Date


Download Available

107 results

PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme

Conference Proceeding
Yaqub, Z., Yigit, Y., Maglaras, L., Tan, Z., & Wooderson, P. (in press)
PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme.
In the rapidly evolving landscape of Intelligent Transportation Systems (ITS), Vehicular Ad-hoc Networks (VANETs) play a critical role in enhancing road safety and traffic flo...

A Probability Mapping-Based Privacy Preservation Method for Social Networks

Conference Proceeding
Li, Q., Wang, Y., Wang, F., Tan, Z., & Wang, C. (2024)
A Probability Mapping-Based Privacy Preservation Method for Social Networks. . https://doi.org/10.1007/978-981-97-1274-8_19
The mining and analysis of social networks can bring significant economic and social benefits. However, it also poses a risk of privacy leakages. Differential privacy is a de ...

Reliable and Fair Trustworthiness Evaluation Protocol for Platoon Service Recommendation System

Journal Article
Cheng, H., Tan, Z., Zhang, X., & Liu, Y. (in press)
Reliable and Fair Trustworthiness Evaluation Protocol for Platoon Service Recommendation System. Chinese Journal of Electronics,
Aiming at the problems of the communication inefficiency and high energy consumption in vehicular networks, the platoon service recommendation systems (PSRS) are presented. Ma...

How Much do Robots Understand Rudeness? Challenges in Human-Robot Interaction

Conference Proceeding
Orme, M., Yu, Y., & Tan, Z. (in press)
How Much do Robots Understand Rudeness? Challenges in Human-Robot Interaction.
This paper concerns the pressing need to understand and manage inappropriate language within the evolving human-robot interaction (HRI) landscape. As intelligent systems and r...

STIDNet: Identity-Aware Face Forgery Detection with Spatiotemporal Knowledge Distillation

Journal Article
Fang, M., Yu, L., Xie, H., Tan, Q., Tan, Z., Hussain, A., …Tian, Z. (in press)
STIDNet: Identity-Aware Face Forgery Detection with Spatiotemporal Knowledge Distillation. IEEE Transactions on Computational Social Systems, https://doi.org/10.1109/tcss.2024.3356549
The impressive development of facial manipulation techniques has raised severe public concerns. Identity-aware methods, especially suitable for protecting celebrities, are see...

Can Federated Models Be Rectified Through Learning Negative Gradients?

Conference Proceeding
Tahir, A., Tan, Z., & Babaagba, K. O. (2024)
Can Federated Models Be Rectified Through Learning Negative Gradients?. In Big Data Technologies and Applications (18-32). https://doi.org/10.1007/978-3-031-52265-9_2
Federated Learning (FL) is a method to train machine learning (ML) models in a decentralised manner, while preserving the privacy of data from multiple clients. However, FL is...

Big Data Technologies and Applications: 13th EAI International Conference, BDTA 2023, Edinburgh, UK, August 23-24, 2023, Proceedings

Conference Proceeding
(2024)
Big Data Technologies and Applications: 13th EAI International Conference, BDTA 2023, Edinburgh, UK, August 23-24, 2023, Proceedings. In Z. Tan, Y. Wu, & M. Xu (Eds.), . https://doi.org/10.1007/978-3-031-52265-9

Machine Un-learning: An Overview of Techniques, Applications, and Future Directions

Journal Article
Sai, S., Mittal, U., Chamola, V., Huang, K., Spinelli, I., Scardapane, S., …Hussain, A. (2024)
Machine Un-learning: An Overview of Techniques, Applications, and Future Directions. Cognitive Computation, 16, 482-506. https://doi.org/10.1007/s12559-023-10219-3
ML applications proliferate across various sectors. Large internet firms employ ML to train intelligent models using vast datasets, including sensitive user information. Howev...

A Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile Devices

Book Chapter
Turnbull, L., Tan, Z., & Babaagba, K. O. (2024)
A Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile Devices. In A. Ismail Awad, A. Ahmad, K. Raymond Choo, & S. Hakak (Eds.), Internet of Things Security and Privacy: Practical and Management Perspectives (24-53). Boca Raton: CRC Press. https://doi.org/10.1201/9781003199410-2
There has been an upsurge in malicious attacks in recent years, impacting computer systems and networks. More and more novel malware families aimed at information assets were ...

A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing

Journal Article
Zhao, L., Zhao, Z., Zhang, E., Hawbani, A., Al-Dubai, A., Tan, Z., & Hussain, A. (2023)
A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing. IEEE Journal on Selected Areas in Communications, 41(11), 3386-3400. https://doi.org/10.1109/jsac.2023.3310062
Vehicle Edge Computing (VEC) is a promising paradigm that exposes Mobile Edge Computing (MEC) to road scenarios. In VEC, task offloading can enable vehicles to offload the com...
6 results

Evaluation of Federated Machine Unlearning using Membership Inference Attacks

2023 - 2026
Federated Learning (FL) is a type of distributed Machine Learning (ML) training technique that allows for accurate predictions without sharing sensitive data. This is possible, as FL allows everyone t...
Funder: Carnegie Trust for the Universities of Scotland | Value: £73,564

Behaviour profiling using Touch-based Behavioural Biometrics for Continuous Authentication Systems

2022 - 2022
Authenticating smartphone users from distinct behavioural biometric patterns provided through human interactions on touch screens would allow users to be continuously authenticated on their devices wh...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £923

Divulging the Secrets of Artificial Intelligence

2022 - 2022
Digital Infrastructures are complex systems that are built upon computing and communication hardware, and whose resilience is undermined by the security of its hardware building blocks, which has not ...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £2,500

Security and Privacy in Vehicular Ad-hoc Networks

2022 - 2024
The great leap forward in wireless communications technology drives the recent advancements of Vehicular Ad hoc NETworks (VANETs). As a key part of the Intelligent Transportation Systems (ITS) framewo...
Funder: Royal Society | Value: £12,000

Repairing Polluted Artificial Intelligent Systems with Machine Unlearning

2019 - 2021
This project is intended to seek in-depth understanding of the new promising decentralised machine learning scheme, namely federated learning, and develop a proof-of-concept algorithm-independent unle...
Funder: ENU Development Trust | Value: £29,998

MemoryCrypt

2019 - 2020
The usage of encryption keys is an important aspect in preserving privacy in communications. Increasingly these communications are protected using SSL/TLS methods. Along with this, there is a general ...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £10,759

Date


Qualification level

16 results

Digital Forensic Triage Methods for Prioritization, based on Computer System and User Classification

2024 - date
Mark McLeod | Director of Studies: Dr Sean McKeown | Second Supervisor: Rich Macfarlane

Decentralized Finance (DeFi) Compositions and Derivatives on Blockchains: A Comprehensive Analysis, Design Framework, and Risk Assessment

2023 - date
Trevor Oakley | Director of Studies: Dr Zakwan Jaroucheh | Second Supervisor: Dr Thomas Tan

Evaluation of Federated Machine Unlearning using Membership Inference Attacks

2023 - date
Jordan Wylie | Director of Studies: Dr Thomas Tan | Second Supervisor: Prof Amir Hussain

Implement "Right to be forgotten" with machine unlearning

2022 - date
Michael Orme | Director of Studies: Dr Thomas Tan | Second Supervisor: Dr Yanchao Yu

Natural Language Interfaces to support career decision-making of young people

2021 - date
Exploring how natural language interfaces can be used to support young people with career decision making, including ethics...
Marianne Wilson | Director of Studies: Dr David Brazier | Second Supervisor: Dr Dimitra Gkatzia

Divulging the Secrets of Artificial Intelligence

2021 - date
Mr Yanfei Zhu | Director of Studies: Dr Thomas Tan | Second Supervisor: Dr Chan Hwang See

Internationalisation-at-home for Computing & Engineering: the experience of a non-first-tier Chinese university

2020 - date
Lijuan Luo | Director of Studies: Dr Peter Cruickshank | Second Supervisor: Dr Kendall Richards

Metaskills Maturity for future workplaces

2019 - date
Katherine Stephen | Director of Studies: Dr David Brazier | Second Supervisor: Prof Hazel Hall

Cyberbullying detection approach using pre-trained models and contrastive self-supervised learning for data augmentation

2019 - date
Lulwah Alharigy | Director of Studies: Dr Naghmeh Moradpoor Sheykhkanloo | Second Supervisor: Dr Thomas Tan

From algorithm selection to generation using deep learning

2018 - 2022
Mhd Rateb Mhd Ziad Alissa | Director of Studies: Dr Kevin Sim | Second Supervisor: Prof Emma Hart

Date