Date


Download Available

107 results

A Mobility Aware Duty Cycling and Preambling Solution for Wireless Sensor Network with Mobile Sink Node

Journal Article
Thomson, C., Wadhaj, I., Tan, Z., & Al-Dubai, A. (2021)
A Mobility Aware Duty Cycling and Preambling Solution for Wireless Sensor Network with Mobile Sink Node. Wireless Networks, 27(5), 3423-3439. https://doi.org/10.1007/s11276-021-02580-8
Utilising the mobilisation of a sink node in a wireless sensor network to combat the energy hole, or hotspot issue, is well referenced. However, another issue , that of energy...

Vehicular Computation Offloading for Industrial Mobile Edge Computing

Journal Article
Zhao, L., Yang, K., Tan, Z., Song, H., Al-Dubai, A., & Zomaya, A. (2021)
Vehicular Computation Offloading for Industrial Mobile Edge Computing. IEEE Transactions on Industrial Informatics, 17(11), 7871-7881. https://doi.org/10.1109/TII.2021.3059640
Due to the limited local computation resource, industrial vehicular computation requires offloading the computation tasks with time-delay sensitive and complex demands to othe...

Towards an Energy Balancing Solution for Wireless Sensor Network with Mobile Sink Node

Journal Article
Thomson, C., Wadhaj, I., Tan, Z., & Al-Dubai, A. (2021)
Towards an Energy Balancing Solution for Wireless Sensor Network with Mobile Sink Node. Computer Communications, 170, 50-64. https://doi.org/10.1016/j.comcom.2021.01.011
The issue of energy holes, or hotspots, in wireless sensor networks is well referenced. As is the proposed mobilisation of the sink node in order to combat this. However, as t...

A Novel Web Attack Detection System for Internet of Things via Ensemble Classification

Journal Article
Luo, C., Tan, Z., Min, G., Gan, J., Shi, W., & Tian, Z. (2021)
A Novel Web Attack Detection System for Internet of Things via Ensemble Classification. IEEE Transactions on Industrial Informatics, 17(8), 5810-5818. https://doi.org/10.1109/tii.2020.3038761
Internet of things (IoT) has become one of the fastestgrowing technologies and has been broadly applied in various fields. IoT networks contain millions of devices with the ca...

Towards Continuous User Authentication Using Personalised Touch-Based Behaviour

Conference Proceeding
Aaby, P., Giuffrida, M. V., Buchanan, W. J., & Tan, Z. (2020)
Towards Continuous User Authentication Using Personalised Touch-Based Behaviour. In 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00023
In this paper, we present an empirical evaluation of 30 features used in touch-based continuous authentication. It is essential to identify the most significant features for e...

A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network

Conference Proceeding
Thomson, C., Wadhaj, I., Al-Dubai, A., & Tan, Z. (2020)
A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network. In 2020 IEEE 6th World Forum on Internet of Things (WF-IoT)https://doi.org/10.1109/WF-IoT48130.2020.9221036
The issue of energy holes, or hotspots, in wireless sensor networks is well referenced. As is the proposed mobilisa-tion of the sink node in order to combat this. However, as ...

Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection

Journal Article
Tian, Z., Shi, W., Tan, Z., Qiu, J., Sun, Y., Jiang, F., & Liu, Y. (in press)
Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection. Mobile Networks and Applications, https://doi.org/10.1007/s11036-020-01656-7
Organizations' own personnel now have a greater ability than ever before to misuse their access to critical organizational assets. Insider threat detection is a key component ...

A Novel Cost Optimization Strategy for SDN-Enabled UAV-Assisted Vehicular Computation Offloading

Journal Article
Zhao, L., Yang, K., Tan, Z., Li, X., Sharma, S., & Liu, Z. (2021)
A Novel Cost Optimization Strategy for SDN-Enabled UAV-Assisted Vehicular Computation Offloading. IEEE Transactions on Intelligent Transportation Systems, 22(6), 3664-3674. https://doi.org/10.1109/TITS.2020.3024186
Vehicular computation offloading is a well-received strategy to execute delay-sensitive and/or compute-intensive tasks of legacy vehicles. The response time of vehicular compu...

Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples

Conference Proceeding
Babaagba, K., Tan, Z., & Hart, E. (2020)
Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples. https://doi.org/10.1109/CEC48606.2020.9185668
Detecting metamorphic malware provides a challenge to machine-learning models as trained models might not generalise to future mutant variants of the malware. To address this,...

Evaluation of Ensemble Learning for Android Malware Family Identification

Journal Article
Wylie, J., Tan, Z., Al-Dubai, A., & Wang, J. (2020)
Evaluation of Ensemble Learning for Android Malware Family Identification. Journal of Guangzhou University (Natural Science Edition), 19(4), 28-41
Every Android malware sample generally belongs to a specific family that performs a similar set of actions and characteristics. Having the ability to effectively identify Andr...
6 results

Evaluation of Federated Machine Unlearning using Membership Inference Attacks

2023 - 2026
Federated Learning (FL) is a type of distributed Machine Learning (ML) training technique that allows for accurate predictions without sharing sensitive data. This is possible, as FL allows everyone t...
Funder: Carnegie Trust for the Universities of Scotland | Value: £73,564

Behaviour profiling using Touch-based Behavioural Biometrics for Continuous Authentication Systems

2022 - 2022
Authenticating smartphone users from distinct behavioural biometric patterns provided through human interactions on touch screens would allow users to be continuously authenticated on their devices wh...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £923

Divulging the Secrets of Artificial Intelligence

2022 - 2022
Digital Infrastructures are complex systems that are built upon computing and communication hardware, and whose resilience is undermined by the security of its hardware building blocks, which has not ...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £2,500

Security and Privacy in Vehicular Ad-hoc Networks

2022 - 2024
The great leap forward in wireless communications technology drives the recent advancements of Vehicular Ad hoc NETworks (VANETs). As a key part of the Intelligent Transportation Systems (ITS) framewo...
Funder: Royal Society | Value: £12,000

Repairing Polluted Artificial Intelligent Systems with Machine Unlearning

2019 - 2021
This project is intended to seek in-depth understanding of the new promising decentralised machine learning scheme, namely federated learning, and develop a proof-of-concept algorithm-independent unle...
Funder: ENU Development Trust | Value: £29,998

MemoryCrypt

2019 - 2020
The usage of encryption keys is an important aspect in preserving privacy in communications. Increasingly these communications are protected using SSL/TLS methods. Along with this, there is a general ...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £10,759

Date


Qualification level

16 results

Digital Forensic Triage Methods for Prioritization, based on Computer System and User Classification

2024 - date
Mark McLeod | Director of Studies: Dr Sean McKeown | Second Supervisor: Rich Macfarlane

Decentralized Finance (DeFi) Compositions and Derivatives on Blockchains: A Comprehensive Analysis, Design Framework, and Risk Assessment

2023 - date
Trevor Oakley | Director of Studies: Dr Zakwan Jaroucheh | Second Supervisor: Dr Thomas Tan

Evaluation of Federated Machine Unlearning using Membership Inference Attacks

2023 - date
Jordan Wylie | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Amir Hussain

Implement "Right to be forgotten" with machine unlearning

2022 - date
Michael Orme | Director of Studies: Dr Thomas Tan | Second Supervisor: Dr Yanchao Yu

Natural Language Interfaces to support career decision-making of young people

2021 - date
Exploring how natural language interfaces can be used to support young people with career decision making, including ethics...
Marianne Wilson | Director of Studies: Dr David Brazier | Second Supervisor: Dr Dimitra Gkatzia

Divulging the Secrets of Artificial Intelligence

2021 - date
Mr Yanfei Zhu | Director of Studies: Dr Thomas Tan | Second Supervisor: Dr Chan Hwang See

Internationalisation-at-home for Computing & Engineering: the experience of a non-first-tier Chinese university

2020 - date
Lijuan Luo | Director of Studies: Dr Peter Cruickshank | Second Supervisor: Dr Kendall Richards

Metaskills Maturity for future workplaces

2019 - date
Katherine Stephen | Director of Studies: Dr David Brazier | Second Supervisor: Prof Hazel Hall

Cyberbullying detection approach using pre-trained models and contrastive self-supervised learning for data augmentation

2019 - date
Lulwah Alharigy | Director of Studies: Dr Naghmeh Moradpoor Sheykhkanloo | Second Supervisor: Dr Thomas Tan

From algorithm selection to generation using deep learning

2018 - 2022
Mhd Rateb Mhd Ziad Alissa | Director of Studies: Dr Kevin Sim | Second Supervisor: Prof Emma Hart

Date