Skip to main content

Research Repository

Advanced Search

All Outputs (2072)

A Study of Online Safety and Digital Literacy of Academic Researchers Working from Home during the COVID-19 Pandemic (2022)
Presentation / Conference Contribution
Haynes, D., & Salzano, R. (2022, April). A Study of Online Safety and Digital Literacy of Academic Researchers Working from Home during the COVID-19 Pandemic. Paper presented at ASIS&T Global 24-hour Conference, 2022, Online

Universities in the UK responded to the COVID-19 pandemic by moving teaching to an online environment and requiring staff to work from home, as far as possible. Researchers face particular challenges of security and privacy where their work involves... Read More about A Study of Online Safety and Digital Literacy of Academic Researchers Working from Home during the COVID-19 Pandemic.

A Participative Approach To Understanding The Hidden Curriculum (2022)
Presentation / Conference Contribution
Brazier, D., & Milosheva, M. (2022, April). A Participative Approach To Understanding The Hidden Curriculum. Paper presented at ASIST 24-Hour Global Conference, Online

Information needs are fundamental building blocks of the information behaviour and information retrieval literature. However, the concept of an “information need” is rarely discussed or defined, particularly in the context of everyday life informatio... Read More about A Participative Approach To Understanding The Hidden Curriculum.

Evaluation Of Inequalities Of Access In UK Online Digital Collections: A Systematic Review (2022)
Presentation / Conference Contribution
Brazier, D., Ryan, B., & Gooding, P. (2022, April). Evaluation Of Inequalities Of Access In UK Online Digital Collections: A Systematic Review. Paper presented at ASIST 24-Hour Global Conference, Online

This paper presents the results of a systematic literature review into how UK Cultural Heritage Institutions (CHIs) deal with issues of Equality, Diversity, and Inclusion (EDI). In recent years, researchers have addressed the fragmented nature of Cul... Read More about Evaluation Of Inequalities Of Access In UK Online Digital Collections: A Systematic Review.

Augmenting Novelty Search with a Surrogate Model to Engineer Meta-Diversity in Ensembles of Classifiers (2022)
Presentation / Conference Contribution
Cardoso, R. P., Hart, E., Burth Kurka, D., & Pitt, J. (2022, April). Augmenting Novelty Search with a Surrogate Model to Engineer Meta-Diversity in Ensembles of Classifiers. Presented at EvoSTAR, Madrid

Using Neuroevolution combined with Novelty Search to promote behavioural diversity is capable of constructing high-performing ensembles for classification. However, using gradient descent to train evolved architectures during the search can be comput... Read More about Augmenting Novelty Search with a Surrogate Model to Engineer Meta-Diversity in Ensembles of Classifiers.

New information literacy horizons: Making the case for career information literacy (2022)
Presentation / Conference Contribution
Milosheva, M., Hall, H., Robertson, P., & Cruickshank, P. (2021, September). New information literacy horizons: Making the case for career information literacy. Presented at European Conference on Information Literacy (ECIL) 2021, Bamberg, Germany [Online]

A literature review on the broad theme of information literacy and work was undertaken between January and April 2021 as part of an on-going doctoral study. The purpose of the literature review was to explore extant research on workplace information... Read More about New information literacy horizons: Making the case for career information literacy.

SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles (2022)
Presentation / Conference Contribution
Babaghayou, M., Labraoui, N., Ari, A. A. A., Lagraa, N., Ferrag, M. A., & Maglaras, L. (2021, November). SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles. Presented at CROWNCOM 2021, WiCON 2021, Online

The quick revolution on the wireless communication technologies had opened the gate towards promising implementations; Vehicular-Ad-hoc Networks (VANETs) and the safety-enhancing applications provided by the Internet of Vehicles (IoV) paradigm are on... Read More about SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles.

MienCap: Performance-based Facial Animation with Live Mood Dynamics (2022)
Presentation / Conference Contribution
Pan, Y., Zhang, R., Wang, J., Chen, N., Qiu, Y., Ding, Y., & Mitchell, K. (2022, March). MienCap: Performance-based Facial Animation with Live Mood Dynamics. Presented at 2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW), Christchurch, New Zealand

Our purpose is to improve performance-based animation which can drive believable 3D stylized characters that are truly perceptual. By combining traditional blendshape animation techniques with machine learning models, we present a real time motion ca... Read More about MienCap: Performance-based Facial Animation with Live Mood Dynamics.

A Lightweight FCNN-Driven Approach to Concrete Composition Extraction in a Distributed Environment (2022)
Presentation / Conference Contribution
Lu, H., Kamoto, K. M., Liu, Q., Zhang, Y., Liu, X., Xu, X., & Qi, L. (2021, December). A Lightweight FCNN-Driven Approach to Concrete Composition Extraction in a Distributed Environment. Presented at 11th EAI International Conference, CloudComp 2021, Online

It is of great significance to study the positive characteristics of concrete bearing cracks, fire and other adverse environment for the safety of human life and property and the protection of environmental resources. However, there are still some ch... Read More about A Lightweight FCNN-Driven Approach to Concrete Composition Extraction in a Distributed Environment.

Improving Domestic NILM Using An Attention- Enabled Seq2Point Learning Approach (2022)
Presentation / Conference Contribution
Zhang, J., Sun, J., Gan, J., Liu, Q., & Liu, X. (2021, October). Improving Domestic NILM Using An Attention- Enabled Seq2Point Learning Approach. Presented at The 6th IEEE Cyber Science and Technology Congress (2021) (CyberSciTech 2021), AB, Canada [Online]

The past decade have seen a growth in Internet technology, the overlap of cyberspace and social space provides great convenience for people's life. The in-depth study of non-intrusive load management (NILM) promotes the development of multi-integrati... Read More about Improving Domestic NILM Using An Attention- Enabled Seq2Point Learning Approach.

An Intelligent Method for Upper Limb Posture Recognition Based on Limited MEMS Data (2022)
Presentation / Conference Contribution
Wu, Z., Wu, X., Liu, Q., & Liu, X. (2021, October). An Intelligent Method for Upper Limb Posture Recognition Based on Limited MEMS Data. Presented at The 6th IEEE Cyber Science and Technology Congress (2021) (CyberSciTech 2021), AB, Canada [Online]

There are more than 10 million new stroke cases worldwide every year, and stroke has become one of the main causes of death and disability. In recent years, with the rapid development of computer science and technology, through the combination of Int... Read More about An Intelligent Method for Upper Limb Posture Recognition Based on Limited MEMS Data.

Sensitivity-Aware Configurations for High Packet Generation Rate LoRa Networks (2022)
Presentation / Conference Contribution
Alahmadi, H., Bouabdallah, F., Ghaleb, B., & Al-Dubai, A. (2021, December). Sensitivity-Aware Configurations for High Packet Generation Rate LoRa Networks. Presented at 20th International Conference on Computer and Information Technology (CIT-2021), London

In this paper, we introduce Sensitivity-Aware LoRa Configuration (SAL), a new algorithm for efficient autonomous and distributed selection of LoRa physical layer transmission parameters. The aim is to address the limitations of the currently adopted... Read More about Sensitivity-Aware Configurations for High Packet Generation Rate LoRa Networks.

A sequential explanatory methodology for the study of young people’s career information literacy and career information behaviours (2022)
Presentation / Conference Contribution
Milosheva, M., Hall, H., Robertson, P., & Cruickshank, P. (2022, February). A sequential explanatory methodology for the study of young people’s career information literacy and career information behaviours. Poster presented at iConference 2022, Online

Poster presented at iConference 2022, Online, 28 Feb - 4 Mar 2022.

A sequential explanatory methodology for the study of young people's career information literacy and career information behaviours (2022)
Presentation / Conference Contribution
Milosheva, M., Hall, H., Robertson, P., & Cruickshank, P. (2022). A sequential explanatory methodology for the study of young people's career information literacy and career information behaviours. In iConference 2022 Posters

In the information-rich post-pandemic employment environment, young people's career success is predicated on the extent to which they can apply career information to their career decision-making and career development learning processes. Taking heed... Read More about A sequential explanatory methodology for the study of young people's career information literacy and career information behaviours.

Internet of Things: Concept, Implementation and Challenges (2022)
Presentation / Conference Contribution
Gunathilake, N. A., Al-Dubai, A., & Buchanan, W. J. (2020, December). Internet of Things: Concept, Implementation and Challenges. Presented at International Conference on IoT and its Applications (ICIA) 2020, Jamshedpur, India

Through the technical advancements over five generations, today's digital communication has become much smarter, more intelligent and punctual. This causes a massive amount of continuous data collection in real-time whose analytics are later used to... Read More about Internet of Things: Concept, Implementation and Challenges.

Detecting Alzheimer’s Disease Using Machine Learning Methods (2022)
Presentation / Conference Contribution
Dashtipour, K., Taylor, W., Ansari, S., Zahid, A., Gogate, M., Ahmad, J., Assaleh, K., Arshad, K., Ali Imran, M., & Abbasi, Q. (2021, October). Detecting Alzheimer’s Disease Using Machine Learning Methods. Presented at 16th EAI International Conference, BODYNETS 2021, Online

As the world is experiencing population growth, the portion of the older people, aged 65 and above, is also growing at a faster rate. As a result, the dementia with Alzheimer’s disease is expected to increase rapidly in the next few years. Currently,... Read More about Detecting Alzheimer’s Disease Using Machine Learning Methods.

Comparing the Performance of Different Classifiers for Posture Detection (2022)
Presentation / Conference Contribution
Suresh Kumar, S., Dashtipour, K., Gogate, M., Ahmad, J., Assaleh, K., Arshad, K., Imran, M. A., Abbasi, Q., & Ahmad, W. (2021, October). Comparing the Performance of Different Classifiers for Posture Detection. Presented at 16th EAI International Conference, BODYNETS 2021, Online

Human Posture Classification (HPC) is used in many fields such as human computer interfacing, security surveillance, rehabilitation, remote monitoring, and so on. This paper compares the performance of different classifiers in the detection of 3 post... Read More about Comparing the Performance of Different Classifiers for Posture Detection.

Min-max Training: Adversarially Robust Learning Models for Network Intrusion Detection Systems (2022)
Presentation / Conference Contribution
Grierson, S., Thomson, C., Papadopoulos, P., & Buchanan, B. (2021, December). Min-max Training: Adversarially Robust Learning Models for Network Intrusion Detection Systems. Presented at 2021 14th International Conference on Security of Information and Networks (SIN), Edinburgh, United Kingdom

Intrusion detection systems are integral to the security of networked systems for detecting malicious or anomalous network traffic. As traditional approaches are becoming less effective, machine learning and deep learning-based intrusion detection sy... Read More about Min-max Training: Adversarially Robust Learning Models for Network Intrusion Detection Systems.

PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching (2022)
Presentation / Conference Contribution
Abramson, W., Buchanan, W. J., Sayeed, S., Pitropakis, N., & Lo, O. (2021, December). PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching. Presented at 14th International Conference on Security of Information and Networks, Edinburgh [Online]

The spread of COVID-19 has highlighted the need for a robust contact tracing infrastructure that enables infected individuals to have their contacts traced, and followed up with a test. The key entities involved within a contact tracing infrastructur... Read More about PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching.

Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates (2022)
Presentation / Conference Contribution
Abubakar, M., McCarron, P., Jaroucheh, Z., Al Dubai, A., & Buchanan, B. (2021, December). Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates. Presented at 2021 14th International Conference on Security of Information and Networks (SIN), Edinburgh

The COVID-19 pandemic has recently emerged as a worldwide health emergency that necessitates coordinated international measures. To contain the virus's spread, governments and health organisations raced to develop vaccines that would lower Covid-19 m... Read More about Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates.

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers (2022)
Presentation / Conference Contribution
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2021, December). Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. Presented at IEEE SINCONF: 14th International Conference on Security of Information and Networks, Edinburgh

Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can provide access to past and current cybersecurity threats for reducing the... Read More about Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers.