郑曦 男  教授 博士生导师  

James Zheng


2015年毕业于美国德州大学奥斯汀分校,获得软件工程博士学位。现任澳大利亚麦格理大学智能系统科研中心主任、软件工程副主任和外事主任。2006-2019担任澳大利亚梅努洛格公司首席解决方案架构师 (公司20158.5亿澳币被收购)。他专门从事自动化系统安全和可靠性分析,服务计算和动作识别。在顶尖期刊和会议上发表了80多份高质量的出版物, 其中SCI 检索论文60多篇,EI 检索论文若干。2017年获得澳大利亚分布式计算和博士学位会议最佳论文。2016年获得迪肯研究杰出奖。他的一篇关于系统安全的文章连续在20182019年世界知名期刊CCPE里获得世界前20影响力奖项。2019年后他有5篇关于智能系统的文章获得高引。2019年关于传感器混合学习的文章被影响因子22IEEE COMMUNICATIONS SURVEYS AND Tutorials录取。他在多个世界顶级会议PERCOM2015-2021, TRUSTCOM2020和期刊IEEE Transactions on Industry Informatics, Future Generation Computer Systems里担任期刊编辑和评审会委员,同时也在顶级会议PERCOM 2020里担任分会主席。他的研究成果发表在计算机领域的顶级国际期刊《IEEE Transactions on Industrial Informatics, IEEE Internet of Things Journal, IEEE Transactions on Cybernetics, IEEE Transactions on Vehicular Technology》和顶级国际会议PerCOM2020, ICSOC2018,19,20上。


主要研究方向:


物联网验证

机器学习安全和测试

人车交互

边缘智能

联邦学习

机器学习及应用


讲授课程 (麦考瑞教程):


分布式系统(本科生、研究生)

软件工程(本科生)

软件工程入门(本科生)


近期主持的科研项目:


Prof. Zheng has been awarded several competitive grants (as either sole CI or lead CI), totalling more than $660,000 (AUD):

A safety-preserving ecosystem for autonomous driving”, CI: Xi Zheng, Shui Yu. PI: John Kim. ARC Linkage Project grant LP190100676. Awarded $341,853. 2020-2022.

Trustworthy AI-Human Interaction in Cyber-Physical World”, CI: Xi Zheng. Australian Data61 CRP Grant. Awarded $130,440. 2020.

Dynamic Safety Analysis for Cyber-Physical Systems”, CI: Xi Zheng. MQ New Staff Research Grant. Awarded $18,000. 2019

Investigating How to Build a Reliable and Secure Software-as-a-Service (SaaS) Platform”, CI: Xi Zheng, Mohamed, Abdelrazek, and Wanlei Zhou, Industry Research Grant. Awarded $120,000. 2016 - 2017



近几年的论著、专利:


Book chapters

1.Zheng, X 2020, ‘Real-time simulation support for real-time systems’, Handbook of Real-Time Computing, Springer

Refereed journal articles  

2.Xu, G, Jiao, L, Wang, W, Liu, A, Su, C, Liu, S, Zheng, X & Cheng, X 2020, 'BAGKD: A Batch Authentication and Group Key Distribution Protocol for VANETs', IEEE Communications Magazine. Q1 (JIF: 4.46).

3.Zhang, C, Lu, J, Zheng, X, Yu, D, Sheng, M & Jolfaei, A 2020, 'RICA-MD: A Refined ICA algorithm for Motion Detection', ACM Transactions on Multimedia Computing, Communications, and Applications  (TOMM). Q1 (JIF: 3.98).

4.liang, H, Wu, J, Zheng, X, Zhang, M & Jolfaei, A 2020, 'Fog based Secure Service Discovery for Internet of Multimedia Things: A Cross-Blockchain Approach', ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM). Q1 (JIF: 3.98).

5.Jing, ZJ, Gu, CS, Yang, L, Zhang, MS, Xu, G, Jolfaei, A & Zheng, X 2020, 'Security Analysis of Indistinguishable Obfuscation for Internet of Medical Things Applications', Computer Communications. Q1 (JIF: 2.81).

6.Xu, J, Meng, Q, Wu, J, Zheng, X, Zhang, X & Sharma, S 2020, 'Efficient and lightweight data streaming authentication in industrial automation and control systems', IEEE Transactions on Industrial Informatics. Q1 (JIF: 7.38).

7.Ling, L, Li, X, Yan, S, Ding, S, Jolfaei, A & Zheng, X 2020, 'Unsupervised learning-based continuous depth and motion estimation with monocular endoscopy for virtual reality minimally invasive surgery', IEEE Transactions on Industrial Informatics. Q1 (JIF: 7.38).

8.Zhang, T, Shen, Z, Jin, J, Zheng, X, Cao, X & Tagami, A 2020, 'Achieving Democracy in Edge Intelligence: A Fog-based Collaborative Learning Scheme', IEEE Internet of Things Journal. Q1 (JIF: 9.51).

9.Xu, G, Zhao, Y, Jiao, L, Feng, M, Ji, Z, Panaousis, E, Chen, S & Zheng, X 2020, 'TTSVD: an efficient sparse decision making model with two-way trust recommendation in the AI enabled IoT systems', IEEE Internet of Things Journal. Q1 (JIF: 9.51).

10.Wang, C, Wu, J, Zheng, X, Pei, B, Zhang, X, Yu, D & Tang, J 2020, 'Leveraging ICN with network sensing for intelligent transportation systems: a dynamic naming approach', IEEE Sensors Journal. in-press. Q1 (JIF: 3.03).

11.Lu, J.C., Zheng, X., Sheng, Q.Z., Jing, J & Shui, Y, 2020. ‘Efficient human activity recognition using a single wearable sensor’, IEEE Internet of Things Journal, in-press. Q1 (JIF: 9.51).

12.Wang, T., Liang, Y.Z., Zheng, X., Arif, M., Wang, J., Jin, Q.,  2020.  ‘An Intelligent Dynamic Offloading from Cloud to Edge for Smart IoT Systems with Big Data’, IEEE Transactions on Network Science and Engineering, in-press. Q1 (JIF: 2.47).

13.Xu, G.Q., Zhang. Y., Zheng.X.,  2020.  ‘A Security-Enhanced Certificateless Aggregate Signature Authentication Protocol for InVANETs’, IEEE Network, in-press. Q1 (JIF: 7.50).

14.Xu, G.Q., Liu, B.Y., Zheng.X.,  2020.  ‘Trust2Privacy: A Novel Fuzzy Trust-to-Privacy Mechanism for Mobile Social Networks’, IEEE Wireless Communications, in-press. Q1 (JIF: 11).

15.Dibae, M, Zheng, X., Jiang, K, Abbas, R, Liu, S, Zhang, Y, Xiang, Y & Yu, S, 2020. ‘Attacks and Defences on Intelligent Connected Vehicles: A Survey’, Digital Communications and Networks, in-press. Q1 (JIF: 3.41).

16.Wang, K, Wu, J, Zheng, X, Jolfaei, A, Li, J.H. & Yu, D.J.,  2020.  ‘Leveraging Energy Function  Virtualization with Game Theory for Fault-Tolerant Smart Grid’, IEEE Transactions on Industrial Informatics, in-press. Q1 (JIF: 7.38).

17.Wang, T, Lu, T, Cao, Z, Shu, L, Zheng, X & Liu, A.,  2020. ‘When Sensor-Cloud Meets Mobile Edge Computing’, IEEE Sensors Journal, in-press. Q1 (JIF: 3.03).

18.Deng, X.C., Zheng, X., Xu, G.Q. & Jolfaei, A., 2020. ‘Dynamic Clustering Method for Imbalanced Learning Based on Adaboost’, The Journal of Supercomputing, in-press. Q2 (JIF: 3.03).

19.Deep, S. & Zheng, X., Jolfaei, A., Yu, D.J. & Zheng, X., 2020. ‘A survey of security and privacy issues in the Internet of Things from the layered context’, Transactions on Emerging Telecommunications Technologies, in-press. Q2 (JIF: 1.26).

20.  Yue, Z.J., Ding, S., Zhao, L., Zhang, Y.T., Tanveer, M., Jolfaei, A. & Zheng, X., 2020. ‘Privacy-preserving time series medical images analysis using a hybrid deep learning framework’, ACM Transactions on Internet Technology, in-press. CORE A (JIF: 2.39)

21.Huang, K., Zhang, X.S., Wang, X.F., Mu, Y., Xu, G.Q. & Zheng, X., 2020. ‘HUCDO:A Hybrid User-Centric Data Outsourcing Scheme’, ACM Transactions on Cyber-Physical Systems, in-press.

22.Wang, T., Mei, Y., Jia, W., Zheng, X., Wang, G. and Xie, M., 2020. Edge-based differential privacy computing for sensor–cloud systems. Journal of Parallel and Distributed Computing, 136, pp.75-8. CORE A*. (JIF: 1.81). HIGHLY CITED PAPER

23.Zhang, Chao, Wu, Xiaopei, Zheng, X. & Yu, Shui, 2019. ‘Driver Drowsiness Detection Using Multi-Channel Second Order Blind Identifications’, IEEE Access, vol. 7, pp. 11829–11843. Q1 (JIF: 4.09).

24.Zheng, Tianlei, Zheng, X., Zhang, Yuqun, Deng, Yao, Dong, Erxi, Zhang, Rui & Liu, Xiao, 2019. ‘SmartVM: a SLA-aware microservice deployment framework’, World Wide Web, vol. 22, no. 1, pp. 275–293. CORE A (JIF: 1.77).

25.Xun Zhou, Xuelian Cai, Yuehang Bu, Zheng, X., Jiong Jin, Tom H. Luan & Changle Li, 2019. ‘When Road Information Meets Data Mining: Precision Detection for Heading and Width of Roads’, IEEE Access, vol. 7, pp. 60399–60410, doi:10.1109/access.2019.2903195. Q1 (JIF: 4.09).

26.Wang, J., Cao, B., Zheng, X., Tan, D. and Fan, J., 2019. Detecting Difference Between Process Models Using Edge Network. IEEE Access, 7, pp.142916-142925. Q1 (JIF: 4.09).

27.Xu, G.Q., Guo, B.J., Su, C.H., Zheng, X, Liang, K.T., S, W.D. & Wang, H 2019, ‘Am I Eclipsed? A Smart Detector of Eclipse Attacks for Ethereum’, Computers & Security, vol. 88 (2020)101604, pp.1-10. Q2 (JIF: 3.06).

28.Xu, G.Q., Wang, W, Jiao, L, Zhang, N, Liang, K, Zheng, X, Lian, W, Xian, H & Gao, H 2019, ‘SoProtector: Safeguard Privacy fo Native SO Files in Evolving Mobile IoT Applications’, IEEE Internet of Things Journal, vol. 7, pp. 2539-2552 (2020). Q1 (JIF: 9.51).

29.Zhang, R, Chen, X, Wen, S & Zheng, X 2019, ‘Using AI to Attack VA: A Stealthy Spyware against Voice Assistances in Smart Phones’, IEEE Access, vol 7, pp. 2169-3536. Q1 (JIF: 4.0).

30.Zhang, Y, Qu, Y, Gao, L, Luan, T.H., Zheng, X, Chen, S & Xiang, Y 2019, ‘APDP: Attack-proof Personalized Differential Privacy Model for a Smart Home’, IEEE Access, vol. 7, pp. 166593-166605. doi:10.1109/acess.2019.2953133. Q1 (JIF: 4.0).

31.Deep, S, Zheng, X, Karmakar, C & Jin, J 2019, ‘A Survey on Anomalous Behavior Detection for Elderly Care using Dense-sensing Networks’, IEEE Communications Surveys and Tutorials, vol. 22, pp. 352-370. doi: 10.1109/COMST.2019.2948204. Q1 (JIF:22.97).

32.Li, X, Xu, G, Zheng, X, Liang, K, Papaousis, E, Li, T & Wang, W 2019, ‘Using Sparse Representation to Detect Anomalies in Complex WSNs’, ACM Transactions on Intelligent Systems and Technology, vol. 10, pp. 64:1-64:18. doi.org/10.1145/3331147. Q2 (JIF:9.39).

33.Zhou, G, Xu, G, Hao, J, Chen, S, Xu, J & Zheng, X 2019, ‘Generalized Centered Two-Dimensional Principal Component Analysis’, IEEE Transactions on Cybernetics, pp. 1-12. doi: 10.1109/TCYB.2019.2931957. Q1 (JIF:10.38).

34.Wang, T, Ke, H.X. & Zheng, X 2019, ‘Big Data Cleaning Based on Mobile Edge Computing in industrial Sensor-Cloud’, IEEE Transactions on Industrial Informatics, vol. 16, pp. 1321-1329. doi: 10.1109/TII.2019.2938861. Q1 (JIF:8.70).  HIGHLY CITED PAPER

35.Wang, T, Luo, H & Zheng, X 2019 ‘Crowdsourcing Mechanism for Trust Evaluation in CPCS based on Intelligent Mobile Edge Computing’, ACM Transactions on Intelligent Systems and Technology, vol. 10, pp.62:1-62:19. doi.org/10.1145/3324926. Q2 (JIF:3.82).  HIGHLY CITED PAPER

36.Wu, J, Li, J.N., Xu, G.Q., Li, J.H., Zheng, X & Jolfaei, A. 2019, ‘Integrating NFV and ICN for advanced driver assistance systems’, IEEE Internet of Things Journal, pp.1-1. doi:10.1109/JIOT.2019.2953988. Q1 (JIF: 9.51).

37.Hu, Z, Xu, G.Q., Zheng, X, Liu, J, Li, Z & Sheng, Q.Z. 2019, ‘SSL-SVD: Semi-Supervised Learning Based Sparse Trust Recommendation’, ACM Transactions on Internet Technology, vol. 20, pp. 4:1-4:20, CORE A (JIF: 2.38).

38.Xie, Haiming, Tian, Guangyu, Du, Guangqian, Huang, Yong, Chen, Hongxu, Zheng, Xi & Luan, Tom H 2018, ‘A Hybrid Method Combining Markov Prediction and Fuzzy Classification for Driving Condition Recognition’, IEEE Transactions on Vehicular Technology, vol. 67, pp. 10411–10424. Q1 (JIF: 5.33).

39.Pan, Lei, Zheng, Xi, Kolar, Philip & Bangay, Shaun 2018, ‘Object localisation through clustering unreliable ultrasonic range sensors’, International journal of sensor networks, vol. 27, pp. 268–280.

40.Radhappa, Harish, Pan, Lei, Zheng, Xi, James & Wen, Sheng 2018, ‘Practical overview of security issues in wireless sensor network applications’, International journal of computers and applications, vol. 40, no. 4, pp. 202–213.

41.Yu, Dongjin, Jin, Yike, Zhang, Yuqun & Zheng, Xi 2018, ‘A survey on security issues in services communication of Microservices enabled fog applications’, Concurrency and Computation: Practice and Experience, pp. 1-19.  CORE A (JIF:1.16).

42.Zeng, Xianjiao, Xu, Guangquan, Zheng, Xi, Xiang, Yang & Zhou, Wanlei 2018, ‘E-AUA: An efficient anonymous user authentication protocol for mobile IoT’, IEEE Internet of Things Journal, vol.6, pp. 1506-1519. Q1 (JIF: 9.51). HIGHLY CITED PAPER

43.Xu, G.Q., Zhang, Y, Arun, K & Zheng, X 2018, ‘CSP-E 2 : An abuse-free Contract Signing Protocol with low-storage TTP for energy efficient electronic transaction ecosystems’, Information Sciences, vol. 476, pp. 505-515. Q1 (JIF:5.52). HIGHLY CITED PAPER

44.Anvari, Armin, Pan, Lei & Zheng, Xi 2017, ‘Generating security questions for better protection of user privacy’, International Journal of Computers and Applications, vol. 42, pp. 329-350.

45.Pan, Lei, Zheng, Xi, Chen, HX, Luan, T, Bootwala, Huzefa & Batten, Lynn 2017, ‘Cyber security attacks to modern vehicular systems’, Journal of information security and applications, vol. 36, pp. 90–100. Q2 (JIF:1.53).

46.Zheng, Xi, Julien, Christine, Chen, Hongxu, Podorozhny, Rodion & Cassez, Franck 2017, ‘Real-time simulation support for runtime verification of cyber-physical systems’, ACM Transactions on Embedded Computing Systems (TECS), vol. 16, pp. 106 :1-106:24. doi.org/10.1145/3063382, CORE A (JIF: 1.36).

47.Zheng, Xi, Julien, Christine, Podorozhny, Rodion, Cassez, Franck & Rakotoarivelo, Thierry 2016, ‘Efficient and scalable runtime monitoring for cyber–physical system’, IEEE Systems Journal, vol. 12, no. 2, pp. 1667–1678. Q1 (JIF:2.11).

48.Zheng, Xi, Julien, Christine, Kim, Miryung & Khurshid, Sarfraz 2015, ‘Perceptions on the state of the art in verification and validation in cyber-physical systems’, IEEE Systems Journal, vol. 11, no. 4, pp. 2614–2627. Q1 (JIF:2.11).

Refereed conference proceedings

49.Yao, D, Zheng, X, Zhang, T.Y., Chen, C, Nan, L.G. & Kim, M 2020, ‘An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models’, IEEE International Conference on Pervasive Computing and Communications (PerCom) (Fully Refereed Conference Proceeding). CORE A*.

50.Zhang, C, Liu, X, Zheng, X, Li, R & Liu, H 2020, ‘FengHuoLun: A Federated Learning based Edge Computing Platform for Cyber-Physical Systems’, IEEE International Conferene on Pervasive Computing and Communications (PerCom). CORE A*.

51.Zhang, T.H., Shen, Z.S., Jin, J & Zheng, X 2020, ‘A Democratically Collaborative Learning Scheme for Fog-enabled Pervasive Environments’, IEEE International Conferene on Pervasive Computing and Communications (PerCom). CORE A*.

52.Fu, M, Guan, W, Zheng, X, Lu, J, Zhang, T & Yang, J 2020, 'ICS-Assist: Intelligent Customer Inquiry Resolution Recommendation in Online Customer Service for Large E-Commerce Businesses'. International Conference on Service-Oriented Computing. CORE A.

53.Li, R, Liu, X, Zheng, X, Zhang, C & Liu, H 2020, ‘TDD4Fog: a test-driven software development platform for Fog Computing systems’.  IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGrid). CORE A.

54.Lu, Jianchao, Wang, Jiaxing, Zheng, Xi, Karmakar, Chandan & Rajasegarar, Sutharshan 2019, ‘Detection of Smoking Events from Confounding Activities of Daily Living’, Proceedings of the Australasian Computer Science Week Multiconference, pp. 1-9.

55.Deep, S & Zheng, X 2019, ‘Leveraging CNN and Transfer Learning for Vision-based Human Activity Recognition’, International Telecommunication Networks and Application Conference. pp. 1-4.

56.Hu, Z, Xu, G.Q., Zheng, X, Liu, J & Li, Z 2019, ‘SSL-STR: Semi-Supervised Learning for Sparse Trust Recommendation’, IEEE Global Communications Conference. pp. 1-6. CORE B.

57.Lu, J.C., Zheng, X, Wang, J.X., Sheng, Q.Z. & Zhou, W.L. 2019, ‘MFE-HAR: Multiscale Feature Engineering for Human Activity Recognition Using Wearable Sensors’, International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. pp. 180-189. CORE A.

58.Luo, G, Zheng, X, Liu, H, Xu, R.B., Nagumothu, D, Janapareddi, R, Zhuang, E & Liu, X 2019, ‘Verication of Microservices Using Metamorphic Testing’, International Conference on Algorithms and Architectures for Parallel Processing, pp. 138—152. CORE B.

59.Zhang, T, Shen, Z, Jin, J, Tagami, A, Zheng, X & Yang, Y 2019, ‘ESDA: An Energy-Saving Data Analytics Fog Service Platform’, International Conference on Service-Oriented Computing. pp. 171-185. CORE A.

60.Fu, Min, Wong, Chi Man, Zhu, Hai, Huang, Yanjun, Li, Yuanping, Zheng, Xi, Wu, Jia, Yang, Jian & Vong, Chi Man 2018, ‘DAliM: Machine Learning Based Intelligent Lucky Money Determination for Large-Scale E-Commerce Businesses’, International Conference on Service-Oriented Computing, pp. 740–755. CORE A.

61.Liu, Mengdi, Xu, Guangquan, Zhang, Jun, Shankaran, Rajan, Luo, Gang, Zheng, Xi & Zhang, Zonghua 2018, ‘Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-Scale Recommendation Systems’, International Conference on Algorithms and Architectures for Parallel Processing, pp. 495–510. CORE B.

62.Wang, Derek, Zhou, Wanlei, Zheng,  Xi, Wen, Sheng, Zhang, Jun & Xiang, Yang 2018, ‘Who Spread to Whom? Inferring Online Social Networks with User Features’, 2018 IEEE International Conference on Communications (ICC), pp. 1–6. CORE B.

63.Zhang, Ning, Xu, Guangquan, Meng, Guozhu & Zheng, Xi 2018, ‘SoProtector: Securing Native C/C++ Libraries for Mobile Applications’, International Conference on Algorithms and Architectures for Parallel Processing, pp. 417–431. CORE B.

64.Wang, D, Zhou, W, Zheng, X, Wen, S, Zhang, J & Xiang, Y 2018, ‘Who Spread to Whom? Inferring Online Social Networks with User Features Sign In or Purchase’, IEEE International Conference on Communications. pp. 1-6. CORE B.

65.Pham, Vu Viet Hoang, Liu, Xiao, Zheng, Xi, Fu, Min, Deshpande, Sahil Vikas, Xia, Weidong, Zhou, Roger & Abdelrazek, Mohamed 2017, ‘PaaS-black or white: an investigation into software development model for building retail industry SaaS’, 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE), pp. 285–287. CORE A*.

66.Zhang, Yuqun, Zhang, Mengshi, Zheng, Xi & Perry, Dewayne E 2017, ‘Service2vec: a vector representation for Web services’, 2017 IEEE International Conference on Web Services (ICWS), pp. 890–893. CORE A.

67.Samundra, D & Zheng, X 2019, ‘Hybrid model featuring CNN and LSTM architecture for Human Activity Recognition on smartphone sensor data’, International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 259-264. CORE B.

68.Zheng, Xi, Bansal, Akanksha & Lease, Matthew 2017, ‘Bullseye: structured passage retrieval and document highlighting for scholarly search’, Proceedings of the Australasian Computer Science Week Multiconference, pp. 1-4.

69.Zheng, Xi, Pan, Lei & Yilmaz, Erdem 2017, ‘Security analysis of modern mission critical android mobile applications’, Proceedings of the Australasian Computer Science Week Multiconference, pp. 1-9.

70.Zheng, Xi, Jiang, Jiaojiao, Zhang, Yuqun, Deng, Yao, Fu, Min, Zheng, Tianlei & Liu, Xiao 2017, ‘Smartvm: A multi-layer microservice-based platform for deploying saas’, 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), pp. 470–474. CORE B.

71.Zheng, Xi, Pan, Lei, Chen, Hongxu, Di Pietro, Rick & Batten, Lynn 2017, ‘A testbed for security analysis of modern vehicle systems’, 2017 IEEE Trustcom/BigDataSE/ICESS, pp. 1090–1095. CORE A.

72.Bhandari, Babin, Lu, JianChao, Zheng, Xi, Rajasegarar, Sutharshan & Karmakar, Chandan 2017, ‘Non-invasive sensor based automated smoking activity detection’, 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp. 845–848.

73.Zheng, Tianlei, Zhang, Yuqun, Zheng, Xi, Fu, Min & Liu, Xiao 2017, ‘Bigvm: A multi-layer-microservice-based platform for deploying saas’, 2017 Fifth International Conference on Advanced Cloud and Big Data (CBD), pp. 45–50.

74.Zheng, Xi & Julien, Christine 2015, ‘Verification and validation in cyber physical systems: research challenges and a way forward’, 2015 IEEE/ACM 1st International Workshop on Software Engineering for Smart Cyber-Physical Systems, pp. 15–18.

75.Zheng, Xi, Julien, Christine, Podorozhny, Rodion & Cassez, Franck 2015, ‘Braceassertion: Runtime verification of cyber-physical systems’, 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems, pp. 298–306. CORE B.

76.Zheng, Xi 2014, ‘Physically informed assertions for cyber physical systems development and debugging’, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS), pp. 181–183. CORE A*.

77.Zheng, Xi, Perry, Dewayne E & Julien, Christine 2014, ‘WiP abstract: BraceForce: Software engineering support for sensing in CPS applications’, 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), pp. 228–228.

78.Zheng, Xi, Perry, Dewayne E & Julien, Christine 2014, ‘Braceforce: A middleware to enable sensing integration in mobile applications for novice programmers’, Proceedings of the 1st International Conference on Mobile Software Engineering and Systems, pp. 8–17.

79.Zheng, Xi, Pan, Lei, Chen, Hongxu & Wang, Peiyin 2016, ‘Investigating security vulnerabilities in modern vehicle systems’, International Conference on Applications and Techniques in Information Security, pp. 29–40.


主要社会任职:


Guest Editor for IEEE Transactions on Industry Informatics, and Future Generation Computer Systems

Reviewer for prestigious journals including ACM Transactions on Sensor Networks, ACM Transactions on InternetTechnology, ACM Transactions on Design Automation of Electronic Systems, IEEE Transactions on Industry Informatics, IEEE Transactions on Cloud Computing, Pervasive and Mobile Computing, IEEE Transaction on Cloud Computing, IEEE Internet of Things, IEEE Systems Journal, Future Generation Computer Systems, Journal of Parallel and Distributed Computing.

Program Committee member of a CORE A* conference in pervasive systems – IEEE International Conference on Pervasive Computing and Communications 2017, 2018,2019, 2020, 2021 http://www.percom.org

Program Committee member of a CORE A conference in Trust and Security – IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2020

Publication Chair for International Conference on Science of Cyber Security 2020

Publicity Chair of International workshop on Emerging Computing Paradigms and Context in Business Process Management (BPM) 2020