Staff directory

Search for a surname in the box below and then click "Search" to search for Staff. 

If you want to get in touch but you don’t know who to contact, fill in our enquiry form and one of our advisers will get back to you as soon as possible.

Date


School

Download Available

69 results

Towards Continuous User Authentication Using Personalised Touch-Based Behaviour

Conference Proceeding
Aaby, P., Giuffrida, M. V., Buchanan, W. J., & Tan, Z. (in press)
Towards Continuous User Authentication Using Personalised Touch-Based Behaviour
In this paper, we present an empirical evaluation of 30 features used in touch-based continuous authentication. It is essential to identify the most significant features for e...

Deep learning based emotion analysis of microblog texts

Journal Article
Xu, D., Tian, Z., Lai, R., Kong, X., Tan, Z., & Shi, W. (2020)
Deep learning based emotion analysis of microblog texts. Information Fusion, 64, 1-11. https://doi.org/10.1016/j.inffus.2020.06.002
Traditional text emotion analysis methods are primarily devoted to studying extended texts, such as news reports and full-length documents. Microblogs are considered short tex...

Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites

Conference Proceeding
Babaagba, K. O., Tan, Z., & Hart, E. (2020)
Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites. In Applications of Evolutionary Computation. EvoApplications 2020. , (117-132). https://doi.org/10.1007/978-3-030-43722-0_8
In the field of metamorphic malware detection, training a detection model with malware samples that reflect potential mutants of the malware is crucial in developing a model r...

Exploring coupled images fusion based on joint tensor decomposition

Journal Article
Lu, L., Ren, X., Yeh, K., Tan, Z., & Chanussot, J. (2020)
Exploring coupled images fusion based on joint tensor decomposition. Human-Centric Computing and Information Sciences, 10, https://doi.org/10.1186/s13673-020-00215-z
Data fusion has always been a hot research topic in human-centric computing and extended with the development of artificial intelligence. Generally, the coupled data fusion al...

Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples

Conference Proceeding
Babaagba, K., Tan, Z., & Hart, E. (in press)
Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples
Detecting metamorphic malware provides a challenge to machine-learning models as trained models might not generalise to future mutant variants of the malware. To address this,...

KNN-Based Approximate Outlier Detection Algorithm Over IoT Streaming Data

Journal Article
Zhu, R., Ji, X., Yu, D., Tan, Z., Zhao, L., Li, J., & Xia, X. (2020)
KNN-Based Approximate Outlier Detection Algorithm Over IoT Streaming Data. IEEE Access, 8, 42749-42759. https://doi.org/10.1109/access.2020.2977114
KNN-Based outlier detection over IoT streaming data is a fundamental problem, which has many applications. However, due to its computational complexity, existing efforts canno...

Secure Information Transmissions in Wireless-powered Cognitive Radio Networks for Internet of Medical Things

Journal Article
Tang, K., Tang, W., Luo, E., Tan, Z., Meng, W., & Qi, L. (2020)
Secure Information Transmissions in Wireless-powered Cognitive Radio Networks for Internet of Medical Things. Security and Communication Networks, 2020, https://doi.org/10.1155/2020/7542726
In this paper, we consider the issue of the secure transmissions for the cognitive radio-based Internet of Medical Things (IoMT) with wireless energy harvesting. In these syst...

A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network

Conference Proceeding
Thomson, C., Wadhaj, I., Al-Dubai, A., & Tan, Z. (in press)
A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network
The issue of energy holes, or hotspots, in wireless sensor networks is well referenced. As is the proposed mobilisa-tion of the sink node in order to combat this. However, as ...

GAN based Text Data Augmentation for IoT domain Dialogue System

Journal Article
Wang, E. K., Tan, Z., Yeh, K., Wang, X., Xu, P., & Chen, C. (in press)
GAN based Text Data Augmentation for IoT domain Dialogue System. Mobile Networks and Applications,
IoT domain Dialogue System is a new tool for AI based IoT applications. However, how to realize an accurate dialogue system has been a key issue. Language understanding is the...

FIMPA: A Fixed Identity Mapping Prediction Algorithm in Edge Computing Environment

Journal Article
Zhang, S., Liu, Y., Li, S., Tan, Z., Zhao, X., & Zhou, J. (2020)
FIMPA: A Fixed Identity Mapping Prediction Algorithm in Edge Computing Environment. IEEE Access, 8, 17356-17365. https://doi.org/10.1109/access.2020.2966399
Edge computing is a research hotspot that extends cloud computing to the edge of the network. Due to the recent developments in computation, storage and network technology for...
9 results

Detection of cyberbullying on social media using deep learning and emojis sentiment analysis

2019 - date
Lulwah Alharigy | Director of Studies: Dr Naghmeh Moradpoor Sheykhkanloo | Second Supervisor: Dr Thomas Tan

Metaskills Maturity for future workplaces

2019 - date
Katherine Stephen | Director of Studies: Prof Hazel Hall | Second Supervisor: Dr David Brazier

An investigation of olfactory augmentation of virtual reality experiences

2018 - date
Andrew McKelvey | Director of Studies: Dr Richard Hetherington | Second Supervisor: Dr Augusto Abreu Esteves

Algorithm selection using machine learning

2018 - date
Mhd Rateb Mhd Ziad Alissa | Director of Studies: Dr Kevin Sim | Second Supervisor: Prof Emma Hart

Application of evolutionary machine learning in metamorphic malware analysis and detection

2017 - date
Ms Kehinde Babaagba | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Emma Hart

Investigations into decrypting live secure traffic in virtual environments

2016 - 2019
Mr Peter McLaren | Director of Studies: Dr Gordon Russell | Second Supervisor: Prof Bill Buchanan

Behaviour profiling using Touch-based Behavioural Biometrics for Continuous Authentication Systems

2016 - date
Peter Aaby | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Ben Paechter

Exploiting the mobility patterns of mobile sink nodes to improve the efficiency of MAC Layer Duty-cycling and Frame Delivery in wireless sensor networks

2016 - date
Craig Thomson | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Thomas Tan

Evolving Legacy Enterprise Systems with Microservices-Based Architecture in Cloud Environments

2015 - date
Safa Habibullah | Director of Studies: Prof Xiaodong Liu | Second Supervisor: Dr Thomas Tan

Date


Research Areas

People

Date