Skip to main content

Research Repository

Advanced Search

All Outputs (95)

Image Encryption Using Dynamic Salt Injection, Hybrid Chaotic Maps, and Dual Operation Substitution (2024)
Presentation / Conference Contribution
Khattak, A. A., Babaagba, K., Liu, X., & Shah, S. A. (2024, August). Image Encryption Using Dynamic Salt Injection, Hybrid Chaotic Maps, and Dual Operation Substitution. Presented at The 2024 International Conference on Automation and Computing (ICAC 2024), Sunderland, UK

In today's digital world, securing the multimedia data, especially images transmitted over unsecure networks, is critically important. In this paper, a novel chaos-based image encryption algorithm is proposed, which utilises dynamic salt injection, h... Read More about Image Encryption Using Dynamic Salt Injection, Hybrid Chaotic Maps, and Dual Operation Substitution.

Scalable Machine Learning Architectures for IPA-Driven Maintenance Task Allocation in Large-Scale Building Portfolios (2024)
Presentation / Conference Contribution
Huang, Z., Liu, X., Romdhani, I., & Shih, C. (2024, August). Scalable Machine Learning Architectures for IPA-Driven Maintenance Task Allocation in Large-Scale Building Portfolios. Presented at The 7th International Conference on Information Science and Systems (ICISS 2024), Edinburgh

This research presents a groundbreaking approach to Building Maintenance Management (BMM) by introducing an Intelligent Process Automation (IPA)-Driven Building Maintenance Management (IBMM) model. This innovative model harnesses the synergies betwee... Read More about Scalable Machine Learning Architectures for IPA-Driven Maintenance Task Allocation in Large-Scale Building Portfolios.

Neurosymbolic learning in the XAI framework for enhanced cyberattack detection with expert knowledge integration (2024)
Presentation / Conference Contribution
Kalutharage, C. S., Liu, X., Chrysoulas, C., & Bamgboye, O. (2024, June). Neurosymbolic learning in the XAI framework for enhanced cyberattack detection with expert knowledge integration. Presented at The 39th International Conference on ICT Systems Security and Privacy Protection (SEC 2024), Edinburgh

The perpetual evolution of cyberattacks, especially in the realm of Internet of Things (IoT) networks, necessitates advanced, adaptive, and intelligent defence mechanisms. The integration of expert knowledge can drastically enhance the efficacy of Io... Read More about Neurosymbolic learning in the XAI framework for enhanced cyberattack detection with expert knowledge integration.

Towards Building a Smart Water Management System (SWAMS) in Nigeria (2024)
Presentation / Conference Contribution
Bamgboye, O., Chrysoulas, C., Liu, X., Watt, T., Sodiya, A., Oyeleye, M., & Kalutharage, S. (2024, June). Towards Building a Smart Water Management System (SWAMS) in Nigeria. Presented at The 22nd IEEE Mediterranean Electrotechnical Conference, Porto, Portugal

The water management landscape in Nigeria struggles with formidable obstacles characterized by a lack of adequate infrastructure, an uneven distribution of resources, and insufficient access to clean water, particularly in rural areas. These challeng... Read More about Towards Building a Smart Water Management System (SWAMS) in Nigeria.

Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection (2024)
Presentation / Conference Contribution
Kalutharage, C. S., Liu, X., Chrysoulas, C., & Bamgboye, O. (2023, September). Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection. Presented at The 4th International Workshop on Cyber-Physical Security for Critical Infrastructures Protection (CPS4CIP 2023) - in conjunction with ESORICS 2023, The Hague, Netherlands

PFL-LDG: Privacy-preserving Federated Learning via Lightweight Device Grouping (2023)
Presentation / Conference Contribution
Wang, Z., Liu, Q., & Liu, X. (2023, August). PFL-LDG: Privacy-preserving Federated Learning via Lightweight Device Grouping. Presented at The 9th IEEE International Conference on Privacy Computing and Data Security (PCDS 2023) as Part of the IEEE Smart World Congress 2023, Portsmouth, UK

The rapid growth of private data from distributed edge networks, driven by the proliferation of IoT sensors, wearable devices, and smartphones, offers significant opportunities for AI applications. However, traditional distributed machine learning me... Read More about PFL-LDG: Privacy-preserving Federated Learning via Lightweight Device Grouping.

Emotion Recognition on Social Media Using Natural Language Processing (NLP) Techniques (2023)
Presentation / Conference Contribution
Gomez, L. R., Watt, T., Babaagba, K. O., Chrysoulas, C., Homay, A., Rangarajan, R., & Liu, X. (2023, August). Emotion Recognition on Social Media Using Natural Language Processing (NLP) Techniques. Presented at ICISS 2023: The 6th International Conference on Information Science and Systems, Edinburgh

In recent years, text has been the main form of communication on social media platforms such as Twitter, Reddit, Facebook, Instagram and YouTube. Emotion Recognition from these platforms can be exploited for all sorts of applications. Through the mea... Read More about Emotion Recognition on Social Media Using Natural Language Processing (NLP) Techniques.

Towards Improving Accessibility of Web Auditing with Google Lighthouse (2023)
Presentation / Conference Contribution
McGill, T., Bamgboye, O., Liu, X., & Kalutharage, C. S. (2023, June). Towards Improving Accessibility of Web Auditing with Google Lighthouse. Presented at The 47th IEEE Annual Conference on Computers, Software, and Applications (COMPSAC), Turin, Italy

Google Lighthouse is a tool made by Google for auditing web pages performance, accessibility, SEO, and best practices with the intention of improving the quality of the websites. This allows software developers to understand areas of improvement with... Read More about Towards Improving Accessibility of Web Auditing with Google Lighthouse.

An Input Sampling Scheme to Radar Echo Extrapolation For RNN-Based Models (2022)
Presentation / Conference Contribution
Wang, Y., Yang, Z., Liu, Q., & Liu, X. (2022, September). An Input Sampling Scheme to Radar Echo Extrapolation For RNN-Based Models. Presented at 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Falerna, Italy

Short-term heavy rainfall can have a significant impact on people's production, life and travel. Numerical Weather Prediction (NWP) is complex. It can predict weather conditions for the next week or even two weeks, but cannot predict the weather in t... Read More about An Input Sampling Scheme to Radar Echo Extrapolation For RNN-Based Models.

Dense-FCN: A Deep Learning Approach for Weather Radar Beam Blockage Correction (2022)
Presentation / Conference Contribution
Sun, J., Wu, H., Liu, Q., Liu, X., & Ma, J. (2022, September). Dense-FCN: A Deep Learning Approach for Weather Radar Beam Blockage Correction. Presented at 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Falerna, Italy

The weather radar will receive a lot of non-meteorological echo information during the body scan process, such as: object echoes, co-wave interference echoes, airplanes, flocks of birds, etc. These non-meteorological echoes will cause pollution to no... Read More about Dense-FCN: A Deep Learning Approach for Weather Radar Beam Blockage Correction.

Emerging Simulation Frameworks for Analyzing Smart Grid Cyberattack: A Literature Review (2022)
Presentation / Conference Contribution
Darteh, O. F., Liu, Q., Liu, X., Bah, I., Nakoty, F. M., & Acakpovi, A. (2022, September). Emerging Simulation Frameworks for Analyzing Smart Grid Cyberattack: A Literature Review. Presented at 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Falerna, Italy

The transition of the conventional power grid into the Smart Grid (SG), a widely distributed energy delivery network characterized by a two-way flow of electricity and information, is key for energy sector stakeholders. Despite the SG’s clear improve... Read More about Emerging Simulation Frameworks for Analyzing Smart Grid Cyberattack: A Literature Review.

Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract) (2022)
Presentation / Conference Contribution
Sampath Kalutharage, C., Liu, X., & Chrysoulas, C. (2022, September). Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract). Presented at 27th European Symposium on Research in Computer Security (ESORICS) 2022, Copenhagen, Denmark

Over the past few decades, Machine Learning (ML)-based intrusion detection systems (IDS) have become increasingly popular and continue to show remarkable performance in detecting attacks. However, the lack of transparency in their decision-making pro... Read More about Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract).

A Lightweight and User-centric Two-factor Authentication Mechanism for IoT Based on Blockchain and Smart Contract (2022)
Presentation / Conference Contribution
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Liu, X. (2022, May). A Lightweight and User-centric Two-factor Authentication Mechanism for IoT Based on Blockchain and Smart Contract. Presented at 2022 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH), Riyadh, Saudi Arabia

Two-factor authentication (2FA) is commonly used in Internet of Things (IoT) authentication to provide multi-layer protection. Tokens, often known as One-Time Passwords (OTP), are used to offer additional information. While this technique provides fl... Read More about A Lightweight and User-centric Two-factor Authentication Mechanism for IoT Based on Blockchain and Smart Contract.

Intelligent Question Answering System Based on Knowledge Graph (2022)
Presentation / Conference Contribution
Feng, X., Liu, Q., & Liu, X. (2021, December). Intelligent Question Answering System Based on Knowledge Graph. Presented at IEEE SmartCity-2021, Hainan, China

In order to build a smart city and pursue more efficient city management, various industries have introduced intelligent question answering into process management. The intelligent question answering system based on the knowledge graph is dedicated t... Read More about Intelligent Question Answering System Based on Knowledge Graph.

A Lightweight FCNN-Driven Approach to Concrete Composition Extraction in a Distributed Environment (2022)
Presentation / Conference Contribution
Lu, H., Kamoto, K. M., Liu, Q., Zhang, Y., Liu, X., Xu, X., & Qi, L. (2021, December). A Lightweight FCNN-Driven Approach to Concrete Composition Extraction in a Distributed Environment. Presented at 11th EAI International Conference, CloudComp 2021, Online

It is of great significance to study the positive characteristics of concrete bearing cracks, fire and other adverse environment for the safety of human life and property and the protection of environmental resources. However, there are still some ch... Read More about A Lightweight FCNN-Driven Approach to Concrete Composition Extraction in a Distributed Environment.

An Intelligent Method for Upper Limb Posture Recognition Based on Limited MEMS Data (2022)
Presentation / Conference Contribution
Wu, Z., Wu, X., Liu, Q., & Liu, X. (2021, October). An Intelligent Method for Upper Limb Posture Recognition Based on Limited MEMS Data. Presented at The 6th IEEE Cyber Science and Technology Congress (2021) (CyberSciTech 2021), AB, Canada [Online]

There are more than 10 million new stroke cases worldwide every year, and stroke has become one of the main causes of death and disability. In recent years, with the rapid development of computer science and technology, through the combination of Int... Read More about An Intelligent Method for Upper Limb Posture Recognition Based on Limited MEMS Data.

Improving Domestic NILM Using An Attention- Enabled Seq2Point Learning Approach (2022)
Presentation / Conference Contribution
Zhang, J., Sun, J., Gan, J., Liu, Q., & Liu, X. (2021, October). Improving Domestic NILM Using An Attention- Enabled Seq2Point Learning Approach. Presented at The 6th IEEE Cyber Science and Technology Congress (2021) (CyberSciTech 2021), AB, Canada [Online]

The past decade have seen a growth in Internet technology, the overlap of cyberspace and social space provides great convenience for people's life. The in-depth study of non-intrusive load management (NILM) promotes the development of multi-integrati... Read More about Improving Domestic NILM Using An Attention- Enabled Seq2Point Learning Approach.

Tracking Stream Quality Issues in Combined Physical and Radar Sensors for IoT-based Data-driven Actuation (2021)
Presentation / Conference Contribution
Bamgboye, O., Liu, X., Cruickshank, P., Liu, Q., & Zhang, Y. (2021, December). Tracking Stream Quality Issues in Combined Physical and Radar Sensors for IoT-based Data-driven Actuation. Presented at 2021 CIE International Conference on Radar (Radar), Haikou, Hainan, China

In this paper, a stream quality tracking for measurements from combined radar and physical sensors is developed. The authors proposed the use of RDF stream processing system and semantic rules to provide semantic reasoning for tracking erroneous data... Read More about Tracking Stream Quality Issues in Combined Physical and Radar Sensors for IoT-based Data-driven Actuation.

Blockchain-based identity and authentication scheme for MQTT protocol (2021)
Presentation / Conference Contribution
Abdelrazig Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Liu, X. (2021, March). Blockchain-based identity and authentication scheme for MQTT protocol. Presented at ICBCT '21: 2021 The 3rd International Conference on Blockchain Technology, Shanghai, China

The publish and subscribe messaging model has proven itself as a dominant messaging paradigm for IoT systems. An example of such is the commonly used Message Queuing Telemetry Transport (MQTT) protocol. However, the security concerns with this protoc... Read More about Blockchain-based identity and authentication scheme for MQTT protocol.