Vicky Liu
YOU?
Author Swipe
View article: Optimising Wi-Fi HaLow Connectivity: A Framework for Variable Environmental and Application Demands
Optimising Wi-Fi HaLow Connectivity: A Framework for Variable Environmental and Application Demands Open
As the number of IoT (Internet of Things) devices continues to grow at an exceptional rate, so does the variety of use cases and operating environments. IoT now plays a crucial role in areas including smart cities, medicine and smart agric…
View article: Detection of TCP and MQTT-Based DoS/DDoS Attacks on MUD IoT Networks
Detection of TCP and MQTT-Based DoS/DDoS Attacks on MUD IoT Networks Open
Mitigating cyberattacks on IoT networks is critical and remains a significant challenge, as such attacks can cause severe damage to the network systems and services. Moreover, the large volume of devices in IoT networks presents another ch…
View article: Energy Consumption Modeling for Wi-Fi HaLow Networks
Energy Consumption Modeling for Wi-Fi HaLow Networks Open
Wi-Fi HaLow (IEEE 802.11ah) has emerged as a promising solution which can support Internet of Things (IoT) applications where energy efficiency and extended coverage are important. A key feature of Wi-Fi HaLow is the Target Wake Time (TWT)…
View article: Robustness and Security Enhancement of Radio Frequency Fingerprint Identification in Time-Varying Channels
Robustness and Security Enhancement of Radio Frequency Fingerprint Identification in Time-Varying Channels Open
Radio frequency fingerprint identification (RFFI) is becoming increasingly popular, especially in applications with constrained power, such as the Internet of Things (IoT). Due to subtle manufacturing variations, wireless devices have uniq…
View article: An Architecture of Enhanced Profiling Assurance for IoT Networks
An Architecture of Enhanced Profiling Assurance for IoT Networks Open
Attacks launched from IoT networks can cause significant damage to critical network systems and services. IoT networks may contain a large volume of devices. Protecting these devices from being abused to launch traffic amplification attack…
View article: Multi-aspect attentive text representations for simple question answering over knowledge base
Multi-aspect attentive text representations for simple question answering over knowledge base Open
With the deepening of knowledge base research and application, question answering over knowledge base, also called KBQA, has recently received more and more attention from researchers. Most previous KBQA models focus on mapping the input q…
View article: An Experimental Field Comparison of Wi-Fi HaLow and LoRa for the Smart Grid
An Experimental Field Comparison of Wi-Fi HaLow and LoRa for the Smart Grid Open
IEEE 802.11ah, or Wi-Fi HaLow, is a long-range Internet of Things (IoT) communication technology with promising performance claims. Being IP-based makes it an attractive prospect when interfacing with existing IP networks. Through real-wor…
View article: On the Use of Power Amplifier Nonlinearity Quotient to Improve Radio Frequency Fingerprint Identification in Time-Varying Channels
On the Use of Power Amplifier Nonlinearity Quotient to Improve Radio Frequency Fingerprint Identification in Time-Varying Channels Open
Radio frequency fingerprint identification (RFFI) is a lightweight device authentication technique particularly desirable for power-constrained devices, e.g., the Internet of things (IoT) devices. Similar to biometric fingerprinting, RFFI …
View article: Network Architecture and Authentication Scheme for LoRa 2.4 GHz Smart Homes
Network Architecture and Authentication Scheme for LoRa 2.4 GHz Smart Homes Open
The IoT-based smart grid provides many benefits to both energy consumers and energy producers, such as advanced metering functions, improved reliability, and management. Increasingly with the rise of smart homes and smart cities, security …
View article: An Architecture to Facilitate Security Assurance and Legal Compliance for Call Auditing in the Wholesale Electricity Market
An Architecture to Facilitate Security Assurance and Legal Compliance for Call Auditing in the Wholesale Electricity Market Open
The auditability of telephone call records plays an essential governance role in the electricity industry in Australia as non-compliance with the Australian National Electricity Rules can lead to financial charges and result in developing …
View article: A Design for a Secure Energy Market Trading System in a National Wholesale Electricity Market
A Design for a Secure Energy Market Trading System in a National Wholesale Electricity Market Open
Energy market trading systems are undergoing rapid transformation due to an increasing demand for renewable energy sources to be integrated into the power grid, coupled with the dynamic and evolving needs of future energy customers. In the…
View article: Security and Performance in IoT: A Balancing Act
Security and Performance in IoT: A Balancing Act Open
With predictions suggesting there will be 18 billion Internet of Things (IoT) devices live by 2022, performance of these low powered devices, as well as security is of utmost importance. Managing security and performance is a balancing act…
View article: Cybersecurity education at formal university level: An Australian perspective
Cybersecurity education at formal university level: An Australian perspective Open
Cybersecurity studies at undergraduate/postgraduate level are offered at numerous universities in Australia. The level offered varies from a specifically named undergraduate/postgraduate coursework degree to usual IT or relevant degrees of…
View article: A viable LoRa framework for smart cities
A viable LoRa framework for smart cities Open
This research is intended to provide practical insights to empower designers, developers and management to develop smart cities underpinned by Long Range (LoRa) technology. LoRa, one of most prevalent long-range wireless communicati…
View article: Energy-Aware Forwarding Strategies for Delay Tolerant Network Routing Protocols
Energy-Aware Forwarding Strategies for Delay Tolerant Network Routing Protocols Open
Delay Tolerant Networking (DTN) is well suited to challenging environments, defined by the lack of reliable end-to-end communication paths to the destination. However, the available energy is not considered in the majority of existing DTN …
View article: Energy-Aware Forwarding Strategies for Delay Tolerant Network Routing Protocols
Energy-Aware Forwarding Strategies for Delay Tolerant Network Routing Protocols Open
Delay Tolerant Networking (DTN) is well suited to challenging environments, defined by the lack of reliable end-to-end communication paths to the destination. However, the available energy is not considered in the majority of existing DTN …
View article: Performance Analysis of Secure Unified Communications in the VMware-Based Cloud
Performance Analysis of Secure Unified Communications in the VMware-Based Cloud Open
Unified communications as a service (UCaaS) can be regarded as a cost-effective model for on-demand delivery of unified communications services in the cloud. However, addressing security concerns has been seen as the biggest challenge to t…
View article: Design, Implementation and Evaluation of Unified Communications on-premises and over the Cloud
Design, Implementation and Evaluation of Unified Communications on-premises and over the Cloud Open
Unified Communication (UC) is the integration of two or more real time communication systems into one platform. Integrating core communication systems into one overall enterprise level system delivers more than just cost saving. These real…
View article: An Architecture for Trustworthy Open Data Services
An Architecture for Trustworthy Open Data Services Open