Associate Professor Julian Jang-Jaccard staff profile picture

Contact details +6492127026

Associate Professor Julian Jang-Jaccard PhD

Associate Professor in Computer Science and Information Technology

Doctoral Supervisor
School of Mathematical and Computational Sciences

Julian is an experienced and passionate IT professional whose career has spanned over 15 years across industries, universities, and government research agencies across Australia and NZ. Her core research focuses are; cybersecurity (identity management, intrusion detection, trustworthy system, cloud storage, applied cryptography) and privacy protection techniques (data anonymization and Homomorphic encryption) for big data analytics. She is currently working at Massy as an associate professor. Prior to joining Massey, she was a leading research scientist at CSIRO working on multi-million dollar projects within Australia and across Pacific. Before CSIRO, she was a professional java developer and a certified database administrator. 

Professional

Contact details

  • Location: 3.22, INMS
    Campus: East Precinct Albany Campus

Qualifications

  • Doctor of Philosophy - University of Sydney (2007)

Certifications and Registrations

  • Licence, Supervisor, Massey University

Research Expertise

Research Interests

Exploring opportunities in application development using differential privacy

Evaluation of feasibility for existing data anonymisation techniques for high volume and dynamic big datasets

Development of controlled Data linkability in the case of big data while preventing re-identification and attribute disclosure

Techniques for global identification, data provenance, traceability

Attribute-based-encryption (ABE) for sharing data among different user groups while preserving users’ privacy

Human immunology inspired and behavior-based mobile malware Intrusion Detection

Thematics

21st Century Citizenship

Area of Expertise

Field of research codes
Computer Software (080300): Computer System Security (080303): Data Encryption (080402): Data Format (080400): Distributed Computing (080500): Health Informatics (080702): Information And Computing Sciences (080000): Library and Information Studies (080700): Networking and Communications (080503)

Keywords

identity management, intrusion detection, trustworthy system, cloud storage, applied cryptography, data anonymization, searchable encryption

Research Projects

Summary of Research Projects

Position Current Completed
Not Specified 0 1
Project Leader 2 5

Current Projects

Project Title: Cyber Security Research Programme - Artificial Intelligence for Automating Response to Threats

Date Range: 2020 - 2023

Funding Body: Ministry of Business, Innovation and Employment

Project Team:

Completed Projects

Project Title: Advanced security technologies for the internet of things

Date Range: 2018 - 2021

Funding Body: University of Canterbury

Project Team:

Research Outputs

Journal

Lee, M., Kim, DH., Jang-Jaccard, J., & Kwak, J. (2023). Blended threat prediction based on knowledge graph embedding in the IoBE. ICT Express.
[Journal article]Authored by: Jang-Jaccard, J.
Dunmore, A., Dunning, A., Jang-Jaccard, J., Sabrina, F., & Kwak, J. (2023). MAGNETO and DeepInsight: Extended Image Translation with Semantic Relationships for Classifying Attack Data with Machine Learning Models. Electronics (Switzerland). 12(16)
[Journal article]Authored by: Jang-Jaccard, J.
Dunmore, A., Jang-Jaccard, J., Sabrina, F., & Kwak, J. (2023). A Comprehensive Survey of Generative Adversarial Networks (GANs) in Cybersecurity Intrusion Detection. IEEE Access. 11, 76071-76094
[Journal article]Authored by: Jang-Jaccard, J.
Zhu, J., Jang-Jaccard, J., Singh, A., Watters, PA., & Camtepe, S. (2023). Task-Aware Meta Learning-Based Siamese Neural Network for Classifying Control Flow Obfuscated Malware. Future Internet. 15(6)
[Journal article]Authored by: Jang-Jaccard, J.
John, TC., Abbasi, MS., Al-Sahaf, H., Welch, I., & Jang-Jaccard, J. (2023). Evolving malice scoring models for ransomware detection: An automated approach by utilising genetic programming and cooperative coevolution. Computers and Security. 129
[Journal article]Authored by: Jang-Jaccard, J.
Yin, Y., Jang-Jaccard, J., Xu, W., Singh, A., Zhu, J., Sabrina, F., . . . Kwak, J. (2023). IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset. Journal of Big Data. 10(1)
[Journal article]Authored by: Jang-Jaccard, J.
Wei, Y., Jang-Jaccard, J., Xu, W., Sabrina, F., Camtepe, S., & Boulic, M. (2023). LSTM-Autoencoder-Based Anomaly Detection for Indoor Air Quality Time-Series Data. IEEE Sensors Journal. 23(4), 3787-3800
[Journal article]Authored by: Boulic, M., Jang-Jaccard, J.
Alavizadeh, H., Jang-Jaccard, J., Enoch, SY., Al-Sahaf, H., Welch, I., Camtepe, SA., . . . Kim, DD. (2022). A Survey on Cyber Situation-Awareness Systems: Framework, Techniques, and Insights. ACM Computing Surveys. 55(5)
[Journal article]Authored by: Jang-Jaccard, J.
Lee, M., Jang-Jaccard, J., & Kwak, J. (2022). Novel Architecture of Security Orchestration, Automation and Response in Internet of Blended Environment. Computers, Materials and Continua. 73(1), 199-223
[Journal article]Authored by: Jang-Jaccard, J.
Xu, W., Jang-Jaccard, J., Liu, T., Sabrina, F., & Kwak, J. (2022). Improved Bidirectional GAN-Based Approach for Network Intrusion Detection Using One-Class Classifier. Computers. 11(6)
[Journal article]Authored by: Jang-Jaccard, J., Liu, T.
Alavizadeh, H., Aref, S., Kim, DS., & Jang-Jaccard, J. (2022). Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud. IEEE Transactions on Emerging Topics in Computing. 10(4), 1772-1788
[Journal article]Authored by: Jang-Jaccard, J.
Zhu, J., Jang-Jaccard, J., Singh, A., Welch, I., AI-Sahaf, H., & Camtepe, S. (2022). A few-shot meta-learning based siamese neural network using entropy features for ransomware classification. Computers and Security. 117
[Journal article]Authored by: Jang-Jaccard, J.
Alavizadeh, H., Alavizadeh, H., & Jang-Jaccard, J. (2022). Deep Q-Learning Based Reinforcement Learning Approach for Network Intrusion Detection. Computers. 11(3)
[Journal article]Authored by: Jang-Jaccard, J.
Feng, S., Liu, Q., Patel, A., Bazai, SU., Jin, CK., Kim, JS., . . . Wilson, B. (2022). Automated pneumothorax triaging in chest X-rays in the New Zealand population using deep-learning algorithms. Journal of Medical Imaging and Radiation Oncology. 66(8), 1035-1043
[Journal article]Authored by: Jang-Jaccard, J.
Bazai, SU., Jang-Jaccard, J., & Alavizadeh, H. (2022). A Novel Hybrid Approach for Multi-Dimensional Data Anonymization for Apache Spark. ACM Transactions on Privacy and Security. 25(1)
[Journal article]Authored by: Jang-Jaccard, J.
Liu, T., Sabrina, F., Jang-Jaccard, J., Xu, W., & Wei, Y. (2022). Artificial intelligence-enabled ddos detection for blockchain-based smart transport systems. Sensors. 22(1)
[Journal article]Authored by: Jang-Jaccard, J., Liu, T.
Wei, Y., Jang-Jaccard, J., Sabrina, F., Singh, A., Xu, W., & Camtepe, S. (2021). AE-MLP: A Hybrid Deep Learning Approach for DDoS Detection and Classification. IEEE Access. 9, 146810-146821
[Journal article]Authored by: Jang-Jaccard, J.
Xu, W., Jang-Jaccard, J., Singh, A., Wei, Y., & Sabrina, F. (2021). Improving Performance of Autoencoder-Based Network Anomaly Detection on NSL-KDD Dataset. IEEE Access. 9, 140136-140146
[Journal article]Authored by: Jang-Jaccard, J.
Sabrina, F., & Jang-Jaccard, J. (2021). Entitlement-based access control for smart cities using blockchain. Sensors. 21(16)
[Journal article]Authored by: Jang-Jaccard, J.
Bazai, SU., Jang-Jaccard, J., & Alavizadeh, H. (2021). Scalable, high-performance, and generalized subtree data anonymization approach for apache spark. Electronics (Switzerland). 10(5), 1-28
[Journal article]Authored by: Jang-Jaccard, J.
Zhu, J., Jang-Jaccard, J., Liu, T., & Zhou, J. (2021). Joint Spectral Clustering based on Optimal Graph and Feature Selection. Neural Processing Letters. 53(1), 257-273
[Journal article]Authored by: Jang-Jaccard, J., Liu, T.
Alavizadeh, H., Hong, JB., Kim, DS., & Jang-Jaccard, J. (2021). Evaluating the effectiveness of shuffle and redundancy MTD techniques in the cloud. Computers and Security. 102
[Journal article]Authored by: Jang-Jaccard, J.
Wei, Y., Jang-Jaccard, J., Sabrina, F., & Alavizadeh, H. (2020). Large-Scale Outlier Detection for Low-Cost PM Sensors. IEEE Access. 8, 229033-229042
[Journal article]Authored by: Jang-Jaccard, J.
Bazai, SU., & Jang-Jaccard, J. (2020). In-memory data anonymization using scalable and high performance rdd design. Electronics (Switzerland). 9(10), 1-26
[Journal article]Authored by: Jang-Jaccard, J.
Zhu, J., Jang-Jaccard, J., & Watters, PA. (2020). Multi-loss Siamese neural network with batch normalization layer for malware detection. IEEE Access. 8, 171542-171550
[Journal article]Authored by: Jang-Jaccard, J.
Alavizadeh, H., Kim, DS., & Jang-Jaccard, J. (2020). Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud. Future Generation Computer Systems. 111, 507-522
[Journal article]Authored by: Jang-Jaccard, J.
McIntosh, T., Jang-Jaccard, J., Watters, P., & Susnjak, T. (2019). Masquerade Attacks Against Security Software Exclusion Lists. Australian Journal of Intelligent Information Processing Systems. 16(4), 1-1 Retrieved from http://ajiips.com.au/
[Journal article]Authored by: Jang-Jaccard, J., Susnjak, T.
Zhang, X., Jang-Jaccard, J., Qi, L., Bhuiyan, MZA., & Liu, C. (2018). Privacy Issues in Big Data Mining Infrastructure, Platforms, and Applications. Security and Communication Networks. 2018
[Journal article]Authored by: Jang-Jaccard, J.Edited by: Jang-Jaccard, J.
Nepal, S., Friedrich, C., Wise, C., Sinnott, RO., Jang-Jaccard, J., & Chen, S. (2016). Key management service: Enabling secure sharing and deleting of documents on public clouds. Services Transactions on Cloud Computing. 4(2), 15-31
[Journal article]Authored by: Jang-Jaccard, J.
Jang-Jaccard, J., Nepal, S., Celler, B., & Yan, B. (2016). WebRTC-based video conferencing service for telehealth. Computing. 98(1-2), 169-193
[Journal article]Authored by: Jang-Jaccard, J.
Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences. 80(5), 973-993
[Journal article]Authored by: Jang-Jaccard, J.
Nepal, S., Li, J., Jang-Jaccard, J., & Alem, L. (2014). A framework for telehealth program evaluation. Telemedicine and e-Health. 20(4), 393-404
[Journal article]Authored by: Jang-Jaccard, J.
Jang-Jaccard, J., Nepal, S., Alem, L., & Li, J. (2014). Barriers for delivering telehealth in rural australia: a review based on Australian trials and studies. Telemedicine journal and e-health : the official journal of the American Telemedicine Association. 20(5), 496-504
[Journal article]Authored by: Jang-Jaccard, J.
Celler, BG., Sparks, R., Nepal, S., Alem, L., Varnfield, M., Li, J., . . . Jayasena, R. (2014). Design of a multi-site multi-state clinical trial of home monitoring of chronic disease in the community in australia. BMC Public Health. 14(1)
[Journal article]Authored by: Jang-Jaccard, J.
Jang-Jaccard, J., Nepal, S., & GUO, YJ. (2013). Cybersecurity threats in cloud computing. Australian Journal of Telecommunications and the Digital Economy. 1(1), 4.1-4.17 Retrieved from http://telsoc.org/journal
[Journal article]Authored by: Jang-Jaccard, J.
Zic, JJ., De Groot, M., Liu, D., Jang, J., & Wang, C. (2012). Hardware security device facilitated trusted energy services. Mobile Networks and Applications. 17(4), 564-577
[Journal article]Authored by: Jang-Jaccard, J.
Liu, D., Lee, J., Jang, J., Nepal, S., & Zic, J. (2012). A new cloud architecture of virtual trusted platform modules. IEICE Transactions on Information and Systems. E95-D(6), 1577-1589
[Journal article]Authored by: Jang-Jaccard, J.
Nepal, S., Zic, J., Liu, D., & Jang, J. (2011). A mobile and portable trusted computing platform. Eurasip Journal on Wireless Communications and Networking. 2011(1)
[Journal article]Authored by: Jang-Jaccard, J.

Book

(2019). Preface. (Vol. 11547 LNCS)
[Edited Book]Authored by: Jang-Jaccard, J.Edited by: Jang-Jaccard, J.
Wilson, O. (2016). Introduction. (pp. 101 - 103).
[Chapter]Edited by: Jang-Jaccard, J., Mathrani, A.
Colarik, AM., Jang-Jaccard, J., & Mathrani, A. (Eds.) (2017). Cyber security and policy: A substantive dialogue. Auckland, New Zealand: Massey University Press
[Edited Book]Authored by: Mathrani, A.Edited by: Jang-Jaccard, J., Mathrani, A.

Report

Dods, S., Freyne, J., Alem, L., Nepal, S., Li, J., & Jang-Jaccard, J.(2012). Caring for the last 3%: Telehealth potential and broadband implications for remote Australia. (Report No. EP129516). Australia: CSIRO
[Technical Report]Authored by: Jang-Jaccard, J.

Conference

Yin, Y., Jang-Jaccard, J., Sabrina, F., & Kwak, J.Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset. Proceedings of the 2023 26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023. (pp. 423 - 431).
[Conference]Authored by: Jang-Jaccard, J.
Lee, M., Jung, IS., Kim, DH., Jang-Jaccard, J., & Kwak, J.Applicability Analysis of Knowledge Graph Embedding on Blended Threat. 2022 International Conference on Platform Technology and Service, PlatCon 2022 - Proceedings. (pp. 48 - 52).
[Conference]Authored by: Jang-Jaccard, J.
Yin, Y., Jang-Jaccard, J., & Baghaei, N.PassImg: A Secure Password Generation and Management Scheme without Storing. 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022. (pp. 341 - 346).
[Conference]Authored by: Jang-Jaccard, J.
Wei, Y., Jang-Jaccard, J., Sabrina, F., & McIntosh, T.MSD-Kmeans: A Hybrid Algorithm for Efficient Detection of Global and Local Outliers. Proceedings - 2021 IEEE 15th International Conference on Big Data Science and Engineering, BigDataSE 2021. (pp. 87 - 94).
[Conference]Authored by: Jang-Jaccard, J.
Alavizadeh, H., Alavizadeh, H., & Jang-Jaccard, J.Cyber situation awareness monitoring and proactive response for enterprises on the cloud. Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020. (pp. 1276 - 1284).
[Conference]Authored by: Jang-Jaccard, J.
Alavizadeh, H., Alavizadeh, H., Kim, DS., Jang-Jaccard, J., & Torshiz, MN.An Automated Security Analysis Framework and Implementation for MTD Techniques on Cloud. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). (pp. 150 - 164). 0302-9743.
[Conference]Authored by: Jang-Jaccard, J.
Jean Camp, L., Grobler, M., Jang-Jaccard, J., Probst, C., Renaud, K., & Watters, P.Conceptualizing human resilience in the face of the global epidemiology of cyber attacks. Proceedings of the Annual Hawaii International Conference on System Sciences. (pp. 4763 - 4772). 1530-1605.
[Conference]Authored by: Jang-Jaccard, J.
McIntosh, T., Jang-Jaccard, J., Watters, P., & Susnjak, T.The Inadequacy of Entropy-Based Ransomware Detection. Communications in Computer and Information Science. (pp. 181 - 189). 1865-0929.
[Conference]Authored by: Jang-Jaccard, J., Susnjak, T.
Bazai, SU., & Jang-Jaccard, J.SparkDA: RDD-Based High-Performance Data Anonymization Technique for Spark Platform. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). (pp. 646 - 662). 0302-9743.
[Conference]Authored by: Jang-Jaccard, J.
Boulic, M., Wang, Y., Phipps, R., Chitty, C., Cunningham, C., Moses, A., . . . Palfroy, C.A breath of fresh air: Engaging school-aged students with air quality science in New Zealand schools. 15th Conference of the International Society of Indoor Air Quality and Climate, INDOOR AIR 2018.
[Conference]Authored by: Boulic, M., Chitty, C., Cunningham, C., Jang-Jaccard, J., Page, W.
Wang, Y., Jang-Jaccard, J., Boulic, M., Phipps, R., Chitty, C., Weyers, R., . . . Team, HSR.Deployment Issues for Integrated Open-Source-ased Indoor Air Quality School Monitoring Box (SKOMOBO). 2018 IEEE SENSORS APPLICATIONS SYMPOSIUM (SAS). (pp. 259 - 262).
[Conference]Authored by: Boulic, M., Chitty, C., Cunningham, C., Jang-Jaccard, J.
McIntosh, TR., Jang-Jaccard, J., & Watters, PA.Large scale behavioral analysis of ransomware attacks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). (pp. 217 - 229). 0302-9743.
[Conference]Authored by: Jang-Jaccard, J.
Alavizadeh, H., Hong, JB., Jang-Jaccard, J., & Kim, DS.Comprehensive security assessment of combined MTD techniques for the cloud. Proceedings of the ACM Conference on Computer and Communications Security. (pp. 11 - 20). 1543-7221.
[Conference]Authored by: Jang-Jaccard, J.
Alavizadeh, H., Jang-Jaccard, J., & Kim, DS.Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing. Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. (pp. 573 - 578).
[Conference]Authored by: Jang-Jaccard, J.
Wang, Y., Jang-Jaccard, J., Boulic, M., Phipps, R., Chitty, C., Weyers, R., . . . Cunningham, C.Deployment issues for integrated open-source-Based indoor air quality school Monitoring Box (SKOMOBO). 2018 IEEE Sensors Applications Symposium, SAS 2018 - Proceedings. (pp. 1 - 4).
[Conference]Authored by: Boulic, M., Chitty, C., Cunningham, C., Jang-Jaccard, J.
Bazai, SU., Jang-Jaccard, J., & Wang, R.Anonymizing k-NN classification on mapreduce. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST. (pp. 364 - 377). 1867-8211.
[Conference]Authored by: Jang-Jaccard, J., Wang, R.
Weyers, R., Jang-Jaccard, J., Moses, A., Wang, Y., Boulic, M., Chitty, C., . . . Cunningham, C. (2018). Low-cost Indoor Air Quality (IAQ) Platform for Healthier Classrooms in New Zealand: Engineering Issues. Proceedings - 2017 4th Asia-Pacific World Congress on Computer Science and Engineering, APWC on CSE 2017. (pp. 208 - 215).
[Conference Paper in Published Proceedings]Authored by: Boulic, M., Chitty, C., Cunningham, C., Jang-Jaccard, J.
Boulic, M., Wang, Y., Phipps, R., Chitty, C., Cunningham, C., Moses, A., . . . Healthy School Research Team, . (2018). A breath of fresh air: engaging school-aged students with air quality science in New Zealand schools.. , Indoor Air 2018
[Conference Abstract]Authored by: Boulic, M., Chitty, C., Cunningham, C., Jang-Jaccard, J.Contributed to by: Tookey, L.Edited by: Tookey, L.
Wang, Y., Boulic, M., Phipps, R., Chitty, C., Moses, A., Weyers, R., . . . Cunningham, C.(2018). Integrating Open-Source Technologies to Build a School Indoor Air Quality Monitoring Box (SKOMOBO). Paper presented at the meeting of Proceedings - 2017 4th Asia-Pacific World Congress on Computer Science and Engineering, APWC on CSE 2017
[Conference Paper]Authored by: Boulic, M., Cunningham, C., Jang-Jaccard, J.
Alavizadeh, H., Kim, DS., Hong, JB., & Jang-Jaccard, J.Effective security analysis for combinations of MTD techniques on cloud computing (short paper). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). (pp. 539 - 548). 0302-9743.
[Conference]Authored by: Jang-Jaccard, J.
Alavizadeh, H., Alavizadeh, H., Dube, K., Kim, DS., Jang-Jaccard, J., & Guesgen, HW. (2017). A secure server-based pseudorandom number generator protocol for mobile devices. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 10701 LNCS (pp. 860 - 876).
[Conference Paper in Published Proceedings]Authored by: Guesgen, H., Jang-Jaccard, J.
Bazai, SU., Jang-Jaccard, J., & Zhang, X.A privacy preserving platform for MapReduce. Communications in Computer and Information Science. (pp. 88 - 99). 1865-0929.
[Conference]Authored by: Jang-Jaccard, J.
Baryalai, M., Jang-Jaccard, J., & Liu, D.Towards privacy-preserving classification in neural networks. 2016 14th Annual Conference on Privacy, Security and Trust, PST 2016. (pp. 392 - 399).
[Conference]Authored by: Jang-Jaccard, J.
Nepal, S., Jang-Jaccard, J., Celler, B., Yan, B., & Alem, L.Data architecture for telehealth services research: A case study of home tele-monitoring. Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, COLLABORATECOM 2013. (pp. 458 - 467).
[Conference]Authored by: Jang-Jaccard, J.
Jang-Jaccard, J., Li, J., Nepal, S., & Alem, L.Security analysis of mobile applications: A case study of a collaboration tool in healthcare. Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, COLLABORATECOM 2013. (pp. 553 - 562).
[Conference]Authored by: Jang-Jaccard, J.
Jang-Jaccard, J., Manraj, A., & Nepal, S.Portable key management service for cloud storage. CollaborateCom 2012 - Proceedings of the 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing. (pp. 147 - 156).
[Conference]Authored by: Jang-Jaccard, J.
Jang, J., Hwang, H., & Nepal, S.Biometric enabled portable trusted computing platform. Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011. (pp. 436 - 442).
[Conference]Authored by: Jang-Jaccard, J.
Zic, J., Jang, J., Liu, D., Wang, C., & De Groot, M.Hardware security device facilitated trusted residential energy services. Proceedings of the 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2010.
[Conference]Authored by: Jang-Jaccard, J.
Liu, D., Lee, J., Jang, J., Nepal, S., & Zic, J.A cloud architecture of virtual trusted platform modules. Proceedings - IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2010. (pp. 804 - 811).
[Conference]Authored by: Jang-Jaccard, J.
Nepal, S., Zic, J., Liu, D., & Jang, J.Trusted computing platform in your pocket. Proceedings - IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2010. (pp. 812 - 817).
[Conference]Authored by: Jang-Jaccard, J.
Jang, J., Liu, D., Nepal, S., & Zic, J.User authentication for online applications using a USB-based trust device. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. (pp. 15 - 26). 1867-8211.
[Conference]Authored by: Jang-Jaccard, J.
Jang, J., Nepal, S., & Zic, J.A trust enhanced email application using Trusted Computing. UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences. (pp. 502 - 507).
[Conference]Authored by: Jang-Jaccard, J.
Chen, W., Fekete, A., Greenfield, P., & Jang, J.Implementing isolation for service-based applications. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5870 LNCS (PART 1)(pp. 365 - 372). 0302-9743.
[Conference]Authored by: Jang-Jaccard, J.
Jang, J., Nepal, S., & Zic, J.Trusted email protocol: Dealing with privacy concerns from malicious email intermediaries. Proceedings - 2008 IEEE 8th International Conference on Computer and Information Technology, CIT 2008. (pp. 402 - 407).
[Conference]Authored by: Jang-Jaccard, J.
Nepal, S., Julian, J., & John, Z.Anitya: An ephemeral data management service and secure data access protocols for dynamic collaborations. Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings. (pp. 219 - 226).
[Conference]Authored by: Jang-Jaccard, J.
Nepal, S., Zic, J., & Jang, J.A policy based approach to managing shared data in dynamic collaborations. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4804 LNCS (PART 2)(pp. 1296 - 1303). 0302-9743.
[Conference]Authored by: Jang-Jaccard, J.
Jang, J., Fekete, A., & Greenfield, P.Delivering promises for web services applications. Proceedings - 2007 IEEE International Conference on Web Services, ICWS 2007. (pp. 599 - 606).
[Conference]Authored by: Jang-Jaccard, J.
Greenfield, P., Fekete, A., Jang, J., Kuo, D., & Nepal, S.Isolation support for service-based applications a position paper. CIDR 2007 - 3rd Biennial Conference on Innovative Data Systems Research. (pp. 314 - 323).
[Conference]Authored by: Jang-Jaccard, J.
Nepal, S., Jang, J., & Zie, J.Anitya: An ephemeral data management service and secure data access protocols for dynamic collaborations. EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS. (pp. 219 - 226).
[Conference]Authored by: Jang-Jaccard, J.
Jang, J., Nepal, S., & Zic, J.Establishing a trust relationship in cooperative information systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). (pp. 426 - 443). 0302-9743.
[Conference]Authored by: Jang-Jaccard, J.
Jang, J., Fekete, A., Greenfield, P., & Nepal, S.An event-driven workflow engine for service-based business systems. Proceedings - IEEE International Enterprise Distributed Object Computing Workshop, EDOC. (pp. 233 - 242). 1541-7719.
[Conference]Authored by: Jang-Jaccard, J.
Nepal, S., Fekete, A., Greenfield, P., Jang, J., Kuo, D., & Shi, T.A service-oriented workflow language for robust interacting applications. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). (pp. 40 - 58). 0302-9743.
[Conference]Authored by: Jang-Jaccard, J.
Kuo, D., Fekete, A., Greenfield, P., & Jang, JL.Towards a transactional framework derived from real workflows. COOPERATIVE INTERNET COMPUTING. (pp. 201 - 220).
[Conference]Authored by: Jang-Jaccard, J.
Greenfield, P., Fekete, A., Jang, J., & Kuo, D.Compensation is not enough [fault-handling and compensation mechanism]. Proceedings - 7th IEEE International Enterprise Distributed Object Computing Conference. 2003-January (January)(pp. 232 - 239). 1541-7719.
[Conference]Authored by: Jang-Jaccard, J.
Jang, J., Fekete, A., Greenfield, P., & Kuo, D.Expressiveness of workflow description languages. Proceedings of the International Conference on Web Services. (pp. 104 - 110).
[Conference]Authored by: Jang-Jaccard, J.
Kuo, D., Fekete, A., Greenfield, P., Jang, J., & Palmer, D.Just What Could Possibly Go Wrong in B2B Integration?. Proceedings - IEEE Computer Society's International Computer Software and Applications Conference. (pp. 544 - 549). 0730-3157.
[Conference]Authored by: Jang-Jaccard, J.

Teaching and Supervision

Summary of Doctoral Supervision

Position Current Completed
Main Supervisor 2 2
Co-supervisor 1 1

Current Doctoral Supervision

Main Supervisor of:

  • Jinting Zhu - Doctor of Philosophy
    Few-shot Learning for Malware Detection
  • Tui Wei - Doctor of Philosophy
    Applying AI-based Techniques for DDoS Anomaly Detection and Classification Using Larger-scale Datasets

Co-supervisor of:

  • Maryam Tagharobi - Doctor of Philosophy
    Modelling capacity, capability, security and disruption in New Zealand construction industry

Completed Doctoral Supervision

Main Supervisor of:

  • 2020 - ~ Sibghat Ullah - Doctor of Philosophy
    Building Privacy-Preservation Models for Distributed Processing Platforms
  • 2019 - Hooman Alavizadeh - Doctor of Philosophy
    Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing

Co-supervisor of:

  • 2022 - Jiangzhang Gan - Doctor of Philosophy
    Representation Learning for the Graph Data