Top of page

Student/Staff Portal
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Dr James Kang

Honorary Lecturer

Staff Member Details
Email: james.kang@ecu.edu.au
ORCID iD: https://orcid.org/0000-0002-0242-4187

James was a lecturer in the School of Science in the Computing and Security discipline and was responsible for developing teaching materials and assessment activities for multiple units at both undergraduate and postgraduate levels.  He is now holding a role of adjunct lecturer helping students for their higher degrees by research in IT and Security.

Background

James (Jin) has worked in research areas including Health Informatics, IoT (Internet of Health Things), Cybersecurity and Disaster Recovery using smart sensors in low power wide area networks. He also taught graduate and undergraduate students in computing and security courses. This included supervising research degree students and supporting our Academic Centre of Cyber Security Excellence (Australian Federal Government). James was also involved in our engagement with a 30-stakeholder $149 million (AUD) Cyber Security Collaborative Research Centre. He has worked in the telecommunications industry for over 20 years, working on projects in Telecom NZ (Spark NZ), Nokia (Alcatel-Lucent), NBN Co, Telstra, Siemens, and Vodafone Australia since 1994. He has gone to Africa as a volunteer to help an NGO as an IT advisor. He specialised in Network Intelligence for wired and mobile networks during the earlier stages of his career. He later worked on career networks such as IP, IMS, NBN and VoIP technologies. He taught master students at National Taiwan University as an associate professor in Taiwan. He is interested in helping offshore students in teaching and research so that they can pursue their objectives with vast experience in his industry experiences.

Research Areas and Interests

  1. Medical Informatics:
    • Leveraging AI in healthcare for enhanced data management and decision support systems.
  2. Sensory networks and IoT sensors:
    • Integrating AI algorithms for smarter data processing and decision-making in sensor networks and IoT applications.
  3. Inference algorithms development:
    • Advancing AI-driven inference algorithms for accurate data analysis and predictive modeling.
  4. Cybersecurity encryption and authentication:
    • Enhancing cybersecurity measures with AI-powered encryption and authentication technologies to safeguard systems and data.

Qualifications

  • Doctor of Philosophy, Deakin University, 2017.

Research Outputs

Journal Articles

  • Paul Shylendra, S., Wajrak, M., Alameh, K., Kang, J. (2024). Effect of post deposition annealing on the sensing properties of thin film Ruthenium Oxide (RuO2) pH sensor. IEEE Sensors Journal, 24(8), 12498 - 12503. https://doi.org/10.1109/JSEN.2024.3370914.

Journal Articles

  • Al-Fawa'reh, M., Abu-Khalaf, J., Szewczyk, P., Kang, J. (2023). MalBoT-DRL: Malware Botnet Detection Using Deep Reinforcement Learning in IoT Networks. IEEE Internet of Things Journal, 2023(Article in press), 20 pages. https://doi.org/10.1109/JIOT.2023.3324053.
  • An, Q., Rahman, S., Zhou, J., Kang, J. (2023). A Comprehensive Review On Machine Learning In Healthcare Industry: Classification, Restrictions, Opportunities And Challenges. Sensors, 23(9), article number 4178. https://doi.org/10.3390/s23094178.

Book Chapters

  • Yang, W., Johnstone, M., Wang, S., Karie, N., Bin Sahri, NM., Kang, J. (2022). Network Forensics in the Era of Artificial Intelligence. Explainable Artificial Intelligence for Cyber Security (171–190). Springer. https://doi.org/10.1007/978-3-030-96630-0_8.

Journal Articles

  • Yang, W., Wang, S., Kang, J., Johnstone, M., Bedari, A. (2022). A Linear Convolution-Based Cancelable Fingerprint Biometric Authentication System. Computers and Security, 114(March 2022), 102583. https://doi.org/10.1016/j.cose.2021.102583.
  • An, A., Al-Fawa'reh, M., Kang, J. (2022). Enhanced Heart Rate Prediction Model Using Damped Least-Squares Algorithm. Sensors, 22(24), Article Number 9679. https://doi.org/10.3390/s22249679.

Book Chapters

  • Kang, J., Sikos, L., Yang, W. (2021). Reducing Attack Surface of Edge Computing IoT Networks via Hybrid Routing Using Dedicated Nodes. Secure Edge Computing: Applications, Techniques and Challenges (97–111). CRC Press. https://ro.ecu.edu.au/ecuworkspost2013/10795.

Journal Articles

  • Kang, J., Dibaei, M., Luo, G., Yang, W., Haskell-Dowland, P., Zheng, X. (2021). An Energy-Efficient and Secure Data Inference Framework for Internet of Health Things: A Pilot Study. Sensors, 21(1), Article number 312. https://doi.org/10.3390/s21010312.
  • Srinivasu, P., Sivasai, J., Ijaz, M., Bhoi, A., Kim, W., Kang, J. (2021). Classification of Skin Disease Using Deep Learning Neural Networks with MobileNet V2 and LSTM. Sensors, 21(8), Article number 2852. https://doi.org/10.3390/s21082852.

Conference Publications

  • An, A., Szewczyk, P., Johnstone, M., Kang, J. (2021). Enhancement of Healthcare Data Performance Metrics using Neural Network Machine Learning Algorithms. Proc. 31st International Telecommunication Networks and Applications Conference (172-179). IEEE. https://ro.ecu.edu.au/ecuworkspost2013/11780.
  • Kang, J. (2021). A Military Human Performance Management System Design using Machine Learning Algorithms. 2021 31st International Telecommunication Networks and Applications Conference (ITNAC) (13-18). IEEE. https://doi.org/10.1109/ITNAC53136.2021.9652140.

Book Chapters

  • Kang, J. (2020). Systematic Analysis of Security Implementation for Internet of Health Things in Mobile Health Networks. Data Science in Cybersecurity and Cyberthreat Intelligence (87-113). Springer. https://doi.org/10.1007/978-3-030-38788-4_5.

Journal Articles

  • Kang, J., Yang, W., Dermody, D., Ghasemian, M., Adibi, S., Haskell-Dowland, P. (2020). No Soldiers Left Behind: An IoT-Based Low-Power Military Mobile Health System Design. IEEE Access, 8(2020), 201498-201515. https://doi.org/10.1109/ACCESS.2020.3035812.

Conference Publications

  • Kang, J. (2020). A Military Mobile Network Design: mHealth, IoT and Low Power Wide Area Networks. 2020 30th International Telecommunication Networks and Applications Conference (ITNAC) (75-77). IEEE. https://doi.org/10.1109/ITNAC50341.2020.9315168.
  • Yang, W., Wang, S., Yu, K., Kang, J., Johnstone, M. (2020). Secure Fingerprint Authentication with Homomorphic Encryption. 2020 Digital Image Computing: Techniques and Applications (1-6). DICTA. https://ro.ecu.edu.au/ecuworkspost2013/9554.
  • Kang, J., Yang, W., Dibaei, M., Luo, G., Zheng, X. (2020). A Privacy-Preserving Data Inference Framework for Internet of Health Things Networks. Proceedings 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications TrustCom 2020 (1209-1214). IEEE. https://doi.org/10.1109/TrustCom50675.2020.00162.

Journal Articles

  • Kang, J., Parvin, S., Fahd, K., Venkatraman, S. (2019). Vehicular Alarm System Using mHealth Data and Lightweight Security Algorithms. Technologies, 7(1), article no.25. https://doi.org/10.3390/technologies7010025.
  • Kang, J., Fahd, K., Venkatraman, S. (2019). An Enhanced Inference Algorithm for Data Sampling Efficiency and Accuracy Using Periodic Beacons and Optimization. Big Data and Cognitive Computing, 3(1), article no.7. https://doi.org/10.3390/bdcc3010009.

Conference Publications

  • Kang, J., Fahd, K., Venkatraman, S., Trujillo-Rausa, R., Haskell-Dowland, P. (2019). Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks. 2019 29th International Telecommunication Networks and Applications Conference (ITNAC) (Article number 9077977). IEEE. https://doi.org/10.1109/ITNAC46935.2019.9077977.
  • Gawanmeh, A., Parvin, S., Venkatraman, S., De Souza-Daw, T., Kang, J., Kaspi, S., Jackson, J. (2019). A Framework for Integrating Big Data Security into Agricultural Supply Chain. Proceedings of 2019 IEEE Fifth International Conference on Big Data Computing Service and Applications (BigDataService) (191-194). IEEE. https://doi.org/10.1109/BigDataService.2019.00032.

Journal Articles

Conference Publications

  • Kang, J., Venkatraman, S. (2018). An Integrated mHealth and Vehicular Sensor Based Alarm System: emergency alarm notification system for long distance drivers using smart devices and cloud networks. ITNAC 2018 : Proceedings of the 2018 28th International Telecommunication Networks and Applications Conference (Article no. 8615441). Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/ATNAC.2018.8615441.
  • Kang, J. (2018). Prediction of Personalised Life Expectancy using Personal Health Devices in mHealth Networks. ITNAC 2018 : Proceedings of the 2018 28th International Telecommunication Networks and Applications Conference (article number 861542). Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/ATNAC.2018.8615428.

Journal Articles

  • Kang, J., Larkin, H. (2017). Intelligent personal health devices converged with internet of things networks. Journal of Mobile Multimedia, 12(3&4), 197-212.
  • Kang, J., Adibi, S. (2017). Bushfire disaster monitoring system using low power wide area networks (LPWAN). Technologies, 5(4), article no.65. https://doi.org/10.3390/technologies5040065.
  • Kang, J., Larkin, H. (2017). Application of an emergency alarm system for physiological sensors utilizing smart devices. Technologies, 5(2), Article no.26. https://doi.org/10.3390/technologies5020026.

Conference Publications

  • Kang, J., Khodasevych, I., Adibi, S. (2017). A disaster recovery system for location identification-based low power wide area networks (LPWAN). ITNAC 2017 : Proceedings of the 27th International Telecommunication Networks and Applications Conference (1-6). IEEE. https://doi.org/10.1109/ATNAC.2017.8215359.
  • Kang, J. (2017). User Feedback System for Emergency Alarms in Mobile Health Networks. ICACS 2017 : Proceedings of the International Conference on Algorithms, Computing and Systems (55-59). ACM. https://doi.org/10.1145/3127942.3127964.

Journal Articles

  • Kang, J., Larkin, H. (2016). Inference of personal sensors in the internet of things. The International Journal of Information, Communication Technology and Applications (IJICTA), 2(1), 1-23. https://doi.org/10.17972/ijicta20162125.
  • Kang, J., Luan, T., Larkin, H. (2016). Data processing of physiological sensor data and alarm determination utilising activity recognition. International journal of information, communication technology and applications, 2(1), 108-131. https://doi.org/10.17972/ijicta20162132.

Conference Publications

  • Kang, J., Luan, T., Larkin, H. (2016). Alarm notification of body sensors utilising activity recognition and smart device application. MoMM 2016: Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedi (105-109). Association for Computing Machinery. https://doi.org/10.1145/3007120.3007153.
  • Kang, J., Luan, T., Larkin, H. (2016). Enhancement of sensor data transmission by inference and efficient data processing. Applications and Techniques in Information Security (81-92). Springer. https://doi.org/10.1007/978-981-10-2741-3_7.
  • Kang, J., Luan, T., Larkin, H. (2016). Inference system of body sensors for health and internet of things networks. Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media (94-98). Association for Computing Machinery. https://doi.org/10.1145/3007120.3007145.

Conference Publications

  • Kang, J., Adibi, S., Larkin, H., Luan, T. (2015). Predictive data mining for converged internet of things: a mobile health perspective. 2015 International Telecommunication Networks and Applications Conference (ITNAC) (5 - 10). IEEE. https://doi.org/10.1109/ATNAC.2015.7366781.
  • Kang, J., Adibi, S. (2015). A review of security protocols in mHealth Wireless Body Area Networks (WBAN). Future Network Systems and Security Proceedings (61-83). Springer. https://doi.org/10.1007/978-3-319-19210-9_5.

Research Student Supervision

No data available

Associate Supervisor

  • VoterChoice: A Ransomware Detection Honeypot with Multiple Voting Concept
  • Master of Computing and Security by Research, A Forensic framework for Detecting Denial-of-Service Attacks in IoT Networks Using the MQTT Protocol
Skip to top of page