Xu Wang

Xu Wang
  • PhD
  • Senior Lecturer at University of Technology Sydney

About

77
Publications
40,033
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,488
Citations
Current institution
University of Technology Sydney
Current position
  • Senior Lecturer
Additional affiliations
February 2020 - present
University of Technology Sydney
Position
  • Lecturer
Description
  • Cyber security
Education
August 2016 - May 2020
University of Technology Sydney
Field of study
  • Information Security; Blockchain
September 2012 - June 2019
Beijing University of Posts and Telecommunications
Field of study
  • Information Security; Intrusion Detection

Publications

Publications (77)
Article
Driving trajectory data remains vulnerable to privacy breaches despite existing mitigation measures. Traditional methods for detecting driving trajectories typically rely on map-matching the path using Global Positioning System (GPS) data, which is susceptible to GPS data outage. This paper introduces CAN-Trace, a novel privacy attack mechanism tha...
Article
As the primary standard protocol for modern cars, the Controller Area Network (CAN) is a critical research target for automotive cybersecurity threats and autonomous applications. As the decoding specification of CAN is a proprietary black-box maintained by Original Equipment Manufacturers (OEMs), conducting related research and industry developmen...
Article
Web3 is leading a wave of the next generation of web services that even many Web2 applications are keen to ride. However, the lack of Web3 background for Web2 developers hinders easy and effective access and transition. On the other hand, Web3 applications desire encouragement and advertisement from conventional Web2 companies and projects due to t...
Preprint
Full-text available
As the primary standard protocol for modern cars, the Controller Area Network (CAN) is a critical research target for automotive cybersecurity threats and autonomous applications. As the decoding specification of CAN is a proprietary black-box maintained by Original Equipment Manufacturers (OEMs), conducting related research and industry developmen...
Preprint
Unlearning in various learning frameworks remains challenging, with the continuous growth and updates of models exhibiting complex inheritance relationships. This paper presents a novel unlearning framework, which enables fully parallel unlearning among models exhibiting inheritance. A key enabler is the new Unified Model Inheritance Graph (UMIG),...
Article
Full-text available
This research introduces a novel framework utilizing a sequential gated graph convolutional neural network (GGCN) designed specifically for botnet detection within Internet of Things (IoT) network environments. By capitalizing on the strengths of graph neural networks (GNNs) to represent network traffic as complex graph structures, our approach ade...
Article
The demand for intelligent industries and smart services based on big data is rising rapidly with the increasing digitization and intelligence of the modern world. This survey comprehensively reviews Blockchained Federated Learning (BlockFL) that joins the benefits of both Blockchain and Federated Learning to provide a secure and efficient solution...
Article
Full-text available
Federated learning (FL) offers an effective learning architecture to protect data privacy in a distributed manner. However, the inevitable network asynchrony, overdependence on a central coordinator, and lack of an open and fair incentive mechanism collectively hinder FL’s further development. We propose IronForge, a new generation of FL framework,...
Article
Full-text available
Existing permissionless sharded-Blockchains come on the scene. However, there is a lack of systematic formulations and experiments regarding the behaviors of individual miners. In this article, we interpret block mining in a permissionless sharded-Blockchain as a repeated $M$ -player noncooperative game with finite actions, and propose a new mult...
Article
Full-text available
Network robustness is one of the core contents of complex network security research. This paper focuses on the robustness of community networks with respect to cascading failures, considering the nodes influence and community heterogeneity. A novel node influence ranking method, community-based Clustering-LeaderRank ( CCL ) algorithm, is first prop...
Preprint
Full-text available
Split learning is emerging as a powerful approach to decentralized machine learning, but the urgent task of unlearning to address privacy issues presents significant challenges. Conventional methods of retraining from scratch or gradient ascending require all clients' involvement, incurring high computational and communication overhead, particularl...
Preprint
Full-text available
As a distributed learning, Federated Learning (FL) faces two challenges: the unbalanced distribution of training data among participants, and the model attack by Byzantine nodes. In this paper, we consider the long-tailed distribution with the presence of Byzantine nodes in the FL scenario. A novel two-layer aggregation method is proposed for the r...
Article
Full-text available
The individual behaviors driven by information diffusion show an undeniable impact on the process of epidemic spreading and have been continuously evolving with the dynamic processes. In this paper, a novel weighted co-evolving multiplex network model is proposed to describe the interaction between information diffusion in online social networks an...
Article
Full-text available
Obfuscating a dataset by adding random noises to protect the privacy of sensitive samples in the training dataset is crucial to prevent data leakage to untrusted parties when dataset sharing is essential. We conduct comprehensive experiments to investigate how the dataset obfuscation can affect the resultant model weights - in terms of the model ac...
Preprint
Full-text available
The demand for intelligent industries and smart services based on big data is rising rapidly with the increasing digitization and intelligence of the modern world. This survey comprehensively reviews Blockchained Federated Learning (BlockFL) that joins the benefits of both Blockchain and Federated Learning to provide a secure and efficient solution...
Preprint
Full-text available
Location privacy is critical in vehicular networks, where drivers' trajectories and personal information can be exposed, allowing adversaries to launch data and physical attacks that threaten drivers' safety and personal security. This survey reviews comprehensively different localization techniques, including widely used ones like sensing infrastr...
Preprint
Full-text available
Federated learning (FL) provides an effective machine learning (ML) architecture to protect data privacy in a distributed manner. However, the inevitable network asynchrony, the over-dependence on a central coordinator, and the lack of an open and fair incentive mechanism collectively hinder its further development. We propose \textsc{IronForge}, a...
Chapter
Full-text available
Sharding has been considered a promising approach to improving blockchain scalability. However, multiple shards result in a large number of cross-shard transactions, which require a long confirmation time across shards and thus restrain the scalability of sharded blockchains. In this paper, we convert the blockchain sharding challenge into a graph...
Preprint
Full-text available
Web3 is leading a wave of the next generation of web services that even many Web2 applications are keen to ride. However, the lack of Web3 background for Web2 developers hinders easy and effective access and transition. On the other hand, Web3 applications desire for encouragement and advertisement from conventional Web2 companies and projects due...
Preprint
Full-text available
In certain Blockchain systems, multiple Blockchains are required to operate cooperatively for security, performance, and capacity considerations. This invention defines a cross-chain mechanism where a main Blockchain issues the tokens, which can then be transferred and used in multiple side Blockchains to drive their operations. A set of witnesses...
Preprint
Full-text available
Obfuscating a dataset by adding random noises to protect the privacy of sensitive samples in the training dataset is crucial to prevent data leakage to untrusted parties for edge applications. We conduct comprehensive experiments to investigate how the dataset obfuscation can affect the resultant model weights - in terms of the model accuracy, Frob...
Article
Full-text available
The proliferation of location-based services (LBS) leads to increasing concern about location privacy. Location obfuscation is a promising privacy-preserving technique but yet to be adequately tailored for vehicles in road networks. Existing obfuscation schemes are based primarily on the Euclidean distances and can lead to infeasible results, e.g.,...
Article
Full-text available
Spread velocity, epidemic threshold, and infection density at steady state are three non-negligible features describing the spread of epidemics. Combining these three features together, a new network robustness metric with respect to epidemics was proposed in this paper. The real-time robustness of the network was defined and analyzed. By using the...
Article
Full-text available
The Internet of Drones (IoD) has attracted increasing attention in recent years because of its portability and automation, and is being deployed in a wide range of fields (e.g., military, rescue and entertainment). Nevertheless, as a result of the inherently open nature of radio transmission paths in the IoD, data collected, generated or handled by...
Article
Full-text available
Accurate assessment of fish quality is difficult in practice due to the lack of trusted fish provenance and quality tracking information. Working with Sydney Fish Market (SFM), we develop a Blockchain-enabled Fish provenance And Quality Tracking (BeFAQT) system. A multi-layer Blockchain architecture based on Attribute-Based Encryption (ABE) is prop...
Preprint
Full-text available
As distributed ledgers, blockchains run consensus protocols which trade capacity for consistency, especially in non-ideal networks with incomplete connectivity and erroneous links. Existing studies on the tradeoff between capacity and consistency are only qualitative or rely on specific assumptions. This paper presents discrete-time Markov chain mo...
Article
Full-text available
As distributed ledgers, blockchains run consensus protocols which trade capacity for consistency, especially in non-ideal networks with incomplete connectivity and erroneous links. Existing studies on the tradeoff between capacity and consistency are only qualitative or rely on specific assumptions. This paper presents discrete-time Markov chain mo...
Article
Full-text available
LoRa serves as one of the most deployed technologies in Internet-of-Things-based information systems (IoT-IS), and self-motivated deployment is the key to the rollout of LoRa. Proper incentive can play an important role in encouraging the private deployment of LoRa, increasing coverage and promoting effective management of IoT-IS. However, existing...
Article
Full-text available
Nakamoto protocol, practically solving the Byzantine Generals Problem, can support a variety of proof-based consensus engines, referred to as Proof-of-X (PoX) in permissionless Blockchains. However, there has been to date in lack of a general approach for each miner to evaluate its steady-state profit against the competitors. This paper presents a...
Article
Full-text available
The Blockchain technology, featured with its decentralized tamper-resistance based on a Peer-to-Peer network, has been widely applied in financial applications, and even further been extended to industrial applications. However, the weak scalability of traditional Blockchain technology severely affects the wide adoption due to the well-known trille...
Chapter
Full-text available
Blockchain, as an immutable distributed ledger, can be the key to realize secure and trustworthy IoT applications. However, existing blockchains can hardly achieve high-performance and high-security for large-scale IoT applications simultaneously. In this paper, we propose a hyper blockchain architecture combining the security of public blockchains...
Article
Full-text available
An integration of Internet-of-Things (IoT) and blockchain becomes increasingly important to secure IoT data in an anti-tampering manner. Challenges arise from the immense scale of IoT and the resultant impact of network partitioning on blockchain. We design a new testbed to evaluate the impact, where resource-limited IoT devices, acting as light no...
Article
Full-text available
Disconnecting impaired or suspicious nodes and rewiring to those reliable, adaptive networks have the potential to inhibit cascading failures, such as DDoS attack and computer virus. The weights of disconnected links, indicating the workload of the links, can be transferred or redistributed to newly connected links to maintain network operations. D...
Article
Full-text available
Online social networks (OSNs) suffer from forged messages. Current studies have typically been focused on the detection of forged messages and do not provide the analysis of the behaviors of message publishers and network strategies to suppress forged messages. This paper carries out the analysis by taking a game theoretic approach, where infinitel...
Article
Full-text available
Epidemic models trade the modeling accuracy for complexity reduction. This paper proposes to group vertices in directed graphs based on connectivity and carries out epidemic spread analysis on the group basis, thereby substantially reducing the modeling complexity while preserving the modeling accuracy. A group-based continuous-time Markov SIS mode...
Article
Full-text available
The Internet of Things (IoT) is poised to transform human life and unleash enormous economic benefit. However, inadequate data security and trust of current IoT are seriously limiting its adoption. Blockchain, a distributed and tamper-resistant ledger, maintains consistent records of data at different locations, and has the potential to address the...
Preprint
Full-text available
Ethereum, as the first Turing-complete blockchain platform, provides various application program interfaces for developers. Although blockchain has highly improved security, faulty configuration and usage can result in serious vulnerabilities. In this paper, we focus on the security vulnerabilities of the official Go-version Ethereum client (geth)....
Conference Paper
Full-text available
Blockchain technology has been showing its strong performance on decentralized security when integrating with Internet of Things network. However, the trilemma of scalability-security-decentralization exists in Blockchain-based IoT. Therein the typical round-robin scheduling implemented in the Byzantine Faulty Tolerance (BFT) proposed by Neo's Bloc...
Conference Paper
Full-text available
Ethereum, as the first Turing-complete blockchain platform, provides various application program interfaces for developers. Although blockchain has highly improved security, faulty configuration and usage can result in serious vulnerabilities. In this paper, we focus on the security vulnerabilities of the official Go-version Ethereum client (geth)....
Article
Full-text available
A major challenge in distributed mobile networks is network integrity, resulting from short link duration and severe transmission collisions. This paper analyzes the impact of link duration and transmission collisions on a range of on-the-fly authentication protocols, which operate based on predistributed keys and can instantly verify and forward m...
Article
Full-text available
Android malware detection is a complex and crucial issue. In this paper, we propose a malware detection model using a support vector machine (SVM) method based on feature weights that are computed by information gain (IG) and particle swarm optimization (PSO) algorithms. The IG weights are evaluated based on the relevance between features and class...
Article
Full-text available
Network security is rapidly developing, but so are attack methods. Network worms are one of the most widely used attack methods and have are able to propagate quickly. As an active defense approach to network worms, the honeynet technique has long been limited by the closed architecture of traditional network devices. In this paper, we propose a cl...
Article
Full-text available
Biological epidemic models, widely used to model computer virus propagations, suffer from either limited scalability to large networks, or accuracy loss resulting from simplifying approximations. In this paper, a discrete-time absorbing Markov process is constructed to precisely characterize virus propagations. Conducting eigenvalue analysis and Jo...

Network

Cited By