Xun Yi

Professor Xun Yi

Professor

Details

  • College: School of Computing Technologies
  • Department: School of Computing Technologies
  • Campus: City Campus Australia
  • xun.yi@rmit.edu.au

Open to

  • Masters Research or PhD student supervision

About

Xun Yi is currently a Professor with the School of Computer Science and IT, RMIT University, Australia. His research interests include data privacy, cloud security, cyber security, wireless and mobile security, and applied cryptography. He has published more than 150 research papers in international journals, such as IEEE Trans. Knowledge and Data Engineering, IEEE Trans. Wireless Communication, IEEE Trans. Dependable and Secure Computing, IEEE Trans. Circuit and Systems, and conference proceedings. Since 2014, he has been an Associate Editor for IEEE Trans. Dependable and Secure Computing.

Industry Experience:
Program Co-Chair, Australasian Information Security Conference (AISC), Canberra, Australia, 2016.
Program Co-Chair, Australasian Information Security Conference (AISC), Sydney, Australia, 2015.

Supervisor projects

  • Advanced Multimodal Generative AI for Nuanced Scam Mitigation: A Privacy-Centric Approach Leveraging Real-Life Datasets
  • 17 Oct 2024
  • Leveraging Computer Vision-Informed Strategies for Large-Scale Language Models and Multimodal Backdoor Learning Defence
  • 7 May 2024
  • Privacy-Preserving Fairness Verification for Graph Neural Networks
  • 13 Nov 2023
  • Cross Domain Searchable Encryption
  • 6 Jun 2023
  • Privacy Preservation in Machine Learning Algorithms
  • 30 Mar 2023
  • On-Camera Cataloguing and Verification Systems for Video Surveillance, and its Application for Law Enforcement
  • 9 Jan 2023
  • TOWARDS INTEGRATING PRIVACY PRESERVING BLOCKCHAIN BASED FEDERATED LEARNING FOR HUMAN DISEASE DIAGNOSIS
  • 15 Dec 2022
  • Secure, Robust, and Scalable Privacy Preserving Data Analytics and Machine Learning Framework for IoT System
  • 5 Dec 2022
  • Maximising renewable energy for water corporations through machine learning, peer-to-peer trading, and demand management
  • 30 Nov 2022
  • Privacy-preserving Biometrics in Distributed Machine Learning Environments
  • 18 Nov 2022
  • Privacy-Preserving Collaborative Learning Over Medical Data
  • 25 Oct 2022
  • Evaluating the Efficacy of Trust-Based Intelligence Routing Algorithm Using Neural Networks for Delay Tolerant Network in the Enhancement of the Internet of Things(IoT) Security
  • 24 Mar 2022
  • Privacy Protection for Verifiable Data Structures
  • 22 Feb 2022
  • Efficient Machine Learning Anomaly Detection Model with Attention Mechanism for Cloud Security
  • 9 Feb 2022
  • Defending Ethereum and the alike from crypto scams
  • 28 Jul 2021
  • Privacy-Preserving IoT Data Analytics for Mobile Edge Computing
  • 12 Mar 2021
  • Privacy-Preserving Federated Learning
  • 12 Mar 2021
  • Privacy-Preserving Models in Edge-Cloud Interplay for Smart Systems
  • 29 Apr 2020
  • Identity Cloning Detection in Social Sensor-Clouds
  • 13 Mar 2020
  • Balancing Personalisation and Privacy: User Matching and Recommender Systems in Social Networks
  • 21 Feb 2020
  • Signature-based Privacy-preserving Data Authentication for IoT
  • 24 Apr 2019
  • Internet of Things Data Contextualisation for Scalable Information Processing, Security, and Privacy
  • 1 Mar 2019
  • Towards a Secure and Scalable Blockchain Protocol for Data-Intensive Applications
  • 6 Feb 2019
  • Blockchain-based AI-enabled Data Protection for the Internet of Things
  • 3 Sep 2018
  • Supply Chain Management of Offsite Construction in Australian Low-rise Residential Buildings
  • 30 Aug 2018
  • Practical Secure Data Analytics Systems with Privacy Assurance
  • 2 Jul 2018
  • Secure Lightweight Authentication with Privacy Protection in IoT and its Applications
  • 3 Apr 2017
  • Preserving Privacy in Edge Computing
  • 7 Oct 2016
  • Privacy Preserving Recommender system
  • 9 Mar 2016
  •  Privacy-preserving data analytic in cloud computing 
  • 13 Nov 2015
  • Publicity Verifiable Ranked Choice Online Voting System
  • 30 Mar 2015

Teaching interests

Supervisor interests
Date privacy, Privacy-preserving data mining, Network security protocols, Mobile and wireless communication security protocols, Applied cryptography, E-Commerce security, Mobile agent security

Research interests

Data Format, Information Systems, Distributed Computing, Computer Software, Other Information and Computing Sciences, Computation Theory and Mathematics
aboriginal flag
torres strait flag

Acknowledgement of Country

RMIT University acknowledges the people of the Woi wurrung and Boon wurrung language groups of the eastern Kulin Nation on whose unceded lands we conduct the business of the University. RMIT University respectfully acknowledges their Ancestors and Elders, past and present. RMIT also acknowledges the Traditional Custodians and their Ancestors of the lands and waters across Australia where we conduct our business - Artwork 'Sentient' by Hollie Johnson, Gunaikurnai and Monero Ngarigo.