Research explorer tool

28 results

Detection of Denial-of-Service Attacks Based on Computer Vision Techniques

Journal Article
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2015)
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Transactions on Computers, 64(9), 2519-2533. https://doi.org/10.1109/tc.2014.2375218
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing ...

Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm

Journal Article
Ambusaidi, M. A., He, X., Nanda, P., & Tan, Z. (2016)
Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm. IEEE Transactions on Computers, 65(10), 2986-2998. https://doi.org/10.1109/tc.2016.2519914
Redundant and irrelevant features in data have caused a long-term problem in network traffic classification. These features not only slow down the process of classification bu...

Ontology definition and construction, and epistemological adequacy for systems interoperability: a practitioner analysis.

Journal Article
Lumsden, J., Hall, H., & Cruickshank, P. (2011)
Ontology definition and construction, and epistemological adequacy for systems interoperability: a practitioner analysis. Journal of Information Science, 37(3), 246-253. https://doi.org/10.1177/0165551511401804
Ontology development is considered to be a useful approach to the design and implementation of interoperable systems. This literature review and commentary examines the curren...

Remote control by body movement in synchrony with orbiting widgets: an evaluation of TraceMatch

Journal Article
Clarke, C., Bellino, A., Esteves, A., & Gellersen, H. (2017)
Remote control by body movement in synchrony with orbiting widgets: an evaluation of TraceMatch. PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 1(3), 1-22. https://doi.org/10.1145/3130910
In this work we consider how users can use body movement for remote control with minimal effort and maximum flexibility. TraceMatch is a novel technique where the interface di...

Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment

Journal Article
Asif, R., & Buchanan, W. J. (2017)
Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment. Security and Communication Networks, 2017, 1-10. https://doi.org/10.1155/2017/7616847
There is current significant interest in Fiber-to-the-Home (FTTH) networks, i.e. end-to-end optical connectivity. Currently, it may be limited due to the presence of last-mile...

Exploring coupled images fusion based on joint tensor decomposition

Journal Article
Lu, L., Ren, X., Yeh, K., Tan, Z., & Chanussot, J. (2020)
Exploring coupled images fusion based on joint tensor decomposition. Human-Centric Computing and Information Sciences, 10, https://doi.org/10.1186/s13673-020-00215-z
Data fusion has always been a hot research topic in human-centric computing and extended with the development of artificial intelligence. Generally, the coupled data fusion al...

Spatial anomaly detection in sensor networks using neighborhood information

Journal Article
Bosman, H. H., Iacca, G., Tejada, A., Wörtche, H. J., & Liotta, A. (2017)
Spatial anomaly detection in sensor networks using neighborhood information. Information Fusion, 33, 41-56. https://doi.org/10.1016/j.inffus.2016.04.007
The field of wireless sensor networks (WSNs), embedded systems with sensing and networking capability, has now matured after a decade-long research effort and technological ad...

A topological insight into restricted Boltzmann machines

Journal Article
Mocanu, D. C., Mocanu, E., Nguyen, P. H., Gibescu, M., & Liotta, A. (2016)
A topological insight into restricted Boltzmann machines. Machine Learning, 104(2-3), 243-270. https://doi.org/10.1007/s10994-016-5570-z
Restricted Boltzmann Machines (RBMs) and models derived from them have been successfully used as basic building blocks in deep artificial neural networks for automatic feature...

Estimating 3D trajectories from 2D projections via disjunctive factored four-way conditional restricted Boltzmann machines

Journal Article
Mocanu, D. C., Bou Ammar, H., Puig, L., Eaton, E., & Liotta, A. (2017)
Estimating 3D trajectories from 2D projections via disjunctive factored four-way conditional restricted Boltzmann machines. Pattern Recognition, 69, 325-335. https://doi.org/10.1016/j.patcog.2017.04.017
Estimation, recognition, and near-future prediction of 3D trajectories based on their two dimensional projections available from one camera source is an exceptionally difficul...

Fast Millimeter Wave Assisted Beam-Steering for Passive Indoor Optical Wireless Networks

Journal Article
Torres Vega, M., Koonen, A. M. J., Liotta, A., & Famaey, J. (2018)
Fast Millimeter Wave Assisted Beam-Steering for Passive Indoor Optical Wireless Networks. IEEE Wireless Communications Letters, 7(2), 278-281. https://doi.org/10.1109/lwc.2017.2771771
In light of the extreme radio congestion, the time has come to consider the upper parts of the electromagnetic spectrum. Optical beam-steered wireless communications offer gre...