Date


People

Output Type

Download Available

Dewey Decimal

584 results

Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode

Conference Proceeding
Buchanan, W., Grierson, S., & Uribe, D. (2024)
Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode. In Proceedings of the 10th International Conference on Information Systems Security and Privacy (226-233). https://doi.org/10.5220/0012454300003648
Biometric data is often highly sensitive, and a leak of this data can lead to serious privacy breaches. Some of the most sensitive of this type of data relates to the usage of...

The digital Foley: what Foley artists say about using audio synthesis

Conference Proceeding
Di Donato, B., & McGregor, I. (2024)
The digital Foley: what Foley artists say about using audio synthesis. In Proceedings of the 2024 AES 6th International Conference on Audio for Games
Foley is a sound production technique where organicity and authenticity in sound creation are key to fostering creativity. Audio synthesis, Artificial Intelligence (AI) and In...

Learning Descriptors for Novelty-Search Based Instance Generation via Meta-evolution

Conference Proceeding
Marrero, A., Segredo, E., León, C., & Hart, E. (in press)
Learning Descriptors for Novelty-Search Based Instance Generation via Meta-evolution. In Genetic and Evolutionary Computation Conference (GECCO ’24), July 14–18, 2024, Melbourne, VIC, Australia. https://doi.org/10.1145/3638529.3654028
The ability to generate example instances from a domain is important in order to benchmark algorithms and to generate data that covers an instance-space in order to train mach...

On the Utility of Probing Trajectories for Algorithm-Selection

Conference Proceeding
Renau, Q., & Hart, E. (2024)
On the Utility of Probing Trajectories for Algorithm-Selection. In Applications of Evolutionary Computation. EvoApplications 2024 (98-114). https://doi.org/10.1007/978-3-031-56852-7_7
Machine-learning approaches to algorithm-selection typically take data describing an instance as input. Input data can take the form of features derived from the instance desc...

A Hierarchical Approach to Evolving Behaviour-Trees for Swarm Control

Conference Proceeding
Montague, K., Hart, E., & Paechter, B. (2024)
A Hierarchical Approach to Evolving Behaviour-Trees for Swarm Control. In S. Smith, J. Correia, & C. Cintrano (Eds.), Applications of Evolutionary Computation: 27th European Conference, EvoApplications 2024, Held as Part of EvoStar 2024, Aberystwyth, UK, April 3–5, 2024, Proceedings, Part I (178-193). https://doi.org/10.1007/978-3-031-56852-7_12
Behaviour trees (BTs) are commonly used as controllers in robotic swarms due their modular composition and to the fact that they can be easily interpreted by humans. From an a...

A Probability Mapping-Based Privacy Preservation Method for Social Networks

Conference Proceeding
Li, Q., Wang, Y., Wang, F., Tan, Z., & Wang, C. (2024)
A Probability Mapping-Based Privacy Preservation Method for Social Networks. . https://doi.org/10.1007/978-981-97-1274-8_19
The mining and analysis of social networks can bring significant economic and social benefits. However, it also poses a risk of privacy leakages. Differential privacy is a de ...

Virtual Rehabilitation: XR Design for Senior Users in Immersive Exergame Environments

Conference Proceeding
Charisis, V., Khan, S., AlTarteer, S., & Lagoo, R. (in press)
Virtual Rehabilitation: XR Design for Senior Users in Immersive Exergame Environments.
The global ageing population presents significant challenges, with healthcare systems strained to meet the needs of an increasingly elderly demographic. Societies face issues ...

Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection

Conference Proceeding
Kalutharage, C. S., Liu, X., Chrysoulas, C., & Bamgboye, O. (2024)
Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection. In Computer Security. ESORICS 2023 International Workshops (125-139). https://doi.org/10.1007/978-3-031-54129-2_8

How Much do Robots Understand Rudeness? Challenges in Human-Robot Interaction

Conference Proceeding
Orme, M., Yu, Y., & Tan, Z. (in press)
How Much do Robots Understand Rudeness? Challenges in Human-Robot Interaction.
This paper concerns the pressing need to understand and manage inappropriate language within the evolving human-robot interaction (HRI) landscape. As intelligent systems and r...

A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence

Conference Proceeding
Onyeashie, B. I., Leimich, P., McKeown, S., & Russell, G. (2024)
A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence. In Big Data Technologies and Applications. BDTA 2023. https://doi.org/10.1007/978-3-031-52265-9_8
The effective management of digital evidence is critical to modern forensic investigations. However, traditional evidence management approaches are often prone to security and...