Skip to main content

Research Repository

Advanced Search

All Outputs (116)

How Much do Robots Understand Rudeness? Challenges in Human-Robot Interaction (2024)
Presentation / Conference Contribution
Orme, M., Yu, Y., & Tan, Z. (2024, May). How Much do Robots Understand Rudeness? Challenges in Human-Robot Interaction. Presented at The 2024 Joint International Conference on Computational Linguistics, Language Resources and Evaluation (LREC-COLING 2024), Torino, Italy

This paper concerns the pressing need to understand and manage inappropriate language within the evolving human-robot interaction (HRI) landscape. As intelligent systems and robots transition from controlled laboratory settings to everyday households... Read More about How Much do Robots Understand Rudeness? Challenges in Human-Robot Interaction.

Towards a Cyberbullying Detection Approach: Fine-Tuned Contrastive Self- Supervised Learning for Data Augmentation (2024)
Journal Article
Alharigy, L., Alnuaim, H., Moradpoor, N., & Tan, T. (online). Towards a Cyberbullying Detection Approach: Fine-Tuned Contrastive Self- Supervised Learning for Data Augmentation. International Journal of Data Science and Analytics, https://doi.org/10.1007/s41060-024-00607-9

Cyberbullying on social media platforms is pervasive and challenging to detect due to linguistic subtleties and the need for extensive data annotation. We introduce a Deep Contrastive Self-Supervised Learning (DCSSL) model that integrates a Natural L... Read More about Towards a Cyberbullying Detection Approach: Fine-Tuned Contrastive Self- Supervised Learning for Data Augmentation.

Reliable and Fair Trustworthiness Evaluation Protocol for Platoon Service Recommendation System (2024)
Journal Article
Cheng, H., Tan, Z., Zhang, X., & Liu, Y. (online). Reliable and Fair Trustworthiness Evaluation Protocol for Platoon Service Recommendation System. Chinese Journal of Electronics, https://doi.org/10.23919/cje.2023.00.012

Aiming at the problems of the communication inefficiency and high energy consumption in vehicular networks, the platoon service recommendation systems (PSRS) are presented. Many schemes for evaluating the reputation of platoon head vehicles have been... Read More about Reliable and Fair Trustworthiness Evaluation Protocol for Platoon Service Recommendation System.

Overtaking Feasibility Prediction for Mixed Connected and Connectionless Vehicles (2024)
Journal Article
Zhao, L., Qian, H., Hawbani, A., Al-Dubai, A. Y., Tan, Z., Yu, K., & Zomaya, A. Y. (online). Overtaking Feasibility Prediction for Mixed Connected and Connectionless Vehicles. IEEE Transactions on Intelligent Transportation Systems, https://doi.org/10.1109/TITS.2024.3398602

Intelligent transportation systems (ITS) utilize advanced technologies to enhance traffic safety and efficiency, contributing significantly to modern transportation. The integration of Vehicle-to-Everything (V2X) further elevates road safety and fost... Read More about Overtaking Feasibility Prediction for Mixed Connected and Connectionless Vehicles.

MalSort: Lightweight and efficient image-based malware classification using masked self-supervised framework with Swin Transformer (2024)
Journal Article
Wang, F., Shi, X., Yang, F., Song, R., Li, Q., Tan, Z., & Wang, C. (2024). MalSort: Lightweight and efficient image-based malware classification using masked self-supervised framework with Swin Transformer. Journal of Information Security and Applications, 83, Article 103784. https://doi.org/10.1016/j.jisa.2024.103784

The proliferation of malware has exhibited a substantial surge in both quantity and diversity, posing significant threats to the Internet and indispensable network applications. The accurate and effective classification makes a pivotal role in defend... Read More about MalSort: Lightweight and efficient image-based malware classification using masked self-supervised framework with Swin Transformer.

Detection of Ransomware (2024)
Patent
Buchanan, B., McLaren, P., Russell, G., & Tan, Z. (2024). Detection of Ransomware. US20240152616A1

The present invention relates to a computer program product, a computing device and a method of detecting a file encrypted by ransomware by identifying a file write operation for a file on the computing device and determining if a predetermined numbe... Read More about Detection of Ransomware.

PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme (2024)
Presentation / Conference Contribution
Yaqub, Z., Yigit, Y., Maglaras, L., Tan, Z., & Wooderson, P. (2024, April). PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme. Presented at The 20th Annual International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT 2024), Abu Dhabi, UAE

In the rapidly evolving landscape of Intelligent Transportation Systems (ITS), Vehicular Ad-hoc Networks (VANETs) play a critical role in enhancing road safety and traffic flow. However, VANETs face significant security and privacy challenges due to... Read More about PULRAS: A Novel PUF-Based Lightweight Robust Authentication Scheme.

A Probability Mapping-Based Privacy Preservation Method for Social Networks (2024)
Presentation / Conference Contribution
Li, Q., Wang, Y., Wang, F., Tan, Z., & Wang, C. (2023, November). A Probability Mapping-Based Privacy Preservation Method for Social Networks. Presented at The 3rd International Conference on Ubiquitous Security 2023 (UbiSec-2023), Exeter

The mining and analysis of social networks can bring significant economic and social benefits. However, it also poses a risk of privacy leakages. Differential privacy is a de facto standard to prevent such leaks, but it suffers from the high sensitiv... Read More about A Probability Mapping-Based Privacy Preservation Method for Social Networks.

STIDNet: Identity-Aware Face Forgery Detection with Spatiotemporal Knowledge Distillation (2024)
Journal Article
Fang, M., Yu, L., Xie, H., Tan, Q., Tan, Z., Hussain, A., Wang, Z., Li, J., & Tian, Z. (online). STIDNet: Identity-Aware Face Forgery Detection with Spatiotemporal Knowledge Distillation. IEEE Transactions on Computational Social Systems, https://doi.org/10.1109/tcss.2024.3356549

The impressive development of facial manipulation techniques has raised severe public concerns. Identity-aware methods, especially suitable for protecting celebrities, are seen as one of promising face forgery detection approaches with additional ref... Read More about STIDNet: Identity-Aware Face Forgery Detection with Spatiotemporal Knowledge Distillation.

Can Federated Models Be Rectified Through Learning Negative Gradients? (2024)
Presentation / Conference Contribution
Tahir, A., Tan, Z., & Babaagba, K. O. Can Federated Models Be Rectified Through Learning Negative Gradients?. Presented at 13th EAI International Conference, BDTA 2023, Edinburgh

Federated Learning (FL) is a method to train machine learning (ML) models in a decentralised manner, while preserving the privacy of data from multiple clients. However, FL is vulnerable to malicious attacks, such as poisoning attacks, and is challen... Read More about Can Federated Models Be Rectified Through Learning Negative Gradients?.

TouchEnc: a Novel Behavioural Encoding Technique to Enable Computer Vision for Continuous Smartphone User Authentication (2023)
Presentation / Conference Contribution
Aaby, P., Giuffrida, M. V., Buchanan, W. J., & Tan, Z. (2023, November). TouchEnc: a Novel Behavioural Encoding Technique to Enable Computer Vision for Continuous Smartphone User Authentication. Presented at The 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2023), Exeter, UK

We are increasingly required to prove our identity when using smartphones through explicit authentication processes such as passwords or physiological biometrics, e.g., authorising online banking transactions or unlocking smartphones. However, these... Read More about TouchEnc: a Novel Behavioural Encoding Technique to Enable Computer Vision for Continuous Smartphone User Authentication.

Self-attention is What You Need to Fool a Speaker Recognition System (2023)
Presentation / Conference Contribution
Wang, F., Song, R., Tan, Z., Li, Q., Wang, C., & Yang, Y. (2023, November). Self-attention is What You Need to Fool a Speaker Recognition System. Presented at The 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2023), Exeter, UK

Speaker Recognition Systems (SRSs) are becoming increasingly popular in various aspects of life due to advances in technology. However, these systems are vulnerable to cyber threats, particularly adversarial attacks. Traditional adversarial attack me... Read More about Self-attention is What You Need to Fool a Speaker Recognition System.

Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices (2023)
Presentation / Conference Contribution
Spalding, A., Tan, Z., & Babaagba, K. O. (2023, November). Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices. Presented at The International Symposium on Intelligent and Trustworthy Computing, Communications, and Networking (ITCCN-2023), Exeter, UK

Data recovery for forensic analysis of both hard drives and solid state media presents its own unique set of challenges. Hard drives face mechanical failures and data fragmentation , but their sequential storage and higher success rates make recovery... Read More about Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices.

Machine Un-learning: An Overview of Techniques, Applications, and Future Directions (2023)
Journal Article
Sai, S., Mittal, U., Chamola, V., Huang, K., Spinelli, I., Scardapane, S., Tan, Z., & Hussain, A. (2024). Machine Un-learning: An Overview of Techniques, Applications, and Future Directions. Cognitive Computation, 16, 482-506. https://doi.org/10.1007/s12559-023-10219-3

ML applications proliferate across various sectors. Large internet firms employ ML to train intelligent models using vast datasets, including sensitive user information. However, new regulations like GDPR require data removal by businesses. Deleting... Read More about Machine Un-learning: An Overview of Techniques, Applications, and Future Directions.

A Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile Devices (2023)
Book Chapter
Turnbull, L., Tan, Z., & Babaagba, K. O. (2024). A Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile Devices. In A. Ismail Awad, A. Ahmad, K. Raymond Choo, & S. Hakak (Eds.), Internet of Things Security and Privacy: Practical and Management Perspectives (24-53). CRC Press. https://doi.org/10.1201/9781003199410-2

There has been an upsurge in malicious attacks in recent years, impacting computer systems and networks. More and more novel malware families aimed at information assets were launched daily over the past year. A particularly threatening malicious gro... Read More about A Generative Neural Network for Improving Metamorphic Malware Detection in IoT Mobile Devices.

A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing (2023)
Journal Article
Zhao, L., Zhao, Z., Zhang, E., Hawbani, A., Al-Dubai, A., Tan, Z., & Hussain, A. (2023). A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing. IEEE Journal on Selected Areas in Communications, 41(11), 3386-3400. https://doi.org/10.1109/jsac.2023.3310062

Vehicle Edge Computing (VEC) is a promising paradigm that exposes Mobile Edge Computing (MEC) to road scenarios. In VEC, task offloading can enable vehicles to offload the computing tasks to nearby Roadside Units (RSUs) that deploy computing capabili... Read More about A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing.

MedOptNet: Meta-Learning Framework for Few-shot Medical Image Classification (2023)
Journal Article
Lu, L., Cui, X., Tan, Z., & Wu, Y. (online). MedOptNet: Meta-Learning Framework for Few-shot Medical Image Classification. IEEE/ACM Transactions on Computational Biology and Bioinformatics, https://doi.org/10.1109/TCBB.2023.3284846

In the medical research domain, limited data and high annotation costs have made efficient classification under few-shot conditions a popular research area. This paper proposes a meta-learning framework, termed MedOptNet, for few-shot medical image c... Read More about MedOptNet: Meta-Learning Framework for Few-shot Medical Image Classification.

A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs (2023)
Presentation / Conference Contribution
McLaren, R. A., Babaagba, K., & Tan, Z. (2022, September). A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs. Presented at The 8th International Conference on machine Learning, Optimization and Data science - LOD 2022, Certosa di Pontignano, Siena – Tuscany, Italy

As the field of malware detection continues to grow, a shift in focus is occurring from feature vectors and other common, but easily obfuscated elements to a semantics based approach. This is due to the emergence of more complex malware families that... Read More about A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs.

An omnidirectional approach to touch-based continuous authentication (2023)
Journal Article
Aaby, P., Giuffrida, M. V., Buchanan, W. J., & Tan, Z. (2023). An omnidirectional approach to touch-based continuous authentication. Computers and Security, 128, Article 103146. https://doi.org/10.1016/j.cose.2023.103146

This paper focuses on how touch interactions on smartphones can provide a continuous user authentication service through behaviour captured by a touchscreen. While efforts are made to advance touch-based behavioural authentication, researchers often... Read More about An omnidirectional approach to touch-based continuous authentication.