Dr Sky Miao

Dr Sky Miao

Lecturer - Computing and Information Technology

School of Information and Physical Sciences (Computing and Information Technology)

Career Summary

Biography

Dr Yuantian Miao is a lecturer at the University of Newcastle, Australia. She received her PhD degree from the Swinburne University of Technology, Australia in 2021. Her current research interests mainly focus on Security and Privacy in Machine Learning, with a few high-quality publications in ACM CSUR, PoPETs, etc. She was a sessional lecturer for IT Security and had been a tutor at Swinburne University of Technology since 2019. Since 2021, she has joined the P-Tech mentoring year-10 students for a cybersecurity research project. 

Qualifications

  • Doctor of Philosophy, Swinburne Institute of Technology

Keywords

  • Automatic Speech Recognition
  • Big Data Analysis
  • Network Security
  • Security and Privacy of Machine Learning

Languages

  • English (Fluent)
  • Cantonese (Fluent)
  • Mandarin (Mother)

Fields of Research

Code Description Percentage
461199 Machine learning not elsewhere classified 20
460499 Cybersecurity and privacy not elsewhere classified 80

Professional Experience

UON Appointment

Title Organisation / Department
Lecturer - Computing and Information Technology University of Newcastle
School of Information and Physical Sciences
Australia

Academic appointment

Dates Title Organisation / Department
17/8/2021 - 27/2/2022 Postdoctoral Research Associate

Conducting research on CRT Trustworthy Machine Learning (TML) project with academics in Data61, Monash University, and Melbourne University

Swinburne University of Technology, VIC
Australia

Teaching appointment

Dates Title Organisation / Department
8/7/2019 - 10/12/2021 Sessional Lecturer / Tutor / Instructor

  • A sessional lecture and tutor in COS30015 IT Security (≈250 students) at Swinburne University of Technology
  • An instructor and course designer in CC5904 IoT Security and Cloud Computing at James Cooks University

Swinburne University of Technology, VIC
Australia
Edit

Publications

For publications that are currently unpublished or in-press, details are shown in italics.


Conference (9 outputs)

Year Citation Altmetrics Link
2025 Sun N, Miao Y, Mo X, Zhang J, 'Large Language Models for Cybersecurity Education: A Survey of Current Practices and Future Directions', Lecture Notes in Computer Science, 15875 LNAI, 3-20 (2025)
DOI 10.1007/978-981-96-8295-9_1
2024 Liu Y, Zhang H, Le VH, Miao Y, Li Z, 'Local Search-based Approach for Cost-effective Job Assignment on Large Language Models', Gecco 2024 Companion Proceedings of the 2024 Genetic and Evolutionary Computation Conference Companion, 719-722 (2024) [E1]
DOI 10.1145/3638530.3654104
Co-authors Hongyu Zhang
2024 Liu Y, Zhang H, Li Z, Miao Y, 'Optimizing the Utilization of Large Language Models via Schedule Optimization: An Exploratory Study', International Symposium on Empirical Software Engineering and Measurement, 84-95 (2024)
DOI 10.1145/3674805.3686671
Co-authors Hongyu Zhang
2024 Liu Y, Zhang H, Miao Y, Le VH, Li Z, 'OptLLM: Optimal Assignment of Queries to Large Language Models', Proceedings of the IEEE International Conference on Web Services, ICWS, 788-798 (2024) [E1]
DOI 10.1109/ICWS62655.2024.00098
Co-authors Hongyu Zhang
2024 Liu Y, Zhang H, Li Z, Miao Y, 'CPLS: Optimizing the Assignment of LLM Queries', Proceedings - 2024 IEEE International Conference on Software Maintenance and Evolution, ICSME 2024, 151-162 (2024) [E1]
DOI 10.1109/ICSME58944.2024.00024
2022 Miao Y, Chen C, Pan L, Liu S, Camtepe S, Zhang J, Xiang Y, 'No-Label User-Level Membership Inference for ASR Model Auditing', COMPUTER SECURITY - ESORICS 2022, PT II, 13555, 610-628 (2022) [E1]
DOI 10.1007/978-3-031-17146-8_30
Citations Scopus - 5Web of Science - 1
2018 Miao Y, Pan L, Rajasegarar S, Zhang J, Leckie C, Xiang Y, 'Distributed detection of zero-day network traffic flows', Communications in Computer and Information Science, Melbourne, Australia (2018) [E1]
DOI 10.1007/978-981-13-0292-3_11
2018 Miao Y, Ruan Z, Pan L, Zhang J, Xiang Y, 'Comprehensive analysis of network traffic data', Concurrency and Computation: Practice and Experience, 30 (2018) [E1]
DOI 10.1002/cpe.4181
Citations Scopus - 1Web of Science - 1
2016 Miao Y, Ruan Z, Pan L, Zhang J, Xiang Y, Wang Y, 'Comprehensive Analysis of Network Traffic Data', 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 423-430 (2016)
DOI 10.1109/CIT.2016.22
Citations Scopus - 1Web of Science - 7
Show 6 more conferences

Journal article (7 outputs)

Year Citation Altmetrics Link
2025 Qiu J, Jiang Y, Miao Y, Luo W, Pan L, Zheng X, 'A survey of coverage-guided greybox fuzzing with deep neural models', Information and Software Technology, 186 (2025) [C1]
DOI 10.1016/j.infsof.2025.107797
2025 Li Z, Zhu W, Zhang H, Miao Y, Ren J, 'The impact of unsupervised feature selection techniques on the performance and interpretation of defect prediction models', Automated Software Engineering, 32 (2025) [C1]

The performance and interpretation of a defect prediction model depend on the software metrics utilized in its construction. Feature selection techniques can enhance mo... [more]

The performance and interpretation of a defect prediction model depend on the software metrics utilized in its construction. Feature selection techniques can enhance model performance and interpretation by effectively removing redundant, correlated, and irrelevant metrics from defect datasets. Previous empirical studies have scrutinized the impact of feature selection techniques on the performance and interpretation of defect prediction models. However, most feature selection techniques examined in these studies are primarily supervised. In particular, the impact of unsupervised feature selection (UFS) techniques on defect prediction remains unknown and needs to be explored extensively. To address this gap, we systematically apply 21 UFS techniques to evaluate their impact on the performance and interpretation of unsupervised defect prediction models in binary classification and effort-aware ranking scenarios. Extensive experiments are conducted on the 28 versions from 8 projects using 4 unsupervised models. We observe that: (1) 10¿100% of the selected metrics are inconsistent between each pair of UFS techniques. (2) 29¿100% of the selected metrics are inconsistent among different software modules. (3) For unsupervised defect prediction models, some UFS techniques (e.g., AutoSpearman, LS, and FMIUFS) exhibit the ability to effectively reduce the number of metrics while maintaining or even improving model performance. (4) UFS techniques alter the ranking of the top 3 groups of metrics in defect models, affecting the interpretation of these models. Based on these findings, we recommend that software practitioners utilize UFS techniques for unsupervised defect prediction. However, caution should be exercised when deriving insights and interpretations from defect prediction models.

DOI 10.1007/s10515-025-00510-y
2021 Miao Y, Chen C, Pan L, Han Q-L, Zhang J, Xiang Y, 'Machine Learning-based Cyber Attacks Targeting on Controlled Information: A Survey', ACM COMPUTING SURVEYS, 54 (2021) [C1]
DOI 10.1145/3465171
Citations Scopus - 9Web of Science - 53
2021 Miao Y, Minhui X, Chen C, Pan L, Zhang J, Zhao BZH, Kaafar D, Xiang Y, 'The audio auditor: user-level membership inference in Internet of Things voice services', Proceedings on Privacy Enhancing Technologies, 2021, 209-228 (2021) [C1]
2019 Miao Y, Zhao BZH, Xue M, Chen C, Pan L, Zhang J, et al., 'The audio auditor: Participant-level membership inference in internet of things voice services (2019)
2018 Ruan Z, Miao Y, Pan L, Xiang Y, Zhang J, 'Big network traffic data visualization', Multimedia Tools and Applications, 77 11459-11487 (2018) [C1]

Visualization is an important tool for capturing the network activities. Effective visualization allows people to gain insights into the data information and discovery ... [more]

Visualization is an important tool for capturing the network activities. Effective visualization allows people to gain insights into the data information and discovery of communication patterns of network flows. Such information may be difficult for human to perceive its relationships due to its numeric nature such as time, packet size, inter-packet time, and many other statistical features. Many existing work fail to provide an effective visualization method for big network traffic data. This work proposes a novel and effective method for visualizing network traffic data with statistical features of high dimensions. We combine Principal Component Analysis (PCA) and Mutidimensional Scaling (MDS) to effectively reduce dimensionality and use colormap for enhance visual quality for human beings. We obtain high quality images on a real-world network traffic dataset named 'ISP'. Comparing with the popular t-SNE method, our visualization method is more flexible and scalable for plotting network traffic data which may require to preserve multi-dimensional information and relationship. Our plots also demonstrate the capability of handling a large amount of data. Using our method, the readers will be able to visualize their network traffic data as an alternative method of t-SNE.

DOI 10.1007/s11042-017-5495-y
Citations Scopus - 7Web of Science - 5
2017 Ruan Z, Miao Y, Pan L, Patterson N, Zhang J, 'Visualization of big data security: a case study on the KDD99 cup data set', Digital Communications and Networks, 3 250-259 (2017) [C1]

Cyber security has been thrust into the limelight in the modern technological era because of an array of attacks often bypassing untrained intrusion detection systems (... [more]

Cyber security has been thrust into the limelight in the modern technological era because of an array of attacks often bypassing untrained intrusion detection systems (IDSs). Therefore, greater attention has been directed on being able deciphering better methods for identifying attack types to train IDSs more effectively. Keycyber-attack insights exist in big data; however, an efficient approach is required to determine strong attack types to train IDSs to become more effective in key areas. Despite the rising growth in IDS research, there is a lack of studies involving big data visualization, which is key. The KDD99 data set has served as a strong benchmark since 1999; therefore, we utilized this data set in our experiment. In this study, we utilized hash algorithm, a weight table, and sampling method to deal with the inherent problems caused by analyzing big data; volume, variety, and velocity. By utilizing a visualization algorithm, we were able to gain insights into the KDD99 data set with a clear identification of "normal" clusters and described distinct clusters of effective attacks.

DOI 10.1016/j.dcan.2017.07.004
Citations Scopus - 31Web of Science - 21
Show 4 more journal articles
Edit

Grants and Funding

Summary

Number of grants 1
Total funding $1

Click on a grant title below to expand the full details for that specific grant.


20231 grants / $1

Developing Digital Capabilities to Support the Aged Care Sector$1

Funding body: CSIRO - Commonwealth Scientific and Industrial Research Organisation

Funding body CSIRO - Commonwealth Scientific and Industrial Research Organisation
Project Team Doctor Sky Miao, Professor Vasso Apostolopoulos, Professor Rezaul Begg, Doctor Chao Chen, Professor Daniel Lai, Professor Kok-Leong Ong, Professor Andy Song
Scheme Next Generation Graduates Program
Role Lead
Funding Start 2023
Funding Finish 2023
GNo G2300200
Type Of Funding C2100 - Aust Commonwealth – Own Purpose
Category 2100
UON Y
Edit

Research Supervision

Number of supervisions

Completed1
Current5

Current Supervision

Commenced Level of Study Research Title Program Supervisor Type
2025 PhD Securing IoT-Enabled Smart Systems Against Advanced Persistent Threats (APTs) Using Deep Learning PhD (Computer Science), College of Engineering, Science and Environment, The University of Newcastle Principal Supervisor
2024 PhD Enhancing Security in Federated Learning: A Research Proposal PhD (Computer Science), College of Engineering, Science and Environment, The University of Newcastle Co-Supervisor
2024 PhD Automatic Code Refactoring Leveraging Large Language Models PhD (Computer Science), College of Engineering, Science and Environment, The University of Newcastle Co-Supervisor
2024 PhD Leveraging Large Language Models for Automated Software Quality Assurance PhD (Computer Science), College of Engineering, Science and Environment, The University of Newcastle Co-Supervisor
2024 PhD Intelligent Data Analysis in Cybersecurity PhD (Information Technology), College of Engineering, Science and Environment, The University of Newcastle Co-Supervisor

Past Supervision

Year Level of Study Research Title Program Supervisor Type
2025 PhD Optimizing Large Language Model Utilization through Scheduling Strategies PhD (Computer Science), College of Engineering, Science and Environment, The University of Newcastle Principal Supervisor
Edit

Dr Sky Miao

Position

Lecturer - Computing and Information Technology
School of Information and Physical Sciences
College of Engineering, Science and Environment

Focus area

Computing and Information Technology

Contact Details

Email sky.miao@newcastle.edu.au
Phone 0249854089
Link Google+

Office

Room ES221
Building Engineering Science
Location Callaghan Campus
University Drive
Callaghan, NSW 2308
Australia
Edit