Zeyar Aung’s Publications

Zeyar Aung's Google Scholar Profile


[T] = Thesis, [E] = Edited Book, [B] = Book Chapter, [J] = Journal Paper, [C] = Conference Paper, [W] = Workshop Paper, [P] = Poster/Short Paper.

[CORE] = http://www.core.edu.au (2017), [IF] = Impact Factor (2016), [AR] = Acceptance Rate.

2017
  1. [E] W.L. Woon, Z. Aung, O. Kramer, and S.E. Madnick (Eds.), Data Analytics for Renewable Energy Integration - Fourth ECML PKDD Workshop, DARE 2016, Riva del Garda, Italy, September 23, 2016, Revised Selected Papers, Lecture Notes in Computer Science (LNCS) Vol. 10097, Springer, 2017. (link)
  2. [J] B. Neupane, W.L. Woon, and Z. Aung, "Ensemble prediction model with expert selection for electricity price forecasting," Energies, 10:77, doi:10.3390/en10010077, 2017. (link) [IF 2.077]
  3. [J] I. Karakatsanis, W. AlKhader, F. MacCrory, A. Alibasic, M.A. Omar, Z. Aung, and W.L. Woon, "Data mining approach to monitoring the requirements of the job market: A case study," Information Systems, 65:1-6, 2017. (pdf) [IF 1.832; CORE A*]
  4. [C] A. Al-Shehhi, W.L. Woon, and Z. Aung, "Investigating human behavior during Ramadan through network structure: Evidence from Twitter," 2017 IEEE International Conference on Inudstrial Enginnering and Engineering Management (IEEM), Singapore, December 2017, accepted for publication.
  5. [C] M. Al Ali, D. Svetinovic, Z. Aung, and S. Lukman, "Malware detection in Android mobile platform using machine learning algorithms," 2017 International Conference on Infocom Technologies and Unmanned Systems (ICTUS), Dubai, UAE, December 2017, accepted for publication.
  6. [C] P. Dimitropoulos, Z. Aung, and D. Svetinovic, "Continuous integration build breakage rationale: Travis data case study," 2017 International Conference on Infocom Technologies and Unmanned Systems (ICTUS), Dubai, UAE, December 2017, accepted for publication.
  7. [C] F. Al Shamsi, S. Bamatraf, T. Rahwan, Z. Aung, and D. Svetinovic, "Systems security requirements analysis for M-Government transformation," 2017 XXVI IEEE International Conference on Information, Communication and Automation Technologies (ICAT), Sarajevo, Bosnia and Herzegovina, October 2017, accepted for publication.
  8. [C] S. Muzaffar, O.T. Waheed, Z. Aung, and I. Elfadel, "Single clock-cycle, multilayer encryption algorithm for single-channel IoT communications," 2017 IEEE Conference on Dependable and Secure Computing (DSC), Taipei, Taiwan, August 2017, accepted for publication.
  9. [C] P. Manandhar, Z. Aung, and P. Marpu, "Segmentation based building detection in high resolution satellite images," 2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), Fort Worth, Texas, USA, July 2017, accepted for publication. [CORE C]
  10. [C] A. Karapetyan, S.K. Azman, and Z. Aung, "Assessing the privacy cost in centralized event-based demand response for microgrids," in Proc. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pages 494-501, 2017. [CORE A]
  11. [C] D. Syed, T.-H. Chang, D. Svetinovic, T. Rahwan, and Z. Aung, "Security for complex cyber-physical and industrial control systems: Current trends, limitations, and challenges," in Proc. 2017 Pacific-Asia Conference on Information Systems (PACIS), paper no. 180, 2017. [CORE A]
  12. [P] P. Manandhar, Z. Aung, and P. Marpu, "Building detection based on segmentation in high resolution satellite images," 2017 UAE Graduate Students Research Conference (GSRC), Abu Dhabi, UAE, 2016.

2016
  1. [B] A. Sanchez, D. Li, Z. Aung, and J.R. Williams, "Cyber security of smart meters," (book chapter) in Smart Grid Handbook Volume 3, 1st Edition, Wiley, pages 1175-1194, 2016.
  2. [J] A.A. Mohammed and Z. Aung, "Ensemble learning approach for probabilistic forecasting of solar power generation," Energies, 9:1017, doi:10.3390/en9121017, 2016. (link) [IF 2.077]
  3. [J] M.A. Azim, Z. Aung, W. Xiao, V. Khadkikar, and A. Jamalipour, "SPSA-NC: Simultaneous perturbation stochastic approximation localization based on neighbor confidence," Wireless Communications and Mobile Computing, 16: 1570-1587, 2016. (pdf) [IF 0.922; CORE A]
  4. [C] F. Al Shamsi and Z. Aung, "Automatic patent classification by a three-phase model with document frequency matrix and boosted tree," in Proc. 5th IEEE International Conference on Electronic Devices, Systems, and Applications (ICEDSA), pages 1-4, 2016. (pdf)
  5. [C] S. Alwahedi, M. Al Ali, F. Ishowo-Oloko, W.L. Woon, and Z. Aung, "Security in mobile computing: Attack vectors, solutions, and challenges," in Proc. 8th EAI International Conference on Mobile Networks and Management (MONAMI), LNICST Vol. 191, pages 177-19, 2016. (pdf)
  6. [W] A. Alibasic, R. Al Junaibi, Z. Aung, W. L. Woon, and M. A. Omar, "Cybersecurity for smart cities: A brief review," in Proc. 4th ECML PKDD Workshop on Data Analytics for Renewable Energy Integration (DARE), LNCS Vol. 10097, pages 22-30, 2016. (pdf)
  7. [P] A. Al-Shehhi and Z. Aung, "Comprehensive evaluation of univariate and multivariate models for forecasting mean and volatility of short-term wind speed," 2016 UAE Graduate Students Research Conference (GSRC), Al Ain, UAE, 2016.
  8. [P] P. Manandhar, Z. Aung, P. Marpu and S. El Khatib, "Extraction of Abu Dhabi downtown road network from satellite images using ensemble machine learning and graph theory approach," 2016 UAE Graduate Students Research Conference (GSRC), Al Ain, UAE, 2016.

2015
  1. [E] W.L. Woon, Z. Aung, and S.E. Madnick (Eds.), Data Analytics for Renewable Energy Integration - Third ECML PKDD Workshop, DARE 2015, Porto, Portugal, September 11, 2015, Revised Selected Papers, Lecture Notes in Computer Science (LNCS) Vol. 9518, Springer, 2015. (link)
  2. [J] M.A. Faisal, Z. Aung, J. Williams, and A. Sanchez, "Data-stream-based intrusion detection system for advanced metering infrastructure in smart grid: A feasibility study," IEEE Systems Journal, 9: 31-44, 2015. (pdf) [IF 2.114]
  3. [J] D. Li, Z. Aung, J. Williams, and A. Sanchez, "Efficient and fault-diagnosable authentication architecture for AMI in smart grid," Security and Communication Networks, 8: 598–616, 2015. (pdf) [IF 0.806]
  4. [J] M.A. Azim and Z. Aung, "Power allocation in cooperative sensor networks: A stochastic approximation approach," IET Journal of Engineering, DOI: 10.1049/joe.2014.0184. 2015. (pdf)
  5. [C] D. Masri, W.L. Woon, and Z. Aung, "Soil property prediction: An extreme learning machine approach," in Proc. 22nd International Conference on Neural Information Processing (ICONIP) Part II, LNCS Vol. 9490, pages 18-27, 2015. (pdf) [CORE A]
  6. [C] W.L. Woon, Z. Aung, W. Alkhader, D. Svetinovic, and M.A. Omar, "Changes in occupational skills - A case study using non-negative matrix factorization," in Proc. 22nd International Conference on Neural Information Processing (ICONIP) Part III, LNCS Vol. 9491, pages 627-634, 2015. (pdf) [CORE A]
  7. [C] Z. Shoroye, W. Yaqub, A.A. Mohammed, Z. Aung, and D. Svetinovic, "Exploring social contagion in open-source communities by mining software repositories," in Proc. 22nd International Conference on Neural Information Processing (ICONIP) Part IV, LNCS Vol. 9492, pages 120-217, 2015. (pdf) [CORE A]
  8. [C] D. Masri, Z. Aung, and W.L. Woon, "Image classification using appearance based features," in Proc. 11th IEEE International Conference on Innovations in Information Technology (IIT), pages 128-133, 2015. (pdf)
  9. [C] F.A.A. Alseiari and Z. Aung, "Real-time anomaly-based distributed intrusion detection systems for advanced metering infrastructure utilizing stream data mining," in Proc. 2015 IEEE International Conference on Smart Grid and Clean Energy Technologies (ICSGCE), pages 148-153, 2015. (pdf)
  10. [C] S. Lukman, Z. Aung, and K. Sim, "Multiple structural clustering of bromodomains of the bromo and extra terminal (BET) proteins highlights subtle differences in their structural dynamics and acetylated leucine binding pocket," in Proc. 15th International Conference on Computational Science (ICCS), Procedia Computer Science Vol. 51, pages 735-744, 2015. (pdf) [CORE A]
  11. [C] A.A. Mohammed, W. Yaqub, and Z. Aung, "Probabilistic forecasting of solar power: An ensemble learning approach," in Proc. 7th International KES Conference on Intelligent Decision Technologies (KES-IDT), Smart Innovation, Systems and Technologies Vol. 39, pages 449-458, 2015. (pdf) [CORE C]
  12. [C] Y.C. Chang and Z. Aung, "AuthorRank: A new scheme for identifying field-specific key researchers," in Proc. 8th International Conference on Information Resources Management (Conf-IRM), pages P01:1-13, 2015. (pdf) [CORE B]
  13. [C] P. Manandhar, Z. Aung, W.L. Woon, and P.R. Marpu, "Random forest ensemble learning for object recognition using RGB features along object edge," in Proc. 4th International Conference on Communications and Information Technology (ICCIT), pages 1-6, 2015. (pdf)
  14. [C] W. Yaqub, A.A. Mohammed, and Z. Aung, "Empirical study of probability and severity of an event on human communication network," in Proc. 17th UKSim-AMSS International Conferecne and Modelling and Simulation (UKSim), pages 217-222, 2015. (pdf)
  15. [C] M.A. Azim, Z. Aung, and M.E. Rivero-Angeles, "Bacterial foraging-based power allocation for cooperative wireless sensor networks," in Proc. 6th International Conference on Information Science and Applications (ICISA), LNEE Vol. 339, pages 67-76, 2015. (pdf) [AR 30%]
  16. [C] N.O. Al Abdouli, Z. Aung, W.L. Woon, and D. Svetinovic, "Tackling class imbalance problem in binary classification using augmented neighborhood cleaning algorithm," in Proc. 6th International Conference on Information Science and Applications (ICISA), LNEE Vol. 339, pages 827-834, 2015. (pdf) [AR 30%]
  17. [W] A. Al-Shehhi, Z. Aung, and W.L. Woon, "Argument visualization and narrative approaches for collaborative spatial decision making and knowledge construction: A case study for an offshore wind farm project," in Proc. 3rd ECML PKDD Workshop on Data Analytics for Renewable Energy Integration (DARE), LNCS Vol. 9518, pages 134-155, 2015. (pdf)
  18. [P] A. A. Mohammed, W. Yaqub, and Z. Aung, "Probabilistic forecasting of solar power generation," 2015 UAE Graduate Students Research Conference (GSRC), Abu Dhabi, UAE, 2015.
  19. [P] P. Manandhar, Z. Aung, W.L. Woon, and P. Marpu, "Ensemble learning using random-forest for classification of images with extraction of RGB feature along edges," 2015 UAE Graduate Students Research Conference (GSRC), Abu Dhabi, UAE, 2015.

2014
  1. [E] W.L. Woon, Z. Aung, and S.E. Madnick (Eds.), Data Analytics for Renewable Energy Integration - Second ECML PKDD Workshop, DARE 2014, Nancy, France, September 19, 2014, Revised Selected Papers, Lecture Notes in Computer Science (LNCS) Vol. 8817, Springer, 2014. (link)
  2. [J] M.A. Azim, Z. Aung, W. Xiao and V. Khadkikar, "Constrained cross-entropy localization technique for wireless sensor networks," International Journal of Distributed Sensor Networks, Article ID 267369, 2014. (pdf) [IF 0.906; CORE C]
  3. [J] D. Li, Z. Aung, J. Williams, and A. Sanchez, "P3: Privacy preservation protocol for automatic appliance control application in smart grid," IEEE Internet of Things Journal, 1: 414-429, 2014 (pdf) [IF 7.596]
  4. [J] D. Li, Z. Aung, J. Williams, and A. Sanchez, "No peeking: Privacy-preserving demand response system in smart grids," International Journal of Parallel, Emergent and Distributed Systems, 29: 290-315, 2014. (pdf) [IF 1.2; CORE B]
  5. [J] R. Oentaryo, E.P. Lim, F. Zhu, D. Lo, M. Finegold, C. Phua, E.Y. Cheu, G.E. Yap, K. Sim, M.N. Nguyen, K. Perera, B. Neupane, M.A. Faisal, Z. Aung, W.L. Woon, C. Wei, D. Patel, and D. Berrar, "Detecting fraudulent patterns in online advertising: A data mining approach," Journal of Machine Learning Research, 15: 99-140, 2014. (pdf) [IF 3.44; CORE A]
  6. [J] M.A. Azim, Z. Aung, S. Moad, N. Bouabdallah, M. E. Rivero-Angeles, I. Leyva-Mayorga, "Energy-efficient methods for highly correlated spatio-temporal environments in wireless sensor network communications," Wireless Sensor Network, 6: 67-92, 2014. (pdf)
  7. [C] D. Li, S. Sampalli, Z. Aung, J. Williams, and A. Sanchez, "Fine-grained encryption for search and rescue operation on Internet of Things," in Proc. 2014 IEEE Asia-Pacific World Congress on Computer Science and Engineering (APWC on CSE), pages 1-9, 2014. (pdf)
  8. [C] W.L. Woon, K.D. Wong, Z. Aung, and D. Svetinovic, "Document versioning using feature space distances," in Proc. 21st International Conference on Neural Information Processing (ICONIP) Part II, LNCS Vol. 8835, pages 487-494, 2014. (pdf) [CORE A]
  9. [C] M.A. Faisal, Z. Aung, W.L. Woon, and D. Svetinovic, "Augmented query strategies for active learning in stream data mining," in Proc. 21st International Conference on Neural Information Processing (ICONIP) Part III, LNCS Vol. 8836, pages 431-438, 2014. (pdf) [CORE A]
  10. [C] P. Manandhar and Z. Aung, "Towards practical anomaly-based intrusion detection by outlier mining on TCP packets," in Proc. 25th International Conference on Database and Expert Systems Applications (DEXA) Part II, LNCS Vol. 8645, pages 164-173, 2014. (pdf) [CORE B]
  11. [C] N. Liu, W.L. Woon, Z. Aung, and A. Afshari, "Handling class imbalance in customer behavior prediction,"  in Proc. 2014 IEEE International Conference on Collaboration Technologies and Systems (CTS), pages 100-103, 2014. (pdf) [CORE C]
  12. [C] D. Li, Z. Aung, J. Williams, and A. Sanchez, "P2DR: Privacy-preserving demand response system in smart grids," in Proc. 2014 IEEE International Conference on Computing, Networking and Communications (ICNC), pages 41-47, 2014. (pdf) [AR 27%]
  13. [C] P. Manandhar and Z. Aung, "Intrusion detection based on outlier detection method," in Proc. 2014 International conference on Intelligent Systems, Data Mining and Information Technology (ICIDIT), pages 68-73, 2014. (pdf) [Best session paper award; AR 50%]
  14. [C] A. Al Shehhi, M. Oudah, and Z. Aung, "Investigating factors behind choosing a cryptocurrency," in Proc. 2014 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), pages 1443-1447, 2014. (pdf)
  15. [W] K.S. Perera, Z. Aung, and W.L. Woon, "Machine learning techniques for supporting renewable energy generation and integration: A survey," in Proc. 2nd ECML PKDD Workshop on Data Analytics for Renewable Energy Integration (DARE), LNCS Vol. 8817, pages 81-96, 2014. (pdf)
  16. [W] W.L. Woon, Z. Aung, and S. Madnick, "Forecasting and visualization of renewable energy technologies using keyword taxonomies," in Proc. 2nd ECML PKDD Workshop on Data Analytics for Renewable Energy Integration (DARE), LNCS Vol. 8817, pages 122-136, 2014. (pdf)

2013
  1. [B] Z. Aung, "Database systems for the smart gird," (book chapter) in Smart Grid: Opportunities, Developments and Trends (edited by A.B.M. Shawkat Ali), Springer Press, pages 151-168, 2013. (preprint
  2. [B] Z. Aung and K.K. Nyunt, "Constructive knowledge management model and information retrieval methods for software engineering," (book chapter) in Software Development Techniques for Constructive Information Systems Design (edited by Khalid A. Buragga and Noor Zaman), pages 377-393, IGI Global Press, 2013. (preprint)
  3. [J] D. Li, Z. Aung, S. Sampalli, J. Williams, and A. Sanchez, "Privacy preservation scheme for multicast communications in smart buildings of the smart grid," Smart Grid and Renewable Energy, 4: 313-324, 2013. (pdf)
  4. [J] Z. Aung, "Discussion on the manuscript 'Short-term forecasting of the daily load curve for residential electricity usage in the smart grid' by S. Ghosh et al.," Applied Stochastic Models in Business and Industry, 29: 624-625, 2013. (pdf) [IF 0.532]
  5. [C] K.S. Perera, B. Neupane, M.A. Faisal, Z. Aung, and W. L. Woon, "A novel ensemble learning-based approach for click fraud detection in mobile advertising," in Proc. 2013 International Conference on Mining Intelligence and Knowledge Exploration (MIKE), LNCS Vol. 8284, pages 370-382, 2013. (pdf) [AR 28%]
  6. [C] M.A. Azim and Z. Aung, "Simultaneous perturbation stochastic approximation-based localization algorithms for mobile devices," in Proc. 6th IEEE International Conference on Developments in eSystems Engineering (DeSE), pages 63-68, 2013. (pdf)
  7. [C] I. Khamis and Z. Aung, "Outlier preprocessing in wireless sensor networks: A two-layered ellipse approach," in Proc. 6th IEEE International Conference on Developments in eSystems Engineering (DeSE), page 73-78, 2013. (pdf)
  8. [C] K.A. Ahmed, Z. Aung, and D. Svetinovic, "Smart grid wireless network security requirements analysis," in Proc. 2013 IEEE International Conference on Cyber, Physical and Social Computing (CPSCom), pages 871-878, 2013, 2013. (pdf)
  9. [C] W. Shen, V. Babushkin, Z. Aung, and W.L. Woon, "An ensemble model for day-ahead electricity demand time series forecasting," in Proc. 4th ACM Conference on Future Energy Systems (e-Energy), pages 51-62, 2013. (pdf) [AR 29%]
  10. [P] D. Svetinovic and Z. Aung, "Smart grid cyber security research at Masdar Institute of Science and Technology," in  Proc. 2013 Secure Abu Dhabi Conference (SAD), pages 15-16, 2013. (pdf)


2012

  1. [C] M. Qasim, W.L. Woon, Z. Aung, and V. Khadkikar, "Intelligent edge detector based on multiple edge maps," in Proc. 2012 IEEE International Conference on Computer Systems and Industrial Informatics (ICCSII), pages 1-6, 2012. (pdf) [AR 60%]
  2. [C] B. Neupane, K.S. Perera, Z. Aung, and W.L. Woon, "Artificial neural network-based electricity price forecasting for smart grid deployment," in Proc. 2012 IEEE International Conference on Computer Systems and Industrial Informatics (ICCSII), pages 1-6, 2012. (pdf) [AR 60%]
  3. [C] M.A. Azim, Z. Aung, W. Xiao, V. Khadkikar, and A. Jamalipour, "Localization in wireless sensor networks by constrained simultaneous perturbation stochastic approximation technique," in Proc. 6th IEEE International Conference on Signal Processing and Communication Systems (ICSPCS), pages 1-9, 2012. (pdf)
  4. [C] M.A. Azim, Z. Aung, W. Xiao, and V. Khadkikar, "Localization in wireless sensor networks by cross entropy method," in Proc. 4th International Conference on Ad Hoc Networks (AdHocNets), LNICST 111, pages 103-118, 2012. (pdf) [AR 42%]
  5. [C] D. Li, Z. Aung, J. Williams, and A. Sanchez, "P3: Privacy preservation protocol for appliance control application," in Proc. 3rd IEEE International Conference on Smart Grid Communications (SmartGridComm), pages 294-299, 2012. (pdf) [AR 37%]
  6. [C] D. Li, Z. Aung, S. Sampalli, J. Williams, and A. Sanchez, "Privacy preservation for smart grid multicast via hybrid group key scheme," in Proc. 2012 International Conference on Electrical Engineering and Computer Science (EECS), pages 62-69, 2012. (pdf)
  7. [C] B. Neupane, Z. Aung, and W.L. Woon, "A new image edge detection method using quality-based clustering," in Proc. 10th IASTED International Conference on Visualization, Imaging, and Image Processing (VIIP), pages 20-26, 2012. (pdf) [CORE C]
  8. [C] Z. Aung, M. Toukhy, J. Williams, A. Sanchez, and S. Herrero, "Towards accurate electricity load forecasting in smart grids," in Proc. 4th International Conference on Advances in Databases, Knowledge, and Data Applications (DBKDA), pages 51-57, 2012. (pdf) [AR 29%]
  9. [C] D. Li, Z. Aung, J. Williams, and A. Sanchez, "Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis," in Proc. 2012 IEEE Power and Energy Society Conference on Innovative Smart Grid Technologies (ISGT), pages 1-8, 2012. (pdf)
  10. [W] M.A. Faisal, Z. Aung, J. Williams, and A. Sanchez, "Securing advanced metering infrastructure using intrusion detection system with data stream mining," in Proc. 2012 Pacific Asia Workshop on Intelligence and Security Informatics (PAISI), LNCS Vol. 7299, pages 96-111, 2012. (pdf) [Best paper award]
  11. [P] B. Neupane, K.S. Perera, Z. Aung, and W.L. Woon, "Towards accurate electricity price forecasting using artificial neural network," in Proc. 2012 UAE-Swiss Research Day: Frontiers in Water, Energy, and Sustainability, page 188, 2012.


2011

  1. [C] J. Williams, S. Herrero-Lopez, C. Leonardi, S. Chan, A. Sanchez, and Z. Aung, "Large in-memory cyber-physical security-related analytics via scalable coherent shared memory architectures," in Proc. 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), pages 1-9, 2011. (pdf) [CORE C]


2010

  1. [J] W. Hugo, F. Song, Z. Aung, S.K. Ng, and W.K. Sung, "SLiM on Diet: Finding short linear motifs on domain interaction interfaces in Protein Data Bank," Bioinformatics, 26: 1036-1042, 2010. (pdf) [IF 5.766]
  2. [C] K. Sim, Z. Aung, and V. Gopalkrishnan, "Discovering correlated subspace clusters in 3D continuous-valued data," in Proc. 10th IEEE International Conference on Data Mining (ICDM), pages 471-480, 2010. (pdf) [CORE A*]
  3. [C] Z. Aung and S.K. Ng, "An indexing scheme for fast and accurate chemical fingerprint database searching," in Proc. 22nd International Conference on Scientific and Statistical Database Management (SSDBM), LNCS Vol. 6187, pages 288-305, 2010. (pdf) [CORE A]
  4. [C] Z. Aung, K. Sim, and W.S. Ng, "TrajAlign: A method for precise matching of 3-D trajectories," in Proc. 20th IEEE International Conference on Pattern Recognition (ICPR), pages 3818-3821, 2010. (pdf) [CORE B]


2009


2008

  1. [J] Z. Aung, S.H. Tan, S.K. Ng, and K.L. Tan, "PPiClust: Efficient clustering of 3-D protein-protein interaction interfaces," Journal of Bioinformatics and Computational Biology, 6: 415-433, 2008. (pdf) [IF 0.832]
  2. [C] Z. Aung and J.C. Tong, "BSAlign: A rapid graph-based algorithm for detecting ligand-binding sites in protein structures," Genome Informatics, 21: 65-76, 2008. (pdf) [AR 33%]


2007

  1. [J] Z. Aung and K.L. Tan, "Rapid retrieval of protein structures from databases," Drug Discovery Today, 12: 732-739, 2007. (pdf) [IF 5.625]
  2. [C] Z. Aung and J. Li, "Mining super-secondary structure motifs from 3D protein structures: A sequence order independent approach," Genome Informatics, 19: 15-26, 2007. (pdf) [AR 29%]
  3. [C] Z. Aung, S.H. Tan, S.K. Ng, and K.L. Tan, "Uncovering the structural basis of protein interactions with efficient clustering of 3-D interaction interfaces," in Proc. 6th International Conference on Computational Systems Bioinformatics (CSB), pages 287-297, 2007. (pdf) [CORE A]
  4. [P] C. Lim, S.L. Chua, X.F. Bong, C.G. Lim, S.Y.H. Lau, E.P. Wang, K.Y. Chung, V.P.Y. Wong, and Z. Aung, "Rapid chemical database search: a filter-and-refine approach," in Poster Proc. 18th International Conference on Genome Informatics (GIW), pages 90-91, 2007.


2006

  1. [T] Z. Aung, Computational Analysis of 3D Protein Structures, PhD Thesis, School of Computing, National University of Singapore, 2006. (pdf)
  2. [J] Z. Aung and K.L. Tan, "MatAlign: Precise protein structure comparison by matrix alignment," Journal of Bioinformatics and Computational Biology, 4: 1197-1216, 2006. (pdf) (errata) [IF 0.832]


2005

  1. [J] Z. Aung and K.L. Tan, "Automatic 3D protein structure classification without structural alignment," Journal of Computational Biology, 12: 1221-1241, 2005. (pdf) [IF 1.670]
  2. [P] Z. Aung and K.L. Tan, "Classifying protein folds using multi-level information of protein structures," in Proc. SIG-Structure Meeting, 3rd Asia Pacific Bioinformatics Conference (APBC), pages 11-12, 2005. (pdf)


2004

  1. [J] Z. Aung and K.L. Tan, "Rapid 3D Protein structure database searching using information retrieval techniques," Bioinformatics, 20: 1045-1052, 2004. (pdf) (errata) [IF 5.766]
  2. [C] Z. Aung and K.L. Tan, "Automatic protein structure classification through structural fingerprinting," in Proc. 4th IEEE Symposium on Bioinformatics and Bioengineering (BIBE), pages 508-515, 2004. (pdf) [CORE C]


2003

  1. [C] Z. Aung, W. Fu, and K.L. Tan, "An efficient index-based protein structure database searching method," in Proc. 8th IEEE International Conference on Database Systems for Advanced Applications (DASFAA), pages 311-318, 2003. (pdf) [CORE B]



Students' Theses

2017
  1. Fatima Al Shamsi, Mapping, Exploration, and Detection Strategies for Malware Universe, Master Thesis, Masdar Institute of Science and Technology, UAE, 2017.

2016
  1. Mariam Ali Abdul Aziz Ali AlAli, Malware Detection in Android Mobile Platforms using Data Mining Algorithms, Master Thesis, Masdar Institute of Science and Technology, UAE, 2016.
  2. Khawla Masood Ali Masood Al Dhaheri, Forecasting Wind Speed in Abu Dhabi Using Statistical Modelling and Machine Learning Approaches, Master Thesis, Masdar Institute of Science and Technology, UAE, 2016.

2015
  1. Fadwa Abdul Aziz Alseiari, Smart Grid's Security: Real-time Anomaly-based Distributed Intrusion Detection Systems for Advanced Metering Infrastructure (AMI) Based on Stream Mining, Master Thesis, Masdar Institute of Science and Technology, UAE, 2015.
  2. Azhar Ahmed Mohammed, Probabilistic Forecasting of Solar Power: An Ensemble Learning Approach, Master Thesis, Masdar Institute of Science and Technology, UAE, 2015.
  3. Waheeb Yaqub, Digital Watermarking Scheme for Columnar Database, Master Thesis, Masdar Institute of Science and Technology, UAE, 2015.
  4. Ya-Chen Chang, A PageRank-based Method for Identifying Field-specific Key Researchers, Master Thesis, Masdar Institute of Science and Technology, UAE, 2015.
  5. Aishah Al-Yammahi, Modelling Wind Direction in UAE, Master Thesis, Masdar Institute of Science and Technology, UAE, 2015. (Co-advisor)

2014
  1. Prajowal Manandhar, A Practical Approach to Anomaly-based Intrusion Detection System by Outlier Mining in Network Traffic, Master Thesis, Masdar Institute of Science and Technology, UAE, 2014. (pdf)
  2. Ibrahim Khamis, Anomaly Detection and Preprocessing, Master Thesis, Masdar Institute of Science and Technology, UAE, 2014. (pdf)
  3. Nadyah Obaid Salem Saeed Al Abdouli, Handling the Class Imbalance Problem in Binary Classification, Master Thesis, Masdar Institute of Science and Technology, UAE, 2014. (pdf)

2013
  1. Bijay Neupane, Ensemble Learning-based Electricity Price Forecasting for Smart Grid Deployment, Master Thesis, Masdar Institute of Science and Technology, UAE, 2013. (pdf) (won the 2013 best thesis award in Computing and Information Science Program)
  2. Baruhupolage Kasun Perera, A Class Imbalance Learning Approach to Fraud Detection in Online Advertising, Master Thesis, Masdar Institute of Science and Technology, UAE, 2013. (pdf)
  3. Aamna Mohammed Al-Shehhi, Argument Visualization and Narrative Approaches Collaborative Spatial Decision Making and Knowledge Construction, Master Thesis, Masdar Institute of Science and Technology, UAE, 2013. (pdf)

2012
  1. Mustafa Amir Faisal, Securing Advanced Metering Infrastructure (AMI) in Smart Grid using Intrusion Detection System (IDS), Master Thesis, Masdar Institute of Science and Technology, UAE, 2012. (pdf)
  2. Mohamed Hussein Toukhy, Data Mining Techniques for Smart Grid Load Forecasting, Master Thesis, Masdar Institute of Science and Technology, UAE, 2012. (pdf)