Research explorer tool

Date


School

Download Available

64 results

FIMPA: A Fixed Identity Mapping Prediction Algorithm in Edge Computing Environment

Journal Article
Zhang, S., Liu, Y., Li, S., Tan, Z., Zhao, X., & Zhou, J. (2020)
FIMPA: A Fixed Identity Mapping Prediction Algorithm in Edge Computing Environment. IEEE Access, 8, 17356-17365. https://doi.org/10.1109/access.2020.2966399
Edge computing is a research hotspot that extends cloud computing to the edge of the network. Due to the recent developments in computation, storage and network technology for...

Exploring coupled images fusion based on joint tensor decomposition

Journal Article
Lu, L., Ren, X., Yeh, K., Tan, Z., & Chanussot, J. (in press)
Exploring coupled images fusion based on joint tensor decomposition. Human-Centric Computing and Information Sciences,
Data fusion has always been a hot research topic in human-centric computing and extended with the development of artificial intelligence. Generally, the coupled data fusion al...

A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network

Conference Proceeding
Thomson, C., Wadhaj, I., Al-Dubai, A., & Tan, Z. (in press)
A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network
The issue of energy holes, or hotspots, in wireless sensor networks is well referenced. As is the proposed mobilisa-tion of the sink node in order to combat this. However, as ...

FairEdge: A Fairness-Oriented Task Offloading Scheme for Iot Applications in Mobile Cloudlet Networks

Journal Article
Lai, S., Fan, X., Ye, Q., Tan, Z., Zhang, Y., He, X., & Nanda, P. (2020)
FairEdge: A Fairness-Oriented Task Offloading Scheme for Iot Applications in Mobile Cloudlet Networks. IEEE Access, 8, 13516-13526. https://doi.org/10.1109/access.2020.2965562
Mobile cloud computing has emerged as a promising paradigm to facilitate computation-intensive and delay-sensitive mobile applications. Computation offloading services at the ...

Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites

Conference Proceeding
Babaagba, K., Tan, Z., & Hart, E. (in press)
Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites
In the field of metamorphic malware detection, training a detection model with malware samples that reflect potential mutants of the malware is crucial in developing a model r...

Double-Arc Parallel Coordinates and its Axes re-Ordering Methods

Journal Article
Lu, L., Wang, W., & Tan, Z. (in press)
Double-Arc Parallel Coordinates and its Axes re-Ordering Methods. Mobile Networks and Applications, https://doi.org/10.1007/s11036-019-01455-9
The Parallel Coordinates Plot (PCP) is a popular technique for the exploration of high-dimensional data. In many cases, researchers apply it as an effective method to analyze ...

PTAOD: A Novel Framework For Supporting Approximate Outlier Detection over Streaming Data for Edge Computing

Journal Article
Zhu, R., Yu, T., Tan, Z., Du, W., Zhao, L., Li, J., & Xia, X. (2019)
PTAOD: A Novel Framework For Supporting Approximate Outlier Detection over Streaming Data for Edge Computing. IEEE Access, 8, 1475-1485. https://doi.org/10.1109/ACCESS.2019.2962066
Outlier detection over sliding window is a fundamental problem in the domain of streaming data management, which has been studied over 10 years. The key of supporting outlier ...

Secure Information Transmissions in Wireless-powered Cognitive Radio Networks for Internet of Medical Things

Journal Article
Tang, K., Tang, W., Luo, E., Tan, Z., Meng, W., & Qi, L. (in press)
Secure Information Transmissions in Wireless-powered Cognitive Radio Networks for Internet of Medical Things. Security and Communication Networks,
In this paper, we consider the issue of the secure transmissions for the cognitive radio-based Internet of Medical Things (IoMT) with wireless energy harvesting. In these syst...

A Multi-attributes-based Trust Model of Internet of Vehicle

Conference Proceeding
Ou, W., Luo, E., Tan, Z., Xiang, L., Yi, Q., & Tian, C. (in press)
A Multi-attributes-based Trust Model of Internet of Vehicle. In Network and System Security, (706-713). https://doi.org/10.1007/978-3-030-36938-5_45
Internet of Vehicle (IoV) is an open network and it changes in constant, where there are large number of entities. Effective way to keep security of data in IoV is to establis...

O-ADPI: Online Adaptive Deep-Packet Inspector Using Mahalanobis Distance Map for Web Service Attacks Classification

Journal Article
Kakavand, M., Mustapha, A., Tan, Z., Foroozana, S., & Arulsamy, L. (2019)
O-ADPI: Online Adaptive Deep-Packet Inspector Using Mahalanobis Distance Map for Web Service Attacks Classification. IEEE Access, 7, 167141-167156. https://doi.org/10.1109/access.2019.2953791
Most active research in Host and Network Intrusion Detection Systems are only able to detect attacks of the computer systems and attacks at the network layer, which are not su...
9 results

Employing Machine Learning/Data Mining for Social Threat Detection

2019 - date
Lulwah Alharigy | Director of Studies: Dr Naghmeh Moradpoor Sheykhkanloo | Second Supervisor: Dr Thomas Tan

Meta skills for future workplaces

2019 - date
Katherine Stephen | Director of Studies: Dr Laura Muir | Second Supervisor: Prof Hazel Hall

An investigation of olfactory augmentation of virtual reality experiences

2018 - date
Andrew McKelvey | Director of Studies: Dr Richard Hetherington | Second Supervisor: Dr Augusto Abreu Esteves

Algorithm selection using machine learning

2018 - date
Mhd Rateb Mhd Ziad Alissa | Director of Studies: Dr Kevin Sim | Second Supervisor: Prof Emma Hart

Application of evolutionary machine learning in metamorphic malware analysis and detection

2017 - date
Ms Kehinde Babaagba | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Emma Hart

Behaviour profiling using Touch-based Behavioural Biometrics for Continuous Authentication Systems

2016 - date
Peter Aaby | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Ben Paechter

Exploiting the mobility patterns of mobile sink nodes to improve the efficiency of duty-cycling and routing in wireless sensor networks

2016 - date
Craig Thomson | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Thomas Tan

Investigations into decrypting live secure traffic in virtual environments

2016 - 2019
Mr Peter McLaren | Director of Studies: Dr Gordon Russell | Second Supervisor: Prof Bill Buchanan

An approach to evolving legacy enterprise systems to cloud-based lean microservices

2015 - date
Safa Habibullah | Director of Studies: Prof Xiaodong Liu | Second Supervisor: Dr Thomas Tan

Date


Research Areas

People

Date