Skip to main content

Research Repository

Advanced Search

All Outputs (2072)

Understanding Personal Online Risk To Individuals Via Ontology Development (2020)
Presentation / Conference Contribution
Haynes, D. (2020, July). Understanding Personal Online Risk To Individuals Via Ontology Development. Presented at International Societey for Knowledge Organziation (ISKO) 2020, Aalborg, Denmark

The concept of risk is widely misunderstood because of the different contexts in which it is used. This paper describes the development of an ontology of risk as a way of better understanding the nature of the potential harms individuals are exposed... Read More about Understanding Personal Online Risk To Individuals Via Ontology Development.

Hardware Design for Autonomous Robot Evolution (2020)
Presentation / Conference Contribution
Hale, M. F., Angus, M., Buchanan, E., Li, W., Woolley, R., Le Goff, L. K., De Carlo, M., Timmis, J., Winfield, A. F., Hart, E., Eiben, A. E., & Tyrrell, A. M. (2020, December). Hardware Design for Autonomous Robot Evolution. Presented at International Conference on Evolvable Hardware, Canberra Australia

The long term goal of the Autonomous Robot Evolution (ARE) project is to create populations of physical robots, in which both the controllers and body plans are evolved. The transition for evolutionary designs from purely simulation environments into... Read More about Hardware Design for Autonomous Robot Evolution.

Assisting Information Practice: From Information Intermediary To Social Proxy (2020)
Presentation / Conference Contribution
Cruickshank, P., Webster, G., & Ryan, F. (2020, September). Assisting Information Practice: From Information Intermediary To Social Proxy. Presented at ISIC 2020 The Information Behaviour conference, Pretoria, South Africa

The increasing dependence on social media and other online systems as part of everyday life has grown considerably over the years. At the same time, the complexity and security of online systems has also been increasing, making it more challenging fo... Read More about Assisting Information Practice: From Information Intermediary To Social Proxy.

Information Literacy as a joint competence shaped by everyday life and workplace roles amongst Scottish community councillors (2020)
Presentation / Conference Contribution
Cruickshank, P., Hall, H., & Ryan, B. (2020, September). Information Literacy as a joint competence shaped by everyday life and workplace roles amongst Scottish community councillors. Presented at ISIC 2020 The Information Behaviour Conference, Pretoria University, Tshwane, Republic of South Africa

*Introduction: This paper addresses the information practices of hyperlocal democratic representatives, and their acquisition and application of information literacy skills. *Method: 1034 Scottish community councillors completed an online questio... Read More about Information Literacy as a joint competence shaped by everyday life and workplace roles amongst Scottish community councillors.

Privacy-preserving Surveillance Methods using Homomorphic Encryption (2020)
Presentation / Conference Contribution
Bowditch, W., Abramson, W., Buchanan, W. J., Pitropakis, N., & Hall, A. J. (2020, February). Privacy-preserving Surveillance Methods using Homomorphic Encryption. Presented at 6th International Conference on Information Security Systems and Privacy (ICISSP), Valletta, Malta

Data analysis and machine learning methods often involve the processing of cleartext data, and where this could breach the rights to privacy. Increasingly, we must use encryption to protect all states of the data: in-transit, at-rest, and in-memory.... Read More about Privacy-preserving Surveillance Methods using Homomorphic Encryption.

A Fast Classification Approach to Upper-Limb Posture Recognition (2020)
Presentation / Conference Contribution
Wu, X., Jiang, Y., Liu, Q., Wu, H., & Liu, X. (2020, November). A Fast Classification Approach to Upper-Limb Posture Recognition. Presented at IEEE International Conferences on Cyber, Physical and Social Computing (CPSCom2020), Rhodes, Greece

Automating GDPR Compliance Verification for Cloud-hosted Services (2020)
Presentation / Conference Contribution
Barati, M., Rana, O., & Theodorakopoulos, G. (2020, October). Automating GDPR Compliance Verification for Cloud-hosted Services. Presented at 2020 International Symposium on Networks, Computers and Communications (ISNCC), Montreal, QC, Canada

Cloud-hosted business processes require access to customer data to complete a transaction, to improve a customer's on-line experience or provide useful product recommendations. However, privacy concerns associated with the use of this data have led t... Read More about Automating GDPR Compliance Verification for Cloud-hosted Services.

The relationship between culture and public library use: non-Western students in Scotland (2020)
Presentation / Conference Contribution
Salzano, R., Hall, H., & Webster, G. (2020, September). The relationship between culture and public library use: non-Western students in Scotland. Presented at ISIC (Information Seeking in Context) 2020, Pretoria, South Africa

Introduction - Individuals’ cultural backgrounds influence their use of societal resources, including those offered in public libraries. Well-established in library research are explorations of the benefits of public library use to new-comer communit... Read More about The relationship between culture and public library use: non-Western students in Scotland.

Asymmetric Private Set Intersection with Applications to Contact Tracing and Private Vertical Federated Machine Learning (2020)
Presentation / Conference Contribution
Angelou, N., Benaissa, A., Cebere, B., Clark, W., Hall, A. J., Hoeh, M. A., Liu, D., Papadopoulos, P., Roehm, R., Sandmann, R., Schoppmann, P., & Titcombe, T. (2020, December). Asymmetric Private Set Intersection with Applications to Contact Tracing and Private Vertical Federated Machine Learning. Poster presented at NeurIPS 2020 Workshop on Privacy Preserving Machine Learning (PPML 2020), Online

We present a multi-language, cross-platform, open-source library for asymmetric private set intersection (PSI) and PSI-Cardinality (PSI-C). Our protocol combines traditional DDH-based PSI and PSI-C protocols with compression based on Bloom filters th... Read More about Asymmetric Private Set Intersection with Applications to Contact Tracing and Private Vertical Federated Machine Learning.

Computing degree apprenticeships: An opportunity to address gender imbalance in the IT sector? (2020)
Presentation / Conference Contribution
Smith, S., Taylor-Smith, E., Fabian, K., Barr, M., Berg, T., Cutting, D., Paterson, J., Young, T., & Zarb, M. (2020, October). Computing degree apprenticeships: An opportunity to address gender imbalance in the IT sector?. Presented at Frontiers in Education, Upsala, Sweden

This paper explores the potential for new work-based apprenticeship degrees to encourage more women into computing degrees and the IT sector. In the UK, women are currently under-represented on computing courses. Meanwhile the IT industry requires mo... Read More about Computing degree apprenticeships: An opportunity to address gender imbalance in the IT sector?.

Working with others and enjoying it: CS1 students' experience of small-group collaboration on a business simulation (2020)
Presentation / Conference Contribution
Bhardwaj, J. (2020). Working with others and enjoying it: CS1 students' experience of small-group collaboration on a business simulation. In 2020 IEEE Frontiers in Education Conference (FIE). https://doi.org/10.1109/fie44824.2020.9274161

This Research Full Paper presents a study exploring whether CS1 entrants' views of the impact and benefits of group work were modified by the experience of small-group collaboration during their first semester at university.We describe a first year b... Read More about Working with others and enjoying it: CS1 students' experience of small-group collaboration on a business simulation.

PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism (2020)
Presentation / Conference Contribution
Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Buchanan, W. (2020, December). PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism. Presented at ICVISP 2020: The 2020 4th International Conference on Vision, Image and Signal Processing, Bangkok

The original consensus algorithm-Proof of Work (PoW) has been widely utilized in the blockchain systems and is been adopted by many cryptocurrencies, such as Bitcoin and Ethereum, among many others. Nevertheless, the concept has received criticisms o... Read More about PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism.

Sdn heading north: Towards a declarative intent-based northbound interface (2020)
Presentation / Conference Contribution
Alalmaei, S., Elkhatib, Y., Bezahaf, M., Broadbent, M., & Race, N. (2020, November). Sdn heading north: Towards a declarative intent-based northbound interface. Presented at 2020 16th International Conference on Network and Service Management (CNSM), Izmir, Turkey

The Intent-Based Northbound Interface (NBI) offers users the ability to express what they want to achieve instead of how to achieve it, enabling improvements to network management and reducing operational costs. However, development of an Intent-Base... Read More about Sdn heading north: Towards a declarative intent-based northbound interface.

Recent Advances and Trends in Lightweight Cryptography for IoT Security (2020)
Presentation / Conference Contribution
Gunathilake, N. A., Al-Dubai, A., & Buchanan, W. J. (2020, November). Recent Advances and Trends in Lightweight Cryptography for IoT Security. Presented at 2020 16th International Conference on Network and Service Management (CNSM), Izmir, Turkey

Lightweight cryptography is a novel diversion from conventional cryptography to minimise its high level of resource requirements, thus it would impeccably fit in the internet-of-things (IoT) environment. The IoT platform is constrained in terms of ph... Read More about Recent Advances and Trends in Lightweight Cryptography for IoT Security.

Effect of Freezing and Fixation on Quantitative Ultrasound Parameters in Phantoms of Brain and Brain Tumour (2020)
Presentation / Conference Contribution
Thomson, H., Yang, S., Cochran, S., Stritch, T., & Baldwin, M. (2020, September). Effect of Freezing and Fixation on Quantitative Ultrasound Parameters in Phantoms of Brain and Brain Tumour. Presented at 2020 IEEE International Ultrasonics Symposium (IUS), Las Vegas, NV, USA

Quantitative ulltrasound (QUS) analyzes unprocessed radio frequency data from an ultrasound transducer or array and infers properties about tissue microstructure. Whilst it has shown success in diagnosing various soft tissue diseases, there have been... Read More about Effect of Freezing and Fixation on Quantitative Ultrasound Parameters in Phantoms of Brain and Brain Tumour.

FaceMagic: Real-time Facial Detail Effects on Mobile (2020)
Presentation / Conference Contribution
Casas, L., Li, Y., & Mitchell, K. (2020). FaceMagic: Real-time Facial Detail Effects on Mobile. In SA '20: SIGGRAPH Asia 2020 Technical Communications (1-4). https://doi.org/10.1145/3410700.3425429

We present a novel real-time face detail reconstruction method capable of recovering high quality geometry on consumer mobile devices. Our system firstly uses a morphable model and semantic segmentation of facial parts to achieve robust self-calibrat... Read More about FaceMagic: Real-time Facial Detail Effects on Mobile.

Towards Continuous User Authentication Using Personalised Touch-Based Behaviour (2020)
Presentation / Conference Contribution
Aaby, P., Giuffrida, M. V., Buchanan, W. J., & Tan, Z. (2020, August). Towards Continuous User Authentication Using Personalised Touch-Based Behaviour. Presented at CyberSciTech 2020, Calgary, Canada

In this paper, we present an empirical evaluation of 30 features used in touch-based continuous authentication. It is essential to identify the most significant features for each user, as behaviour is different amongst humans. Thus, a fixed feature s... Read More about Towards Continuous User Authentication Using Personalised Touch-Based Behaviour.

Music classroom as the shifting ground for patriotism: National Anthem Law in Hong Kong (2020)
Presentation / Conference Contribution
Cheng, L. (2020, July). Music classroom as the shifting ground for patriotism: National Anthem Law in Hong Kong. Presented at 20th International Seminar of the ISME Commission on Policy: Culture, Media and Education, Online

Music as an expressive art form can convey meaning and carry emotional associations. It can promote universal values such as anti-war and equality, or political ideology including both pro- and anti-establishment sentiments. As a result, various coun... Read More about Music classroom as the shifting ground for patriotism: National Anthem Law in Hong Kong.

Fast Probabilistic Consensus with Weighted Votes (2020)
Presentation / Conference Contribution
Müller, S., Penzkofer, A., Ku´smierz, B., Camargo, D., & Buchanan, W. J. (2020, November). Fast Probabilistic Consensus with Weighted Votes. Presented at FTC 2020 - Future Technologies Conference 2020, Vancouver, Canada

The fast probabilistic consensus (FPC) is a voting consensus protocol that is robust and efficient in Byzantine infrastructure. We propose an adaption of the FPC to a setting where the voting power is proportional to the nodes reputations. We model t... Read More about Fast Probabilistic Consensus with Weighted Votes.

PlanCurves: An Interface for End-Users to Visualise Multi-Agent Temporal Plans (2020)
Presentation / Conference Contribution
Le Bras, P., Carreno, Y., Lindsay, A., Petrick, R. P. A., & Chantler, M. J. (2020, October). PlanCurves: An Interface for End-Users to Visualise Multi-Agent Temporal Plans. Presented at ICAPS 2020 Workshop on Knowledge Engineering for Planning and Scheduling (KEPS 2020), Nancy, France [Online]

In operational contexts, there is a growing need to make automatically generated plans available for assessment, verification, and accountability purposes, in order to evaluate the risks associated with such plans prior to their execution. However, t... Read More about PlanCurves: An Interface for End-Users to Visualise Multi-Agent Temporal Plans.