Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach
Christou, O., Pitropakis, N., Papadopoulos, P., Mckeown, S., & Buchanan, W. J. (2020)
Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach. In Proceedings of the 6th International Conference on Information Systems Security and Privacy. , (289-298). https://doi.org/10.5220/0008902202890298
Phishing is considered to be one of the most prevalent cyber-attacks because of its immense flexibility and alarmingly high success rate. Even with adequate training and high ...
Privacy-preserving Surveillance Methods using Homomorphic Encryption
Bowditch, W., Abramson, W., Buchanan, W. J., Pitropakis, N., & Hall, A. J. (2020)
Privacy-preserving Surveillance Methods using Homomorphic Encryption. In ICISSP: Proceedings of the 6th International Conference on Information Systems Security and Privacy. , (240-248). https://doi.org/10.5220/0008864902400248
Data analysis and machine learning methods often involve the processing of cleartext data, and where this could breach the rights to privacy. Increasingly, we must use encrypt...
Props Alive: A Framework for Augmented Reality Stop Motion Animation
Casas, L., Kosek, M., & Mitchell, K. (2020)
Props Alive: A Framework for Augmented Reality Stop Motion Animation. In 2017 IEEE 10th Workshop on Software Engineering and Architectures for Realtime Interactive Systems (SEARIS)https://doi.org/10.1109/SEARIS41720.2017.9183487
Stop motion animation evolved in the early days of cinema with the aim to create an illusion of movement with static puppets posed manually each frame. Current stop motion mov...
Photo-Realistic Facial Details Synthesis from Single Image
Chen, A., Chen, Z., Zhang, G., Zhang, Z., Mitchell, K., & Yu, J. (2019)
Photo-Realistic Facial Details Synthesis from Single Image. In 2019 IEEE/CVF International Conference on Computer Vision (ICCV) (9429-9439). https://doi.org/10.1109/ICCV.2019.00952
We present a single-image 3D face synthesis technique that can handle challenging facial expressions while recovering fine geometric details. Our technique employs expression ...
A Multi-attributes-based Trust Model of Internet of Vehicle
Ou, W., Luo, E., Tan, Z., Xiang, L., Yi, Q., & Tian, C. (2019)
A Multi-attributes-based Trust Model of Internet of Vehicle. In Network and System Security. , (706-713). https://doi.org/10.1007/978-3-030-36938-5_45
Internet of Vehicle (IoV) is an open network and it changes in constant, where there are large number of entities. Effective way to keep security of data in IoV is to establis...
Wattom: Ambient Eco-feedback with Mid-air Input
Esteves, A., Quintal, F., Caires, F., Baptista, V., & Mendes, P. (2019)
Wattom: Ambient Eco-feedback with Mid-air Input. In 2019 5th Experiment International Conference (exp.at'19)https://doi.org/10.1109/EXPAT.2019.8876565
This paper presents Wattom, a highly interactive ambient eco-feedback smart plug that aims to promote a more sustainable use of electricity in the home. This paper describes o...
A temporal-information-based adaptive routing algorithm for software defined vehicular networks
Zhao, L., Li, Z., Li, J., Al-Dubai, A., Min, G., & Zomaya, A. Y. (2019)
A temporal-information-based adaptive routing algorithm for software defined vehicular networks. In ICC 2019 - 2019 IEEE International Conference on Communications (ICC)https://doi.org/10.1109/ICC.2019.8761680
In Software Defined Vehicular Networks (SDVNs), most existing studies of routing consider the vehicular network as a static graph and compute the flow table based on static in...
A novel adaptive routing and switching scheme for software-defined vehicular Networks
Zhoa, L., Zhao, W., Gong, C., Al-Dubai, A., & Min, G. (2019)
A novel adaptive routing and switching scheme for software-defined vehicular Networks. In Proceedings of the IEEE International Conference on Communicationshttps://doi.org/10.1109/ICC.2019.8761365
Software-Defined Vehicular Networks (SDVNs) technology has been attracting significant attention as it can make Vehicular Ad Hoc Network (VANET) more efficient and intelligent...
Algorithm selection using deep learning without feature extraction
Alissa, M., Sim, K., & Hart, E. (2019)
Algorithm selection using deep learning without feature extraction. In GECCO '19: Proceedings of the Genetic and Evolutionary Computation Conference Companion. , (198-206). https://doi.org/10.1145/3321707.3321845
We propose a novel technique for algorithm-selection which adopts a deep-learning approach, specifically a Recurrent-Neural Network with Long-Short-Term-Memory (RNN-LSTM). In ...
An Illumination Algorithm Approach to Solving the Micro-Depot Routing Problem
Urquhart, N., Hoehl, S., & Hart, E. (2019)
An Illumination Algorithm Approach to Solving the Micro-Depot Routing Problem. In GECCO '19: Proceedings of the Genetic and Evolutionary Computation Conference Companion. , (1347-1355). https://doi.org/10.1145/3321707.3321767
An increasing emphasis on reducing pollution and congestion in city centres combined with an increase in online shopping is changing the ways in which logistics companies addr...