Skip to main content

Research Repository

Advanced Search

Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode (2024)
Conference Proceeding
Buchanan, W., Grierson, S., & Uribe, D. (2024). Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode. In Proceedings of the 10th International Conference on Information Systems Security and Privacy (226-233). https://doi.org/10.5220/0012454300003648

Biometric data is often highly sensitive, and a leak of this data can lead to serious privacy breaches. Some of the most sensitive of this type of data relates to the usage of DNA data on individuals. A leak of this type of data without consent could... Read More about Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode.

Advancing Sustainable Building through Passive Cooling with Phase Change Materials, a comprehensive literature review (2024)
Journal Article
Ghamari, M., See, C. H., Hughes, D., Mallick, T., Srinivas Reddy, K., Patchigolla, K., & Sundaram, S. (in press). Advancing Sustainable Building through Passive Cooling with Phase Change Materials, a comprehensive literature review. Energy and Buildings,

Phase Change Materials (PCMs) present cutting-edge technology with substantial promise for advancing sustainable and energy-efficient cooling in buildings. These materials can absorb and release latent heat during phase transitions, facilitating ther... Read More about Advancing Sustainable Building through Passive Cooling with Phase Change Materials, a comprehensive literature review.

Wireless Power Transfer Technologies, Applications, and Future Trends: A Review (2024)
Journal Article
Alabsi, A., Hawbani, A., Wang, X., Dubai, A. A., Hu, J., Aziz, S. A., …Alsamhi, S. H. (in press). Wireless Power Transfer Technologies, Applications, and Future Trends: A Review. IEEE Transactions on Sustainable Computing, https://doi.org/10.1109/TSUSC.2024.3380607

Wireless Power Transfer (WPT) is a disruptive technology that allows wireless energy provisioning for energy- limited IoT devices, thus decreasing the over-reliance on batteries and wires. WPT could replace conventional energy provisioning (e.g., ene... Read More about Wireless Power Transfer Technologies, Applications, and Future Trends: A Review.

Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks (2024)
Journal Article
Bhatti, D. S., Saleem, S., Ali, Z., Park, T., Suh, B., Kamran, A., …Kim, K. (2024). Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks. IEEE Access, 12, 41499-41516. https://doi.org/10.1109/access.2024.3377144

Wireless Sensor Networks (WSN) are deployed on a large scale and require protection from malicious energy drainage attacks, particularly those directed at the routing layer. The complexity increases during critical operations like cluster head select... Read More about Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks.

PHASER: Perceptual Hashing Algorithms Evaluation and Results -an Open Source Forensic Framework (2024)
Journal Article
Mckeown, S., Aaby, P., & Steyven, A. (2024). PHASER: Perceptual Hashing Algorithms Evaluation and Results -an Open Source Forensic Framework. Forensic Science International: Digital Investigation, 48(Supplement), Article 301680

The automated comparison of visual content is a contemporary solution to scale the detection of illegal media and extremist material, both for detection on individual devices and in the cloud. However, the problem is difficult, and perceptual similar... Read More about PHASER: Perceptual Hashing Algorithms Evaluation and Results -an Open Source Forensic Framework.

A Probability Mapping-Based Privacy Preservation Method for Social Networks (2024)
Conference Proceeding
Li, Q., Wang, Y., Wang, F., Tan, Z., & Wang, C. (2024). A Probability Mapping-Based Privacy Preservation Method for Social Networks. . https://doi.org/10.1007/978-981-97-1274-8_19

The mining and analysis of social networks can bring significant economic and social benefits. However, it also poses a risk of privacy leakages. Differential privacy is a de facto standard to prevent such leaks, but it suffers from the high sensitiv... Read More about A Probability Mapping-Based Privacy Preservation Method for Social Networks.

SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT (2024)
Journal Article
Alshehri, M. S., Ahmad, J., Almakdi, S., Qathrady, M. A., Ghadi, Y. Y., & Buchanan, W. J. (2024). SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT. IEEE Access, 12, https://doi.org/10.1109/access.2024.3371992

The rise of Internet of Things (IoT) has led to increased security risks, particularly from botnet attacks that exploit IoT device vulnerabilities. This situation necessitates effective Intrusion Detection Systems (IDS), that are accurate, lightweigh... Read More about SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT.

How Much do Robots Understand Rudeness? Challenges in Human-Robot Interaction (2024)
Conference Proceeding
Orme, M., Yu, Y., & Tan, Z. (in press). How Much do Robots Understand Rudeness? Challenges in Human-Robot Interaction.

This paper concerns the pressing need to understand and manage inappropriate language within the evolving human-robot interaction (HRI) landscape. As intelligent systems and robots transition from controlled laboratory settings to everyday households... Read More about How Much do Robots Understand Rudeness? Challenges in Human-Robot Interaction.

STIDNet: Identity-Aware Face Forgery Detection with Spatiotemporal Knowledge Distillation (2024)
Journal Article
Fang, M., Yu, L., Xie, H., Tan, Q., Tan, Z., Hussain, A., …Tian, Z. (in press). STIDNet: Identity-Aware Face Forgery Detection with Spatiotemporal Knowledge Distillation. IEEE Transactions on Computational Social Systems, https://doi.org/10.1109/tcss.2024.3356549

The impressive development of facial manipulation techniques has raised severe public concerns. Identity-aware methods, especially suitable for protecting celebrities, are seen as one of promising face forgery detection approaches with additional ref... Read More about STIDNet: Identity-Aware Face Forgery Detection with Spatiotemporal Knowledge Distillation.

An Auditable Framework for Evidence Sharing and Management using Smart Lockers and Distributed Technologies: Law Enforcement Use Case (2024)
Conference Proceeding
Onyeashie, B., Leimich, P., McKeown, S., & Russell, G. (2024). An Auditable Framework for Evidence Sharing and Management using Smart Lockers and Distributed Technologies: Law Enforcement Use Case. In Big Data Technologies and Applications (156-167). https://doi.org/10.1007/978-3-031-52265-9_11

This paper presents a decentralised framework for sharing and managing evidence that uses smart lockers, blockchain technology, and the InterPlanetary File System (IPFS). The system incorporates Hyperledger Fabric blockchain for immutability and tamp... Read More about An Auditable Framework for Evidence Sharing and Management using Smart Lockers and Distributed Technologies: Law Enforcement Use Case.

A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence (2024)
Conference Proceeding
Onyeashie, B. I., Leimich, P., McKeown, S., & Russell, G. (2024). A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence. In Big Data Technologies and Applications. BDTA 2023. https://doi.org/10.1007/978-3-031-52265-9_8

The effective management of digital evidence is critical to modern forensic investigations. However, traditional evidence management approaches are often prone to security and integrity issues. In recent years, the use of blockchain technology has em... Read More about A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence.

Potential of Satellite-Airborne Sensing Technologies for Agriculture 4.0 and Climate-Resilient: A Review (2023)
Journal Article
Hazmy, A. I., Hawbani, A., Wang, X., Al-Dubai, A., Ghannami, A., Yahya, A. A., …Alsamhi, S. H. (2024). Potential of Satellite-Airborne Sensing Technologies for Agriculture 4.0 and Climate-Resilient: A Review. IEEE Sensors Journal, 24(4), 4161-4180. https://doi.org/10.1109/jsen.2023.3343428

Agriculture 4.0 offers the potential to revolutionize the agriculture sector through improved productivity and efficiency. However, adopting Agriculture 4.0 requires a period of transition and effort. Satellite-Airborne sensing technologies may becom... Read More about Potential of Satellite-Airborne Sensing Technologies for Agriculture 4.0 and Climate-Resilient: A Review.

Minkowski Based Microwave Resonator for Material Detection over Sub-6 GHz 5G Spectrum (2023)
Conference Proceeding
Anwer, A. I., Alibakhshikenari, . M., Elwi, T., Virdee, B., Kouhalvandi, L., Abdul Hassain, Z. A., …Livreri, P. (2023). Minkowski Based Microwave Resonator for Material Detection over Sub-6 GHz 5G Spectrum. . https://doi.org/10.1109/6GNet58894.2023.10317726

This paper describes the performance of a low-cost, high-sensitive microwave resonator for 5G modern wireless communication systems operating through sub-6GHz spectrum. Here, the proposed resonator is constructed from a Minkowski fractal open stub th... Read More about Minkowski Based Microwave Resonator for Material Detection over Sub-6 GHz 5G Spectrum.

Navigating Industry 5.0: A Survey of Key Enabling Technologies, Trends, Challenges, and Opportunities (2023)
Journal Article
Tallat,, R., Hawbani, A., Wang, X., Al-Dubai, A., Zhao, L., Liu, Z., …Alsamhi, S. (in press). Navigating Industry 5.0: A Survey of Key Enabling Technologies, Trends, Challenges, and Opportunities. Communications Surveys and Tutorials, IEEE Communications Society, https://doi.org/10.1109/comst.2023.3329472

This century has been a major avenue for revolutionary changes in technology and industry. Industries have transitioned towards intelligent automation, relying less on human intervention, resulting in the fourth industrial revolution, Industry 4.0. T... Read More about Navigating Industry 5.0: A Survey of Key Enabling Technologies, Trends, Challenges, and Opportunities.

Scalable Multi-domain Trust Infrastructures for Segmented Networks (2023)
Conference Proceeding
Grierson, S., Ghaleb, B., Buchanan, W. J., Thomson, C., Maglaras, L., & Eckl, C. (in press). Scalable Multi-domain Trust Infrastructures for Segmented Networks.

Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verifying the au... Read More about Scalable Multi-domain Trust Infrastructures for Segmented Networks.

Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices (2023)
Conference Proceeding
Spalding, A., Tan, Z., & Babaagba, K. O. (in press). Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices. In Proceedings of the 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2023)

Data recovery for forensic analysis of both hard drives and solid state media presents its own unique set of challenges. Hard drives face mechanical failures and data fragmentation , but their sequential storage and higher success rates make recovery... Read More about Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices.

Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant (2023)
Journal Article
Elmiger, M., Lemoudden, M., Pitropakis, N., & Buchanan, W. J. (2024). Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant. International Journal of Information Security, 23, 467-485. https://doi.org/10.1007/s10207-023-00751-6

The challenge of securing IT environments has reached a new complexity level as a growing number of organisations adopt cloud solutions. This trend increases the possibility of overseen attack paths in an organisation’s IT infrastructure. This paper... Read More about Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant.

Self-attention is What You Need to Fool a Speaker Recognition System (2023)
Conference Proceeding
Wang, F., Song, R., Tan, Z., Li, Q., Wang, C., & Yang, Y. (in press). Self-attention is What You Need to Fool a Speaker Recognition System.

Speaker Recognition Systems (SRSs) are becoming increasingly popular in various aspects of life due to advances in technology. However, these systems are vulnerable to cyber threats, particularly adversarial attacks. Traditional adversarial attack me... Read More about Self-attention is What You Need to Fool a Speaker Recognition System.