Skip to menu Skip to content Skip to footer

2025

Journal Article

Adapting to the stream: an instance-attention GNN method for irregular multivariate time series data

Han, Kun, Koay, Abigail M. Y., Ko, Ryan K. L., Chen, Weitong and Xu, Miao (2025). Adapting to the stream: an instance-attention GNN method for irregular multivariate time series data. Frontiers of Computer Science, 19 (8) 198340. doi: 10.1007/s11704-024-40449-z

Adapting to the stream: an instance-attention GNN method for irregular multivariate time series data

2025

Journal Article

Contrasting the optimal resource allocation to cybersecurity and cyber insurance using prospect theory versus expected utility theory

Joshi, Chaitanya, Slapničar, Sergeja, Yang, Jinming and Ko, Ryan (2025). Contrasting the optimal resource allocation to cybersecurity and cyber insurance using prospect theory versus expected utility theory. Computers and Security, 154 104450, 1-14. doi: 10.1016/j.cose.2025.104450

Contrasting the optimal resource allocation to cybersecurity and cyber insurance using prospect theory versus expected utility theory

2025

Journal Article

A container security survey: exploits, attacks, and defenses

Jarkas, Omar, Ko, Ryan, Dong, Naipeng and Mahmud, Redowan (2025). A container security survey: exploits, attacks, and defenses. ACM Computing Surveys, 57 (7) 170, 1-36. doi: 10.1145/3715001

A container security survey: exploits, attacks, and defenses

2024

Book Chapter

Mining Irregular Time Series Data with Noisy Labels: A Risk Estimation Approach

Han, Kun, Koay, Abigail, Ko, Ryan K. L., Chen, Weitong and Xu, Miao (2024). Mining Irregular Time Series Data with Noisy Labels: A Risk Estimation Approach. Lecture Notes in Computer Science. (pp. 293-307) Singapore: Springer Nature Singapore. doi: 10.1007/978-981-96-1242-0_22

Mining Irregular Time Series Data with Noisy Labels: A Risk Estimation Approach

2024

Other Outputs

The Australia-Korea cyber cooperation in the context of the Australian Cyber Security Strategy 2023-2030

Ko, Ryan (2024). The Australia-Korea cyber cooperation in the context of the Australian Cyber Security Strategy 2023-2030. Seoul, Republic of Korea: Korea on Point.

The Australia-Korea cyber cooperation in the context of the Australian Cyber Security Strategy 2023-2030

2024

Conference Publication

Privacy-preserving and fairness-aware federated learning for critical infrastructure protection and resilience

Zhang, Yanjun, Sun, Ruoxi, Shen, Liyue, Bai, Guangdong, Xue, Minhui, Meng, Mark Huasong, Li, Xue, Ko, Ryan and Nepal, Surya (2024). Privacy-preserving and fairness-aware federated learning for critical infrastructure protection and resilience. WWW '24: ACM Web Conference 2024, Singapore, Singapore, 13-17 May 2024. New York, NY, United States: ACM. doi: 10.1145/3589334.3645545

Privacy-preserving and fairness-aware federated learning for critical infrastructure protection and resilience

2024

Journal Article

Utilizing cyberplace managers to prevent and control cybercrimes: a vignette experimental study

Ho, Heemeng, Gilmour, John, Mazerolle, Lorraine and Ko, Ryan (2024). Utilizing cyberplace managers to prevent and control cybercrimes: a vignette experimental study. Security Journal, 37 (1), 129-152. doi: 10.1057/s41284-023-00371-8

Utilizing cyberplace managers to prevent and control cybercrimes: a vignette experimental study

2024

Other Outputs

PRISMA Results for Using Situational Crime Prevention (SCP)-C3 Cycle and Common Inventory of Cybersecurity Controls from ISO/IEC 27002:2022 to Prevent Cybercrimes

Ho, Hee Meng, Ko, Ryan, Mazerolle, Lorraine and Miao, Cheng (2024). PRISMA Results for Using Situational Crime Prevention (SCP)-C3 Cycle and Common Inventory of Cybersecurity Controls from ISO/IEC 27002:2022 to Prevent Cybercrimes. The University of Queensland. (Dataset) doi: 10.48610/71aa67b

PRISMA Results for Using Situational Crime Prevention (SCP)-C3 Cycle and Common Inventory of Cybersecurity Controls from ISO/IEC 27002:2022 to Prevent Cybercrimes

2024

Journal Article

Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimes

Ho, Heemeng, Ko, Ryan, Mazerolle, Lorraine, Gilmour, John and Miao, Cheng (2024). Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimes. Journal of Cybersecurity, 10 (1) tyae020. doi: 10.1093/cybsec/tyae020

Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimes

2024

Book Chapter

AI for designing responsible and resilient food systems

Ko, Ryan, Gain, Alexandria, Bongiovanni, Ivano, Browne, Will, Jarkas, Omar, Uhlmann, Kora and Viller, Stephen (2024). AI for designing responsible and resilient food systems. Food AI: A game changer for Australia’s food and beverage sector. (pp. 69-78) edited by Janet R. McColl-Kennedy and Damian Hine. Brisbane, QLD, Australia: The University of Queensland, Australia's Food and Beverage Accelerator (FaBA). doi: 10.14264/f5f35d0

AI for designing responsible and resilient food systems

2024

Conference Publication

Scp-bp framework: situational crime prevention for managing data breaches in business processes

Miao, Cheng, Ho, Heemeng, Tsen, Elinor, Gilmour, John and Ko, Ryan K. L. (2024). Scp-bp framework: situational crime prevention for managing data breaches in business processes. Business Process Management 22nd International Conference, BPM 2024, Krakow, Poland, 1-6 September 2024. Cham, Switzerland: Springer Nature Switzerland. doi: 10.1007/978-3-031-70396-6_26

Scp-bp framework: situational crime prevention for managing data breaches in business processes

2023

Journal Article

Evasion attack and defense on machine learning models in cyber-physical systems: a survey

Wang, Shunyao, Ko, Ryan K. L., Bai, Guangdong, Dong, Naipeng, Choi, Taejun and Zhang, Yanjun (2023). Evasion attack and defense on machine learning models in cyber-physical systems: a survey. IEEE Communications Surveys and Tutorials, 26 (2), 930-966. doi: 10.1109/comst.2023.3344808

Evasion attack and defense on machine learning models in cyber-physical systems: a survey

2023

Journal Article

ResNet and Yolov5-enabled non-invasive meat identification for high-accuracy box label verification

Jarkas, Omar, Hall, Josh, Smith, Stuart, Mahmud, Redowan, Khojasteh, Parham, Scarsbrook, Joshua and Ko, Ryan K.L. (2023). ResNet and Yolov5-enabled non-invasive meat identification for high-accuracy box label verification. Engineering Applications of Artificial Intelligence, 125 106679, 106679. doi: 10.1016/j.engappai.2023.106679

ResNet and Yolov5-enabled non-invasive meat identification for high-accuracy box label verification

2023

Journal Article

Enlarging the model of the human at the heart of human-centered AI: a social self-determination model of AI system impact

Bingley, William J., Haslam, S. Alexander, Steffens, Niklas K., Gillespie, Nicole, Worthy, Peter, Curtis, Caitlin, Lockey, Steven, Bialkowski, Alina, Ko, Ryan K.L. and Wiles, Janet (2023). Enlarging the model of the human at the heart of human-centered AI: a social self-determination model of AI system impact. New Ideas in Psychology, 70 101025, 1-12. doi: 10.1016/j.newideapsych.2023.101025

Enlarging the model of the human at the heart of human-centered AI: a social self-determination model of AI system impact

2023

Conference Publication

A framework for user-centric visualisation of blockchain transactions in critical infrastructure

Jeyakumar, Samantha Tharani, Ko, Ryan and Muthukkumarasamy, Vallipuram (2023). A framework for user-centric visualisation of blockchain transactions in critical infrastructure. BSCI '23: Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, Melbourne, VIC, Australia, 10 - 14 July 2023. New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3594556.3594624

A framework for user-centric visualisation of blockchain transactions in critical infrastructure

2023

Other Outputs

Digital Service Transformation: Pathways to human and economic wellbeing: White paper

Andreassen, Tor W., Archibald, Gordon, Beekhuyzen, Jenine, Bongiovanni, Ivano, Brea, Edgar, Breidbach, Christoph, Burchill, Keith, Burgers, Henri, Cao, Selina, Coote, Len, Coram, Brendan, Cunningham, Claire, Feast, George, Field, Mitch, Ford, Jerad, Fouche, Leon, Gain, Alexandria, Gooding, Glen, Goyeneche Ramirez, David, Green, Teegan, Gschwind, Daniel, Hall, Thomas, Hartley, Nicole, Heinz, Daniel, Hine, Damian, Indulska, Marta, Kapernick, Brett, Kastelle, Tim, Ko, Ryan ... Zhang, Wenlu (2023). Digital Service Transformation: Pathways to human and economic wellbeing: White paper. Brisbane, QLD, Australia: The University of Queensland. doi: 10.14264/aed4918

Digital Service Transformation: Pathways to human and economic wellbeing: White paper

2023

Conference Publication

TypeScript’s evolution: an analysis of feature adoption over time

Scarsbrook, Joshua D., Utting, Mark and Ko, Ryan K. L. (2023). TypeScript’s evolution: an analysis of feature adoption over time. IEEE/ACM 20th International Conference on Mining Software Repositories (MSR), Melbourne, VIC, Australia, 15-16 May 2023. Piscataway, NJ, United States: IEEE. doi: 10.1109/msr59073.2023.00027

TypeScript’s evolution: an analysis of feature adoption over time

2023

Other Outputs

Discussion Paper: 2023-2030 Australian Cyber Security Strategy

Abeysooriya, Sasenka, Akhlaghpour, Saeed, Bongiovanni, Ivano, Dowsett, Dallas, Grotowski, Joseph, Holm, Mike, Kim, Dan, Ko, Ryan, Phillips, Andelka M., Slapnicar, Sergeja, Stockdale, David, Swinson, John, Thonon, Geoffroy, Utting, Mark, Walker-Munro, Brendan and Willoughby, Shannon (2023). Discussion Paper: 2023-2030 Australian Cyber Security Strategy. UQ CYBER and AUSCERT.

Discussion Paper: 2023-2030 Australian Cyber Security Strategy

2023

Journal Article

Where is the human in human-centered AI? Insights from developer priorities and user experiences

Bingley, William J., Curtis, Caitlin, Lockey, Steven, Bialkowski, Alina, Gillespie, Nicole, Haslam, S. Alexander, Ko, Ryan K.L., Steffens, Niklas, Wiles, Janet and Worthy, Peter (2023). Where is the human in human-centered AI? Insights from developer priorities and user experiences. Computers in Human Behavior, 141 107617, 1-8. doi: 10.1016/j.chb.2022.107617

Where is the human in human-centered AI? Insights from developer priorities and user experiences

2023

Book Chapter

Preserving the privacy and cybersecurity of home energy data

Bean, Richard, Zhang, Yanjun, Ko, Ryan K. L., Mao, Xinyu and Bai, Guangdong (2023). Preserving the privacy and cybersecurity of home energy data. Emerging trends in cybersecurity applications. (pp. 323-343) edited by Kevin Daimi, Abeer Alsadoon, Cathryn Peoples and Nour El Madhoun. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-031-09640-2_14

Preserving the privacy and cybersecurity of home energy data