Big data for cybersecurity: Vulnerability disclosure trends and dependencies MJ Tang, M Alazab, Y Luo IEEE Transactions on Big Data 5 (3), 317-329, 2019 | 179 | 2019 |
Deep Learning Applications for Cyber Security M Alazab, MJ Tang | 120 | 2019 |
Apply transfer learning to cybersecurity: Predicting exploitability of vulnerabilities by description J Yin, MJ Tang, J Cao, H Wang Knowledge-Based Systems, 2020 | 94 | 2020 |
Vulnerability Exploitation Time Prediction: an Integrated Framework for Dynamic Imbalanced Learning J Yin, MJ Tang, J Cao, H Wang, M You, Y Lin World Wide Web Journal, 2021 | 81 | 2021 |
Knowledge-Driven Cybersecurity intelligence: Software Vulnerability Co-exploitation Behaviour Discovery J Yin, MJ Tang, J Cao, M You, H Wang, M Alazab IEEE Transactions on Industrial Informatics, 2022 | 75 | 2022 |
Privacy-preserving Bilateral Fine-grained Access Control for Cloud-enabled Industrial IoT Healthcare J Sun, Y Yuan, MJ Tang, X Cheng, X Nie, UA Muhammad IEEE Transactions on Industrial Informatics, 2021 | 66 | 2021 |
Robust Information Bottleneck for Task-Oriented Communication with Digital Modulation S Xie, Y Wu, S Ma, M Ding, Y Shi, MJ Tang IEEE Journal on Selected Areas in Communications, 2023 | 64 | 2023 |
Secure Data Sharing With Flexible Cross-Domain Authorization in Autonomous Vehicle Systems J Sun, G Xu, T Zhang, X Cheng, X Han, MJ Tang IEEE Transactions on Intelligent Transportation Systems, 2022 | 43 | 2022 |
Unsupervised fraud detection in Medicare Australia MJ Tang, BSU Mendis, DW Murray, Y Hu, A Sutinen Proceedings of the Ninth Australasian Data Mining Conference-Volume 121, 103-110, 2011 | 38 | 2011 |
DATSING: Data Augmented Time Series Forecasting with Adversarial Domain Adaptation H Hu, MJ Tang, C Bai 29th ACM International Conference on Information and Knowledge Management …, 2020 | 34 | 2020 |
Disclosure of Cyber Security Vulnerabilities: Time Series Modelling M Tang, M Alazab, Y Luo, M Donlon International Journal of Electronic Security and Digital Forensics, 2017 | 30 | 2017 |
A Real-time Dynamic Concept Adaptive Learning Algorithm for Exploitability Prediction J Yin, MJ Tang, J Cao, H Wang, M You Neurocomputing 472, 252-265, 2022 | 22 | 2022 |
A Privacy-aware and Traceable Fine-grained Data Delivery System in Cloud-assisted Healthcare IIoT J Sun, D Chen, N Zhang, G Xu, MJ Tang, X Nie, M Cao IEEE Internet of Things Journal, 2021 | 20 | 2021 |
Adaptive Online Learning for Vulnerability Exploitation Time Prediction J Yin, MJ Tang, J Cao, H Wang, M You, Y Lin 21st International Conference on Web Information Systems Engineering (WISE 2020), 2020 | 20 | 2020 |
Data-driven hierarchical neural network modeling for high-pressure feedwater heater group J Yin, M You, J Cao, H Wang, MJ Tang, YF Ge Databases Theory and Applications: 31st Australasian Database Conference …, 2020 | 19 | 2020 |
Modelling of Extreme Vulnerability Disclosure in Smart City Industrial Environments MJ Tang, Y Jiao, M Alazab, J Cao, Y Luo IEEE Transactions on Industrial Informatics 17 (6), 4150-4158, 2021 | 18 | 2021 |
A dynamic mechanism for handling mobile computing environmental changes MJ Tang, J Cao Proceedings of the 1st international conference on Scalable information …, 2006 | 18 | 2006 |
Do Simpler Statistical Methods Perform Better in Multivariate Long Sequence Time-Series Forecasting? H Li, J Shao, K Liao, MJ Tang CIKM '22: Proceedings of the 31st ACM International Conference on …, 2022 | 17 | 2022 |
Exploiting vulnerability disclosures: statistical framework and case study MJ Tang, M Alazab, Y Luo 2016 Cybersecurity and Cyberforensics Conference (CCC), 117-122, 2016 | 15 | 2016 |
Developing Responsible Chatbots for Financial Services: A Pattern-Oriented Responsible AI Engineering Approach Q Lu, Y Luo, L Zhu, MJ Tang, X Xu, J Whittle IEEE Intelligent Systems, 2023 | 14* | 2023 |