Lei Pan
Lei Pan
Senior Lecturer in Cyber Security, School of Information Technology, Deakin University
Verified email at deakin.edu.au - Homepage
Cited by
Cited by
Cross-project transfer representation learning for vulnerable function discovery
G Lin, J Zhang, W Luo, L Pan, Y Xiang, O De Vel, P Montague
IEEE Transactions on Industrial Informatics 14 (7), 3289-3297, 2018
Cyber security attacks to modern vehicular systems
L Pan, X Zheng, HX Chen, T Luan, H Bootwala, L Batten
Journal of Information Security and Applications 36, 90-100, 2017
Practical overview of security issues in wireless sensor network applications
H Radhappa, L Pan, J Xi Zheng, S Wen
International Journal of Computers and Applications 40 (4), 202-213, 2018
Intelligent agents defending for an IoT world: A review
R Coulter, L Pan
Computers & Security 73, 439-458, 2018
POSTER: Vulnerability discovery with function representation learning from unlabeled projects
G Lin, J Zhang, W Luo, L Pan, Y Xiang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Enhanced Twitter sentiment analysis by using feature selection and combination
A Yang, J Zhang, L Pan, Y Xiang
Proceedings of the International Symposium on Security and Privacy in Social …, 2015
Data-driven cyber security in perspective--intelligent traffic analysis
R Coulter, QL Han, L Pan, J Zhang, Y Xiang
IEEE Transactions on Cybernetics 50 (7), 3081--3093, 2020
Reproducibility of digital evidence in forensic investigations
L Pan, L Batten
Proceedings of the 5th Annual Digital Forensic Research Workshop (DFRWS 2005 …, 2005
Security analysis methods on Ethereum smart contract vulnerabilities: A survey
P Praitheeshan, L Pan, J Yu, J Liu, R Doss
arXiv:1908.08605, 2019
Comprehensive analysis of network traffic data
Y Miao, Z Ruan, L Pan, J Zhang, Y Xiang
Concurrency and Computation: Practice and Experience 30 (5), e4181, 2018
Robust performance testing for digital forensic tools
L Pan, LM Batten
Digital Investigation 6 (1-2), 71-81, 2009
Visualization of big data security: a case study on the KDD99 cup data set
Z Ruan, Y Miao, L Pan, N Patterson, J Zhang
Digital Communications and Networks 3 (4), 250-259, 2017
Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding
H Lai, J Zhang, MX Luo, L Pan, J Pieprzyk, F Xiao, MA Orgun
Scientific Reports 6, 2016
Teaching digital forensics to undergraduate students
L Batten, L Pan
IEEE Security & Privacy 6 (3), 54-56, 2008
Security analysis of modern mission critical android mobile applications
X Zheng, L Pan, E Yilmaz
Proceedings of the Australasian Computer Science Week Multiconference, 1-9, 2017
Lease based addressing for event-driven wireless sensor networks
RC Doss, D Chandra, L Pan, W Zhou, M Chowdhury
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC …, 2006
Protean authentication scheme--a time-bound dynamic keygen authentication technique for IoT edge nodes in outdoor deployments
S Sathyadevan, K Achuthan, R Doss, L Pan
IEEE Access 7, 92419-92435, 2019
A testbed for security analysis of modern vehicle systems
X Zheng, L Pan, H Chen, R Di Pietro, L Batten
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, 1090-1095, 2017
Investigating security vulnerabilities in modern vehicle systems
X Zheng, L Pan, H Chen, P Wang
Proceedings of the International Conference on Applications and Techniques …, 2016
Internet security applications of the Munn rings
AV Kelarev, JL Yearwood, P Watters, X Wu, JH Abawajy, L Pan
Semigroup Forum 81 (1), 162-171, 2010
The system can't perform the operation now. Try again later.
Articles 1–20