IEEE Transactions on Information Forensics and Security 18, 965-979, 2023
462023
Ransomware early detection: A survey
M Cen, F Jiang, X Qin, Q Jiang, R Doss
Computer Networks 239, 110138, 2024
442024
Solving the last mile problem in logistics: A mobile edge computing and blockchain‐based unmanned aerial vehicle delivery system
X Li, L Gong, X Liu, F Jiang, W Shi, L Fan, H Gao, R Li, J Xu
Concurrency and Computation: Practice and Experience 34 (7), e6068, 2022
432022
Using neural networks to compute approximate and guaranteed feasible Hamilton-Jacobi-Bellman PDE solutions
F Jiang, G Chou, M Chen, CJ Tomlin
arXiv preprint arXiv:1611.03158, 2016
432016
Responsible use of technology to combat Cyberbullying among adolescents
C Kaluarachchi, M Warren, F Jiang
Australasian Journal of Information Systems 24, 2020
412020
Effective quarantine and recovery scheme against advanced persistent threat
LX Yang, P Li, X Yang, Y Xiang, F Jiang, W Zhou
IEEE Transactions on Systems, Man, and Cybernetics: Systems 51 (10), 5977-5991, 2019
392019
Zero trust cybersecurity: Critical success factors and A maturity assessment framework
W Yeoh, M Liu, M Shore, F Jiang
Computers & Security 133, 103412, 2023
372023
Image super-resolution based on generative adversarial networks: A brief review
K Fu, J Peng, H Zhang, X Wang, F Jiang
Deakin University, 2020
372020
Quality and robustness improvement for real world industrial systems using a fuzzy particle swarm optimization
SH Ling, KY Chan, FHF Leung, F Jiang, H Nguyen
Engineering Applications of Artificial Intelligence 47, 68-80, 2016
372016
Rolling surface defect inspection for drum-shaped rollers based on deep learning
J Tao, Y Zhu, F Jiang, H Liu, H Liu
IEEE Sensors Journal 22 (9), 8693-8700, 2022
352022
A dual privacy-preservation scheme for cloud-based eHealth systems
X Wang, L Bai, Q Yang, L Wang, F Jiang
Journal of Information Security and Applications 47, 132-138, 2019
342019
Threshold-based image segmentation through an improved particle swarm optimisation
F Jiang, MR Frater, M Pickering
2012 International Conference on Digital Image Computing Techniques and …, 2012
342012
A review of aggregation algorithms for the internet of things
F Al-Doghman, Z Chaczko, J Jiang
2017 25th International Conference on Systems Engineering (ICSEng), 480-487, 2017
312017
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20