


Остановите войну!
for scientists:


default search action
Lei Pan 0002
Person information

- affiliation: Deakin University, School of IT, Faculty of Science and Technology, Melbourne, Australia
Other persons with the same name
- Lei Pan — disambiguation page
- Lei Pan 0001 — California Institute of Technology, Jet Propulsion Laboratory, Pasadena, CA, USA (and 1 more)
- Lei Pan 0003
— Southwest Jiaotong University, Sichuan Provincial Key Laboratory of Information Coding and Transmission, Chengdu, China
- Lei Pan 0004
— Southeast University, MOE Key Laboratory of Energy Thermal Conversion and Control, Nanjing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j53]Junyang Qiu
, Qing-Long Han
, Wei Luo
, Lei Pan
, Surya Nepal
, Jun Zhang
, Yang Xiang
:
Cyber Code Intelligence for Android Malware Detection. IEEE Trans. Cybern. 53(1): 617-627 (2023) - 2022
- [j52]Rory Coulter
, Jun Zhang, Lei Pan, Yang Xiang
:
Domain adaptation for Windows advanced persistent threat detection. Comput. Secur. 112: 102496 (2022) - [j51]Yonghang Tai, Yinjia Wang, Zhifeng Wang, Feiyan Li, Lei Wei
, Lei Pan
, Jun Zhang, Junsheng Shi:
Trustworthy blockchain-based medical Internet of thing for minimal invasive surgery training simulator. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j50]Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang
:
Machine Learning-based Cyber Attacks Targeting on Controlled Information: A Survey. ACM Comput. Surv. 54(7): 139:1-139:36 (2022) - [j49]Jun Zhang, Lei Pan, Qing-Long Han, Chao Chen, Sheng Wen, Yang Xiang
:
Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey. IEEE CAA J. Autom. Sinica 9(3): 377-391 (2022) - [j48]Yahui Han, Yonggang Huang, Lei Pan, Yunbo Zheng:
Learning multi-level and multi-scale deep representations for privacy image classification. Multim. Tools Appl. 81(2): 2259-2274 (2022) - [j47]Ahmed Falah
, Shiva Raj Pokhrel, Lei Pan, Anthony de Souza-Daw:
Towards enhanced PDF maldocs detection with feature engineering: design challenges. Multim. Tools Appl. 81(28): 41103-41130 (2022) - [j46]Hong Lai, Josef Pieprzyk
, Lei Pan:
Dynamic and compressed quantum many-body state secret sharing based on site-independent matrix product states. Quantum Inf. Process. 21(3): 83 (2022) - [j45]Qiang Zhang, Hong Lai, Josef Pieprzyk
, Lei Pan:
An improved quantum network communication model based on compressed tensor network states. Quantum Inf. Process. 21(7): 253 (2022) - [j44]Guangquan Xu
, Xiaofei Xie
, Shuhan Huang
, Jun Zhang
, Lei Pan
, Wei Lou
, Kaitai Liang
:
JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers. IEEE Trans. Dependable Secur. Comput. 19(2): 862-878 (2022) - [j43]Iynkaran Natgunanathan, Purathani Praitheeshan, Longxiang Gao, Yong Xiang, Lei Pan:
Blockchain-Based Audio Watermarking Technique for Multimedia Copyright Protection in Distribution Networks. ACM Trans. Multim. Comput. Commun. Appl. 18(3): 86:1-86:23 (2022) - [c46]Venkata Abhishek Kanthuru, Sutharshan Rajasegarar, Punit Rathore, Robin Ram Mohan Doss, Lei Pan, Biplob Ray, Morshed Chowdhury, Chandrasekaran Srimathi, M. A. Saleem Durai:
Cyber Attack Detection in IoT Networks with Small Samples: Implementation And Analysis. ADMA (1) 2022: 118-130 - [c45]Vatsal Patel, Sutharshan Rajasegarar
, Lei Pan
, Jiajun Liu, Liming Zhu
:
EvAnGCN: Evolving Graph Deep Neural Network Based Anomaly Detection in Blockchain. ADMA (1) 2022: 444-456 - [c44]Lin Li, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
Video is All You Need: Attacking PPG-based Biometric Authentication. AISec@CCS 2022: 57-66 - [c43]Yuantian Miao, Chao Chen, Lei Pan, Shigang Liu, Seyit Camtepe, Jun Zhang, Yang Xiang:
No-Label User-Level Membership Inference for ASR Model Auditing. ESORICS (2) 2022: 610-628 - [c42]Markian Jaworsky, Xiaohui Tao
, Jianming Yong, Lei Pan, Ji Zhang, Shiva Raj Pokhrel:
Automated Knowledge Graph Construction for Healthcare Domain. HIS 2022: 258-265 - [c41]Fuyi Wang, Leo Yu Zhang, Lei Pan, Shengshan Hu, Robin Doss:
Towards Privacy-Preserving Neural Architecture Search. ISCC 2022: 1-6 - [c40]Fokke Heikamp
, Lei Pan
, Rolando Trujillo-Rasua
, Sushmita Ruj
, Robin Doss
:
Forward Traceability for Product Authenticity Using Ethereum Smart Contracts. NSS 2022: 514-523 - [i12]Lin Li, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
SoK: An Overview of PPG's Application in Authentication. CoRR abs/2201.11291 (2022) - [i11]Yuantian Miao, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation. CoRR abs/2202.05416 (2022) - [i10]Lin Li, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
Video is All You Need: Attacking PPG-based Biometric Authentication. CoRR abs/2203.00928 (2022) - [i9]Fuyi Wang, Leo Yu Zhang, Lei Pan, Shengshan Hu, Robin Doss:
Towards Privacy-Preserving Neural Architecture Search. CoRR abs/2204.10958 (2022) - [i8]Mohammad Reza Nosouhi, Syed W. Shah, Lei Pan, Yevhen Zolotavkin, Ashish Nanda, Praveen Gauravaram, Robin Doss:
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism. CoRR abs/2204.13885 (2022) - [i7]Lin Li, Chao Chen, Lei Pan, Yonghang Tai, Jun Zhang, Yang Xiang:
Hiding Your Signals: A Security Analysis of PPG-based Biometric Authentication. CoRR abs/2207.04434 (2022) - 2021
- [j42]Rui Li, Xuejun Li, Jia Xu
, Frank Jiang
, Zhao-hong Jia, Di Shao, Lei Pan, Xiao Liu
:
Energy-aware decision-making for dynamic task migration in MEC-based unmanned aerial vehicle delivery system. Concurr. Comput. Pract. Exp. 33(22) (2021) - [j41]Ravneet Kaur, Ramkumar Ketti Ramachandran
, Robin Doss, Lei Pan:
The importance of selecting clustering parameters in VANETs: A survey. Comput. Sci. Rev. 40: 100392 (2021) - [j40]Junyang Qiu, Jun Zhang
, Wei Luo
, Lei Pan
, Surya Nepal
, Yang Xiang
:
A Survey of Android Malware Detection with Deep Neural Models. ACM Comput. Surv. 53(6): 126:1-126:36 (2021) - [j39]Ahmed Falah, Lei Pan, Md. Shamsul Huda, Shiva Raj Pokhrel
, Adnan Anwar
:
Improving malicious PDF classifier with feature engineering: A data-driven approach. Future Gener. Comput. Syst. 115: 314-326 (2021) - [j38]Shiva Raj Pokhrel
, Lei Pan
, Neeraj Kumar
, Robin Doss
, Hai Le Vu
:
Multipath TCP Meets Transfer Learning: A Novel Edge-Based Learning for Industrial IoT. IEEE Internet Things J. 8(13): 10299-10307 (2021) - [j37]Purathani Praitheeshan, Lei Pan, Xi Zheng
, Alireza Jolfaei
, Robin Doss:
SolGuard: Preventing external call issues in smart contract-based multi-agent robotic systems. Inf. Sci. 579: 150-166 (2021) - [j36]Guangjun Li, Preetpal Sharma, Lei Pan, Sutharshan Rajasegarar
, Chandan K. Karmakar
, Nicholas Charles Patterson
:
Deep learning algorithms for cyber security applications: A survey. J. Comput. Secur. 29(5): 447-471 (2021) - [j35]Yuantian Miao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Benjamin Zi Hao Zhao, Dali Kaafar, Yang Xiang:
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services. Proc. Priv. Enhancing Technol. 2021(1): 209-228 (2021) - [j34]Purathani Praitheeshan, Lei Pan
, Robin Doss
:
Private and Trustworthy Distributed Lending Model Using Hyperledger Besu. SN Comput. Sci. 2(2): 115 (2021) - [j33]Guanjun Lin
, Jun Zhang
, Wei Luo
, Lei Pan
, Olivier Y. de Vel
, Paul Montague, Yang Xiang
:
Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases. IEEE Trans. Dependable Secur. Comput. 18(5): 2469-2485 (2021) - [j32]Tarandeep Kaur Bhatia
, Ramkumar Ketti Ramachandran
, Robin Doss, Lei Pan:
Data congestion in VANETs: research directions and new trends through a bibliometric analysis. J. Supercomput. 77(7): 6586-6628 (2021) - [c39]Tarandeep Kaur Bhatia, Ramkumar Ketti Ramachandran
, Robin Doss, Lei Pan:
Detecting and Controlling the Occurrence of Data Congestion in a High-density VANETs Environment. FRUCT 2021: 42-48 - [c38]Khondker Fariha Hossain, Sharif Amit Kamran
, Alireza Tavakkoli, Lei Pan, Xingjun Ma, Sutharshan Rajasegarar, Chandan Karmaker:
ECG-Adv-GAN: Detecting ECG Adversarial Examples with Conditional Generative Adversarial Networks. ICMLA 2021: 50-56 - [c37]Zichan Ruan, Shuiqiao Yang, Lei Pan, Xingjun Ma, Wei Luo
, Marthie Grobler:
Microwave Link Failures Prediction via LSTM-based Feature Fusion Network. IJCNN 2021: 1-8 - [i6]Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang:
Machine Learning Based Cyber Attacks Targeting on Controlled Information: A Survey. CoRR abs/2102.07969 (2021) - [i5]Khondker Fariha Hossain, Sharif Amit Kamran, Alireza Tavakkoli, Lei Pan, Daniel Ma, Sutharshan Rajasegarar, Chandan Karmaker:
ECG-Adv-GAN: Detecting ECG Adversarial Examples with Conditional Generative Adversarial Networks. CoRR abs/2107.07677 (2021) - 2020
- [j31]Peng Zeng, Guanjun Lin
, Lei Pan
, Yonghang Tai
, Jun Zhang:
Software Vulnerability Analysis and Discovery Using Deep Learning Techniques: A Survey. IEEE Access 8: 197158-197172 (2020) - [j30]Chee Keong Ng
, Sutharshan Rajasegarar
, Lei Pan
, Frank Jiang
, Leo Yu Zhang
:
VoterChoice: A ransomware detection honeypot with multiple voting framework. Concurr. Comput. Pract. Exp. 32(14) (2020) - [j29]Miraj Asghar, Lei Pan, Robin Doss:
An efficient voting based decentralized revocation protocol for vehicular ad hoc networks. Digit. Commun. Networks 6(4): 422-432 (2020) - [j28]Rory Coulter, Qing-Long Han
, Lei Pan
, Jun Zhang, Yang Xiang
:
Code analysis for intelligent cyber systems: A data-driven approach. Inf. Sci. 524: 46-58 (2020) - [j27]Lei Pan, Nicholas Charles Patterson, Sophie McKenzie, Surtharshan Rajasegarar
, Guy Wood-Bradley, Justin T. Rough, Wei Luo
, Elicia Lanham, Jo Coldwell-Neilson:
Gathering Intelligence on Student Information Behavior Using Data Mining. Libr. Trends 68(4): 636-658 (2020) - [j26]Hong Lai, Josef Pieprzyk
, Mingxing Luo, Cheng Zhan, Lei Pan
, Mehmet A. Orgun
:
High-capacity (2, 3) threshold quantum secret sharing based on asymmetric quantum lossy channels. Quantum Inf. Process. 19(5): 157 (2020) - [j25]Hong Lai, Josef Pieprzyk
, Lei Pan:
Analysis of weighted quantum secret sharing based on matrix product states. Quantum Inf. Process. 19(12): 418 (2020) - [j24]Rory Coulter
, Qing-Long Han
, Lei Pan
, Jun Zhang
, Yang Xiang
:
Data-Driven Cyber Security in Perspective - Intelligent Traffic Analysis. IEEE Trans. Cybern. 50(7): 3081-3093 (2020) - [j23]Yonggang Huang
, Jun Zhang
, Lei Pan
, Yang Xiang
:
Privacy Protection in Interactive Content Based Image Retrieval. IEEE Trans. Dependable Secur. Comput. 17(3): 595-607 (2020) - [c36]Purathani Praitheeshan
, Lei Pan
, Robin Doss
:
Security Evaluation of Smart Contract-Based On-chain Ethereum Wallets. NSS 2020: 22-41 - [c35]Vatsal Patel
, Lei Pan
, Sutharshan Rajasegarar
:
Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network. NSS 2020: 132-148 - [c34]Rory Coulter, Jun Zhang, Lei Pan, Yang Xiang
:
Unmasking Windows Advanced Persistent Threat Execution. TrustCom 2020: 268-276 - [c33]Samaneh Rashidibajgan, Thomas Hupperich, Robin Doss
, Lei Pan:
Opportunistic Tracking in Cyber-Physical Systems. TrustCom 2020: 1672-1679
2010 – 2019
- 2019
- [j22]Junyang Qiu
, Wei Luo
, Lei Pan
, Yonghang Tai, Jun Zhang, Yang Xiang:
Predicting the Impact of Android Malicious Samples via Machine Learning. IEEE Access 7: 66304-66316 (2019) - [j21]Shiju Sathyadevan
, Krishnashree Achuthan, Robin Doss
, Lei Pan
:
Protean Authentication Scheme - A Time-Bound Dynamic KeyGen Authentication Technique for IoT Edge Nodes in Outdoor Deployments. IEEE Access 7: 92419-92435 (2019) - [j20]Junyang Qiu
, Jun Zhang, Wei Luo
, Lei Pan
, Surya Nepal
, Yu Wang
, Yang Xiang
:
A3CM: Automatic Capability Annotation for Android Malware. IEEE Access 7: 147156-147168 (2019) - [j19]Lei Pan
, Jun Zhang, Jonathan J. Oliver:
Editorial: Recent advances in machine learning for cybersecurity. Concurr. Comput. Pract. Exp. 31(19) (2019) - [j18]Md. Shamsul Huda, Jemal H. Abawajy, Baker Al-Rubaie, Lei Pan
, Mohammad Mehedi Hassan:
Automatic extraction and integration of behavioural indicators of malware for protection of cyber-physical networks. Future Gener. Comput. Syst. 101: 1247-1258 (2019) - [j17]Binfeng Wang, Jun Zhang, Zili Zhang
, Lei Pan
, Yang Xiang
, Dawen Xia:
Noise-Resistant Statistical Traffic Classification. IEEE Trans. Big Data 5(4): 454-466 (2019) - [c32]Cameron R. Schafer, Lei Pan
:
Password Strength Estimators Trained on the Leaked Password Lists. ATIS 2019: 219-231 - [c31]Purathani Praitheeshan, Yi Wei Xin, Lei Pan
, Robin Doss
:
Attainable Hacks on Keystore Files in Ethereum Wallets - A Systematic Analysis. FNSS 2019: 99-117 - [c30]Man Wu, Shirui Pan
, Xingquan Zhu
, Chuan Zhou, Lei Pan
:
Domain-Adversarial Graph Neural Networks for Text Classification. ICDM 2019: 648-657 - [c29]Wei Du, Qiwang Lei, Qiang He, Wei Liu, Feifei Chen, Lei Pan
, Tao Lei, Hailiang Zhao
:
Multiple Energy Harvesting Devices Enabled Joint Computation Offloading and Dynamic Resource Allocation for Mobile-Edge Computing Systems. ICWS 2019: 154-158 - [c28]Junyang Qiu, Surya Nepal, Wei Luo
, Lei Pan
, Yonghang Tai, Jun Zhang, Yang Xiang:
Data-Driven Android Malware Intelligence: A Survey. ML4CS 2019: 183-202 - [c27]Rory Coulter, Lei Pan
, Jun Zhang, Yang Xiang:
A Visualization-Based Analysis on Classifying Android Malware. ML4CS 2019: 304-319 - [i4]Yuantian Miao, Benjamin Zi Hao Zhao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Dali Kaafar, Yang Xiang:
The Audio Auditor: Participant-Level Membership Inference in Voice-Based IoT. CoRR abs/1905.07082 (2019) - [i3]Purathani Praitheeshan, Lei Pan, Jiangshan Yu, Joseph K. Liu, Robin Doss
:
Security Analysis Methods on Ethereum Smart Contract Vulnerabilities: A Survey. CoRR abs/1908.08605 (2019) - [i2]Nicholas Charles Patterson
, Michael Hobbs, Frank Jiang, Lei Pan:
Cyber security insights into self-proclaimed virtual world hackers. CoRR abs/1908.11010 (2019) - 2018
- [b1]Chee Keong Ng, Lei Pan, Yang Xiang:
Honeypot Frameworks and their Applications: A New Framework. SpringerBriefs on Cyber Security Systems and Networks, Springer 2018, ISBN 978-981-10-7738-8, pp. 1-81 - [j16]Hong Lai, Mingxing Luo, Josef Pieprzyk, Jun Zhang, Lei Pan
, Mehmet A. Orgun
:
High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space. Sci. China Inf. Sci. 61(6): 062501:1-062501:11 (2018) - [j15]Rory Coulter, Lei Pan
:
Intelligent agents defending for an IoT world: A review. Comput. Secur. 73: 439-458 (2018) - [j14]Yuantian Miao, Zichan Ruan
, Lei Pan
, Jun Zhang
, Yang Xiang:
Comprehensive analysis of network traffic data. Concurr. Comput. Pract. Exp. 30(5) (2018) - [j13]Lei Pan, Xi Zheng
, Philip Kolar, Shaun Bangay:
Object localisation through clustering unreliable ultrasonic range sensors. Int. J. Sens. Networks 27(4): 268-280 (2018) - [j12]Simon James
, Elicia Lanham, Vicky H. Mak-Hau
, Lei Pan
, Tim Wilkin, Guy Wood-Bradley:
Identifying items for moderation in a peer assessment framework. Knowl. Based Syst. 162: 211-219 (2018) - [j11]Zichan Ruan
, Yuantian Miao, Lei Pan
, Yang Xiang, Jun Zhang:
Big network traffic data visualization. Multim. Tools Appl. 77(9): 11459-11487 (2018) - [j10]Hong Lai, Mingxing Luo, Jun Zhang, Josef Pieprzyk, Lei Pan
, Mehmet A. Orgun
:
A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement. Quantum Inf. Process. 17(7): 162 (2018) - [j9]Yonggang Huang
, Longbing Cao
, Jun Zhang, Lei Pan
, Yuying Liu:
Exploring Feature Coupling and Model Coupling for Image Source Identification. IEEE Trans. Inf. Forensics Secur. 13(12): 3108-3121 (2018) - [j8]Guanjun Lin
, Jun Zhang
, Wei Luo
, Lei Pan
, Yang Xiang
, Olivier Y. de Vel, Paul Montague:
Cross-Project Transfer Representation Learning for Vulnerable Function Discovery. IEEE Trans. Ind. Informatics 14(7): 3289-3297 (2018) - [c26]Junyang Qiu, Wei Luo
, Surya Nepal
, Jun Zhang, Yang Xiang
, Lei Pan
:
Keep Calm and Know Where to Focus: Measuring and Predicting the Impact of Android Malware. ADMA 2018: 238-254 - [c25]Ahmed Falah
, Lei Pan
, Mohamed Abdelrazek
, Robin Doss
:
Identifying Drawbacks in Malicious PDF Detectors. FNSS 2018: 128-139 - [c24]Miraj Asghar, Robin Ram Mohan Doss
, Lei Pan
:
A Scalable and Efficient PKI Based Authentication Protocol for VANETs. ITNAC 2018: 1-3 - [c23]Ahmed Falah, Lei Pan
, Feifei Chen:
A Quantitative Approach to Design Special Purpose Systems to Measure Hacking Skills. TALE 2018: 54-61 - [i1]Yuantian Miao, Zichan Ruan, Lei Pan, Yu Wang, Jun Zhang, Yang Xiang:
Automated Big Traffic Analytics for Cyber Security. CoRR abs/1804.09023 (2018) - 2017
- [j7]Zichan Ruan, Yuantian Miao, Lei Pan
, Nicholas Charles Patterson
, Jun Zhang
:
Visualization of big data security: a case study on the KDD99 cup data set. Digit. Commun. Networks 3(4): 250-259 (2017) - [j6]Lei Pan
, Xi Zheng
, H. X. Chen, Tom H. Luan
, H. Bootwala, Lynn Margaret Batten:
Cyber security attacks to modern vehicular systems. J. Inf. Secur. Appl. 36: 90-100 (2017) - [c22]Xi Zheng
, Lei Pan
, Erdem Yilmaz:
Security analysis of modern mission critical android mobile applications. ACSW 2017: 2:1-2:9 - [c21]Ahmed Falah, Lei Pan
, Mohamed Abdelrazek:
Visual representation of penetration testing actions and skills in a technical tree model. ACSW 2017: 8:1-8:10 - [c20]Yuantian Miao, Lei Pan
, Sutharshan Rajasegarar
, Jun Zhang, Christopher Leckie
, Yang Xiang:
Distributed Detection of Zero-Day Network Traffic Flows. AusDM 2017: 173-191 - [c19]Guanjun Lin, Jun Zhang, Wei Luo
, Lei Pan
, Yang Xiang:
POSTER: Vulnerability Discovery with Function Representation Learning from Unlabeled Projects. CCS 2017: 2539-2541 - [c18]Simon James
, Lei Pan
, Tim Wilkin, Lilin Yin:
Online peer marking with aggregation functions. FUZZ-IEEE 2017: 1-6 - [c17]Shiju Sathyadevan, V. Vejesh, Robin Doss
, Lei Pan
:
Portguard - an authentication tool for securing ports in an IoT gateway. PerCom Workshops 2017: 624-629 - [c16]Xi Zheng
, Lei Pan
, Hongxu Chen, Rick Di Pietro, Lynn Batten:
A Testbed for Security Analysis of Modern Vehicle Systems. TrustCom/BigDataSE/ICESS 2017: 1090-1095 - 2016
- [c15]Yuantian Miao, Zichan Ruan, Lei Pan
, Jun Zhang
, Yang Xiang, Yu Wang
:
Comprehensive Analysis of Network Traffic Data. CIT 2016: 423-430 - [c14]Xi Zheng
, Lei Pan
, Hongxu Chen, Peiyin Wang:
Investigating Security Vulnerabilities in Modern Vehicle Systems. ATIS 2016: 29-40 - 2015
- [c13]Ang Yang, Jun Zhang
, Lei Pan
, Yang Xiang:
Enhanced Twitter Sentiment Analysis by Using Feature Selection and Combination. SocialSec 2015: 52-57 - 2014
- [j5]Tianqing Zhu, Gang Li
, Lei Pan
, Yongli Ren
, Wanlei Zhou
:
Privacy preserving collaborative filtering for KNN attack resisting. Soc. Netw. Anal. Min. 4(1): 196 (2014) - [c12]Lei Pan
, Shaun Bangay:
Generating Repudiable, Memorizable, and Privacy Preserving Security Questions Using the Propp Theory of Narrative. CyberC 2014: 66-72 - [c11]Ping Xiong, Tianqing Zhu, Lei Pan, Wenjia Niu, Gang Li:
Privacy Preserving in Location Data Release: A Differential Privacy Approach. PRICAI 2014: 183-195 - 2013
- [c10]Matthias Trojahn, Lei Pan
, Fabian Schmidt:
Developing a Cloud Computing Based Approach for Forensic Analysis Using OCR. IMF 2013: 59-68 - [c9]Lei Pan
, Yan Zhou:
Developing an Empirical Algorithm for Protecting Text-Based CAPTCHAs against Segmentation Attacks. TrustCom/ISPA/IUCC 2013: 636-643 - 2012
- [j4]Lynn Margaret Batten, Lei Pan
, Nisar Khan:
Hypothesis Generation and Testing in Event Profiling for Digital Forensic Investigations. Int. J. Digit. Crime Forensics 4(4): 1-14 (2012) - [c8]Lei Pan, Nisar Khan, Lynn Margaret Batten:
Using Hypothesis Generation in Event Profiling for Digital Forensic Investigations. WDFIA 2012: 76-86 - 2010
- [j3]Robin Chellappa Doss, Deddy Chandra, Lei Pan, Wanlei Zhou, Morshed U. Chowdhury:
Dynamic Addressing in Wireless Sensor Networks without Location Awareness. J. Inf. Sci. Eng. 26(2): 443-460 (2010) - [c7]Lynn Margaret Batten, Lei Pan
:
Using Relationship-Building in Event Profiling for Digital Forensic Investigations. e-Forensics 2010: 40-52 - [p1]Lynn Margaret Batten, Lei Pan:
Testing Digital Forensic Software Tools Used in Expert Testimony. Handbook of Research on Computational Forensics, Digital Crime, and Investigation 2010: 257-278
2000 – 2009
- 2009
- [j2]Lei Pan
, Lynn Margaret Batten:
Robust performance testing for digital forensic tools. Digit. Investig. 6(1-2): 71-81 (2009) - [c6]Lei Pan
, Lynn Margaret Batten:
Robust Correctness Testing for Digital Forensic Tools. e-Forensics 2009: 54-64 - 2008
- [j1]Lynn Margaret Batten, Lei Pan
:
Teaching Digital Forensics to Undergraduate Students. IEEE Secur. Priv. 6(3): 54-56 (2008) - [c5]Lei Pan
, Antonio Savoldi, Paolo Gubian, Lynn Margaret Batten:
Measure of Integrity Leakage in Live Forensic Context. IIH-MSP 2008: 534-537 - 2007
- [c4]Lei Pan
, Lynn Margaret Batten:
An Effective and Efficient Testing Methodology for Correctness Testing for File Recovery Tools. IIH-MSP 2007: 103-107 - [c3]