Doctor Weisheng Si

Doctor Weisheng Si

Director of Academic Program - Information and Communications Technology - Postgraduate,
Computing & ICT

Senior Lecturer in Networking & Mobile Computing,
Computing & ICT

Biography

Dr Weisheng Si is with the School of Computer, Data and Mathematical Sciences at Western Sydney University. Prior to this, he was a Postdoctoral Researcher at the National ICT Australia (NICTA, now merged into Data61 at CSIRO). He received his PhD, MS, and BS in Computer Science from the University of Sydney, University of Virginia (USA), and Peking University (China) respectively. His research is mainly focused on Complex Networks, Internet of Things, Network Security, and Quantum Networking.

This information has been contributed by Doctor Si.

Qualifications

  • PhD University of Sydney
  • MSc University of Virginia (USA)
  • BSc Peking University

Organisational Unit (School / Division)

  • Computing & ICT
  • Computing & ICT

Contact

Email: W.Si@westernsydney.edu.au
Phone: (02) 9685 9283
Mobile:
Location: ER.G.14
Parramatta

PLEASE NOTE: obtaining information from this Directory must be for the legitimate purposes of doing business with and within Western Sydney University, and must not be used for unsolicited bulk e-mailing (spamming) or similar purposes.

Teaching

Previous Teaching Areas

  • 300094 Computer Networking Fundamentals, 2013
  • 300095 Computer Networks and Internets, 2012
  • 300095 Computer Networks and Internets, 2013
  • 300166 Systems and Network Management, 2013
  • 300166 Systems and Network Management, 2015
  • 300565 Computer Networking, 2012
  • 300582 Technologies for Web Applications, 2014
  • 300582 Technologies for Web Applications, 2015
  • 300583 Web Systems Development, 2019
  • 300583 Web Systems Development, 2020
  • 300695 Network Technologies, 2012
  • 300902 Web Systems Development (Advanced), 2019
  • 300902 Web Systems Development (Advanced), 2020
  • 301124 Ethical Hacking Principles and Practice, 2017
  • 301124 Ethical Hacking Principles and Practice, 2018
  • 301124 Ethical Hacking Principles and Practice, 2019
  • 301124 Ethical Hacking Principles and Practice, 2020
  • 301124 Ethical Hacking Principles and Practice, 2021
  • 301124 Ethical Hacking Principles and Practice, 2022
  • 301437 Quantum Computing and Communication, 2022
  • INFS3017 Web Systems Development, 2022
  • INFS3018 Web Systems Development (Advanced), 2022

Publications

Books

  • Tian, Y., Si, W. and Han, Y. (2006), 'Principles of Computer Networks', : China Machine Press 7111187768.

Journal Articles

  • Zhang, D., Zhu, S., Zhang, H., Si, W. and Zheng, W. (2023), 'Fixed-time consensus for multiple mechanical systems with input dead-zone and quantization under directed graphs', IEEE Transactions on Network Science and Engineering, vol 10, no 3 , pp 1525 - 1536.
  • Si, W., Mburano, B., Zheng, W. and Qiu, T. (2022), 'Measuring network robustness by average network flow', IEEE Transactions on Network Science and Engineering, vol 9, no 3 , pp 1697 - 1712.
  • Zhao, T., Si, W., Li, W. and Zomaya, A. (2021), 'Optimizing the maximum vertex coverage attacks under knapsack constraint', IEEE/ACM Transactions on Networking, vol 29, no 3 , pp 1088 - 1104.
  • Sharma, Y., Taheri, J., Si, W., Sun, D. and Javadi, B. (2021), 'Dynamic resource provisioning for sustainable cloud computing systems in the presence of correlated failures', IEEE Transactions on Sustainable Computing, vol 6, no 4 , pp 641 - 654.
  • Qiu, T., Zhang, S., Si, W., Cao, Q. and Atiquzzaman , M. (2021), 'A 3-D topology evolution scheme with self-adaption for industrial Internet of Things', IEEE Internet of Things Journal, vol 8, no 12 , pp 9473 - 9483.
  • Sharma, Y., Si, W., Sun, D. and Javadi, B. (2019), 'Failure-aware energy-efficient VM consolidation in cloud computing systems', Future Generation Computer Systems, vol 94 , pp 620 - 633.
  • Qiu, T., Liu, J., Si, W. and Wu, D. (2019), 'Robustness optimization scheme with multi-population co-evolution for scale-free wireless sensor networks', IEEE/ACM Transactions on Networking, vol 27, no 3 , pp 1028 - 1042.
  • Si, W., Tse, Q., Mao, G. and Zomaya, A. (2018), 'On the performance of greedy forwarding on Yao and Theta graphs', Journal of Parallel and Distributed Computing, vol 117 , pp 87 - 97.
  • Portocarrero, J., Delicato, F., Pires, P., Costa, B., Li, W., Si, W. and Zomaya, A. (2017), 'RAMSES : a new reference architecture for self-adaptive middleware in Wireless Sensor Networks', Ad Hoc Networks, vol 55 , pp 3 - 27.
  • Huque, M., Si, W., Jourjon, G. and Gramoli, V. (2017), 'Large-scale dynamic controller placement', IEEE Transactions on Network and Service Management, vol 14, no 1 , pp 63 - 76.
  • Qiu, T., Zhao, A., Xia, F., Si, W. and Wu, D. (2017), 'ROSE : robustness strategy for scale-free wireless sensor networks', IEEE/ACM Transactions on Networking, vol 25, no 5 , pp 2944 - 2959.
  • Qiu, T., Liu, J., Si, W., Han, M., Ning, H. and Atiquzzaman, M. (2017), 'A data-driven robustness algorithm for the Internet of things in smart cities', IEEE Communications Magazine, vol 55, no 12 , pp 18 - 23.
  • Qiu, T., Luo, D., Xia, F., Deonauth, N., Si, W. and Tolba, A. (2016), 'A greedy model with small world for improving the robustness of heterogeneous Internet of Things', Computer Networks, vol 101 , pp 127 - 143.
  • Sharma, Y., Javadi, B., Si, W. and Sun, D. (2016), 'Reliability and energy efficiency in cloud computing systems : survey and taxonomy', Journal of Network and Computer Applications, vol 74 , pp 66 - 85.
  • Ye, K., Wu, Z., Wang, C., Zhou, B., Si, W., Jiang, X. and Zomaya, A. (2015), 'Profiling-based workload consolidation and migration in virtualized data centers', IEEE Transactions on Parallel and Distributed Systems, vol 26, no 3 , pp 878 - 890.
  • Si, W., Zomaya, A. and Selvakennedy, S. (2014), 'A geometric deployment and routing scheme for directional wireless mesh networks', IEEE Transactions on Computers, vol 63, no 6 , pp 1323 - 1335.
  • Si, W. and Zomaya, A. (2012), 'New memoryless online routing algorithms for delaunay triangulations', IEEE Transactions on Parallel and Distributed Systems, vol 23, no 8 , pp 1520 - 1527.
  • Qiu, T., Guo, H., Feng, L., Si, W. and Liu, X. (2012), 'A new analysis model for task buffer of pipeline simulator based on queueing network', Journal of Computer Research and Development, vol 49, no 1 , pp 103 - 110.
  • Si, W., Selvakennedy, S. and Zomaya, A. (2010), 'An overview of Channel Assignment methods for multi-radio multi-channel wireless mesh networks', Journal of Parallel and Distributed Computing, vol 70, no 5 , pp 505 - 524.
  • Si, W. and Li, C. (2005), 'RMAC : a reliable MAC protocol supporting multicast for wireless ad hoc networks', Journal of Computer Science and Technology, vol 20, no 5 , pp 702 - 712.

Conference Papers

  • Vaidhyanathan, M., Si, W., Javadi, B. and Camtepe, S. (2022), 'Towards cooperative games for developing secure software in agile SDLC', IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Taichung, Taiwan.
  • Chu, T., Si, W., Simoff, S. and Nguyen, Q. (2022), 'A machine learning classification model using random forest for detecting DDoS attacks', International Symposium on Networks, Computers and Communications, Shenzhen, China.
  • Shahid, J., Muhammad, Z., Iqbal, Z., Khan, M., Amer, Y. and Si, W. (2022), 'SAT : Integrated Multi-agent Blackbox Security Assessment Tool using machine learning', IEEE International Conference on Artificial Intelligence, Islamabad, Pakistan.
  • Mburano, B., Si, W. and Zheng, W. (2021), 'A comparative study on the variants of R metric for network robustness', International Symposium on Networks, Computers and Communications, Dubai, UAE.
  • Zhang, S., Si, W., Qiu, T. and Cao, Q. (2020), 'Toward more effective centrality-based attacks on network topologies', IEEE International Conference on Communications, Dublin, Ireland.
  • Xiong, S., Cao, Q. and Si, W. (2019), 'Adaptive path tracing with programmable bloom filters in software-defined networks', IEEE Conference on Computer Communications, Paris, France.
  • Mburano, B. and Si, W. (2018), 'Evaluation of web vulnerability scanners based on OWASP benchmark', International Conference on Systems Engineering, University of Technology Sydney.
  • Asuncion, V., Zhang, Y., Zhang, H., Bai, Y. and Si, W. (2018), 'Loop restricted existential rules and first-order rewritability for query answering', International Conference on Principles of Knowledge Representation and Reasoning, Tempe, Az..
  • Sharma, Y., Si, W., Javadi, B. and Sun, D. (2017), 'Reliable and energy efficient resource provisioning and allocation in cloud computing', International Conference on Utility and Cloud Computing, U.S..
  • Sharma, Y., Javadi, B. and Si, W. (2015), 'On the reliability and energy efficiency in cloud computing', Australasian Symposium on Parallel and Distributed Computing, Parramatta, N.S.W..
  • Si, W., Tse, Q., Mao, G. and Zomaya, A. (2014), 'How well do Yao graph and Theta graph support Greedy Forwarding?', IEEE Global Communications Conference , Austin, Tex..
  • Tse, Q., Si, W. and Taheri, J. (2013), 'Estimating contention of IEEE 802.11 broadcasts based on inter-frame idle slots', IEEE International Workshop on Performance and Management of Wireless and Mobile, Sydney, N.S.W..
  • Si, W., Taheri, J. and Zomaya, A. (2012), 'A distributed energy saving approach for ethernet switches in data centers', Conference on Local Computer Networks, USA.
  • Si, W., Scholz, B., Gudmundsson, J., Mao, G., Boreli, R. and Zomaya, A. (2012), 'On graphs supporting greedy forwarding for directional wireless networks', IEEE International Conference on Communications, Ottawa, Canada.
  • Si, W., Boreli, R., Mahanti, A. and Zomaya, A. (2011), 'Tree-based double-covered broadcast for wireless ad hoc networks', (MobiWac '11) Proceedings of the 9th ACM international symposium on Mobility management and wireless access, USA.
  • Si, W. and Zomaya, A. (2010), 'Midpoint Routing Algorithms for Delaunay Triangulations', Proceedings of the 24th IEEE International Parallel and Distributed Processing Symposium (IPDPS), USA.
  • Si, W. and Selvakennedy, S. (2008), 'A position-based deployment and routing approach for directional wireless mesh networks', Proceedings of the 17th International Conference on Computer Communications and Networks (ICCCN), USA.
  • Si, W. and Li, M. (2005), 'On the Connectedness of Peer-to-Peer Overlay Networks', Proceedings of the 11th International Conference on Parallel and Distributed Systems (ICPADS), USA.
  • Si, W. and Li, C. (2004), 'RMAC: A Reliable Multicast MAC Protocol for Wireless Ad Hoc Networks', Proceedings of the 33rd International Conference on Parallel Processing (ICPP), USA.

During my research career, I have ever focused on the following areas in computer networking: network security, wireless networks, data centre networks, and quantum networking. In terms of theories, I am good at complex networks, optimization algorithms, game theory,and quantum computing. In terms of practical skills, I do well in network simulators,open source software development with GitHub, etc. My current research interests lie in:

  • Complex networks
  • Network Security
  • Internet of Things
  • Quantum Networking

Very welcome to discuss with me if you share similar research interests. More info about my research can be found at http://staff.cdms.westernsydney.edu.au/~weisheng/.

Research Grants

I've been awarded the following research grants after joining Western Sydney University:

  • 2018, Pilot grant from NSW Cyber Security Network, "Building robust network topologies against cyberattacks for critical infrastructure networks", $94000.
  • 2015, ECR Research Support Award, "Exploiting geometric graphs to model wireless networks with directional antennas", $8536.
  • 2013, SCEM Pilot Research Challenge Project, "Implementation of Open Source Software for Constructing Geometric Graphs Exploited in Wireless Networks", $6500. 

Current Research Efforts

  • Master project: Evaluation and comparison of web vulnerability scanners
  • In collaboration with researchers in School of Computer Science and Technology, Tianjin University: Enhance robustness of scale-free network topologies in IoT.
  • In collaboration with researchers in Dept. of EE and CS, University of Tennessee: Anomaly detection with machine learning in IoT environment.

 

This information has been contributed by Doctor Si.

Previous Projects

Title: Building robust network topologies against cyber attacks for critical infrastructure networks [via UNSW]
Funder:
  • The NSW Cyber Security Network
Western Researchers: Weisheng Si, Yun Bai and Wei Xing Zheng
Years: 2019-01-01 - 2020-12-31
ID: P00025091

Supervision

Previous Supervision

Thesis Title: Utilising Fuzzy Logic to Detect False Access Points in Wi-Fi Networks
Field of Research: Information Technology; Engineering And Related Technologies; Computer Science
Thesis Title: Evaluation of Web Vulnerability Scanners Based on OWASP Benchmark
Field of Research: Information Technology, N.e.c.

Western Sydney University

Locked Bag 1797
Penrith NSW 2751

ABN 53 014 069 881
CRICOS Provider No: 00917k