Skip to main content

Research Repository

Advanced Search

All Outputs (3)

Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices (2023)
Presentation / Conference Contribution
Spalding, A., Tan, Z., & Babaagba, K. O. (2023, November). Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices. Presented at The International Symposium on Intelligent and Trustworthy Comp

Data recovery for forensic analysis of both hard drives and solid state media presents its own unique set of challenges. Hard drives face mechanical failures and data fragmentation , but their sequential storage and higher success rates make recovery... Read More about Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices.

Self-attention is What You Need to Fool a Speaker Recognition System (2023)
Presentation / Conference Contribution
Wang, F., Song, R., Tan, Z., Li, Q., Wang, C., & Yang, Y. (2023, November). Self-attention is What You Need to Fool a Speaker Recognition System. Presented at The 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communica

Speaker Recognition Systems (SRSs) are becoming increasingly popular in various aspects of life due to advances in technology. However, these systems are vulnerable to cyber threats, particularly adversarial attacks. Traditional adversarial attack me... Read More about Self-attention is What You Need to Fool a Speaker Recognition System.

A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs (2023)
Presentation / Conference Contribution
McLaren, R. A., Babaagba, K., & Tan, Z. (2023). A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs. In Machine Learning, Optimization, and Data Science: 8th International Conference, LOD 2022, Certosa di Po

As the field of malware detection continues to grow, a shift in focus is occurring from feature vectors and other common, but easily obfuscated elements to a semantics based approach. This is due to the emergence of more complex malware families that... Read More about A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs.