


default search action
Lei Pan 0002
Person information
- affiliation: Deakin University, School of IT, Faculty of Science and Technology, Melbourne, Australia
Other persons with the same name
- Lei Pan — disambiguation page
- Lei Pan 0001 — California Institute of Technology, Jet Propulsion Laboratory, Pasadena, CA, USA (and 1 more)
- Lei Pan 0003
— Southwest Jiaotong University, Sichuan Provincial Key Laboratory of Information Coding and Transmission, Chengdu, China
- Lei Pan 0004
— Southeast University, MOE Key Laboratory of Energy Thermal Conversion and Control, Nanjing, China
- Lei Pan 0005 — University of Maryland, ECE Department, UMIACS, MD, USA
- Lei Pan 0006
— Tianjin Chengjian University, School of Control and Mechanical Engineering, China (and 1 more)
- Lei Pan 0007 — Qualcomm, San Jose, CA, USA (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j71]Saifur Rahman
, Shantanu Pal
, Ahsan Habib
, Lei Pan
, Chandan K. Karmakar
:
Attack-data independent defence mechanism against adversarial attacks on ECG signal. Comput. Networks 258: 111027 (2025) - [j70]Ravneet Kaur, Robin Doss, Lei Pan, Chaitanya Singla, Selvarajah Thuseethan:
Role of Roadside Units in Cluster Head Election and Coverage Maximization for Vehicle Emergency Services. Comput. 14(4): 152 (2025) - [j69]Fuyi Wang, Jinzhi Ouyang, Xiaoning Liu, Lei Pan, Leo Yu Zhang, Robin Doss:
MedShield: A Fast Cryptographic Framework for Private Multi-Service Medical Diagnosis. IEEE Trans. Serv. Comput. 18(2): 954-968 (2025) - [c72]Huynh Thanh Thien Pham, Frank Jiang, Lei Pan, Alessio Bonti, Mohamed Abdelrazek:
uBSaaS: A Unified Blockchain Service as a Service Framework for Streamlined Blockchain Services Integration. ENASE 2025: 107-119 - 2024
- [j68]Siqi Xia
, Sutharshan Rajasegarar
, Lei Pan
, Christopher Leckie
, Sarah M. Erfani
, Jeffrey Chan
:
LabelGen: An Anomaly Label Generative Framework for Enhanced Graph Anomaly Detection. IEEE Access 12: 121971-121982 (2024) - [j67]Moe Hdaib, Sutharshan Rajasegarar, Lei Pan:
Quantum deep learning-based anomaly detection for enhanced network security. Quantum Mach. Intell. 6(1): 26 (2024) - [j66]Ravneet Kaur, Robin Doss, Lei Pan:
The route based emergency message dissemination scheme using multihop wireless network for VANETs. Telecommun. Syst. 87(4): 1183-1199 (2024) - [j65]Sheraz Mazhar
, Abdur Rakib
, Lei Pan
, Frank Jiang, Adnan Anwar, Robin Doss, Jeremy W. Bryans
:
State-of-the-art authentication and verification schemes in VANETs: A survey. Veh. Commun. 49: 100804 (2024) - [c71]Mohammad Reza Nosouhi
, Zubair A. Baig
, Robin Doss
, Divyans Mahansaria
, Debi Prasad Pati
, Praveen Gauravaram
, Lei Pan
, Keshav Sood
:
Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology Environments. ARES 2024: 145:1-145:11 - [c70]Shiva Raj Pokhrel
, Naman Yash
, Jonathan Kua
, Gang Li
, Lei Pan
:
A Data-Encoding Approach to Quantum Federated Learning: Experimenting with Cloud Challenges. APNet 2024: 179-180 - [c69]Fuyi Wang
, Zekai Chen
, Lei Pan
, Leo Yu Zhang
, Jianying Zhou
:
CryptGraph: An Efficient Privacy-Enhancing Solution for Accurate Shortest Path Retrieval in Cloud Environments. AsiaCCS 2024 - [c68]Ryan Holland, Shantanu Pal, Lei Pan, Leo Yu Zhang:
Backdoor Attacks and Generative Model Fairness: Current Trends and Future Research Directions. COMSNETS 2024: 31-36 - [c67]Huynh Thanh Thien Pham
, Frank Jiang, Alessio Bonti, Lei Pan, Junyu Lu, Mohamed Almorsy Abdelrazek:
Towards Blockchain Services Marketplace for More Efficient Blockchain Development. DSC 2024: 13-23 - [c66]Fuyi Wang, Jinzhi Ouyang, Lei Pan, Leo Yu Zhang, Xiaoning Liu, Yanping Wang, Robin Doss:
TrustMIS: Trust-Enhanced Inference Framework for Medical Image Segmentation. ECAI 2024: 105-112 - [c65]Siqi Xia
, Sutharshan Rajasegarar
, Lei Pan
, Christopher Leckie
, Sarah M. Erfani
, Jeffrey Chan
:
ConDGAD: Multi-augmentation Contrastive Learning for Dynamic Graph Anomaly Detection. ICPR (25) 2024: 416-431 - [c64]Zian Liu, Shigang Liu, Lei Pan, Chao Chen, Ejaz Ahmed, Jun Zhang, Dongxi Liu:
VulMatch: Binary-Level Vulnerability Detection Through Signature. NSS 2024: 409-427 - [c63]Mohammad Reza Nosouhi, Zubair A. Baig, Robin Doss, Praveen Gauravaram
, Debi Prasad Pati, Divyans Mahansaria, Keshav Sood, Lei Pan:
The Value of Strong Identity and Access Management for ICS/OT Security. PST 2024: 1-5 - [i17]Shiva Raj Pokhrel, Naman Yash, Jonathan Kua, Gang Li, Lei Pan:
Quantum Federated Learning Experiments in the Cloud with Data Encoding. CoRR abs/2405.00909 (2024) - [i16]Jiwei Guan, Tianyu Ding, Longbing Cao, Lei Pan, Chen Wang, Xi Zheng:
Probing the Robustness of Vision-Language Pretrained Models: A Multimodal Adversarial Attack Approach. CoRR abs/2408.13461 (2024) - 2023
- [j64]Mohammad Reza Nosouhi
, Syed Wajid Ali Shah, Lei Pan
, Robin Doss
:
Bit Flipping Key Encapsulation for the Post-Quantum Era. IEEE Access 11: 56181-56195 (2023) - [j63]Hong Lai, Josef Pieprzyk
, Lei Pan:
Novel entanglement compression for QKD protocols using isometric tensors. Sci. China Inf. Sci. 66(8) (2023) - [j62]Jingjin Li
, Chao Chen
, Mostafa Rahimi Azghadi, Hossein Ghodosi, Lei Pan
, Jun Zhang:
Security and privacy problems in voice assistant applications: A survey. Comput. Secur. 134: 103448 (2023) - [j61]Lin Li
, Chao Chen, Lei Pan, Leo Yu Zhang, Zhifeng Wang, Jun Zhang, Yang Xiang:
A Survey of PPG's Application in Authentication. Comput. Secur. 135: 103488 (2023) - [j60]Markian Jaworsky
, Xiaohui Tao, Lei Pan, Shiva Raj Pokhrel, Jianming Yong
, Ji Zhang:
Interrelated feature selection from health surveys using domain knowledge graph. Health Inf. Sci. Syst. 11(1): 54 (2023) - [j59]Jiwei Guan
, Lei Pan
, Chen Wang
, Shui Yu
, Longxiang Gao
, Xi Zheng
:
Trustworthy Sensor Fusion Against Inaudible Command Attacks in Advanced Driver-Assistance Systems. IEEE Internet Things J. 10(19): 17254-17264 (2023) - [j58]Xue Zhang, Fusen Guo
, Tao Chen, Lei Pan
, Gleb Beliakov, Jianzhang Wu
:
A Brief Survey of Machine Learning and Deep Learning Techniques for E-Commerce Research. J. Theor. Appl. Electron. Commer. Res. 18(4): 2188-2216 (2023) - [j57]Hong Lai, Josef Pieprzyk
, Lei Pan, Ya Li:
Resource-saving quantum key distribution based on three-photon matrix product states. Quantum Inf. Process. 22(6): 235 (2023) - [j56]Lei Pan
, Xiao Liu
, Zhaohong Jia
, Jia Xu
, Xuejun Li
:
A Multi-Objective Clustering Evolutionary Algorithm for Multi-Workflow Computation Offloading in Mobile Edge Computing. IEEE Trans. Cloud Comput. 11(2): 1334-1351 (2023) - [j55]Junyang Qiu
, Qing-Long Han
, Wei Luo
, Lei Pan
, Surya Nepal
, Jun Zhang
, Yang Xiang
:
Cyber Code Intelligence for Android Malware Detection. IEEE Trans. Cybern. 53(1): 617-627 (2023) - [j54]Mohammad Reza Nosouhi
, Syed W. Shah, Lei Pan
, Yevhen Zolotavkin
, Ashish Nanda
, Praveen Gauravaram
, Robin Doss
:
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism. IEEE Trans. Inf. Forensics Secur. 18: 2160-2174 (2023) - [c62]Siqi Xia
, Sutharshan Rajasegarar
, Christopher Leckie
, Sarah M. Erfani
, Jeffrey Chan
, Lei Pan
:
EnSpeciVAT: Enhanced SpecieVAT for Cluster Tendency Identification in Graphs. ADMA (3) 2023: 323-337 - [c61]Syed Wajid Ali Shah
, Mohammad Reza Nosouhi
, Lei Pan
, Robin Doss
:
SoK: On Efficacy of the BGF Decoder for QC-MDPC-based Quantum-Safe Cryptosystems. APKC@AsiaCCS 2023: 2-9 - [c60]Fokke Heikamp
, Lei Pan
, Robin Doss
, Rolando Trujillo-Rasua
, Sushmita Ruj
:
ForTrac: a Secure NFT-based Forward Traceability System for Providing Data Accuracy and Completeness. BSCI 2023: 1-10 - [c59]Cynthia Yi Min Chee
, Shantanu Pal
, Lei Pan
, Robin Doss
:
An Analysis of Important Factors Affecting the Success of Blockchain Smart Contract Security Vulnerability Scanning Tools. BSCI 2023: 105-113 - [c58]Lin Li
, Chao Chen, Lei Pan, Yonghang Tai, Jun Zhang, Yang Xiang:
Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication. ESORICS (3) 2023: 183-202 - [c57]Markian Jaworsky, Xiaohui Tao, Jianming Yong
, Lei Pan, Ji Zhang, Shiva Raj Pokhrel:
Knowledge-Based Nonlinear to Linear Dataset Transformation for Chronic Illness Classification. HIS 2023: 115-126 - [c56]Moe Hdaib, Sutharshan Rajasegarar, Lei Pan:
Quantum Autoencoder Frameworks for Network Anomaly Detection. ICONIP (5) 2023: 69-82 - [c55]Lin Li
, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
SigD: A Cross-Session Dataset for PPG-based User Authentication in Different Demographic Groups. IJCNN 2023: 1-8 - [c54]Pengyu Li, Lei Pan, Feifei Chen, Thuong N. Hoang, Rui Wang
:
TOTPAuth: A Time-based One Time Password Authentication Proof-of-Concept against Metaverse User Identity Theft. MetaCom 2023: 662-665 - [c53]Andrew Plapp
, Jianzhang Wu, Lei Pan, Chao Chen, Caslon Chua
, Jun Zhang:
Strengthening Cyber Security Education: Designing Robust Assessments for ChatGPT-Generated Answers. ML4CS 2023: 17-27 - [c52]Lin Li
, Chao Chen
, Lei Pan
, Leo Yu Zhang
, Jun Zhang
, Yang Xiang
:
SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display. RAID 2023: 686-699 - [c51]Fusen Guo
, Jianzhang Wu
, Lei Pan:
An Empirical Study of AI Model's Performance for Electricity Load Forecasting with Extreme Weather Conditions. SciSec 2023: 193-204 - [i15]Jingjin Li, Chao Chen, Lei Pan, Mostafa Rahimi Azghadi, Hossein Ghodosi, Jun Zhang:
Security and Privacy Problems in Voice Assistant Applications: A Survey. CoRR abs/2304.09486 (2023) - [i14]Jiwei Guan, Lei Pan, Chen Wang, Shui Yu, Longxiang Gao, Xi Zheng:
Trustworthy Sensor Fusion against Inaudible Command Attacks in Advanced Driver-Assistance System. CoRR abs/2306.05358 (2023) - [i13]Zian Liu, Lei Pan, Chao Chen, Ejaz Ahmed, Shigang Liu, Jun Zhang, Dongxi Liu:
VulMatch: Binary-level Vulnerability Detection Through Signature. CoRR abs/2308.00288 (2023) - 2022
- [j53]Rory Coulter
, Jun Zhang, Lei Pan, Yang Xiang
:
Domain adaptation for Windows advanced persistent threat detection. Comput. Secur. 112: 102496 (2022) - [j52]Yonghang Tai, Yinjia Wang, Zhifeng Wang, Feiyan Li, Lei Wei
, Lei Pan
, Jun Zhang, Junsheng Shi:
Trustworthy blockchain-based medical Internet of thing for minimal invasive surgery training simulator. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j51]Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang
:
Machine Learning-based Cyber Attacks Targeting on Controlled Information: A Survey. ACM Comput. Surv. 54(7): 139:1-139:36 (2022) - [j50]Jun Zhang, Lei Pan, Qing-Long Han, Chao Chen, Sheng Wen, Yang Xiang
:
Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey. IEEE CAA J. Autom. Sinica 9(3): 377-391 (2022) - [j49]Yahui Han, Yonggang Huang, Lei Pan, Yunbo Zheng:
Learning multi-level and multi-scale deep representations for privacy image classification. Multim. Tools Appl. 81(2): 2259-2274 (2022) - [j48]Ahmed Falah
, Shiva Raj Pokhrel, Lei Pan, Anthony de Souza-Daw:
Towards enhanced PDF maldocs detection with feature engineering: design challenges. Multim. Tools Appl. 81(28): 41103-41130 (2022) - [j47]Hong Lai, Josef Pieprzyk
, Lei Pan:
Dynamic and compressed quantum many-body state secret sharing based on site-independent matrix product states. Quantum Inf. Process. 21(3): 83 (2022) - [j46]Qiang Zhang, Hong Lai, Josef Pieprzyk
, Lei Pan:
An improved quantum network communication model based on compressed tensor network states. Quantum Inf. Process. 21(7): 253 (2022) - [j45]Guangquan Xu
, Xiaofei Xie
, Shuhan Huang
, Jun Zhang
, Lei Pan
, Wei Lou
, Kaitai Liang
:
JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers. IEEE Trans. Dependable Secur. Comput. 19(2): 862-878 (2022) - [j44]Iynkaran Natgunanathan, Purathani Praitheeshan, Longxiang Gao, Yong Xiang, Lei Pan:
Blockchain-Based Audio Watermarking Technique for Multimedia Copyright Protection in Distribution Networks. ACM Trans. Multim. Comput. Commun. Appl. 18(3): 86:1-86:23 (2022) - [c50]Venkata Abhishek Kanthuru, Sutharshan Rajasegarar
, Punit Rathore, Robin Ram Mohan Doss, Lei Pan, Biplob Ray, Morshed Chowdhury, Chandrasekaran Srimathi, M. A. Saleem Durai:
Cyber Attack Detection in IoT Networks with Small Samples: Implementation And Analysis. ADMA (1) 2022: 118-130 - [c49]Vatsal Patel, Sutharshan Rajasegarar
, Lei Pan
, Jiajun Liu, Liming Zhu
:
EvAnGCN: Evolving Graph Deep Neural Network Based Anomaly Detection in Blockchain. ADMA (1) 2022: 444-456 - [c48]Lin Li
, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
Video is All You Need: Attacking PPG-based Biometric Authentication. AISec@CCS 2022: 57-66 - [c47]Yuantian Miao, Chao Chen, Lei Pan, Shigang Liu, Seyit Camtepe, Jun Zhang, Yang Xiang:
No-Label User-Level Membership Inference for ASR Model Auditing. ESORICS (2) 2022: 610-628 - [c46]Markian Jaworsky, Xiaohui Tao
, Jianming Yong
, Lei Pan, Ji Zhang, Shiva Raj Pokhrel:
Automated Knowledge Graph Construction for Healthcare Domain. HIS 2022: 258-265 - [c45]Fuyi Wang, Leo Yu Zhang, Lei Pan, Shengshan Hu, Robin Doss:
Towards Privacy-Preserving Neural Architecture Search. ISCC 2022: 1-6 - [c44]Pengyu Li, Feifei Chen, Rui Wang
, Thuong N. Hoang
, Lei Pan
:
InstaVarjoLive: An Edge-Assisted 360 Degree Video Live Streaming for Virtual Reality Testbed. MSN 2022: 609-613 - [c43]Fokke Heikamp
, Lei Pan
, Rolando Trujillo-Rasua
, Sushmita Ruj
, Robin Doss
:
Forward Traceability for Product Authenticity Using Ethereum Smart Contracts. NSS 2022: 514-523 - [i12]Lin Li, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
SoK: An Overview of PPG's Application in Authentication. CoRR abs/2201.11291 (2022) - [i11]Yuantian Miao, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation. CoRR abs/2202.05416 (2022) - [i10]Lin Li, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
Video is All You Need: Attacking PPG-based Biometric Authentication. CoRR abs/2203.00928 (2022) - [i9]Fuyi Wang, Leo Yu Zhang, Lei Pan, Shengshan Hu, Robin Doss:
Towards Privacy-Preserving Neural Architecture Search. CoRR abs/2204.10958 (2022) - [i8]Mohammad Reza Nosouhi, Syed W. Shah, Lei Pan, Yevhen Zolotavkin, Ashish Nanda, Praveen Gauravaram, Robin Doss:
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism. CoRR abs/2204.13885 (2022) - [i7]Lin Li, Chao Chen, Lei Pan, Yonghang Tai, Jun Zhang, Yang Xiang:
Hiding Your Signals: A Security Analysis of PPG-based Biometric Authentication. CoRR abs/2207.04434 (2022) - 2021
- [j43]Rui Li
, Xuejun Li, Jia Xu
, Frank Jiang
, Zhao-hong Jia, Di Shao
, Lei Pan, Xiao Liu
:
Energy-aware decision-making for dynamic task migration in MEC-based unmanned aerial vehicle delivery system. Concurr. Comput. Pract. Exp. 33(22) (2021) - [j42]Ravneet Kaur
, Ramkumar Ketti Ramachandran
, Robin Doss, Lei Pan:
The importance of selecting clustering parameters in VANETs: A survey. Comput. Sci. Rev. 40: 100392 (2021) - [j41]Junyang Qiu, Jun Zhang
, Wei Luo
, Lei Pan
, Surya Nepal
, Yang Xiang
:
A Survey of Android Malware Detection with Deep Neural Models. ACM Comput. Surv. 53(6): 126:1-126:36 (2021) - [j40]Ahmed Falah, Lei Pan, Md. Shamsul Huda, Shiva Raj Pokhrel
, Adnan Anwar
:
Improving malicious PDF classifier with feature engineering: A data-driven approach. Future Gener. Comput. Syst. 115: 314-326 (2021) - [j39]Shiva Raj Pokhrel
, Lei Pan
, Neeraj Kumar
, Robin Doss
, Hai Le Vu
:
Multipath TCP Meets Transfer Learning: A Novel Edge-Based Learning for Industrial IoT. IEEE Internet Things J. 8(13): 10299-10307 (2021) - [j38]Purathani Praitheeshan, Lei Pan, Xi Zheng
, Alireza Jolfaei
, Robin Doss:
SolGuard: Preventing external call issues in smart contract-based multi-agent robotic systems. Inf. Sci. 579: 150-166 (2021) - [j37]Guangjun Li, Preetpal Sharma, Lei Pan, Sutharshan Rajasegarar
, Chandan K. Karmakar
, Nicholas Charles Patterson
:
Deep learning algorithms for cyber security applications: A survey. J. Comput. Secur. 29(5): 447-471 (2021) - [j36]Yuantian Miao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Benjamin Zi Hao Zhao, Dali Kaafar, Yang Xiang:
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services. Proc. Priv. Enhancing Technol. 2021(1): 209-228 (2021) - [j35]Purathani Praitheeshan, Lei Pan
, Robin Doss
:
Private and Trustworthy Distributed Lending Model Using Hyperledger Besu. SN Comput. Sci. 2(2): 115 (2021) - [j34]Guanjun Lin
, Jun Zhang
, Wei Luo
, Lei Pan
, Olivier Y. de Vel
, Paul Montague, Yang Xiang
:
Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases. IEEE Trans. Dependable Secur. Comput. 18(5): 2469-2485 (2021) - [j33]Tarandeep Kaur Bhatia
, Ramkumar Ketti Ramachandran
, Robin Doss, Lei Pan:
Data congestion in VANETs: research directions and new trends through a bibliometric analysis. J. Supercomput. 77(7): 6586-6628 (2021) - [j32]Zhao-hong Jia, Lei Pan, Xiao Liu
, Xuejun Li:
A novel cloud workflow scheduling algorithm based on stable matching game theory. J. Supercomput. 77(10): 11597-11624 (2021) - [c42]Francisco Rojo, Lei Pan
:
Containers' Privacy and Data Protection via Runtime Scanning Methods. BROADNETS 2021: 37-56 - [c41]Rajiv Faleiro, Lei Pan
, Shiva Raj Pokhrel
, Robin Doss
:
Digital Twin for Cybersecurity: Towards Enhancing Cyber Resilience. BROADNETS 2021: 57-76 - [c40]Tarandeep Kaur Bhatia, Ramkumar Ketti Ramachandran
, Robin Doss, Lei Pan:
Detecting and Controlling the Occurrence of Data Congestion in a High-density VANETs Environment. FRUCT 2021: 42-48 - [c39]Khondker Fariha Hossain
, Sharif Amit Kamran
, Alireza Tavakkoli, Lei Pan, Xingjun Ma, Sutharshan Rajasegarar
, Chandan Karmaker:
ECG-Adv-GAN: Detecting ECG Adversarial Examples with Conditional Generative Adversarial Networks. ICMLA 2021: 50-56 - [c38]Zichan Ruan, Shuiqiao Yang, Lei Pan, Xingjun Ma, Wei Luo
, Marthie Grobler:
Microwave Link Failures Prediction via LSTM-based Feature Fusion Network. IJCNN 2021: 1-8 - [i6]Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang:
Machine Learning Based Cyber Attacks Targeting on Controlled Information: A Survey. CoRR abs/2102.07969 (2021) - [i5]Khondker Fariha Hossain, Sharif Amit Kamran, Alireza Tavakkoli, Lei Pan, Daniel Ma, Sutharshan Rajasegarar, Chandan Karmaker:
ECG-Adv-GAN: Detecting ECG Adversarial Examples with Conditional Generative Adversarial Networks. CoRR abs/2107.07677 (2021) - 2020
- [j31]Peng Zeng, Guanjun Lin
, Lei Pan
, Yonghang Tai
, Jun Zhang:
Software Vulnerability Analysis and Discovery Using Deep Learning Techniques: A Survey. IEEE Access 8: 197158-197172 (2020) - [j30]Chee Keong Ng
, Sutharshan Rajasegarar
, Lei Pan
, Frank Jiang
, Leo Yu Zhang
:
VoterChoice: A ransomware detection honeypot with multiple voting framework. Concurr. Comput. Pract. Exp. 32(14) (2020) - [j29]Miraj Asghar, Lei Pan, Robin Doss:
An efficient voting based decentralized revocation protocol for vehicular ad hoc networks. Digit. Commun. Networks 6(4): 422-432 (2020) - [j28]Rory Coulter, Qing-Long Han
, Lei Pan
, Jun Zhang, Yang Xiang
:
Code analysis for intelligent cyber systems: A data-driven approach. Inf. Sci. 524: 46-58 (2020) - [j27]Lei Pan, Nicholas Charles Patterson, Sophie McKenzie, Surtharshan Rajasegarar
, Guy Wood-Bradley, Justin T. Rough
, Wei Luo
, Elicia Lanham, Jo Coldwell-Neilson:
Gathering Intelligence on Student Information Behavior Using Data Mining. Libr. Trends 68(4): 636-658 (2020) - [j26]Hong Lai, Josef Pieprzyk
, Mingxing Luo, Cheng Zhan, Lei Pan
, Mehmet A. Orgun
:
High-capacity (2, 3) threshold quantum secret sharing based on asymmetric quantum lossy channels. Quantum Inf. Process. 19(5): 157 (2020) - [j25]Hong Lai, Josef Pieprzyk
, Lei Pan:
Analysis of weighted quantum secret sharing based on matrix product states. Quantum Inf. Process. 19(12): 418 (2020) - [j24]Rory Coulter
, Qing-Long Han
, Lei Pan
, Jun Zhang
, Yang Xiang
:
Data-Driven Cyber Security in Perspective - Intelligent Traffic Analysis. IEEE Trans. Cybern. 50(7): 3081-3093 (2020) - [j23]Yonggang Huang
, Jun Zhang
, Lei Pan
, Yang Xiang
:
Privacy Protection in Interactive Content Based Image Retrieval. IEEE Trans. Dependable Secur. Comput. 17(3): 595-607 (2020) - [c37]Purathani Praitheeshan
, Lei Pan
, Robin Doss
:
Security Evaluation of Smart Contract-Based On-chain Ethereum Wallets. NSS 2020: 22-41 - [c36]Vatsal Patel
, Lei Pan
, Sutharshan Rajasegarar
:
Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network. NSS 2020: 132-148 - [c35]Rory Coulter, Jun Zhang, Lei Pan, Yang Xiang
:
Unmasking Windows Advanced Persistent Threat Execution. TrustCom 2020: 268-276 - [c34]Samaneh Rashidibajgan, Thomas Hupperich
, Robin Doss
, Lei Pan:
Opportunistic Tracking in Cyber-Physical Systems. TrustCom 2020: 1672-1679
2010 – 2019
- 2019
- [j22]Junyang Qiu
, Wei Luo
, Lei Pan
, Yonghang Tai, Jun Zhang, Yang Xiang:
Predicting the Impact of Android Malicious Samples via Machine Learning. IEEE Access 7: 66304-66316 (2019) - [j21]Shiju Sathyadevan
, Krishnashree Achuthan, Robin Doss
, Lei Pan
:
Protean Authentication Scheme - A Time-Bound Dynamic KeyGen Authentication Technique for IoT Edge Nodes in Outdoor Deployments. IEEE Access 7: 92419-92435 (2019) - [j20]Junyang Qiu
, Jun Zhang, Wei Luo
, Lei Pan
, Surya Nepal
, Yu Wang
, Yang Xiang
:
A3CM: Automatic Capability Annotation for Android Malware. IEEE Access 7: 147156-147168 (2019) - [j19]Lei Pan
, Jun Zhang, Jonathan J. Oliver:
Editorial: Recent advances in machine learning for cybersecurity. Concurr. Comput. Pract. Exp. 31(19) (2019) - [j18]Md. Shamsul Huda, Jemal H. Abawajy, Baker Al-Rubaie, Lei Pan
, Mohammad Mehedi Hassan:
Automatic extraction and integration of behavioural indicators of malware for protection of cyber-physical networks. Future Gener. Comput. Syst. 101: 1247-1258 (2019) - [j17]Binfeng Wang, Jun Zhang, Zili Zhang
, Lei Pan
, Yang Xiang
, Dawen Xia
:
Noise-Resistant Statistical Traffic Classification. IEEE Trans. Big Data 5(4): 454-466 (2019) - [c33]Younis AL Husaini, Matthew J. Warren, Lei Pan, Mansoor Al-Gharibi:
Cloud Forensics Investigations Relationship: A Model And Instrument. ACIS 2019: 83 - [c32]Cameron R. Schafer, Lei Pan
:
Password Strength Estimators Trained on the Leaked Password Lists. ATIS 2019: 219-231 - [c31]Purathani Praitheeshan, Yi Wei Xin, Lei Pan
, Robin Doss
:
Attainable Hacks on Keystore Files in Ethereum Wallets - A Systematic Analysis. FNSS 2019: 99-117 - [c30]Man Wu, Shirui Pan
, Xingquan Zhu
, Chuan Zhou, Lei Pan
:
Domain-Adversarial Graph Neural Networks for Text Classification. ICDM 2019: 648-657 - [c29]Wei Du, Qiwang Lei, Qiang He, Wei Liu, Feifei Chen, Lei Pan
, Tao Lei, Hailiang Zhao
:
Multiple Energy Harvesting Devices Enabled Joint Computation Offloading and Dynamic Resource Allocation for Mobile-Edge Computing Systems. ICWS 2019: 154-158 - [c28]Junyang Qiu, Surya Nepal, Wei Luo
, Lei Pan
, Yonghang Tai, Jun Zhang, Yang Xiang:
Data-Driven Android Malware Intelligence: A Survey. ML4CS 2019: 183-202 - [c27]Rory Coulter, Lei Pan
, Jun Zhang, Yang Xiang:
A Visualization-Based Analysis on Classifying Android Malware. ML4CS 2019: 304-319 - [i4]Yuantian Miao, Benjamin Zi Hao Zhao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Dali Kaafar, Yang Xiang:
The Audio Auditor: Participant-Level Membership Inference in Voice-Based IoT. CoRR abs/1905.07082 (2019) - [i3]Purathani Praitheeshan, Lei Pan, Jiangshan Yu, Joseph K. Liu, Robin Doss
:
Security Analysis Methods on Ethereum Smart Contract Vulnerabilities: A Survey. CoRR abs/1908.08605 (2019) - [i2]Nicholas Charles Patterson
, Michael Hobbs, Frank Jiang, Lei Pan:
Cyber security insights into self-proclaimed virtual world hackers. CoRR abs/1908.11010 (2019) - 2018
- [b1]Chee Keong Ng, Lei Pan, Yang Xiang:
Honeypot Frameworks and their Applications: A New Framework. SpringerBriefs on Cyber Security Systems and Networks, Springer 2018, ISBN 978-981-10-7738-8, pp. 1-81 - [j16]Hong Lai, Mingxing Luo, Josef Pieprzyk
, Jun Zhang, Lei Pan
, Mehmet A. Orgun
:
High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space. Sci. China Inf. Sci. 61(6): 062501:1-062501:11 (2018) - [j15]Rory Coulter, Lei Pan
:
Intelligent agents defending for an IoT world: A review. Comput. Secur. 73: 439-458 (2018) - [j14]Yuantian Miao, Zichan Ruan
, Lei Pan
, Jun Zhang
, Yang Xiang:
Comprehensive analysis of network traffic data. Concurr. Comput. Pract. Exp. 30(5) (2018) - [j13]Lei Pan, Xi Zheng
, Philip Kolar, Shaun Bangay:
Object localisation through clustering unreliable ultrasonic range sensors. Int. J. Sens. Networks 27(4): 268-280 (2018) - [j12]Simon James
, Elicia Lanham, Vicky H. Mak-Hau
, Lei Pan
, Tim Wilkin, Guy Wood-Bradley:
Identifying items for moderation in a peer assessment framework. Knowl. Based Syst. 162: 211-219 (2018) - [j11]Zichan Ruan
, Yuantian Miao, Lei Pan
, Yang Xiang, Jun Zhang:
Big network traffic data visualization. Multim. Tools Appl. 77(9): 11459-11487 (2018) - [j10]Hong Lai, Mingxing Luo, Jun Zhang, Josef Pieprzyk
, Lei Pan
, Mehmet A. Orgun
:
A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement. Quantum Inf. Process. 17(7): 162 (2018) - [j9]Yonggang Huang
, Longbing Cao
, Jun Zhang
, Lei Pan
, Yuying Liu:
Exploring Feature Coupling and Model Coupling for Image Source Identification. IEEE Trans. Inf. Forensics Secur. 13(12): 3108-3121 (2018) - [j8]Guanjun Lin
, Jun Zhang
, Wei Luo
, Lei Pan
, Yang Xiang
, Olivier Y. de Vel, Paul Montague:
Cross-Project Transfer Representation Learning for Vulnerable Function Discovery. IEEE Trans. Ind. Informatics 14(7): 3289-3297 (2018) - [c26]Junyang Qiu, Wei Luo
, Surya Nepal
, Jun Zhang, Yang Xiang
, Lei Pan
:
Keep Calm and Know Where to Focus: Measuring and Predicting the Impact of Android Malware. ADMA 2018: 238-254 - [c25]Ahmed Falah
, Lei Pan
, Mohamed Abdelrazek
, Robin Doss
:
Identifying Drawbacks in Malicious PDF Detectors. FNSS 2018: 128-139 - [c24]Miraj Asghar, Robin Ram Mohan Doss
, Lei Pan
:
A Scalable and Efficient PKI Based Authentication Protocol for VANETs. ITNAC 2018: 1-3 - [c23]Ahmed Falah, Lei Pan
, Feifei Chen:
A Quantitative Approach to Design Special Purpose Systems to Measure Hacking Skills. TALE 2018: 54-61 - [i1]Yuantian Miao, Zichan Ruan, Lei Pan, Yu Wang, Jun Zhang, Yang Xiang:
Automated Big Traffic Analytics for Cyber Security. CoRR abs/1804.09023 (2018) - 2017
- [j7]Zichan Ruan, Yuantian Miao, Lei Pan
, Nicholas Charles Patterson
, Jun Zhang
:
Visualization of big data security: a case study on the KDD99 cup data set. Digit. Commun. Networks 3(4): 250-259 (2017) - [j6]Lei Pan
, Xi Zheng
, H. X. Chen, Tom H. Luan
, H. Bootwala, Lynn Margaret Batten:
Cyber security attacks to modern vehicular systems. J. Inf. Secur. Appl. 36: 90-100 (2017) - [c22]Xi Zheng
, Lei Pan
, Erdem Yilmaz:
Security analysis of modern mission critical android mobile applications. ACSW 2017: 2:1-2:9 - [c21]Ahmed Falah, Lei Pan
, Mohamed Abdelrazek:
Visual representation of penetration testing actions and skills in a technical tree model. ACSW 2017: 8:1-8:10 - [c20]Yuantian Miao, Lei Pan
, Sutharshan Rajasegarar
, Jun Zhang, Christopher Leckie
, Yang Xiang:
Distributed Detection of Zero-Day Network Traffic Flows. AusDM 2017: 173-191 - [c19]Guanjun Lin, Jun Zhang, Wei Luo
, Lei Pan
, Yang Xiang:
POSTER: Vulnerability Discovery with Function Representation Learning from Unlabeled Projects. CCS 2017: 2539-2541 - [c18]Simon James
, Lei Pan
, Tim Wilkin, Lilin Yin:
Online peer marking with aggregation functions. FUZZ-IEEE 2017: 1-6 - [c17]Shiju Sathyadevan, V. Vejesh, Robin Doss
, Lei Pan
:
Portguard - an authentication tool for securing ports in an IoT gateway. PerCom Workshops 2017: 624-629 - [c16]Xi Zheng
, Lei Pan
, Hongxu Chen, Rick Di Pietro, Lynn Batten:
A Testbed for Security Analysis of Modern Vehicle Systems. TrustCom/BigDataSE/ICESS 2017: 1090-1095 - 2016
- [c15]Yuantian Miao, Zichan Ruan, Lei Pan
, Jun Zhang
, Yang Xiang, Yu Wang
:
Comprehensive Analysis of Network Traffic Data. CIT 2016: 423-430 - [c14]Xi Zheng
, Lei Pan
, Hongxu Chen, Peiyin Wang:
Investigating Security Vulnerabilities in Modern Vehicle Systems. ATIS 2016: 29-40 - 2015
- [c13]Ang Yang, Jun Zhang
, Lei Pan
, Yang Xiang:
Enhanced Twitter Sentiment Analysis by Using Feature Selection and Combination. SocialSec 2015: 52-57 - 2014
- [j5]Tianqing Zhu, Gang Li
, Lei Pan
, Yongli Ren
, Wanlei Zhou
:
Privacy preserving collaborative filtering for KNN attack resisting. Soc. Netw. Anal. Min. 4(1): 196 (2014) - [c12]Lei Pan
, Shaun Bangay:
Generating Repudiable, Memorizable, and Privacy Preserving Security Questions Using the Propp Theory of Narrative. CyberC 2014: 66-72 - [c11]Ping Xiong, Tianqing Zhu, Lei Pan, Wenjia Niu, Gang Li:
Privacy Preserving in Location Data Release: A Differential Privacy Approach. PRICAI 2014: 183-195 - 2013
- [c10]Matthias Trojahn, Lei Pan
, Fabian Schmidt:
Developing a Cloud Computing Based Approach for Forensic Analysis Using OCR. IMF 2013: 59-68 - [c9]Lei Pan
, Yan Zhou:
Developing an Empirical Algorithm for Protecting Text-Based CAPTCHAs against Segmentation Attacks. TrustCom/ISPA/IUCC 2013: 636-643 - 2012
- [j4]Lynn Margaret Batten, Lei Pan
, Nisar Khan:
Hypothesis Generation and Testing in Event Profiling for Digital Forensic Investigations. Int. J. Digit. Crime Forensics 4(4): 1-14 (2012) - [c8]Lei Pan, Nisar Khan, Lynn Margaret Batten:
Using Hypothesis Generation in Event Profiling for Digital Forensic Investigations. WDFIA 2012: 76-86 - 2010
- [j3]Robin Chellappa Doss, Deddy Chandra, Lei Pan, Wanlei Zhou, Morshed U. Chowdhury:
Dynamic Addressing in Wireless Sensor Networks without Location Awareness. J. Inf. Sci. Eng. 26(2): 443-460 (2010) - [c7]Lynn Margaret Batten, Lei Pan
:
Using Relationship-Building in Event Profiling for Digital Forensic Investigations. e-Forensics 2010: 40-52 - [p1]Lynn Margaret Batten, Lei Pan:
Testing Digital Forensic Software Tools Used in Expert Testimony. Handbook of Research on Computational Forensics, Digital Crime, and Investigation 2010: 257-278
2000 – 2009
- 2009
- [j2]Lei Pan
, Lynn Margaret Batten:
Robust performance testing for digital forensic tools. Digit. Investig. 6(1-2): 71-81 (2009) - [c6]Lei Pan
, Lynn Margaret Batten:
Robust Correctness Testing for Digital Forensic Tools. e-Forensics 2009: 54-64 - 2008
- [j1]Lynn Margaret Batten, Lei Pan
:
Teaching Digital Forensics to Undergraduate Students. IEEE Secur. Priv. 6(3): 54-56 (2008) - [c5]Lei Pan
, Antonio Savoldi, Paolo Gubian, Lynn Margaret Batten:
Measure of Integrity Leakage in Live Forensic Context. IIH-MSP 2008: 534-537 - 2007
- [c4]Lei Pan
, Lynn Margaret Batten:
An Effective and Efficient Testing Methodology for Correctness Testing for File Recovery Tools. IIH-MSP 2007: 103-107 - [c3]Lei Pan
, Lynn Margaret Batten:
A Lower Bound on Effective Performance Testing for Digital Forensic Tools. SADFE 2007: 117-130 - 2006
- [c2]Robin Chellappa Doss
, Deddy Chandra, Lei Pan
, Wanlei Zhou
, Morshed U. Chowdhury
:
Lease Based Addressing for Event-Driven Wireless Sensor Networks. ISCC 2006: 251-256 - 2005
- [c1]Lei Pan, Lynn Margaret Batten:
Reproducibility of Digital Evidence in Forensic Investigations. DFRWS 2005
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-06 22:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint