Lecturer

Dr Jiaojiao Jiang

Engineering
Computer Science and Engineering

Dr Jiaojiao Jiang is currently a lecturer at the School of Computer Science and Engineering at the University of New South Wales. She holds a Ph.D. degree from Deakin University, Melbourne, Australia. She has published over 25 articles in high quality journals and conferences.

Her current research focuses on Cybersecurity. In particular, she is interested in research at the detection of false information on social media. Her research areas include:

  • Detection of rumours on social media
  • Identification of rumour diffusion source
  • Epidemic Modelling
  • Complex Networks

In her previous job, she was an ECDF/Lecturer at the Department of Computing Sciences and Software Engineering, RMIT University, Melbourne. She also worked as Postdoc Research Fellow at the School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne. 

Jiaojiao has served as PC members of a number of conferences: International Conference on Applications and Technologies in Information Security (ATIS), International Conference on Knowledge Science, Engineering and Management (KSEM), and IEEE-RIVF International Conference on Computing and Communications Technologies.

Phone
61 2 9385 4535
Location
Room 501J, Building K17
  • Books | 2019
    2019, Preface
  • Book Chapters | 2019
    Jiang J; Wen S; Liu B; Yu S; Xiang Y; Zhou W, 2019, 'Malicious attack propagation and source identification', in Advances in Information Security, pp. 1 - 192, http://dx.doi.org/10.1007/978-3-030-02179-5_1
    Book Chapters | 2019
    2019, 'Comparative study and numerical analysis', in Advances in Information Security, pp. 95 - 114, http://dx.doi.org/10.1007/978-3-030-02179-5_9
    Book Chapters | 2019
    2019, 'Future directions and conclusion', in Advances in Information Security, pp. 179 - 181, http://dx.doi.org/10.1007/978-3-030-02179-5_13
    Book Chapters | 2019
    2019, 'Identifying multiple propagation sources', in Advances in Information Security, pp. 139 - 157, http://dx.doi.org/10.1007/978-3-030-02179-5_11
    Book Chapters | 2019
    2019, 'Identifying propagation source in large-scale networks', in Advances in Information Security, pp. 159 - 178, http://dx.doi.org/10.1007/978-3-030-02179-5_12
    Book Chapters | 2019
    2019, 'Identifying propagation source in time-varying networks', in Advances in Information Security, pp. 117 - 137, http://dx.doi.org/10.1007/978-3-030-02179-5_10
    Book Chapters | 2019
    2019, 'Introduction', in Malicious Attack Propagation and Source Identification, Springer Nature, pp. 1 - 8, http://dx.doi.org/10.1007/978-3-030-02179-5_1
    Book Chapters | 2019
    2019, 'Preliminary of identifying propagation sources', in Advances in Information Security, pp. 65 - 67, http://dx.doi.org/10.1007/978-3-030-02179-5_5
    Book Chapters | 2019
    2019, 'Preliminary of modeling malicious attack propagation', in Advances in Information Security, pp. 11 - 19, http://dx.doi.org/10.1007/978-3-030-02179-5_2
    Book Chapters | 2019
    2019, 'Restrain malicious attack propagation', in Advances in Information Security, pp. 41 - 62, http://dx.doi.org/10.1007/978-3-030-02179-5_4
    Book Chapters | 2019
    2019, 'Source identification under complete observations: A maximum likelihood (ML) source estimator', in Advances in Information Security, pp. 69 - 77, http://dx.doi.org/10.1007/978-3-030-02179-5_6
    Book Chapters | 2019
    2019, 'Source identification under sensor observations: A Gaussian source estimator', in Advances in Information Security, pp. 89 - 93, http://dx.doi.org/10.1007/978-3-030-02179-5_8
    Book Chapters | 2019
    2019, 'Source identification under snapshots: A sample path based source estimator', in Advances in Information Security, pp. 79 - 87, http://dx.doi.org/10.1007/978-3-030-02179-5_7
    Book Chapters | 2019
    2019, 'User influence in the propagation of malicious attacks', in Advances in Information Security, pp. 21 - 39, http://dx.doi.org/10.1007/978-3-030-02179-5_3
    Book Chapters | 2009
    Bowden BM, 2009, 'Introduction', in Bowden B (ed.), Civilization; Critical Concepts in Political Science, edn. First, Routledge, London and New York, pp. 1 - 18
  • Journal articles | 2023
    Sun N; Ding M; Jiang J; Xu W; Mo X; Tai Y; Zhang J, 2023, 'Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives', IEEE Communications Surveys & Tutorials, pp. 1 - 1, http://dx.doi.org/10.1109/comst.2023.3273282
    Journal articles | 2023
    2023, 'A Tight Bound of Modified Iterative Hard Thresholding Algorithm for Compressed Sensing', Applications of Mathematics, http://dx.doi.org/10.21136/AM.2023.0221-22
    Journal articles | 2023
    2023, 'Variational co-embedding learning for attributed network clustering', Knowledge-Based Systems, 270, http://dx.doi.org/10.1016/j.knosys.2023.110530
    Journal articles | 2022
    2022, 'Extracting Formats of Service Messages with Varying Payloads', ACM Transactions on Internet Technology, 22, http://dx.doi.org/10.1145/3503159
    Journal articles | 2022
    2022, 'Identifying potential breakthrough research: A machine learning method using scientific papers and Twitter data', Technological Forecasting and Social Change, 184, http://dx.doi.org/10.1016/j.techfore.2022.122042
    Journal articles | 2022
    2022, 'Inferring data model from service interactions for response generation in service virtualization', Information and Software Technology, 145, http://dx.doi.org/10.1016/j.infsof.2021.106803
    Journal articles | 2022
    2022, 'Network Growth From Global and Local Influential Nodes', IEEE Transactions on Network Science and Engineering
    Journal articles | 2022
    2022, 'Robust cross-network node classification via constrained graph mutual information', Knowledge-Based Systems, 257, pp. 109852 - 109852, http://dx.doi.org/10.1016/j.knosys.2022.109852
    Journal articles | 2021
    2021, 'R-gram: Inferring message formats of service protocols with relative positional n-grams', Journal of Network and Computer Applications, 196, pp. 103247 - 103247, http://dx.doi.org/10.1016/j.jnca.2021.103247
    Journal articles | 2020
    2020, 'A positional keyword-based approach to inferring fine-grained message formats', Future Generation Computer Systems, 102, pp. 369 - 381, http://dx.doi.org/10.1016/j.future.2019.08.011
    Journal articles | 2020
    2020, 'Analysis and Insights for Myths Circulating on Twitter during the COVID-19 Pandemic', IEEE Open Journal of the Computer Society, 1, pp. 209 - 219, http://dx.doi.org/10.1109/OJCS.2020.3028573
    Journal articles | 2019
    2019, 'Identifying and monitoring the development trends of emerging technologies using patent analysis and Twitter data mining: The case of perovskite solar cell technology', Technological Forecasting and Social Change, 146, pp. 687 - 705, http://dx.doi.org/10.1016/j.techfore.2018.06.004
    Journal articles | 2019
    2019, 'P-Gram: Positional N-Gram for the Clustering of Machine-Generated Messages', IEEE Access, 7, pp. 88504 - 88516, http://dx.doi.org/10.1109/ACCESS.2019.2924928
    Journal articles | 2019
    2019, 'Sustainability Analysis for Fog Nodes with Renewable Energy Supplies', IEEE Internet of Things Journal, 6, pp. 6725 - 6735, http://dx.doi.org/10.1109/JIOT.2019.2910875
    Journal articles | 2018
    Jiang J; Wen S; Yu S; Xiang Y; Zhou W, 2018, 'Rumor Source Identification in Social Networks with Time-Varying Topology', IEEE Transactions on Dependable and Secure Computing, 15, pp. 166 - 179, http://dx.doi.org/10.1109/TDSC.2016.2522436
    Journal articles | 2017
    Jiang J; Wen S; Yu S; Xiang Y; Zhou W, 2017, 'Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies', IEEE Communications Surveys and Tutorials, 19, pp. 465 - 481, http://dx.doi.org/10.1109/COMST.2016.2615098
    Journal articles | 2017
    Wen S; Jiang J; Liu B; Xiang Y; Zhou W, 2017, 'Using epidemic betweenness to measure the influence of users in complex networks', Journal of Network and Computer Applications, 78, pp. 288 - 299, http://dx.doi.org/10.1016/j.jnca.2016.10.018
    Journal articles | 2017
    2017, 'The structure of communities in scale-free networks', Concurrency and Computation: Practice and Experience, 29, http://dx.doi.org/10.1002/cpe.4040
    Journal articles | 2015
    2015, 'K-Center: An Approach on the Multi-Source Identification of Information Diffusion', IEEE Transactions on Information Forensics and Security, 10, pp. 2616 - 2626, http://dx.doi.org/10.1109/TIFS.2015.2469256
    Journal articles | 2015
    2015, 'On the proximal Landweber Newton method for a class of nonsmooth convex problems', Computational Optimization and Applications, 61, pp. 79 - 99, http://dx.doi.org/10.1007/s10589-014-9703-7
    Journal articles | 2014
    Wen S; Jiang J; Xiang Y; Yu S; Zhou W; Jia W, 2014, 'To shut them up or to clarify: Restraining the spread of rumors in online social networks', IEEE Transactions on Parallel and Distributed Systems, 25, pp. 3306 - 3316, http://dx.doi.org/10.1109/TPDS.2013.2297115
    Journal articles | 2014
    2014, 'Are the popular users always important for information dissemination in online social networks?', IEEE Network, 28, pp. 64 - 67, http://dx.doi.org/10.1109/MNET.2014.6915441
    Journal articles | 2013
    2013, 'On the Linear Convergence of a Proximal Gradient Method for a Class of Nonsmooth Convex Minimization Problems', Journal of the Operations Research Society of China, 1, pp. 163 - 186, http://dx.doi.org/10.1007/s40305-013-0015-x
    Journal articles | 2012
    2012, 'An interior point trust region method for nonnegative matrix factorization', Neurocomputing, 97, pp. 309 - 316, http://dx.doi.org/10.1016/j.neucom.2012.05.008
  • Conference Papers | 2022
    2022, 'The Effect of Source Location on the Effectiveness of Source Detection in Finite Networks', in IEEE International Conference on Communications, pp. 4104 - 4113, http://dx.doi.org/10.1109/ICC45855.2022.9838272
    Conference Papers | 2018
    Zheng X; Jiang J; Zhang Y; Deng Y; Fu M; Zheng T; Liu X, 2018, 'SmartVM: A multi-layer microservice-based platform for deploying SaaS', in Proceedings - 15th IEEE International Symposium on Parallel and Distributed Processing with Applications and 16th IEEE International Conference on Ubiquitous Computing and Communications, ISPA/IUCC 2017, pp. 470 - 474, http://dx.doi.org/10.1109/ISPA/IUCC.2017.00077
    Conference Papers | 2018
    2018, 'Mining accurate message formats for service APIs', in 25th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2018 - Proceedings, pp. 266 - 276, http://dx.doi.org/10.1109/SANER.2018.8330215
    Conference Papers | 2018
    2018, 'Preferential attachment and the spreading influence of users in online social networks', in 2017 IEEE/CIC International Conference on Communications in China, ICCC 2017, pp. 1 - 6, http://dx.doi.org/10.1109/ICCChina.2017.8330470
    Conference Papers | 2017
    2017, 'Preferential attachment and the spreading influence of users in online social networks', in 2017 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), IEEE, PEOPLES R CHINA, Qingdao, pp. 690 - 695, presented at IEEE/CIC International Conference on Communications in China (ICCC), PEOPLES R CHINA, Qingdao, 22 October 2017 - 24 October 2017, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000709551200125&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
    Conference Papers | 2017
    2017, 'Studying the global spreading influence and local connections of users in online social networks', in Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016, pp. 431 - 435, http://dx.doi.org/10.1109/CIT.2016.15
    Conference Papers | 2017
    2017, 'Towards an analysis of traffic shaping and policing in fog networks using stochastic fluid models', in ACM International Conference Proceeding Series, pp. 196 - 204, http://dx.doi.org/10.1145/3144457.3144496
    Conference Papers | 2016
    2016, 'A popularity-based cache consistency mechanism for information-centric networking', in 2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings, http://dx.doi.org/10.1109/GLOCOM.2016.7841535
    Conference Papers | 2016
    2016, 'Analysis of the spreading influence variations for online social users under attacks', in 2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings, http://dx.doi.org/10.1109/GLOCOM.2016.7841605
    Conference Papers | 2016
    2016, 'K-Source: Multiple source selection for traffic offloading in mobile social networks', in 2016 8th International Conference on Wireless Communications and Signal Processing, WCSP 2016, http://dx.doi.org/10.1109/WCSP.2016.7752474
    Conference Papers | 2016
    2016, 'The relation between local and global influence of individuals in scale-free networks', in Proceedings - 2015 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2015, pp. 80 - 84, http://dx.doi.org/10.1109/SocialSec2015.20
    Conference Papers | 2015
    Jiang J; Zhou A; Yazdi KM; Wen S; Yu S; Xiang Y, 2015, 'Identifying diffusion sources in large networks: A community structure based approach', in Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015, pp. 302 - 309, http://dx.doi.org/10.1109/Trustcom.2015.388
    Conference Papers | 2015
    2015, 'Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach', in 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, IEEE, FINLAND, Aalto Univ, Helsinki, pp. 302 - 309, presented at Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), FINLAND, Aalto Univ, Helsinki, 20 August 2015 - 22 August 2015, http://dx.doi.org/10.1109/Trustcom-2015.388
    Conference Papers | 2012
    2012, 'Fast local learning regularized nonnegative matrix factorization', in Lee G (ed.), Advances in Intelligent and Soft Computing, SPRINGER-VERLAG BERLIN, Melbourne, AUSTRALIA, pp. 67 - 75, presented at International Conference on Environment Science (ICES 2012), Melbourne, AUSTRALIA, 15 January 2012 - 16 January 2012, http://dx.doi.org/10.1007/978-3-642-27957-7_9
    Conference Papers | 2011
    2011, 'A novel monotonic fixed-point algorithm for l1-regularized least square vector and matrix problem', in Wu YW (ed.), Communications in Computer and Information Science, SPRINGER-VERLAG BERLIN, Singapore, SINGAPORE, pp. 476 - 483, presented at 2nd International Conference on Theoretical and Mathematical Foundations of Computer Science (ICHCC 2011), Singapore, SINGAPORE, 05 May 2011 - 06 May 2011, http://dx.doi.org/10.1007/978-3-642-25002-6_67
    Conference Papers | 2010
    2010, 'Multiplicative update for projective nonnegative matrix factorization with Bregman divergence', in Proceedings - 3rd International Symposium on Information Processing, ISIP 2010, IEEE, pp. 233 - 237, presented at 2010 Third International Symposium on Information Processing (ISIP), 15 October 2010 - 17 October 2010, http://dx.doi.org/10.1109/ISIP.2010.73
    Conference Papers | 2010
    2010, 'The inexact Newton method with semi automatic differentiation', in Proceedings - 3rd International Symposium on Information Processing, ISIP 2010, IEEE, pp. 286 - 290, presented at 2010 Third International Symposium on Information Processing (ISIP), 15 October 2010 - 17 October 2010, http://dx.doi.org/10.1109/ISIP.2010.71