Deep Vision in Analysis and Recognition of Radar Data: Achievements, Advancements, and Challenges
Journal Article
Liu, Q., Yang, Z., Ji, R., Zhang, Y., Bilal, M., Liu, X., …Xu, X. (2023)
Deep Vision in Analysis and Recognition of Radar Data: Achievements, Advancements, and Challenges. IEEE Systems, Man, and Cybernetics Magazine, 9(4), 4-12. https://doi.org/10.1109/msmc.2022.3216943
Radars are widely used to obtain echo information for effective prediction, such as precipitation nowcasting. In this article, recent relevant scientific investigation and pra...
Nature Inspired Optimisation for Delivery Problems: From Theory to the Real World
Book
Urquhart, N. (2022)
Nature Inspired Optimisation for Delivery Problems: From Theory to the Real World. Cham: Springer. https://doi.org/10.1007/978-3-030-98108-2
This book explains classic routing and transportation problems and solutions, before offering insights based on successful real-world solutions. The chapters in Part I introdu...
Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract)
Conference Proceeding
Sampath Kalutharage, C., Liu, X., & Chrysoulas, C. (2022)
Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract). In Attacks and Defenses for the Internet-of-Things: 5th International Workshop, ADIoT 2022 (41-50). https://doi.org/10.1007/978-3-031-21311-3_8
Over the past few decades, Machine Learning (ML)-based intrusion detection systems (IDS) have become increasingly popular and continue to show remarkable performance in detect...
A framework for live host-based Bitcoin wallet forensics and triage
Journal Article
Holmes, A., & Buchanan, W. J. (2023)
A framework for live host-based Bitcoin wallet forensics and triage. Forensic Science International: Digital Investigation, 44, Article 301486. https://doi.org/10.1016/j.fsidi.2022.301486
Organised crime and cybercriminals use Bitcoin, a popular cryptocurrency, to launder money and move it across borders with impunity. The UK and other countries have legislatio...
A forensic analysis of streaming platforms on Android OS
Journal Article
García Murias, J., Levick, D., & Mckeown, S. (2023)
A forensic analysis of streaming platforms on Android OS. Forensic Science International: Digital Investigation, 44, Article 301485. https://doi.org/10.1016/j.fsidi.2022.301485
This work builds on existing research in streamed video reconstruction on the Android OS, which previously demonstrated that caching occurs in most cases for the Chrome and Fi...
Four-Element/Eight-Port MIMO Antenna System with Diversity and Desirable Radiation for Sub 6 GHz Modern 5G Smartphones
Journal Article
Ojaroudi Parchin, N., S.I. Amar, A., Darwish, M., H. Moussa, K., See, C. H., Abd-Alhameed, R., … Mohamed, H. G. (in press)
Four-Element/Eight-Port MIMO Antenna System with Diversity and Desirable Radiation for Sub 6 GHz Modern 5G Smartphones. IEEE Access, https://doi.org/10.1109/ACCESS.2022.3227199
In this manuscript, a multiple-input multiple-output (MIMO) antenna array system with identical compact antenna elements providing wide radiation and diversity function is int...
Accelerating neural network architecture search using multi-GPU high-performance computing
Journal Article
Lupión, M., Cruz, N. C., Sanjuan, J. F., Paechter, B., & Ortigosa, P. M. (2023)
Accelerating neural network architecture search using multi-GPU high-performance computing. Journal of Supercomputing, 79, 7609-7625. https://doi.org/10.1007/s11227-022-04960-z
Neural networks stand out from artificial intelligence because they can complete challenging tasks, such as image classification. However, designing a neural network for a par...
Automated Algorithm Selection: from Feature-Based to Feature-Free Approaches
Journal Article
Alissa, M., Sim, K., & Hart, E. (in press)
Automated Algorithm Selection: from Feature-Based to Feature-Free Approaches. Journal of Heuristics, https://doi.org/10.1007/s10732-022-09505-4
We propose a novel technique for algorithm-selection, applicable to optimisation domains in which there is implicit sequential information encapsulated in the data, e.g., in o...
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification
Journal Article
Davies, S., Macfarlane, R., & Buchanan, W. (2022)
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification. Entropy, 24(10), Article 1503. https://doi.org/10.3390/e24101503
Ransomware is a malicious class of software that utilises encryption to implement an attack on system availability. The target’s data remains encrypted and is held captive by ...
Detection of Signals in MC–CDMA Using a Novel Iterative Block Decision Feedback Equalizer
Journal Article
Bagadi, K., Ravikumar, C., Sathish, K., Alibakhshikenari, M., Virdee, B. S., Kouhalvandi, L., …Limiti, E. (2022)
Detection of Signals in MC–CDMA Using a Novel Iterative Block Decision Feedback Equalizer. IEEE Access, 10, 105674-105684. https://doi.org/10.1109/ACCESS.2022.3211392
This paper presents a technique to mitigate multiple access interference (MAI) in multicarrier code division multiple access (MC-CDMA) wireless communications systems. Althoug...