
Dr Xiao Chen
Lecturer
School of Information and Physical Sciences (Computing and Information Technology)
Career Summary
Biography
Qualifications
- DOCTOR OF PHILOSOPHY, Swinburne University of Technology
Keywords
- AI Security
- AI for Software Engineering
- Digital Health
- Software Engineering for AI
- Software Quality Assurance
- Software Security
- Trustworthy AI
Languages
- English (Fluent)
- Mandarin (Mother)
Fields of Research
| Code | Description | Percentage |
|---|---|---|
| 460403 | Data security and protection | 50 |
| 460406 | Software and application security | 50 |
Professional Experience
UON Appointment
| Title | Organisation / Department |
|---|---|
| Lecturer | University of Newcastle School of Information and Physical Sciences Australia |
Academic appointment
| Dates | Title | Organisation / Department |
|---|---|---|
| 2/12/2019 - 2/2/2024 | Research Fellow | Monash University Faculty of Information Technology Australia |
Awards
Nomination
| Year | Award |
|---|---|
| 2025 |
Early Career Researcher Excellence College of Engineering, Science and Environment (CESE), University of Newcastle |
Research Award
| Year | Award |
|---|---|
| 2020 |
Outstanding HDR Published Award 2020 Swinburne University of Technology |
Teaching
| Code | Course | Role | Duration |
|---|---|---|---|
| SENG3320 |
Software Verification and Validation College of Engineering Science and Environment | the University of Newcastle | Australia |
Course Coordinator, Lecturer | 26/2/2024 - 7/6/2024 |
| SENG6250 |
System and Network Security College of Engineering Science and Environment | the University of Newcastle | Australia |
Course Coordinator, Lecturer | 22/7/2024 - 1/11/2024 |
| SENG2250 |
System and Network Security College of Engineering Science and Environment | the University of Newcastle | Australia |
Course Coordinator, Lecturer | 22/7/2024 - 1/11/2024 |
| SENG6320 |
Software Verification and Validation College of Engineering Science and Environment | the University of Newcastle | Australia |
Course Coordinator, Lecturer | 26/2/2024 - 7/6/2024 |
| FIT3173 |
Software Security Monash University |
Lecturer | 21/2/2022 - 3/6/2022 |
Publications
For publications that are currently unpublished or in-press, details are shown in italics.
Chapter (1 outputs)
| Year | Citation | Altmetrics | Link | ||
|---|---|---|---|---|---|
| 2025 |
Hoda R, Zhou W, Chen X, Li A, Kalla M, Wulandari T, Bain C, Chapman W, Georgy S, Franco M, Poon P, 'A Picture Is Worth a ThousandWords: Designing a Tele-Health Solution Using Photo Elicitation', 1180 LNNS, 519-528 (2025) [B1]
|
Conference (21 outputs)
| Year | Citation | Altmetrics | Link | |||||
|---|---|---|---|---|---|---|---|---|
| 2025 |
Liu T, Deng J, Zhao Y, Chen X, Du X, Li L, Wang H, 'Are iOS Apps Immune to Abusive Advertising Practices?', Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 491-502 (2025) [E1]
|
|||||||
| 2024 |
Zhou M, Gao X, Liu P, Grundy J, Chen C, Chen X, Li L, 'Model-less Is the Best Model: Generating Pure Code Implementations to Replace On-Device DL Models', PROCEEDINGS OF THE 33RD ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2024, 174-185 (2024) [E1]
|
Open Research Newcastle | ||||||
| 2024 |
Zhou M, Gao X, Chen X, Chen C, Grundy J, Li L, 'DynaMO: Protecting Mobile DL Models through Coupling Obfuscated DL Operators', Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 204-215 (2024) [E1]
|
|||||||
| 2024 |
Li F, Chen X, Xiao X, Sun X, Chen C, Wang S, Han J, 'Incremental Context-free Grammar Inference in Black Box Settings', Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 1171-1182 (2024) [E1]
|
|||||||
| 2023 |
Zhou M, Gao X, Wu J, Grundy J, Chen X, Chen C, Li L, 'ModelObfuscator: Obfuscating Model Information to Protect Deployed ML-Based Systems', ISSTA 2023 - Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 1005-1017 (2023) [E1]
|
|||||||
| 2023 |
Sun X, Chen X, Liu Y, Grundy J, Li L, 'LazyCow: A Lightweight Crowdsourced Testing Tool for Taming Android Fragmentation', ESEC/FSE 2023 - Proceedings of the 31st ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2127-2131 (2023) [E1]
|
|||||||
| 2023 |
Zhang R, Wu T, Chen X, Wen S, Nepal S, Paris C, Xiang Y, 'Dynalogue: A Transformer-Based Dialogue System with Dynamic Attention', ACM Web Conference 2023 - Proceedings of the World Wide Web Conference, WWW 2023, 1604-1615 (2023) [E1]
|
|||||||
| 2023 |
Liu Y, Chen X, Liu P, Grundy J, Chen C, Li L, 'ReuNify: A Step Towards Whole Program Analysis for React Native Android Apps', Proceedings 2023 38th IEEE ACM International Conference on Automated Software Engineering Ase 2023, 1390-1402 (2023) [E1]
React Native is a widely-used open-source frame-work that facilitates the development of cross-platform mobile apps. The framework enables JavaScript code to interact w... [more] React Native is a widely-used open-source frame-work that facilitates the development of cross-platform mobile apps. The framework enables JavaScript code to interact with native-side code, such as Objective-C/Swift for iOS and Java/Kotlin for Android, via a communication mechanism provided by React Native. However, previous research and tools have overlooked this mechanism, resulting in incomplete analysis of React Native app code. To address this limitation, we have developed REUNIFY, a prototype tool that integrates the JavaScript and native-side code of React Native apps into an intermediate language that can be processed by the Soot static analysis framework. By doing so, REUNIFY enables the generation of a comprehensive model of the app's behavior. Our evaluation indicates that, by leveraging REUNIFY, the Soot-based framework can improve its coverage of static analysis for the 1,007 most popular React Native Android apps, augmenting the number of lines of Jimple code by 70%. Additionally, we observed an average increase of 84% in new nodes reached in the callgraph for these apps, after integrating REUNIFY. When REUNIFY is used for taint flow analysis, an average of two additional privacy leaks were identified. Overall, our results demonstrate that REUNIFY significantly enhances the Soot-based framework's capability to analyze React Native Android apps.
|
|||||||
| 2022 |
Li C, Chen X, Sun R, Xue M, Wen S, Ahmed ME, Camtepe S, Xiang Y, 'Cross-language Android permission specification', ESEC/FSE 2022 - Proceedings of the 30th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 772-783 (2022) [E1]
|
|||||||
| 2022 |
Sun X, Chen X, Zhao Y, Liu P, Grundy J, Li L, 'Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues', ACM International Conference Proceeding Series (2022)
Despite being one of the largest and most popular projects, the official Android framework has only provided test cases for less than 30% of its APIs. Such a poor test ... [more] Despite being one of the largest and most popular projects, the official Android framework has only provided test cases for less than 30% of its APIs. Such a poor test case coverage rate has led to many compatibility issues that can cause apps to crash at runtime on specific Android devices, resulting in poor user experiences for both apps and the Android ecosystem. To mitigate this impact, various approaches have been proposed to automatically detect such compatibility issues. Unfortunately, these approaches have only focused on detecting signature-induced compatibility issues (i.e., a certain API does not exist in certain Android versions), leaving other equally important types of compatibility issues unresolved. In this work, we propose a novel prototype tool, JUnitTestGen, to fill this gap by mining existing Android API usage to generate unit test cases. After locating Android API usage in given real-world Android apps, JUnitTestGen performs inter-procedural backward data-flow analysis to generate a minimal executable code snippet (i.e., test case). Experimental results on thousands of real-world Android apps show that JUnitTestGen is effective in generating valid unit test cases for Android APIs. We show that these generated test cases are indeed helpful for pinpointing compatibility issues, including ones involving semantic code changes.
|
|||||||
| 2021 |
Chen X, Chen W, Liu K, Chen C, Li L, 'A Comparative Study of Smartphone and Smartwatch Apps', 36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021, 1484-1493 (2021)
Despite that our community has spent numerous efforts on analyzing mobile apps, there is no study proposed for characterizing the relationship between smartphone and sm... [more] Despite that our community has spent numerous efforts on analyzing mobile apps, there is no study proposed for characterizing the relationship between smartphone and smartwatch apps. To fill this gap, we present to the community a comparative study of smartphone and smartwatch apps, aiming at understanding the status quo of cross-phone/watch apps. Specifically, in this work, we first collect a set of cross-phone/watch app pairs and then experimentally look into them to explore their similarities or dissimilarities from different perspectives. Experimental results show that (1) Approximately, up to 40% of resource files, 30% of code methods are reused between smartphone/watch app pairs, (2) Smartphone apps may require more than twice as many as permissions and adopt more than five times as many as user interactions than their watch counterparts, and (3) Smartwatch apps can be released as either standalone (can be run independently) or companion versions (i.e., have to co-work with their smartphone counterparts), for which the former type of apps tends to require more permissions and reuse more code, involve more user interactions than the latter type. Our findings can help developers and researchers understand the ecosystem of smartwatch apps and further gain insight into migrating smartphone apps for smartwatches.
|
|||||||
| 2021 |
Wang X, Liu X, Li L, Chen X, Liu J, Wu H, 'Time-aware User Modeling with Check-in Time Prediction for Next POI Recommendation', Proceedings - 2021 IEEE International Conference on Web Services, ICWS 2021, 125-134 (2021)
POI (point-of-interest) recommendation as an important type of location-based services has received increasing attention with the rise of location-based social networks... [more] POI (point-of-interest) recommendation as an important type of location-based services has received increasing attention with the rise of location-based social networks. Although significant efforts have been dedicated to learning and recommending users' next POIs based on their historical mobility traces, there still lacks consideration of the discrepancy of users' check-in time preferences and the inherent relationships between POIs and check-in times. To fill this gap, this paper proposes a novel recommendation method which applies multi-task learning over historical user mobility traces known to be sparse. Specifically, we design a cross-graph neural network to obtain time-aware user modeling and control how much information flows across different semantic spaces, which makes up the inadequate representation of existing user modeling methods. In addition, we design a check-in time prediction task to learn users' activities from a time perspective and learn internal patterns between POIs and their check-in times, aiming to reduce the search space to overcome the data sparsity problem. Comprehensive experiments on two real-world public datasets demonstrate that our proposed method outperforms several representative POI recommendation methods with 8.93% to 20.21 % improvement on Recall@1, 5, 10, and 9.25% to 17.56% improvement on Mean Reciprocal Rank.
|
|||||||
| 2021 |
Sun X, Chen X, Liu K, Wen S, Li L, Grundy J, 'Characterizing Sensor Leaks in Android Apps', Proceedings International Symposium on Software Reliability Engineering ISSRE, 2021-October, 498-509 (2021)
While extremely valuable to achieve advanced functions, mobile phone sensors can be abused by attackers to implement malicious activities in Android apps, as experiment... [more] While extremely valuable to achieve advanced functions, mobile phone sensors can be abused by attackers to implement malicious activities in Android apps, as experimentally demonstrated by many state-of-the-art studies. There is hence a strong need to regulate the usage of mobile sensors so as to keep them from being exploited by malicious attackers. However, despite the fact that various efforts have been put in achieving this, i.e., detecting privacy leaks in Android apps, we have not yet found approaches to automatically detect sensor leaks in Android apps. To fill the gap, we designed and implemented a novel prototype tool, Seeker, that extends the famous FlowDroid tool to detect sensor-based data leaks in Android apps. Seeker conducts sensor-focused static taint analyses directly on the Android apps' bytecode and reports not only sensor-triggered privacy leaks but also the sensor types involved in the leaks. Experimental results using over 40,000 real-world Android apps show that Seeker is effective in detecting sensor leaks in Android apps, and malicious apps are more interested in leaking sensor data than benign apps.
|
|||||||
| 2020 |
Wang X, Liu J, Li L, Chen X, Liu X, Wu H, 'Detecting and Explaining Self-Admitted Technical Debts with Attention- based Neural Networks', 2020 35TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2020), 871-882 (2020)
|
|||||||
| 2020 |
Li Y, Xiao X, Zhu X, Chen X, Wen S, Zhang B, 'SpeedNeuzz: Speed Up Neural Program Approximation with Neighbor Edge Knowledge', 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 450-457 (2020)
|
|||||||
| 2019 |
Shi L, Chen X, Wen S, Xiang Y, 'Main Enabling Technologies in Industry 4.0 and Cybersecurity Threats', CYBERSPACE SAFETY AND SECURITY, PT II, 11983, 588-597 (2019)
|
|||||||
| 2019 |
Zhang R, Chen X, Wen S, Zheng J, 'Who Activated My Voice Assistant? A Stealthy Attack on Android Phones Without Users’ Awareness', Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, 11806 LNCS, 378-396 (2019)
Voice Assistant (VAs) are increasingly popular for human-computer interaction (HCI) smartphones. To help users automatically conduct various tasks, these tools usually ... [more] Voice Assistant (VAs) are increasingly popular for human-computer interaction (HCI) smartphones. To help users automatically conduct various tasks, these tools usually come with high privileges and are able to access sensitive system resources. A comprised VA is a stepping stone for attackers to hack into users' phones. Prior work has experimentally demonstrated that VAs can be a promising attack point for HCI tools. However, the state-of-the-art approaches require ad-hoc mechanisms to activate VAs that are non-trivial to trigger in practice and are usually limited to specific mobile platforms. To mitigate the limitations faced by the state-of-the-art, we propose a novel attack approach, namely Vaspy, which crafts the users' "activation voice" by silently listening to users' phone calls. Once the activation voice is formed, Vaspy can select a suitable occasion to launch an attack. Vaspy embodies a machine learning model that learns suitable attacking times to prevent the attack from being noticed by the user. We implement a proof-of-concept spyware and test it on a range of popular Android phones. The experimental results demonstrate that this approach can silently craft the activation voice of the users and launch attacks. In the wrong hands, a technique like Vaspy can enable automated attacks to HCI tools. By raising awareness, we urge the community and manufacturers to revisit the risks of VAs and subsequently revise the activation logic to be resilient to the style of attacks proposed in this work.
|
|||||||
| Show 18 more conferences | ||||||||
Journal article (16 outputs)
| Year | Citation | Altmetrics | Link | |||||
|---|---|---|---|---|---|---|---|---|
| 2025 |
Liu Y, Chen X, Liu Y, Kong P, Bissyandé TF, Klein J, Sun X, Li L, Chen C, Grundy J, 'A comparative study between android phone and TV apps', Automated Software Engineering, 32 (2025) [C1]
|
|||||||
| 2025 |
Liu Y, Chen X, Liu P, Samhi J, Grundy J, Chen C, Li L, 'Demystifying React Native Android Apps for Static Analysis', ACM Transactions on Software Engineering and Methodology, 34 (2025) [C1]
|
|||||||
| 2025 |
Zhou W, Zhu X, Han QL, Li L, Chen X, Wen S, Xiang Y, 'The Security of Using Large Language Models: A Survey with Emphasis on ChatGPT', IEEE Caa Journal of Automatica Sinica, 12, 1-26 (2025) [C1]
ChatGPT is a powerful artificial intelligence (AI) language model that has demonstrated significant improvements in various natural language processing (NLP) tasks. How... [more] ChatGPT is a powerful artificial intelligence (AI) language model that has demonstrated significant improvements in various natural language processing (NLP) tasks. However, like any technology, it presents potential security risks that need to be carefully evaluated and addressed. In this survey, we provide an overview of the current state of research on security of using ChatGPT, with aspects of bias, disinformation, ethics, misuse, attacks and privacy. We review and discuss the literature on these topics and highlight open research questions and future directions. Through this survey, we aim to contribute to the academic discourse on AI security, enriching the understanding of potential risks and mitigations. We anticipate that this survey will be valuable for various stakeholders involved in AI development and usage, including AI researchers, developers, policy makers, and end-users.
|
|||||||
| 2025 |
Chen D, Liu Y, Zhou M, Zhao Y, Wang H, Wang S, Chen X, Bissyandé TF, Klein J, Li L, 'LLM for Mobile: An Initial Roadmap', ACM Transactions on Software Engineering and Methodology, 34 (2025) [C1]
|
|||||||
| 2025 |
Kalla M, O'Brien T, Metcalf O, Hoda R, Chen X, Li A, Parker C, Franco ME, Georgy S, Huckvale K, Bain C, Poon P, 'Understanding Experiences of Telehealth in Palliative Care: Photo Interview Study', JMIR Hum Factors, 12, e53913-e53913 (2025) [C1]
|
|||||||
| 2024 |
Chen X, Zhou W, Hoda R, Li A, Bain C, Poon P, 'Exploring the opportunities of large language models for summarizing palliative care consultations: A pilot comparative study', DIGITAL HEALTH, 10 (2024) [C1]
|
|||||||
| 2024 |
Hu H, Wang H, Dong R, Chen X, Chen C, 'Enhancing GUI Exploration Coverage of Android Apps with Deep Link-Integrated Monkey', ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 33 (2024) [C1]
Mobile apps are ubiquitous in our daily lives for supporting different tasks such as reading and chatting. Despite the availability of many GUI testing tools, app teste... [more] Mobile apps are ubiquitous in our daily lives for supporting different tasks such as reading and chatting. Despite the availability of many GUI testing tools, app testers still struggle with low testing code coverage due to tools frequently getting stuck in loops or overlooking activities with concealed entries. This results in a significant amount of testing time being spent on redundant and repetitive exploration of a few GUI pages. To address this, we utilize Android's deep links, which assist in triggering Android intents to lead users to specific pages and introduce a deep link-enhanced exploration method. This approach, integrated into the testing tool Monkey, gives rise to Delm (Deep Link-enhanced Monkey). Delm oversees the dynamic exploration process, guiding the tool out of meaningless testing loops to unexplored GUI pages. We provide a rigorous activity context mock-up approach for triggering existing Android intents to discover more activities with hidden entrances. We conduct experiments to evaluate Delm's effectiveness on activity context mock-up, activity coverage, method coverage, and crash detection. The findings reveal that Delm can mock up more complex activity contexts and significantly outperform state-of-the-art baselines with 27.2% activity coverage, 21.13% method coverage, and 23.81% crash detection.
|
Open Research Newcastle | ||||||
| 2024 |
Tang L, Chen X, Wen S, Li L, Grobler M, Xiang Y, 'Demystifying the Evolution of Android Malware Variants', IEEE Transactions on Dependable and Secure Computing, 21 3324-3341 (2024) [C1]
It is important to understand the evolution of Android malware as this facilitates the development of defence techniques by proactively capturing malware features. So f... [more] It is important to understand the evolution of Android malware as this facilitates the development of defence techniques by proactively capturing malware features. So far, researchers mainly rely on dendrogram or family-tree analysis for malware's evolutionary development. However, our research finds that these techniques cannot support comprehensive malware evolution modelling, which provides a detailed explanation for why Android malware samples evolve in specific ways. This shortcoming is mainly caused by the coarse-grained clustering and analysis of malware samples. For example, because these works do not divide malware samples of a family into variant sets and explore the evolution principles among those sets, they usually fail to capture new variants that have been empowered by the feature 'drifting' in evolution. To address this problem, we propose a fine-grained and in-depth analysis of Android malware. Our experimental work systematically reveals the phylogenetic relationships among the variant sets for a deeper malware evolution analysis. We introduce five metrics: silhouette coefficient, creation date, variant labels, the presentativeness of the variant set formula, and the correctness of the linked edges to evaluate the correctness of our analysis. The results show that our variant clustering achieved a high silhouette value at a small sample distance (0.3), a small standard deviation (three months and 16 days) date based on when the malware samples are lastly modified, a high label consistency (91.4%), a high representativeness (93.1%) of the variant set formula. All the linked variant sets are connected based on our PhyloNet construction rules. We further analyse the coding details of Android malware for each variant set and summarise models of their evolutionary development. In this work, we successfully expose two major models of malware evolution: active evolution and passive evolution. We also disclose four technical explanations on the incentives of the two evolution models (two for each model respectively). These findings are valuable for proactive defence against newly emerged malware samples.
|
|||||||
| 2024 |
Tang L, Wu T, Chen X, Wen S, Zhou W, Zhu X, Xiang Y, 'How COVID-19 impacts telehealth: an empirical study of telehealth services, users and the use of metaverse', Connection Science, 36 (2024) [C1]
|
|||||||
| 2023 |
Sun X, Chen X, Liu Y, Grundy J, Li L, 'Taming Android Fragmentation Through Lightweight Crowdsourced Testing', IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 49, 3599-3615 (2023) [C1]
|
|||||||
| 2023 |
Sun X, Chen X, Li L, Cai H, Grundy J, Samhi J, Bissyande T, Klein J, 'Demystifying Hidden Sensitive Operations in Android Apps', ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 32 (2023) [C1]
|
|||||||
| 2023 |
Tang L, Wu T, Chen X, Wen S, Li L, Xia X, Grobler M, Xiang Y, 'How Does Visualisation Help App Practitioners Analyse Android Apps?', IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 20, 2238-2255 [C1]
|
|||||||
| 2022 |
Li C, Chen X, Wang D, Wen S, Ahmed ME, Camtepe S, Xiang Y, 'Backdoor Attack on Machine Learning Based Android Malware Detectors', IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 19, 3357-3370 (2022) [C1]
|
|||||||
| 2020 |
Chen X, Li C, Wang D, Wen S, Zhang J, Nepal S, Xiang Y, Ren K, 'Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection', IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 15, 987-1001 (2020) [C1]
|
|||||||
| 2019 |
Zhang R, Chen X, Wen S, Zheng X, Ding Y, 'Using AI to Attack VA: A Stealthy Spyware Against Voice Assistances in Smart Phones', IEEE ACCESS, 7, 153542-153554 (2019) [C1]
|
|||||||
| Show 13 more journal articles | ||||||||
Grants and Funding
Summary
| Number of grants | 4 |
|---|---|
| Total funding | $2,038,000 |
Click on a grant title below to expand the full details for that specific grant.
20251 grants / $15,000
CTF-based Cybersecurity Offensive and Defensive Platform: Development and Evaluation for Higher Education Use$15,000
Funding body: Australasian Council of Deans of Information & Communications Technology
| Funding body | Australasian Council of Deans of Information & Communications Technology |
|---|---|
| Project Team | Caslon Chua, Sheng Wen, Xiao Chen, Sky Miao, Wei Zhou, Hao Zhang, Xiaogang Zhu, Cheryl Pope |
| Scheme | ACDICT Learning & Teaching Research Grants Scheme |
| Role | Investigator |
| Funding Start | 2025 |
| Funding Finish | 2025 |
| GNo | |
| Type Of Funding | C1700 - Aust Competitive - Other |
| Category | 1700 |
| UON | N |
20242 grants / $23,000
Light-Weight Active Security for Resource-Constrained Devices in Smart Farming$13,000
Funding body: Office of Deputy Vice-Chancellor (Global), Global Engagement and Partnerships Division, University of Newcastle
| Funding body | Office of Deputy Vice-Chancellor (Global), Global Engagement and Partnerships Division, University of Newcastle |
|---|---|
| Project Team | Xiao Chen, Farzana Zahid, Shaleeza Sohail, Boyang Li, Melanie Ooi, Harish Devaraj |
| Scheme | The University of Newcastle and The University of Waikato Partnership Seed Fund |
| Role | Lead |
| Funding Start | 2024 |
| Funding Finish | 2024 |
| GNo | |
| Type Of Funding | Internal |
| Category | INTE |
| UON | N |
CESE Start Up$10,000
Funding body: University of Newcastle
| Funding body | University of Newcastle |
|---|---|
| Project Team | Xiao Chen |
| Scheme | Academic Appointment Support |
| Role | Lead |
| Funding Start | 2024 |
| Funding Finish | 2024 |
| GNo | |
| Type Of Funding | Internal |
| Category | INTE |
| UON | N |
20211 grants / $2,000,000
Enhanced Telehealth Capabilities for Improved Patient and Clinician Experiences$2,000,000
Deliver enhanced telehealth capabilities (ETHC) to improve patient and clinician experiences of the telehealth delivery method.
This project will make use of an experience-based co-design, prototyping, and evaluation method to enhance telehealth capabilities. By improving the patient experience, as well as the efficiency of telehealth, researchers hope to facilitate a greater uptake of it in the future.ETHC can improve the technical, as well as the user experience parameters of telehealth. This includes increasing the speed and quality of virtual systems during major events like pandemics, but also providing better and more equitable access to specialist services all the time.
Researchers will apply their methodology to real-world settings and will develop modules for palliative care and mental health as a starting point, while looking to apply their findings across the whole of healthcare in due course.
Funding body: Digital Health CRC
| Funding body | Digital Health CRC |
|---|---|
| Scheme | Digital Health CRC |
| Role | Investigator |
| Funding Start | 2021 |
| Funding Finish | 2024 |
| GNo | |
| Type Of Funding | CRC - Cooperative Research Centre |
| Category | 4CRC |
| UON | N |
Research Supervision
Number of supervisions
Current Supervision
| Commenced | Level of Study | Research Title | Program | Supervisor Type |
|---|---|---|---|---|
| 2025 | PhD | Integrating Federated Learning and Blockchain in IoT Future Application | PhD (Information Technology), College of Engineering, Science and Environment, The University of Newcastle | Co-Supervisor |
| 2024 | PhD | Enhancing Security in Federated Learning: A Research Proposal | PhD (Computer Science), College of Engineering, Science and Environment, The University of Newcastle | Principal Supervisor |
| 2024 | PhD | Automatic Code Refactoring Leveraging Large Language Models | PhD (Computer Science), College of Engineering, Science and Environment, The University of Newcastle | Principal Supervisor |
| 2024 | PhD | Leveraging Large Language Models for Automated Software Quality Assurance | PhD (Computer Science), College of Engineering, Science and Environment, The University of Newcastle | Principal Supervisor |
| 2021 | PhD | Static Analysis in Python | Computer Science, Monash University | Co-Supervisor |
| 2020 | PhD | Improving Mobile App Quality through Intelligent Dynamic Analysis | Computer Science, Monash University | Co-Supervisor |
Past Supervision
| Year | Level of Study | Research Title | Program | Supervisor Type |
|---|---|---|---|---|
| 2025 | PhD | Cross‑platform Mobile App Analysis | Computer Science, Monash University | Co-Supervisor |
| 2025 | PhD | Enhancing Security of On‑device Machine Learning Models | Computer Science, Monash University | Co-Supervisor |
| 2024 | PhD | Android App GUI Testing | Computer Science, Monash University | Co-Supervisor |
Research Opportunities
PhD Student
I’m looking for a self-motivated PhD student to join our research lab, working on topics in LLM for software engineering, software security, AI security and trustworthiness. CSC scholarship available.
PHD
School of Information and Physical Sciences
1/1/2027 - 1/6/2030
Contact
Doctor Xiao Chen
University of Newcastle
School of Information and Physical Sciences
xiao.chen@newcastle.edu.au
Dr Xiao Chen
Position
Lecturer
School of Information and Physical Sciences
College of Engineering, Science and Environment
Focus area
Computing and Information Technology
Contact Details
| xiao.chen@newcastle.edu.au |
Office
| Room | SR273 |
|---|---|
| Building | Social Science |
| Location | Callaghan Campus University Drive Callaghan, NSW 2308 Australia |
