Research explorer tool

Date


People

Output Type

Download Available

Dewey Decimal

628 results

A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network

Conference Proceeding
Thomson, C., Wadhaj, I., Al-Dubai, A., & Tan, Z. (in press)
A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network
The issue of energy holes, or hotspots, in wireless sensor networks is well referenced. As is the proposed mobilisa-tion of the sink node in order to combat this. However, as ...

Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites

Conference Proceeding
Babaagba, K., Tan, Z., & Hart, E. (in press)
Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites
In the field of metamorphic malware detection, training a detection model with malware samples that reflect potential mutants of the malware is crucial in developing a model r...

Creating optimised employee travel plans

Conference Proceeding
Urquhart, N., & Hart, E. (2019)
Creating optimised employee travel plans. In Advances in Evolutionary and Deterministic Methods for Design, Optimization and Control in Engineering and Sciences, 489-502
The routing of employees who provide services such as home health or social care is a complex problem. When sending an employee between two addresses , there may exist more th...

Photo-Realistic Facial Details Synthesis from Single Image

Conference Proceeding
Chen, A., Chen, Z., Zhang, G., Zhang, Z., Mitchell, K., & Yu, J. Photo-Realistic Facial Details Synthesis from Single Image. In IEEE International Conference on Computer Vision (ICCV), (9429-9439)

)
Chen, A., Chen, Z., Zhang, G., Zhang, Z., Mitchell, K., & Yu, J. Photo-Realistic Facial Details Synthesis from Single Image. In IEEE International Conference on Computer Vision (ICCV), (9429-9439
We present a single-image 3D face synthesis technique that can handle challenging facial expressions while recovering fine geometric details. Our technique employs expression ...

A Multi-attributes-based Trust Model of Internet of Vehicle

Conference Proceeding
Ou, W., Luo, E., Tan, Z., Xiang, L., Yi, Q., & Tian, C. (in press)
A Multi-attributes-based Trust Model of Internet of Vehicle. In Network and System Security, (706-713). https://doi.org/10.1007/978-3-030-36938-5_45
Internet of Vehicle (IoV) is an open network and it changes in constant, where there are large number of entities. Effective way to keep security of data in IoV is to establis...

Application of Bluetooth Low Energy Beacons and Fog Computing for Smarter Environments in Emerging Economies

Conference Proceeding
Sun, M., Michael Kamoto, K., Liu, Q., Liu, X., & Qi, L. (2019)
Application of Bluetooth Low Energy Beacons and Fog Computing for Smarter Environments in Emerging Economies
The Internet of Things (IoT) has already begun to drastically alter the way people operate in various industries across the world, as well as how we interact wit...

Near-Data Prediction Based Speculative Optimization in a Distribution Environment

Conference Proceeding
Sun, M., Wu, X., Jin, D., Xu, X., Liu, Q., & Liu, X. (2019)
Near-Data Prediction Based Speculative Optimization in a Distribution Environment
Apache Hadoop is an open source software framework that supports data-intensive distributed applications and is distributed under the Apache 2.0 licensing agreement,...

Privacy-preserving Surveillance Methods using Homomorphic Encryption

Conference Proceeding
Bowditch, W., Abramson, W., Buchanan, W. J., Pitropakis, N., & Hall, A. J. (in press)
Privacy-preserving Surveillance Methods using Homomorphic Encryption
Data analysis and machine learning methods often involve the processing of cleartext data, and where this could breach the rights to privacy. Increasingly, we must use encrypt...

Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach

Conference Proceeding
Christou, O., Pitropakis, N., Papadopoulos, P., Mckeown, S., & Buchanan, W. J. (in press)
Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach
Phishing is considered to be one of the most prevalent cyber-attacks because of its immense flexibility and alarmingly high success rate. Even with adequate training and high ...

How Can We Balance Research, Participation and Innovation as HCI Researchers?

Conference Proceeding
Lechelt, S., Elsden, C., Helgason, I., Panneels, I., Smyth, M., Speed, C., & Terras, M. (2019)
How Can We Balance Research, Participation and Innovation as HCI Researchers?. In Proceedings of the Halfway to the Future Symposium 2019https://doi.org/10.1145/3363384.3363394
This paper reflects upon the growing expectation for HCI research projects to collaborate closely with partners in industry and civil society. Specifically, we suggest that th...