Skip to main content

Research Repository

Advanced Search

Outputs (267)

FLORA: Fuzzy Based Load-Balanced Opportunistic Routing for Asynchronous Duty-Cycled WSNs (2021)
Journal Article
Wu, W., Wang, X., Hawbani, A., Liu, P., Zhao, L., & Al-Dubai, A. (2023). FLORA: Fuzzy Based Load-Balanced Opportunistic Routing for Asynchronous Duty-Cycled WSNs. IEEE Transactions on Mobile Computing, 22(1), 253-268. https://doi.org/10.1109/TMC.2021.3074739

Existing Opportunistic routing (OR) schemes work well with asynchronous duty-cycled wireless sensor networks (WSNs), which effectively reduces the sender waiting time by broadcasting packets to a set of forwarders instead of a predetermined forwarder... Read More about FLORA: Fuzzy Based Load-Balanced Opportunistic Routing for Asynchronous Duty-Cycled WSNs.

Improving generative adversarial networks with simple latent distributions (2021)
Journal Article
Zhang, S., Huang, K., Qian, Z., Zhang, R., & Hussain, A. (2021). Improving generative adversarial networks with simple latent distributions. Neural Computing and Applications, 33, 13193-13203. https://doi.org/10.1007/s00521-021-05946-3

Generative Adversarial Networks (GANs) have drawn great attention recently since they are the powerful models to generate high-quality images. Although GANs have achieved great success, they usually suffer from unstable training and consequently may... Read More about Improving generative adversarial networks with simple latent distributions.

Does semantics aid syntax? An empirical study on named entity recognition and classification (2021)
Journal Article
Zhong, X., Cambria, E., & Hussain, A. (2022). Does semantics aid syntax? An empirical study on named entity recognition and classification. Neural Computing and Applications, 34, 8373-8384. https://doi.org/10.1007/s00521-021-05949-0

Many researchers jointly model multiple linguistic tasks (e.g., joint modeling of named entity recognition and named entity classification and joint modeling of syntactic parsing and semantic parsing) with an implicit assumption that these individual... Read More about Does semantics aid syntax? An empirical study on named entity recognition and classification.

Application of Artificial Neural Network in Predicting Flashover Behaviour of Outdoor Insulators under Polluted Conditions (2021)
Presentation / Conference Contribution
Sajjad, U., Arshad, Ahmad, J., & Shoaib, S. (2021, January). Application of Artificial Neural Network in Predicting Flashover Behaviour of Outdoor Insulators under Polluted Conditions. Presented at 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), St. Petersburg, Moscow, Russia

Safe and reliable delivery of power through transmission lines mainly depends on the quality condition of the high voltage insulators. In the last few decades, demand in polymeric insulator has been dramatically increased due to their advanced perfor... Read More about Application of Artificial Neural Network in Predicting Flashover Behaviour of Outdoor Insulators under Polluted Conditions.

A novel tensor-information bottleneck method for multi-input single-output applications (2021)
Journal Article
Lu, L., Ren, X., Cui, C., Tan, Z., Wu, Y., & Qin, Z. (2021). A novel tensor-information bottleneck method for multi-input single-output applications. Computer Networks, 193, Article 108088. https://doi.org/10.1016/j.comnet.2021.108088

Ensuring timeliness and mobility for multimedia computing is a crucial task for wireless communication. Previous algorithms that utilize information channels, such as the information bottleneck method, have shown great performance and efficiency, whi... Read More about A novel tensor-information bottleneck method for multi-input single-output applications.

When to (or not to) trust intelligent machines: Insights from an evolutionary game theory analysis of trust in repeated games (2021)
Journal Article
Han, T. A., Perrett, C., & Powers, S. T. (2021). When to (or not to) trust intelligent machines: Insights from an evolutionary game theory analysis of trust in repeated games. Cognitive Systems Research, 68, Article 111-124. https://doi.org/10.1016/j.cogsys.2021.02.003

The actions of intelligent agents, such as chatbots, recommender systems, and virtual assistants are typically not fully transparent to the user. Consequently , users take the risk that such agents act in ways opposed to the users' preferences or goa... Read More about When to (or not to) trust intelligent machines: Insights from an evolutionary game theory analysis of trust in repeated games.

A Hybrid Deep Random Neural Network for Cyberattack Detection in the Industrial Internet of Things (2021)
Journal Article
Huma, Z. E., Latif, S., Ahmad, J., Idrees, Z., Ibrar, A., Zou, Z., Alqahtani, F., & Baothman, F. (2021). A Hybrid Deep Random Neural Network for Cyberattack Detection in the Industrial Internet of Things. IEEE Access, 9, 55595-55605. https://doi.org/10.1109/access.2021.3071766

The Industrial Internet of Things (IIoT) refers to the use of traditional Internet of Things (IoT) concepts in industrial sectors and applications. IIoT has several applications in smart homes, smart cities, smart grids, connected cars, and supply ch... Read More about A Hybrid Deep Random Neural Network for Cyberattack Detection in the Industrial Internet of Things.

Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things (2021)
Journal Article
Medjek, F., Tandjaoui, D., Djedjig, N., & Romdhani, I. (2021). Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things. International Journal of Critical Infrastructure Protection, 34, Article 100436. https://doi.org/10.1016/j.ijcip.2021.100436

Internet of Things (IoT) has emerged as a key component of all advanced critical infrastructures. However, with the challenging nature of IoT, new security breaches have been introduced, especially against the Routing Protocol for Low-power and Lossy... Read More about Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things.

WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles (2021)
Journal Article
Babaghayou, M., Labraoui, N., Abba Ari, A. A., Ferrag, M. A., Maglaras, L., & Janicke, H. (2021). WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles. Sensors, 21(7), Article 2443. https://doi.org/10.3390/s21072443

Internet of Vehicles (IoV) has the potential to enhance road-safety with environment sensing features provided by embedded devices and sensors. This benignant feature also raises privacy issues as vehicles announce their fine-grained whereabouts main... Read More about WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles.

A Comparative Analysis of Honeypots on Different Cloud Platforms (2021)
Journal Article
Kelly, C., Pitropakis, N., Mylonas, A., McKeown, S., & Buchanan, W. J. (2021). A Comparative Analysis of Honeypots on Different Cloud Platforms. Sensors, 21(7), Article 2433. https://doi.org/10.3390/s21072433

In 2019, the majority of companies used at least one cloud computing service and it is expected that by the end of 2021, cloud data centres will process 94% of workloads. The financial and operational advantages of moving IT infrastructure to special... Read More about A Comparative Analysis of Honeypots on Different Cloud Platforms.