Skip to main content

Research Repository

Advanced Search

Outputs (13)

Machine Un-learning: An Overview of Techniques, Applications, and Future Directions (2023)
Journal Article
Sai, S., Mittal, U., Chamola, V., Huang, K., Spinelli, I., Scardapane, S., Tan, Z., & Hussain, A. (2024). Machine Un-learning: An Overview of Techniques, Applications, and Future Directions. Cognitive Computation, 16, 482-506. https://doi.org/10.1007/s12559-023-10219-3

ML applications proliferate across various sectors. Large internet firms employ ML to train intelligent models using vast datasets, including sensitive user information. However, new regulations like GDPR require data removal by businesses. Deleting... Read More about Machine Un-learning: An Overview of Techniques, Applications, and Future Directions.

Navigating Industry 5.0: A Survey of Key Enabling Technologies, Trends, Challenges, and Opportunities (2023)
Journal Article
Tallat,, R., Hawbani, A., Wang, X., Al-Dubai, A., Zhao, L., Liu, Z., Min, G., Zomaya, A., & Alsamhi, S. (2024). Navigating Industry 5.0: A Survey of Key Enabling Technologies, Trends, Challenges, and Opportunities. Communications Surveys and Tutorials, IEEE Communications Society, 26(2), 1080 - 1126. https://doi.org/10.1109/comst.2023.3329472

This century has been a major avenue for revolutionary changes in technology and industry. Industries have transitioned towards intelligent automation, relying less on human intervention, resulting in the fourth industrial revolution, Industry 4.0. T... Read More about Navigating Industry 5.0: A Survey of Key Enabling Technologies, Trends, Challenges, and Opportunities.

Rapidrift: Elementary Techniques to Improve Machine Learning-Based Malware Detection (2023)
Journal Article
Manikandaraja, A., Aaby, P., & Pitropakis, N. (2023). Rapidrift: Elementary Techniques to Improve Machine Learning-Based Malware Detection. Computers, 12(10), Article 195. https://doi.org/10.3390/computers12100195

Artificial intelligence and machine learning have become a necessary part of modern living along with the increased adoption of new computational devices. Because machine learning and artificial intelligence can detect malware better than traditional... Read More about Rapidrift: Elementary Techniques to Improve Machine Learning-Based Malware Detection.

A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing (2023)
Journal Article
Zhao, L., Zhao, Z., Zhang, E., Hawbani, A., Al-Dubai, A., Tan, Z., & Hussain, A. (2023). A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing. IEEE Journal on Selected Areas in Communications, 41(11), 3386-3400. https://doi.org/10.1109/jsac.2023.3310062

Vehicle Edge Computing (VEC) is a promising paradigm that exposes Mobile Edge Computing (MEC) to road scenarios. In VEC, task offloading can enable vehicles to offload the computing tasks to nearby Roadside Units (RSUs) that deploy computing capabili... Read More about A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing.

Reliable and Scalable Routing Under Hybrid SDVN Architecture: A Graph Learning Based Method (2023)
Journal Article
Li, Z., Zhao, L., Min, G., Al-Dubai, A. Y., Hawbani, A., Zomaya, A. Y., & Luo, C. (2023). Reliable and Scalable Routing Under Hybrid SDVN Architecture: A Graph Learning Based Method. IEEE Transactions on Intelligent Transportation Systems, 24(12), 14022 - 14036. https://doi.org/10.1109/tits.2023.3300082

Greedy routing efficiently achieves routing solutions for vehicular networks due to its simplicity and reliability. However, the existing greedy routing schemes have mainly considered simple routing metrics only, e.g., distance based on the local vie... Read More about Reliable and Scalable Routing Under Hybrid SDVN Architecture: A Graph Learning Based Method.

A Transcriptomic Appreciation of Childhood Meningococcal and Polymicrobial Sepsis from a Pro-Inflammatory and Trajectorial Perspective, a Role for Vascular Endothelial Growth Factor A and B Modulation? (2023)
Journal Article
Rashid, A., Brusletto, B. S., Al-Obeidat, F., Toufiq, M., Benakatti, G., Brierley, J., Malik, Z. A., Hussain, Z., Alkhazaimi, H., Sharief, J., Kadwa, R., Sarpal, A., Chaussabel, D., Malik, R. A., Quraishi, N., Khilnani, P., Zaki, S. A., Nadeem, R., Shaikh, G., Al-Dubai, A., …Hussain, A. (2023). A Transcriptomic Appreciation of Childhood Meningococcal and Polymicrobial Sepsis from a Pro-Inflammatory and Trajectorial Perspective, a Role for Vascular Endothelial Growth Factor A and B Modulation?. Shock, 60(4), 503-516. https://doi.org/10.1097/shk.0000000000002192

This study investigated the temporal dynamics of childhood sepsis by analyzing gene expression changes associated with proinflammatory processes. Five datasets, including four meningococcal sepsis shock (MSS) datasets (two temporal and two longitudin... Read More about A Transcriptomic Appreciation of Childhood Meningococcal and Polymicrobial Sepsis from a Pro-Inflammatory and Trajectorial Perspective, a Role for Vascular Endothelial Growth Factor A and B Modulation?.

ESPP: Efficient Sector-based Charging Scheduling and Path Planning for WRSNs with Hexagonal Topology (2023)
Journal Article
Naji, A., Hawbani, A., Wang, X., Al-Gunid, H. M., Al-Dhabi, Y., Al-Dubai, A., Hussain, A., Zhao, L., & Alsamhi, S. H. (2024). ESPP: Efficient Sector-based Charging Scheduling and Path Planning for WRSNs with Hexagonal Topology. IEEE Transactions on Sustainable Computing, 9(1), 31 - 45. https://doi.org/10.1109/tsusc.2023.3296607

Wireless Power Transfer (WPT) is a promising technology that can potentially mitigate the energy provisioning problem for sensor networks. In order to efficiently replenish energy for these battery-powered devices, designing appropriate scheduling an... Read More about ESPP: Efficient Sector-based Charging Scheduling and Path Planning for WRSNs with Hexagonal Topology.

MESON: A Mobility-aware Dependent Task Offloading Scheme for Urban Vehicular Edge Computing (2023)
Journal Article
Zhao, L., Zhang, E., Wan, S., Hawbani, A., Al-Dubai, A. Y., Min, G., & Zomaya, A. Y. (2024). MESON: A Mobility-aware Dependent Task Offloading Scheme for Urban Vehicular Edge Computing. IEEE Transactions on Mobile Computing, 23(5), 4259 - 4272. https://doi.org/10.1109/tmc.2023.3289611

Vehicular Edge Computing (VEC) is the transportation version of Mobile Edge Computing (MEC) in road scenarios. One key technology of VEC is task offloading, which allows vehicles to send their computation tasks to the surrounding Roadside Units (RSUs... Read More about MESON: A Mobility-aware Dependent Task Offloading Scheme for Urban Vehicular Edge Computing.

MedOptNet: Meta-Learning Framework for Few-shot Medical Image Classification (2023)
Journal Article
Lu, L., Cui, X., Tan, Z., & Wu, Y. (2024). MedOptNet: Meta-Learning Framework for Few-shot Medical Image Classification. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 21(4), 725-736. https://doi.org/10.1109/TCBB.2023.3284846

In the medical research domain, limited data and high annotation costs have made efficient classification under few-shot conditions a popular research area. This paper proposes a meta-learning framework, termed MedOptNet, for few-shot medical image c... Read More about MedOptNet: Meta-Learning Framework for Few-shot Medical Image Classification.

Hamming Distributions of Popular Perceptual Hashing Techniques (2023)
Journal Article
McKeown, S., & Buchanan, W. J. (2023). Hamming Distributions of Popular Perceptual Hashing Techniques. Forensic Science International: Digital Investigation, 44(Supplement), Article 301509. https://doi.org/10.1016/j.fsidi.2023.301509

Content-based file matching has been widely deployed for decades, largely for the detection of sources of copyright infringement, extremist materials, and abusive sexual media. Perceptual hashes, such as Microsoft's PhotoDNA, are one automated mechan... Read More about Hamming Distributions of Popular Perceptual Hashing Techniques.

An omnidirectional approach to touch-based continuous authentication (2023)
Journal Article
Aaby, P., Giuffrida, M. V., Buchanan, W. J., & Tan, Z. (2023). An omnidirectional approach to touch-based continuous authentication. Computers and Security, 128, Article 103146. https://doi.org/10.1016/j.cose.2023.103146

This paper focuses on how touch interactions on smartphones can provide a continuous user authentication service through behaviour captured by a touchscreen. While efforts are made to advance touch-based behavioural authentication, researchers often... Read More about An omnidirectional approach to touch-based continuous authentication.

Preserving Differential Privacy in Deep Learning Based on Feature Relevance Region Segmentation (2023)
Journal Article
Wang, F., Xie, M., Tan, Z., Li, Q., & Wang, C. (2024). Preserving Differential Privacy in Deep Learning Based on Feature Relevance Region Segmentation. IEEE Transactions on Emerging Topics in Computing, 12(1), 307 - 315. https://doi.org/10.1109/TETC.2023.3244174

In the era of big data, deep learning techniques provide intelligent solutions for various problems in real-life scenarios. However, deep neural networks depend on large-scale datasets including sensitive data, which causes the potential risk of priv... Read More about Preserving Differential Privacy in Deep Learning Based on Feature Relevance Region Segmentation.

Towards The Creation Of The Future Fish Farm (2023)
Journal Article
Papadopoulos, P., Buchanan, W. J., Sayeed, S., & Pitropakis, N. (2023). Towards The Creation Of The Future Fish Farm. Journal of Surveillance, Security and Safety, 4, 1-3. https://doi.org/10.20517/jsss.2022.16

Aim: A fish farm is an area where fish raise and bred for food. Fish farm environments support the care and management of seafood within a controlled environment. Over the past few decades, there has been a remarkable increase in the calorie intake o... Read More about Towards The Creation Of The Future Fish Farm.