Machine Un-learning: An Overview of Techniques, Applications, and Future Directions
Sai, S., Mittal, U., Chamola, V., Huang, K., Spinelli, I., Scardapane, S., …Hussain, A. (in press)
Machine Un-learning: An Overview of Techniques, Applications, and Future Directions. Cognitive Computation, https://doi.org/10.1007/s12559-023-10219-3
ML applications proliferate across various sectors. Large internet firms employ ML to train intelligent models using vast datasets, including sensitive user information. Howev...
Navigating Industry 5.0: A Survey of Key Enabling Technologies, Trends, Challenges, and Opportunities
Tallat,, R., Hawbani, A., Wang, X., Al-Dubai, A., Zhao, L., Liu, Z., …Alsamhi, S. (in press)
Navigating Industry 5.0: A Survey of Key Enabling Technologies, Trends, Challenges, and Opportunities. Communications Surveys and Tutorials, IEEE Communications Society, https://doi.org/10.1109/comst.2023.3329472
This century has been a major avenue for revolutionary changes in technology and industry. Industries have transitioned towards intelligent automation, relying less on human i...
A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing
Zhao, L., Zhao, Z., Zhang, E., Hawbani, A., Al-Dubai, A., Tan, Z., & Hussain, A. (2023)
A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing. IEEE Journal on Selected Areas in Communications, 41(11), 3386-3400. https://doi.org/10.1109/jsac.2023.3310062
Vehicle Edge Computing (VEC) is a promising paradigm that exposes Mobile Edge Computing (MEC) to road scenarios. In VEC, task offloading can enable vehicles to offload the com...
Reliable and Scalable Routing Under Hybrid SDVN Architecture: A Graph Learning Based Method
Li, Z., Zhao, L., Min, G., Al-Dubai, A. Y., Hawbani, A., Zomaya, A. Y., & Luo, C. (2023)
Reliable and Scalable Routing Under Hybrid SDVN Architecture: A Graph Learning Based Method. IEEE Transactions on Intelligent Transportation Systems, 24(12), 14022 - 14036. https://doi.org/10.1109/tits.2023.3300082
Greedy routing efficiently achieves routing solutions for vehicular networks due to its simplicity and reliability. However, the existing greedy routing schemes have mainly co...
Towards The Creation Of The Future Fish Farm
Papadopoulos, P., Buchanan, W. J., Sayeed, S., & Pitropakis, N. (2023)
Towards The Creation Of The Future Fish Farm. Journal of Surveillance, Security and Safety, 4, 1-3. https://doi.org/10.20517/jsss.2022.16
Aim: A fish farm is an area where fish raise and bred for food. Fish farm environments support the care and management of seafood within a controlled environment. Over the pas...
Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence
Maleh, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.)
(2022). Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence. Gistrup, Denmark: River Publishers
In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for sing...
Using Social Media & Sentiment Analysis to Make Investment Decisions
Hasselgren, B., Chrysoulas, C., Pitropakis, N., & Buchanan, W. J. (2023)
Using Social Media & Sentiment Analysis to Make Investment Decisions. Future Internet, 15(1), Article 5. https://doi.org/10.3390/fi15010005
Making investment decisions by utilizing sentiment data from social media (SM) is starting to become a more tangible concept. There has been a broad investigation into this fi...
A framework for live host-based Bitcoin wallet forensics and triage
Holmes, A., & Buchanan, W. J. (2023)
A framework for live host-based Bitcoin wallet forensics and triage. Forensic Science International: Digital Investigation, 44, Article 301486. https://doi.org/10.1016/j.fsidi.2022.301486
Organised crime and cybercriminals use Bitcoin, a popular cryptocurrency, to launder money and move it across borders with impunity. The UK and other countries have legislatio...
A forensic analysis of streaming platforms on Android OS
García Murias, J., Levick, D., & Mckeown, S. (2023)
A forensic analysis of streaming platforms on Android OS. Forensic Science International: Digital Investigation, 44, Article 301485. https://doi.org/10.1016/j.fsidi.2022.301485
This work builds on existing research in streamed video reconstruction on the Android OS, which previously demonstrated that caching occurs in most cases for the Chrome and Fi...
Hamming Distributions of Popular Perceptual Hashing Techniques
McKeown, S., & Buchanan, W. J. (in press)
Hamming Distributions of Popular Perceptual Hashing Techniques. Forensic Science International: Digital Investigation,
Content-based file matching has been widely deployed for decades, largely for the detection of sources of copyright infringement, extremist materials, and abusive sexual media...