Skip to main content

Research Repository

Advanced Search

Outputs (682)

Preserving Differential Privacy in Deep Learning Based on Feature Relevance Region Segmentation (2023)
Journal Article
Wang, F., Xie, M., Tan, Z., Li, Q., & Wang, C. (2024). Preserving Differential Privacy in Deep Learning Based on Feature Relevance Region Segmentation. IEEE Transactions on Emerging Topics in Computing, 12(1), 307 - 315. https://doi.org/10.1109/TETC.2023.3244174

In the era of big data, deep learning techniques provide intelligent solutions for various problems in real-life scenarios. However, deep neural networks depend on large-scale datasets including sensitive data, which causes the potential risk of priv... Read More about Preserving Differential Privacy in Deep Learning Based on Feature Relevance Region Segmentation.

Uzytkowanie Komputerow. (2004)
Book
Buchanan, W. J. (2004). Uzytkowanie Komputerow. Wkt (Poland)

Przyst?pny i praktyczny poradnik dotycz?cy u?ytkowania komputerów, obejmuj?cy szeroki zakres zagadnie? zwi?zanych z przetwarzaniem informacji i transmisj? danych oraz ich kompresj?, przechowywaniem, szyfrowaniem i bezpiecze?stwem, zawieraj?cy tak?e o... Read More about Uzytkowanie Komputerow..

Covert channel analysis and detection using reverse proxy servers. (2004)
Presentation / Conference Contribution
Buchanan, W. J., & Llamas, D. (2004, June). Covert channel analysis and detection using reverse proxy servers. Paper presented at 3rd International Conference on Electronic Warfare and Security (EIWC)

Data hiding methods can be used by intruders to communicate over open data channels (Wolf 1989; McHugh 1995; deVivo, deVivo et al. 1999), and can be used to overcome firewalls, and most other forms of network intrusion detection systems. In fact, mos... Read More about Covert channel analysis and detection using reverse proxy servers..

Component-based network test tools platform for network design and maintenance (2003)
Thesis
Golam, H. (2003). Component-based network test tools platform for network design and maintenance. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4066

Tools development for testing real time systems rely heavily on frameworks that are capable of delivering the advantages of precise control, the availability of a range of functions and the availability of standardised and reusable components. The ad... Read More about Component-based network test tools platform for network design and maintenance.

A new scalable broadcast algorithm for multiport meshes with minimum communication steps (2003)
Journal Article
Ould-Khaoua, M., Al-Dubai, A., Al-Dubai, A., & Ould-Khaoua, M. (2003). A new scalable broadcast algorithm for multiport meshes with minimum communication steps. Microprocessors and Microsystems, 27(3), 101-113. https://doi.org/10.1016/s0141-9331%2802%2900094-7

Many broadcast algorithms have been proposed for the mesh in the literature. However, most of these algorithms do not exhibit good scalability properties as the network size increases. As a consequence, most existing broadcast algorithms cannot suppo... Read More about A new scalable broadcast algorithm for multiport meshes with minimum communication steps.

Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks. (2003)
Presentation / Conference Contribution
Migas, N., Buchanan, W. J., & McArtney, K. (2003, April). Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks

Wireless networks and the usage of mobile devices are becoming popular in recent days, especially in creating ad-hoc networks. There is thus scope for developing mobile systems, where devices take an active part of creating a network infrastructure,... Read More about Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks..

Normalisation of gait data in children (2002)
Journal Article
Stansfield, B., Hillman, S., Hazlewood, M., Lawson, A., Mann, A., Loudon, I., & Robb, J. (2003). Normalisation of gait data in children. Gait and Posture, 17(1), 81-87. https://doi.org/10.1016/s0966-6362%2802%2900062-0

The comparative effect of semi-dimensional (SD) and non-dimensional (ND) normalisation on the results of a longitudinal study of gait in 5–12-year old children was investigated. The use of both height and leg length in the normalisation was examined.... Read More about Normalisation of gait data in children.

An efficient path-based multicast algorithm for mesh networks (2003)
Presentation / Conference Contribution
Mackenzie, L., Ould-Khaoua, M., Al-Dubai, Y., Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2003, April). An efficient path-based multicast algorithm for mesh networks. Presented at International Parallel and Distributed Processing Symposium, Nice, France

This paper presents a new multicast path-based algorithm, referred to here as the qualified groups (QG for short), which can achieve a high degree of parallelism and low communication latency over a wide range of traffic loads in the mesh. The QG alg... Read More about An efficient path-based multicast algorithm for mesh networks.

A novel flow-vector generation approach for malicious traffic detection (2022)
Journal Article
Hou, J., Liu, F., Lu, H., Tan, Z., Zhuang, X., & Tian, Z. (2022). A novel flow-vector generation approach for malicious traffic detection. Journal of Parallel and Distributed Computing, 169, 72-86. https://doi.org/10.1016/j.jpdc.2022.06.004

Malicious traffic detection is one of the most important parts of cyber security. The approaches of using the flow as the detection object are recognized as effective. Benefiting from the development of deep learning techniques, raw traffic can be di... Read More about A novel flow-vector generation approach for malicious traffic detection.

An agent-based Bayesian method for network intrusion detection. (2003)
Thesis
Pikoulas, J. (2003). An agent-based Bayesian method for network intrusion detection. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4057

Security is one of the major issues in any network and on the Internet. It encapsulates many different areas, such as protecting individual users against intruders, protecting corporate systems against damage, and protecting data from intrusion. It i... Read More about An agent-based Bayesian method for network intrusion detection..

A Novel Nomad Migration-Inspired Algorithm for Global Optimization (2022)
Journal Article
Lin, N., Fu, L., Zhao, L., Hawbani, A., Tan, Z., Al-Dubai, A., & Min, G. (2022). A Novel Nomad Migration-Inspired Algorithm for Global Optimization. Computers and Electrical Engineering, 100, Article 107862. https://doi.org/10.1016/j.compeleceng.2022.107862

Nature-inspired computing (NIC) has been widely studied for many optimization scenarios. However, miscellaneous solution space of real-world problem causes it is challenging to guarantee the global optimum. Besides, cumbersome structure and complex p... Read More about A Novel Nomad Migration-Inspired Algorithm for Global Optimization.

Towards a scalable broadcast in wormhole-switched mesh networks (2002)
Presentation / Conference Contribution
Al-Dubai, A. Y., Ould-Khaoua, M., & Mackenzie, L. M. (2002). Towards a scalable broadcast in wormhole-switched mesh networks. In Proceedings of the 2002 ACM symposium on Applied computing (840-844). https://doi.org/10.1145/508791.508955

Broadcast algorithms for wormhole--switched meshes have been widely reported in the literature. However, most of these algorithms handle broadcast in a sequential manner and do not scale well with the network size. As a consequence, many parallel ap... Read More about Towards a scalable broadcast in wormhole-switched mesh networks.

A scalable broadcast algorithm for multiport meshes with minimum communication steps (2003)
Presentation / Conference Contribution
Al-Dubai, A., & Ould-Khaoua, M. (2002, December). A scalable broadcast algorithm for multiport meshes with minimum communication steps. Presented at Ninth International Conference on Parallel and Distributed Systems, 2002. Proceedings., Taiwan, China

Many broadcast algorithms have been proposed for the mesh over the past decade. However, most of these algorithms do not exhibit good scalability properties as the network size increases. As a consequence, most existing broadcast algorithms cannot su... Read More about A scalable broadcast algorithm for multiport meshes with minimum communication steps.

Mastering Computing. (2002)
Book
Buchanan, W. J. (2002). Mastering Computing. Macmillan Press

Computing is an area which continues to grow. This book covers the main areas of computing, including programming, computer hardware, operating systems, the Internet, data communications and networking. It uses practical examples to show basic concep... Read More about Mastering Computing..

Mastering Delphi programming. (2002)
Book
Buchanan, W. J. (2002). Mastering Delphi programming. Palgrave Publishers

This book provides an introduction to the use of Delphi Version 3/4 in developing programs, full of real-life applications including serial communications, internet programming and system interfacing. The book also contains tutorial questions, many w... Read More about Mastering Delphi programming..