Evaluation of Privacy-Preserving Support Vector Machine (SVM) Learning Using Homomorphic Encryption
Journal Article
Buchanan, W. J., & Ali, H. (2025)
Evaluation of Privacy-Preserving Support Vector Machine (SVM) Learning Using Homomorphic Encryption. Cryptography, 9(2), Article 33. https://doi.org/10.3390/cryptography9020033
The requirement for privacy-aware machine learning increases as we continue to use PII (personally identifiable information) within machine training. To overcome the existing ...
FedBT: Effective and Robust Federated Unlearning via Bad Teacher Distillation for Secure Internet of Things
Journal Article
Wang, F., Huo, J., Wang, W., Zhang, X., Liu, Y., Tan, Z., & Wang, C. (in press)
FedBT: Effective and Robust Federated Unlearning via Bad Teacher Distillation for Secure Internet of Things. IEEE Internet of Things Journal,
Exploring DTrace as an Incident Response Tool for Unix Systems
Presentation / Conference Contribution
Duin, J., Mckeown, S., & Abubakar, M. (2024, June)
Exploring DTrace as an Incident Response Tool for Unix Systems. Presented at Cyber Science 2024, Edinburgh, Scotland
Critical National Infrastructure (CNI) is often the target of sophisticated and sustained cyber attacks perpetrated by advanced threat actors with considerable resources. Thes...
LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts
Journal Article
Kumar, G., Saha, R., Conti, M., & Buchanan, W. J. (online)
LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts. IEEE Transactions on Services Computing, https://doi.org/10.1109/tsc.2025.3562323
Smart contracts are integral to decentralized systems like blockchains and enable the automation of processes through programmable conditions. However, their immutability, onc...
A Lightweight Image Steganography Scheme Based on Invertible Neural Network Architecture with Progressive Channel Attention
Presentation / Conference Contribution
Li, Q., Yang, R., Wang, F., Wang, C., Zhang, X., Babaagba, K., & Tan, Z. (2025, July)
A Lightweight Image Steganography Scheme Based on Invertible Neural Network Architecture with Progressive Channel Attention. Presented at EAI SecureComm 2025, Xiangtan, China
Post-Quantum Migration of the Tor Application
Journal Article
Berger, D., Lemoudden, M., & Buchanan, W. J. (2025)
Post-Quantum Migration of the Tor Application. Journal of Cybersecurity and Privacy, 5(2), Article 13. https://doi.org/10.3390/jcp5020013
The efficiency of Shor's and Grover's algorithms and the advancement of quantum computers implies that the cryptography used until now to protect one's privacy is potentially ...
Leveraging LLMs for Non-Security Experts in Threat Hunting: Detecting Living off the Land Techniques
Journal Article
Konstantinou, A., Kasimatis, D., Buchanan, W. J., Ullah Jan, S., Ahmad, J., Politis, I., & Pitropakis, N. (2025)
Leveraging LLMs for Non-Security Experts in Threat Hunting: Detecting Living off the Land Techniques. Machine Learning and Knowledge Extraction, 7(2), Article 31. https://doi.org/10.3390/make7020031
This paper explores the potential use of Large Language Models (LLMs), such as ChatGPT, Google Gemini, and Microsoft Copilot, in threat hunting, specifically focusing on Livin...
Beyond Hamming Distance: Exploring Spatial Encoding in Perceptual Hashes
Presentation / Conference Contribution
McKeown, S. (2025, April)
Beyond Hamming Distance: Exploring Spatial Encoding in Perceptual Hashes. Presented at DFRWS EU 2025, Brno, Czech Republic
Forensic analysts are often tasked with analysing large volumes of data in modern investigations, and frequently make use of hashing technologies to identify previously encoun...
Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode
Conference Proceeding
Buchanan, W., Grierson, S., & Uribe, D. (2024)
Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode. In Proceedings of the 10th International Conference on Information Systems Security and Privacy (226-233). https://doi.org/10.5220/0012454300003648
Biometric data is often highly sensitive, and a leak of this data can lead to serious privacy breaches. Some of the most sensitive of this type of data relates to the usage of...
VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography
Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Ali, M., Al Dubai, A., Pitropakis, N., & Buchanan, W. J. (2024, July)
VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography. Presented at 2024 IEEE 7th International Conference on Advanced Technologies, Signal and Image Processing (ATSIP), Sousse, Tunisia
In this digital era, ensuring the security of data transmission is critically important. Digital data, especially image data, needs to be secured against unauthorized access. ...