91³ÉÈ˰涶Òô

Dr Jiaojiao Jiang

Dr Jiaojiao Jiang

Senior Lecturer
Engineering
Computer Science and Engineering

Dr Jiaojiao Jiang is currently a senior lecturerÌýat the School of Computer Science and Engineering at the University of New South Wales.ÌýShe holds a Ph.D. degree from Deakin University,ÌýMelbourne, Australia.ÌýShe has published over 45Ìýarticles in high quality journals and conferences and received 1,100 citations.

Her current research focuses on AI for Cybersecurity. In particular, she is interested in research at the detection of misinformation and modelling the propagation of misinformation on online social networks. Her research areas include:

  • Misinformation detection inÌýcomplex networks
  • MisinformationÌýdiffusion source identification
  • Cyber threat intelligence

Ìý

Jiaojiao has served asÌýPC members of a number of conferences: ACM MM, CIKM,ÌýECAI, etc. She has also been a regular reviewer for top ranked journals, including IEEE TIFS, IEEE TNSE, IEEE TDSC, etc.

Phone
+61 2 9065 4369
Location
Room 501J, Building K17
  • Books | 2019
    Jiang J; Wen S; Liu B; Yu S; Xiang Y; Zhou W, 2019, Preface
  • Book Chapters | 2024
    Ma B; Ren H; Jiang J, 2024, 'Influence Robustness ofÌýNodes inÌýMultiplex Networks Against Attacks', in , pp. 62 - 74,
    Book Chapters | 2019
    Jiang J; Wen S; Liu B; Yu S; Xiang Y; Zhou W, 2019, 'Malicious attack propagation and source identification', in Advances in Information Security, pp. 1 - 192,
    Book Chapters | 2019
    Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Comparative study and numerical analysis', in Advances in Information Security, pp. 95 - 114,
    Book Chapters | 2019
    Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Future directions and conclusion', in Advances in Information Security, pp. 179 - 181,
    Book Chapters | 2019
    Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Identifying multiple propagation sources', in Advances in Information Security, pp. 139 - 157,
    Book Chapters | 2019
    Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Identifying propagation source in large-scale networks', in Advances in Information Security, pp. 159 - 178,
    Book Chapters | 2019
    Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Identifying propagation source in time-varying networks', in Advances in Information Security, pp. 117 - 137,
    Book Chapters | 2019
    Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Introduction', in Malicious Attack Propagation and Source Identification, Springer Nature, pp. 1 - 8,
    Book Chapters | 2019
    Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Preliminary of identifying propagation sources', in Advances in Information Security, pp. 65 - 67,
    Book Chapters | 2019
    Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Preliminary of modeling malicious attack propagation', in Advances in Information Security, pp. 11 - 19,
    Book Chapters | 2019
    Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Restrain malicious attack propagation', in Advances in Information Security, pp. 41 - 62,
    Book Chapters | 2019
    Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Source identification under complete observations: A maximum likelihood (ML) source estimator', in Advances in Information Security, pp. 69 - 77,
    Book Chapters | 2019
    Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Source identification under sensor observations: A Gaussian source estimator', in Advances in Information Security, pp. 89 - 93,
    Book Chapters | 2019
    Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'Source identification under snapshots: A sample path based source estimator', in Advances in Information Security, pp. 79 - 87,
    Book Chapters | 2019
    Jiang J; Wen S; Yu S; Liu B; Xiang Y; Zhou W, 2019, 'User influence in the propagation of malicious attacks', in Advances in Information Security, pp. 21 - 39,
    Book Chapters | 2009
    Bowden BM, 2009, 'Introduction', in Bowden B (ed.), Civilization; Critical Concepts in Political Science, Routledge, London and New York, pp. 1 - 18
  • Journal articles | 2024
    Karunanayake I; Jiang J; Ahmed N; Jha SK, 2024, 'Exploring Uncharted Waters of Website Fingerprinting', IEEE Transactions on Information Forensics and Security, 19, pp. 1840 - 1854,
    Journal articles | 2024
    Ma J; Jiang J; Bao W; Zhang H, 2024, 'Partial label learning via identifying outlier features', Knowledge-Based Systems, 301,
    Journal articles | 2024
    Zaman Z; Xue W; Gauravaram P; Hu W; Jiang J; Jha SK, 2024, 'Privacy-Preserving Probabilistic Data Encoding for IoT Data Analysis', IEEE Transactions on Information Forensics and Security, 19, pp. 9173 - 9187,
    Journal articles | 2023
    Ma J; Zhang H; Yang S; Jiang J; Li G, 2023, 'An Improved Robust Sparse Convex Clustering', Tsinghua Science and Technology, 28, pp. 989 - 998,
    Journal articles | 2023
    Ma J; Zhang H; Yang S; Jiang J, 2023, 'A tight bound of modified iterative hard thresholding algorithm for compressed sensing', Applications of Mathematics, 68, pp. 623 - 642,
    Journal articles | 2023
    Sun N; Ding M; Jiang J; Xu W; Mo X; Tai Y; Zhang J, 2023, 'Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives', IEEE Communications Surveys and Tutorials, 25, pp. 1748 - 1774,
    Journal articles | 2023
    Yang S; Verma S; Cai B; Jiang J; Yu K; Chen F; Yu S, 2023, 'Variational co-embedding learning for attributed network clustering', Knowledge-Based Systems, 270,
    Journal articles | 2022
    Hossain MA; Han J; Schneider JG; Jiang J; Kabir MA; Versteeg S, 2022, 'Extracting Formats of Service Messages with Varying Payloads', ACM Transactions on Internet Technology, 22,
    Journal articles | 2022
    Hossain MA; Jiang J; Han J; Kabir MA; Schneider JG; Liu C, 2022, 'Inferring data model from service interactions for response generation in service virtualization', Information and Software Technology, 145,
    Journal articles | 2022
    Jiang J, 2022, 'Network Growth From Global and Local Influential Nodes', IEEE Transactions on Network Science and Engineering,
    Journal articles | 2022
    Li X; Wen Y; Jiang J; Daim T; Huang L, 2022, 'Identifying potential breakthrough research: A machine learning method using scientific papers and Twitter data', Technological Forecasting and Social Change, 184,
    Journal articles | 2022
    Yang S; Cai B; Cai T; Song X; Jiang J; Li B; Li J, 2022, 'Robust cross-network node classification via constrained graph mutual information', Knowledge-Based Systems, 257,
    Journal articles | 2021
    Jiang J; Schneider JG; Versteeg S; Han J; Hossain MA; Liu C, 2021, 'R-gram: Inferring message formats of service protocols with relative positional n-grams', Journal of Network and Computer Applications, 196,
    Journal articles | 2020
    Jiang J; Versteeg S; Han J; Hossain MDA; Schneider JG, 2020, 'A positional keyword-based approach to inferring fine-grained message formats', Future Generation Computer Systems, 102, pp. 369 - 381,
    Journal articles | 2020
    Yang S; Jiang J; Pal A; Yu K; Chen F; Yu S, 2020, 'Analysis and Insights for Myths Circulating on Twitter during the COVID-19 Pandemic', IEEE Open Journal of the Computer Society, 1, pp. 209 - 219,
    Journal articles | 2019
    Jiang J; Gao L; Jin J; Luan TH; Yu S; Xiang Y; Garg S, 2019, 'Sustainability Analysis for Fog Nodes with Renewable Energy Supplies', IEEE Internet of Things Journal, 6, pp. 6725 - 6735,
    Journal articles | 2019
    Jiang J; Versteeg S; Han J; Hossain MA; Schneider JG; Leckie C; Farahmandpour Z, 2019, 'P-Gram: Positional N-Gram for the Clustering of Machine-Generated Messages', IEEE Access, 7, pp. 88504 - 88516,
    Journal articles | 2019
    Li X; Xie Q; Jiang J; Zhou Y; Huang L, 2019, 'Identifying and monitoring the development trends of emerging technologies using patent analysis and Twitter data mining: The case of perovskite solar cell technology', Technological Forecasting and Social Change, 146, pp. 687 - 705,
    Journal articles | 2018
    Jiang J; Wen S; Yu S; Xiang Y; Zhou W, 2018, 'Rumor Source Identification in Social Networks with Time-Varying Topology', IEEE Transactions on Dependable and Secure Computing, 15, pp. 166 - 179,
    Journal articles | 2017
    Jiang J; Wen S; Yu S; Xiang Y; Zhou W; Hassan H, 2017, 'The structure of communities in scale-free networks', Concurrency and Computation: Practice and Experience, 29,
    Journal articles | 2017
    Jiang J; Wen S; Yu S; Xiang Y; Zhou W, 2017, 'Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies', IEEE Communications Surveys and Tutorials, 19, pp. 465 - 481,
    Journal articles | 2017
    Wen S; Jiang J; Liu B; Xiang Y; Zhou W, 2017, 'Using epidemic betweenness to measure the influence of users in complex networks', Journal of Network and Computer Applications, 78, pp. 288 - 299,
    Journal articles | 2015
    Jiang J; Wen S; Yu S; Xiang Y; Zhou W, 2015, 'K-Center: An Approach on the Multi-Source Identification of Information Diffusion', IEEE Transactions on Information Forensics and Security, 10, pp. 2616 - 2626,
    Journal articles | 2015
    Zhang HB; Jiang JJ; Zhao YB, 2015, 'On the proximal Landweber Newton method for a class of nonsmooth convex problems', Computational Optimization and Applications, 61, pp. 79 - 99,
    Journal articles | 2014
    Wen S; Jiang J; Xiang Y; Yu S; Zhou W; Jia W, 2014, 'To shut them up or to clarify: Restraining the spread of rumors in online social networks', IEEE Transactions on Parallel and Distributed Systems, 25, pp. 3306 - 3316,
    Journal articles | 2014
    Wen S; Jiang J; Xiang Y; Yu S; Zhou W, 2014, 'Are the popular users always important for information dissemination in online social networks?', IEEE Network, 28, pp. 64 - 67,
    Journal articles | 2013
    Zhang H; Jiang J; Luo ZQ, 2013, 'On the Linear Convergence of a Proximal Gradient Method for a Class of Nonsmooth Convex Minimization Problems', Journal of the Operations Research Society of China, 1, pp. 163 - 186,
    Journal articles | 2012
    Jiang JJ; Zhanga HB; Yu S, 2012, 'An interior point trust region method for nonnegative matrix factorization', Neurocomputing, 97, pp. 309 - 316,
  • Conference Papers | 2024
    Chang YT; Hu Z; Li X; Yang S; Jiang J; Sun N, 2024, 'DiHAN: A Novel Dynamic Hierarchical Graph Attention Network for Fake News Detection', in International Conference on Information and Knowledge Management, Proceedings, pp. 197 - 206,
    Conference Papers | 2024
    Malik M; Jiang J; Song Y; Jha S, 2024, 'MFVIEW: Multi-modal Fake News Detection withÌýView-Specific Information Extraction', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 345 - 353,
    Conference Papers | 2024
    Ren H; Jiang J, 2024, 'LayerPlexRank: Exploring Node Centrality and Layer Influence through Algebraic Connectivity in Multiplex Networks', in International Conference on Information and Knowledge Management, Proceedings, pp. 4010 - 4014,
    Preprints | 2022
    Go JH; Sari A; Jiang J; Yang S; Jha S, 2022, Fake News Quick Detection on Dynamic Heterogeneous Information Networks,
    Conference Papers | 2022
    Qu D; Chen Q; Wang J; Jiang J; Wang Z, 2022, 'The Effect of Source Location on the Effectiveness of Source Detection in Finite Networks', in IEEE International Conference on Communications, pp. 4104 - 4113,
    Conference Papers | 2018
    Hossain MA; Versteeg S; Han J; Kabir MA; Jiang J; Schneider JG, 2018, 'Mining accurate message formats for service APIs', in 25th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2018 - Proceedings, pp. 266 - 276,
    Conference Papers | 2018
    Zheng X; Jiang J; Zhang Y; Deng Y; Fu M; Zheng T; Liu X, 2018, 'SmartVM: A multi-layer microservice-based platform for deploying SaaS', in Proceedings - 15th IEEE International Symposium on Parallel and Distributed Processing with Applications and 16th IEEE International Conference on Ubiquitous Computing and Communications, ISPA/IUCC 2017, pp. 470 - 474,
    Conference Papers | 2017
    Jiang J; Gao L; Jin J; Luan TH; Yu S; Yuan D; Xiang Y; Yuan D, 2017, 'Towards an analysis of traffic shaping and policing in fog networks using stochastic fluid models', in ACM International Conference Proceeding Series, pp. 196 - 204,
    Conference Papers | 2017
    Jiang J; Gao L; Yu S; Jin J; Yuan D, 2017, 'Preferential attachment and the spreading influence of users in online social networks', in 2017 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), IEEE, PEOPLES R CHINA, Qingdao, pp. 690 - 695, presented at IEEE/CIC International Conference on Communications in China (ICCC), PEOPLES R CHINA, Qingdao, 22 October 2017 - 24 October 2017,
    Conference Papers | 2017
    Jiang J; Gao L; Yu S; Jin J; Yuan D, 2017, 'Preferential attachment and the spreading influence of users in online social networks', in 2017 IEEE/CIC International Conference on Communications in China, ICCC 2017, pp. 1 - 6,
    Conference Papers | 2017
    Jiang J; Qu Y; Yu S; Zhou W; Wu W, 2017, 'Studying the global spreading influence and local connections of users in online social networks', in Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016, pp. 431 - 435,
    Conference Papers | 2016
    Feng B; Zhou H; Zhang H; Jiang J; Yu S, 2016, 'A popularity-based cache consistency mechanism for information-centric networking', in Proceedings - IEEE Global Communications Conference, GLOBECOM,
    Conference Papers | 2016
    Jiang J; Wen S; Yu S; Zhou W; Qian Y, 2016, 'Analysis of the spreading influence variations for online social users under attacks', in Proceedings - IEEE Global Communications Conference, GLOBECOM,
    Conference Papers | 2016
    Liu B; Zhou W; Jiang J; Wang K, 2016, 'K-Source: Multiple source selection for traffic offloading in mobile social networks', in 2016 8th International Conference on Wireless Communications and Signal Processing, WCSP 2016,
    Conference Papers | 2016
    Wen S; Jiang J; Yazdi KM; Xiang Y; Zhou W, 2016, 'The relation between local and global influence of individuals in scale-free networks', in Proceedings - 2015 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2015, pp. 80 - 84,
    Conference Papers | 2015
    Jiang J; Zhou A; Yazdi KM; Wen S; Yu S; Xiang Y, 2015, 'Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach', in 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, IEEE, FINLAND, Aalto Univ, Helsinki, pp. 302 - 309, presented at Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), FINLAND, Aalto Univ, Helsinki, 20 August 2015 - 22 August 2015,
    Conference Papers | 2015
    Jiang J; Zhou A; Yazdi KM; Wen S; Yu S; Xiang Y, 2015, 'Identifying diffusion sources in large networks: A community structure based approach', in Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015, pp. 302 - 309,
    Conference Papers | 2012
    Jiang J; Zhang H; Xue Y, 2012, 'Fast local learning regularized nonnegative matrix factorization', in Advances in Intelligent and Soft Computing, pp. 67 - 75,
    Conference Papers | 2011
    Jiang J; Zhang H; Yu S, 2011, 'A novel monotonic fixed-point algorithm for l1-regularized least square vector and matrix problem', in Communications in Computer and Information Science, pp. 476 - 483,
    Conference Papers | 2010
    Jiang J; Zhang H, 2010, 'Multiplicative update for projective nonnegative matrix factorization with Bregman divergence', in Proceedings - 3rd International Symposium on Information Processing, ISIP 2010, pp. 233 - 237,
    Conference Papers | 2010
    Zhang H; Jiang J, 2010, 'The inexact Newton method with semi automatic differentiation', in Proceedings - 3rd International Symposium on Information Processing, ISIP 2010, pp. 286 - 290,

ARC DECRAÌýDE240101049