Follow
Frank Jiang
Frank Jiang
Deakin University
Verified email at adfa.edu.au - Homepage
Title
Cited by
Cited by
Year
Applications of distributed ledger technologies to the internet of things: A survey
Q Zhu, SW Loke, R Trujillo-Rasua, F Jiang, Y Xiang
ACM computing surveys (CSUR) 52 (6), 1-34, 2019
1662019
An improved authentication scheme for internet of vehicles based on blockchain technology
X Wang, P Zeng, N Patterson, F Jiang, R Doss
IEEE access 7, 45061-45072, 2019
1262019
Robust stabilization of linear uncertain discrete-time systems via a limited capacity communication channel
VN Phat, F Jiang, AV Savkin, IR Petersen
Systems & control letters 53 (5), 347-360, 2004
822004
Constrained NMF-based semi-supervised learning for social media spammer detection
D Yu, N Chen, F Jiang, B Fu, A Qin
Knowledge-Based Systems 125, 64-73, 2017
742017
A new binary hybrid particle swarm optimization with wavelet mutation
F Jiang, H Xia, QA Tran, QM Ha, NQ Tran, J Hu
Knowledge-Based Systems 130, 90-101, 2017
672017
A real-time netflow-based intrusion detection system with improved BBNN and high-frequency field programmable gate arrays
JH Quang Anh Tran, Frank Jiang
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
632012
UAV swarm mission planning in dynamic environment using consensus-based bundle algorithm
Y Zhang, W Feng, G Shi, F Jiang, M Chowdhury, SH Ling
Sensors 20 (8), 2307, 2020
452020
Using neural networks to compute approximate and guaranteed feasible Hamilton-Jacobi-Bellman PDE solutions
F Jiang, G Chou, M Chen, CJ Tomlin
arXiv preprint arXiv:1611.03158, 2016
372016
Quality and robustness improvement for real world industrial systems using a fuzzy particle swarm optimization
SH Ling, KY Chan, FHF Leung, F Jiang, H Nguyen
Engineering Applications of Artificial Intelligence 47, 68-80, 2016
362016
Intrusion detection scheme with dimensionality reduction in next generation networks
K Sood, MR Nosouhi, DDN Nguyen, F Jiang, M Chowdhury, R Doss
IEEE Transactions on Information Forensics and Security 18, 965-979, 2023
352023
Solving the last mile problem in logistics: A mobile edge computing and blockchain‐based unmanned aerial vehicle delivery system
X Li, L Gong, X Liu, F Jiang, W Shi, L Fan, H Gao, R Li, J Xu
Concurrency and Computation: Practice and Experience 34 (7), e6068, 2022
352022
Image super-resolution based on generative adversarial networks: A brief review
K Fu, J Peng, H Zhang, X Wang, F Jiang
Deakin University, 2020
352020
Responsible use of technology to combat cyberbullying among young people
C Kaluarachchi, M Warren, F Jiang
Deakin University, 2020
332020
Effectively predicting whether and when a topic will become prevalent in a social network
W Liu, ZH Deng, X Gong, F Jiang, I Tsang
Proceedings of the AAAI conference on artificial intelligence 29 (1), 2015
332015
Threshold-based image segmentation through an improved particle swarm optimisation
F Jiang, MR Frater, M Pickering
2012 International Conference on Digital Image Computing Techniques and …, 2012
332012
Effective quarantine and recovery scheme against advanced persistent threat
LX Yang, P Li, X Yang, Y Xiang, F Jiang, W Zhou
IEEE Transactions on Systems, Man, and Cybernetics: Systems 51 (10), 5977-5991, 2019
322019
A dual privacy-preservation scheme for cloud-based eHealth systems
X Wang, L Bai, Q Yang, L Wang, F Jiang
Journal of Information Security and Applications 47, 132-138, 2019
322019
A review of aggregation algorithms for the internet of things
F Al-Doghman, Z Chaczko, J Jiang
2017 25th International Conference on Systems Engineering (ICSEng), 480-487, 2017
322017
Deterministic joint remote preparation of arbitrary multi-qudit states
M Jiang, F Jiang
Physics Letters A 377 (38), 2524-2530, 2013
312013
Rolling surface defect inspection for drum-shaped rollers based on deep learning
J Tao, Y Zhu, F Jiang, H Liu, H Liu
IEEE Sensors Journal 22 (9), 8693-8700, 2022
282022
The system can't perform the operation now. Try again later.
Articles 1–20