2025 Journal Article Adapting to the stream: an instance-attention GNN method for irregular multivariate time series dataHan, Kun, Koay, Abigail M. Y., Ko, Ryan K. L., Chen, Weitong and Xu, Miao (2025). Adapting to the stream: an instance-attention GNN method for irregular multivariate time series data. Frontiers of Computer Science, 19 (8) 198340. doi: 10.1007/s11704-024-40449-z |
2025 Journal Article Contrasting the optimal resource allocation to cybersecurity and cyber insurance using prospect theory versus expected utility theoryJoshi, Chaitanya, Slapničar, Sergeja, Yang, Jinming and Ko, Ryan (2025). Contrasting the optimal resource allocation to cybersecurity and cyber insurance using prospect theory versus expected utility theory. Computers and Security, 154 104450, 1-14. doi: 10.1016/j.cose.2025.104450 |
2025 Journal Article A container security survey: exploits, attacks, and defensesJarkas, Omar, Ko, Ryan, Dong, Naipeng and Mahmud, Redowan (2025). A container security survey: exploits, attacks, and defenses. ACM Computing Surveys, 57 (7) 170, 1-36. doi: 10.1145/3715001 |
2024 Book Chapter Mining Irregular Time Series Data with Noisy Labels: A Risk Estimation ApproachHan, Kun, Koay, Abigail, Ko, Ryan K. L., Chen, Weitong and Xu, Miao (2024). Mining Irregular Time Series Data with Noisy Labels: A Risk Estimation Approach. Lecture Notes in Computer Science. (pp. 293-307) Singapore: Springer Nature Singapore. doi: 10.1007/978-981-96-1242-0_22 |
2024 Other Outputs The Australia-Korea cyber cooperation in the context of the Australian Cyber Security Strategy 2023-2030Ko, Ryan (2024). The Australia-Korea cyber cooperation in the context of the Australian Cyber Security Strategy 2023-2030. Seoul, Republic of Korea: Korea on Point. |
2024 Conference Publication Privacy-preserving and fairness-aware federated learning for critical infrastructure protection and resilienceZhang, Yanjun, Sun, Ruoxi, Shen, Liyue, Bai, Guangdong, Xue, Minhui, Meng, Mark Huasong, Li, Xue, Ko, Ryan and Nepal, Surya (2024). Privacy-preserving and fairness-aware federated learning for critical infrastructure protection and resilience. WWW '24: ACM Web Conference 2024, Singapore, Singapore, 13-17 May 2024. New York, NY, United States: ACM. doi: 10.1145/3589334.3645545 |
2024 Journal Article Utilizing cyberplace managers to prevent and control cybercrimes: a vignette experimental studyHo, Heemeng, Gilmour, John, Mazerolle, Lorraine and Ko, Ryan (2024). Utilizing cyberplace managers to prevent and control cybercrimes: a vignette experimental study. Security Journal, 37 (1), 129-152. doi: 10.1057/s41284-023-00371-8 |
2024 Other Outputs PRISMA Results for Using Situational Crime Prevention (SCP)-C3 Cycle and Common Inventory of Cybersecurity Controls from ISO/IEC 27002:2022 to Prevent CybercrimesHo, Hee Meng, Ko, Ryan, Mazerolle, Lorraine and Miao, Cheng (2024). PRISMA Results for Using Situational Crime Prevention (SCP)-C3 Cycle and Common Inventory of Cybersecurity Controls from ISO/IEC 27002:2022 to Prevent Cybercrimes. The University of Queensland. (Dataset) doi: 10.48610/71aa67b |
2024 Journal Article Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimesHo, Heemeng, Ko, Ryan, Mazerolle, Lorraine, Gilmour, John and Miao, Cheng (2024). Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimes. Journal of Cybersecurity, 10 (1) tyae020. doi: 10.1093/cybsec/tyae020 |
2024 Book Chapter AI for designing responsible and resilient food systemsKo, Ryan, Gain, Alexandria, Bongiovanni, Ivano, Browne, Will, Jarkas, Omar, Uhlmann, Kora and Viller, Stephen (2024). AI for designing responsible and resilient food systems. Food AI: A game changer for Australia’s food and beverage sector. (pp. 69-78) edited by Janet R. McColl-Kennedy and Damian Hine. Brisbane, QLD, Australia: The University of Queensland, Australia's Food and Beverage Accelerator (FaBA). doi: 10.14264/f5f35d0 |
2024 Conference Publication Scp-bp framework: situational crime prevention for managing data breaches in business processesMiao, Cheng, Ho, Heemeng, Tsen, Elinor, Gilmour, John and Ko, Ryan K. L. (2024). Scp-bp framework: situational crime prevention for managing data breaches in business processes. Business Process Management 22nd International Conference, BPM 2024, Krakow, Poland, 1-6 September 2024. Cham, Switzerland: Springer Nature Switzerland. doi: 10.1007/978-3-031-70396-6_26 |
2023 Journal Article Evasion attack and defense on machine learning models in cyber-physical systems: a surveyWang, Shunyao, Ko, Ryan K. L., Bai, Guangdong, Dong, Naipeng, Choi, Taejun and Zhang, Yanjun (2023). Evasion attack and defense on machine learning models in cyber-physical systems: a survey. IEEE Communications Surveys and Tutorials, 26 (2), 930-966. doi: 10.1109/comst.2023.3344808 |
2023 Journal Article ResNet and Yolov5-enabled non-invasive meat identification for high-accuracy box label verificationJarkas, Omar, Hall, Josh, Smith, Stuart, Mahmud, Redowan, Khojasteh, Parham, Scarsbrook, Joshua and Ko, Ryan K.L. (2023). ResNet and Yolov5-enabled non-invasive meat identification for high-accuracy box label verification. Engineering Applications of Artificial Intelligence, 125 106679, 106679. doi: 10.1016/j.engappai.2023.106679 |
2023 Journal Article Enlarging the model of the human at the heart of human-centered AI: a social self-determination model of AI system impactBingley, William J., Haslam, S. Alexander, Steffens, Niklas K., Gillespie, Nicole, Worthy, Peter, Curtis, Caitlin, Lockey, Steven, Bialkowski, Alina, Ko, Ryan K.L. and Wiles, Janet (2023). Enlarging the model of the human at the heart of human-centered AI: a social self-determination model of AI system impact. New Ideas in Psychology, 70 101025, 1-12. doi: 10.1016/j.newideapsych.2023.101025 |
2023 Conference Publication A framework for user-centric visualisation of blockchain transactions in critical infrastructureJeyakumar, Samantha Tharani, Ko, Ryan and Muthukkumarasamy, Vallipuram (2023). A framework for user-centric visualisation of blockchain transactions in critical infrastructure. BSCI '23: Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, Melbourne, VIC, Australia, 10 - 14 July 2023. New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3594556.3594624 |
2023 Other Outputs Digital Service Transformation: Pathways to human and economic wellbeing: White paperAndreassen, Tor W., Archibald, Gordon, Beekhuyzen, Jenine, Bongiovanni, Ivano, Brea, Edgar, Breidbach, Christoph, Burchill, Keith, Burgers, Henri, Cao, Selina, Coote, Len, Coram, Brendan, Cunningham, Claire, Feast, George, Field, Mitch, Ford, Jerad, Fouche, Leon, Gain, Alexandria, Gooding, Glen, Goyeneche Ramirez, David, Green, Teegan, Gschwind, Daniel, Hall, Thomas, Hartley, Nicole, Heinz, Daniel, Hine, Damian, Indulska, Marta, Kapernick, Brett, Kastelle, Tim, Ko, Ryan ... Zhang, Wenlu (2023). Digital Service Transformation: Pathways to human and economic wellbeing: White paper. Brisbane, QLD, Australia: The University of Queensland. doi: 10.14264/aed4918 |
2023 Conference Publication TypeScript’s evolution: an analysis of feature adoption over timeScarsbrook, Joshua D., Utting, Mark and Ko, Ryan K. L. (2023). TypeScript’s evolution: an analysis of feature adoption over time. IEEE/ACM 20th International Conference on Mining Software Repositories (MSR), Melbourne, VIC, Australia, 15-16 May 2023. Piscataway, NJ, United States: IEEE. doi: 10.1109/msr59073.2023.00027 |
2023 Other Outputs Discussion Paper: 2023-2030 Australian Cyber Security StrategyAbeysooriya, Sasenka, Akhlaghpour, Saeed, Bongiovanni, Ivano, Dowsett, Dallas, Grotowski, Joseph, Holm, Mike, Kim, Dan, Ko, Ryan, Phillips, Andelka M., Slapnicar, Sergeja, Stockdale, David, Swinson, John, Thonon, Geoffroy, Utting, Mark, Walker-Munro, Brendan and Willoughby, Shannon (2023). Discussion Paper: 2023-2030 Australian Cyber Security Strategy. UQ CYBER and AUSCERT. |
2023 Journal Article Where is the human in human-centered AI? Insights from developer priorities and user experiencesBingley, William J., Curtis, Caitlin, Lockey, Steven, Bialkowski, Alina, Gillespie, Nicole, Haslam, S. Alexander, Ko, Ryan K.L., Steffens, Niklas, Wiles, Janet and Worthy, Peter (2023). Where is the human in human-centered AI? Insights from developer priorities and user experiences. Computers in Human Behavior, 141 107617, 1-8. doi: 10.1016/j.chb.2022.107617 |
2023 Book Chapter Preserving the privacy and cybersecurity of home energy dataBean, Richard, Zhang, Yanjun, Ko, Ryan K. L., Mao, Xinyu and Bai, Guangdong (2023). Preserving the privacy and cybersecurity of home energy data. Emerging trends in cybersecurity applications. (pp. 323-343) edited by Kevin Daimi, Abeer Alsadoon, Cathryn Peoples and Nour El Madhoun. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-031-09640-2_14 |