Skip to main content

Research Repository

Advanced Search

Outputs (35)

STIDNet: Identity-Aware Face Forgery Detection with Spatiotemporal Knowledge Distillation (2024)
Journal Article
Fang, M., Yu, L., Xie, H., Tan, Q., Tan, Z., Hussain, A., Wang, Z., Li, J., & Tian, Z. (online). STIDNet: Identity-Aware Face Forgery Detection with Spatiotemporal Knowledge Distillation. IEEE Transactions on Computational Social Systems, https://doi.org/

The impressive development of facial manipulation techniques has raised severe public concerns. Identity-aware methods, especially suitable for protecting celebrities, are seen as one of promising face forgery detection approaches with additional ref... Read More about STIDNet: Identity-Aware Face Forgery Detection with Spatiotemporal Knowledge Distillation.

A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence (2024)
Presentation / Conference Contribution
Onyeashie, B. I., Leimich, P., McKeown, S., & Russell, G. (2023, August). A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence. Presented at EAI BDTA 2023 - 13th EAI International Conference on Big Data

The effective management of digital evidence is critical to modern forensic investigations. However, traditional evidence management approaches are often prone to security and integrity issues. In recent years, the use of blockchain technology has em... Read More about A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence.

Majority Voting Ransomware Detection System (2023)
Journal Article
Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2023). Majority Voting Ransomware Detection System. Journal of Information Security, 14(4), 264-293. https://doi.org/10.4236/jis.2023.144016

Crypto-ransomware remains a significant threat to governments and companies alike, with high-profile cyber security incidents regularly making headlines. Many different detection systems have been proposed as solutions to the ever-changing dynamic la... Read More about Majority Voting Ransomware Detection System.

A Novel RFID Tag's Antenna for Mounting on Metallic Objects (2024)
Presentation / Conference Contribution
Gharbia, I., Aldelemy, A., Elmegri, F., Ismail, . A. S., Darwish, M., See, C. H., & Abd-Alhameed, R. A. (2024, May). A Novel RFID Tag's Antenna for Mounting on Metallic Objects. Presented at 14th International Conference on Electrical Engineering (ICEENG)

PHASER: Perceptual Hashing Algorithms Evaluation and Results -an Open Source Forensic Framework (2024)
Presentation / Conference Contribution
Mckeown, S., Aaby, P., & Steyven, A. PHASER: Perceptual Hashing Algorithms Evaluation and Results -an Open Source Forensic Framework. Presented at DFRWS EU 2024, Zaragoza, Spain

The automated comparison of visual content is a contemporary solution to scale the detection of illegal media and extremist material, both for detection on individual devices and in the cloud. However, the problem is difficult, and perceptual similar... Read More about PHASER: Perceptual Hashing Algorithms Evaluation and Results -an Open Source Forensic Framework.

A Probability Mapping-Based Privacy Preservation Method for Social Networks (2024)
Presentation / Conference Contribution
Li, Q., Wang, Y., Wang, F., Tan, Z., & Wang, C. (2023, November). A Probability Mapping-Based Privacy Preservation Method for Social Networks. Presented at The 3rd International Conference on Ubiquitous Security 2023 (UbiSec-2023), Exeter

The mining and analysis of social networks can bring significant economic and social benefits. However, it also poses a risk of privacy leakages. Differential privacy is a de facto standard to prevent such leaks, but it suffers from the high sensitiv... Read More about A Probability Mapping-Based Privacy Preservation Method for Social Networks.

How Much do Robots Understand Rudeness? Challenges in Human-Robot Interaction (2024)
Presentation / Conference Contribution
Orme, M., Yu, Y., & Tan, Z. (2024, May). How Much do Robots Understand Rudeness? Challenges in Human-Robot Interaction. Presented at The 2024 Joint International Conference on Computational Linguistics, Language Resources and Evaluation (LREC-COLING 2024)

This paper concerns the pressing need to understand and manage inappropriate language within the evolving human-robot interaction (HRI) landscape. As intelligent systems and robots transition from controlled laboratory settings to everyday households... Read More about How Much do Robots Understand Rudeness? Challenges in Human-Robot Interaction.

An Auditable Framework for Evidence Sharing and Management using Smart Lockers and Distributed Technologies: Law Enforcement Use Case (2024)
Presentation / Conference Contribution
Onyeashie, B., Leimich, P., McKeown, S., & Russell, G. (2023, August). An Auditable Framework for Evidence Sharing and Management using Smart Lockers and Distributed Technologies: Law Enforcement Use Case. Presented at EAI BDTA 2023 - 13th EAI Internation

This paper presents a decentralised framework for sharing and managing evidence that uses smart lockers, blockchain technology, and the InterPlanetary File System (IPFS). The system incorporates Hyperledger Fabric blockchain for immutability and tamp... Read More about An Auditable Framework for Evidence Sharing and Management using Smart Lockers and Distributed Technologies: Law Enforcement Use Case.

Minkowski Based Microwave Resonator for Material Detection over Sub-6 GHz 5G Spectrum (2023)
Presentation / Conference Contribution
Anwer, A. I., Alibakhshikenari, . M., Elwi, T., Virdee, B., Kouhalvandi, L., Abdul Hassain, Z. A., Soruri, . M., Tokan, N. T., Ojaroudi Parchin, N., See, C. H., & Livreri, P. (2023, October). Minkowski Based Microwave Resonator for Material Detection ov

This paper describes the performance of a low-cost, high-sensitive microwave resonator for 5G modern wireless communication systems operating through sub-6GHz spectrum. Here, the proposed resonator is constructed from a Minkowski fractal open stub th... Read More about Minkowski Based Microwave Resonator for Material Detection over Sub-6 GHz 5G Spectrum.

Navigating Industry 5.0: A Survey of Key Enabling Technologies, Trends, Challenges, and Opportunities (2023)
Journal Article
Tallat,, R., Hawbani, A., Wang, X., Al-Dubai, A., Zhao, L., Liu, Z., Min, G., Zomaya, A., & Alsamhi, S. (online). Navigating Industry 5.0: A Survey of Key Enabling Technologies, Trends, Challenges, and Opportunities. Communications Surveys and Tutorials,

This century has been a major avenue for revolutionary changes in technology and industry. Industries have transitioned towards intelligent automation, relying less on human intervention, resulting in the fourth industrial revolution, Industry 4.0. T... Read More about Navigating Industry 5.0: A Survey of Key Enabling Technologies, Trends, Challenges, and Opportunities.

Scalable Multi-domain Trust Infrastructures for Segmented Networks (2023)
Presentation / Conference Contribution
Grierson, S., Ghaleb, B., Buchanan, W. J., Thomson, C., Maglaras, L., & Eckl, C. (2023, November). Scalable Multi-domain Trust Infrastructures for Segmented Networks. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design

Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verifying the au... Read More about Scalable Multi-domain Trust Infrastructures for Segmented Networks.

Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices (2023)
Presentation / Conference Contribution
Spalding, A., Tan, Z., & Babaagba, K. O. (2023, November). Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices. Presented at The International Symposium on Intelligent and Trustworthy Comp

Data recovery for forensic analysis of both hard drives and solid state media presents its own unique set of challenges. Hard drives face mechanical failures and data fragmentation , but their sequential storage and higher success rates make recovery... Read More about Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices.

Self-attention is What You Need to Fool a Speaker Recognition System (2023)
Presentation / Conference Contribution
Wang, F., Song, R., Tan, Z., Li, Q., Wang, C., & Yang, Y. (2023, November). Self-attention is What You Need to Fool a Speaker Recognition System. Presented at The 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communica

Speaker Recognition Systems (SRSs) are becoming increasingly popular in various aspects of life due to advances in technology. However, these systems are vulnerable to cyber threats, particularly adversarial attacks. Traditional adversarial attack me... Read More about Self-attention is What You Need to Fool a Speaker Recognition System.

FitForensics: A Tool to Acquire Data from FIT-Compatible Wearables via the USB Mass Storage Interface (2023)
Journal Article
Perry, S., Levick, D., & Mckeown, S. (in press). FitForensics: A Tool to Acquire Data from FIT-Compatible Wearables via the USB Mass Storage Interface. Journal of Digital Forensics, Security and Law,

Wearable and fitness tracking devices are commonplace, with global shipments forecast to continue rising in the future. These devices store a wealth of personal data that is useful to the forensic examiner. However, due to device fragmentation, acqui... Read More about FitForensics: A Tool to Acquire Data from FIT-Compatible Wearables via the USB Mass Storage Interface.

Independent review – Independent advisory group on new and emerging technologies in policing: final report (2023)
Report
Aston, E. (2023). Independent review – Independent advisory group on new and emerging technologies in policing: final report. Edinburgh: Scottish Government

This report explores a rights based, transparent, evidence-based, legal, ethical and socially responsible approach to adopting emerging technologies in policing, in a manner that upholds public confidence and safety. Alongside the importance of legal... Read More about Independent review – Independent advisory group on new and emerging technologies in policing: final report.

A Novel Autonomous Time-Slotted LoRa MAC Protocol with Adaptive Frame Sizes (2023)
Presentation / Conference Contribution
Alahamadi, H., Bouabdallah, F., Al-Dubai, A., & Ghaleb, B. (2023). A Novel Autonomous Time-Slotted LoRa MAC Protocol with Adaptive Frame Sizes. In 2023 International Wireless Communications and Mobile Computing (IWCMC) (917-922). https://doi.org/10.1109/

Time-Slotted Medium Access Control protocols bring advantages to the scalability of LoRa networks as an alternative to the ALOHA access method. However, such Time-Slotted protocols require nodes synchronization and schedules dissemination under strin... Read More about A Novel Autonomous Time-Slotted LoRa MAC Protocol with Adaptive Frame Sizes.

A New Scalable Distributed Homomorphic Encryption Scheme for High Computational Complexity Models (2023)
Presentation / Conference Contribution
Almaini, A., Folz, J., Woelfl, D., Al-Dubai, A., Schramm, M., & Heigl, M. (2023). A New Scalable Distributed Homomorphic Encryption Scheme for High Computational Complexity Models. In 2023 International Wireless Communications and Mobile Computing (IWCMC

Due to the increasing privacy demand in data processing, Fully Homomorphic Encryption (FHE) has recently received growing attention for its ability to perform calculations over encrypted data. Since the data can be processed in encrypted form and the... Read More about A New Scalable Distributed Homomorphic Encryption Scheme for High Computational Complexity Models.

A Novel Federated Learning Scheme for Generative Adversarial Networks (2023)
Journal Article
Zhang, J., Zhao, L., Yu, . K., Min, G., Al-Dubai, A., & Zomya, A. (2024). A Novel Federated Learning Scheme for Generative Adversarial Networks. IEEE Transactions on Mobile Computing, 23(5), 3633-3649. https://doi.org/10.1109/tmc.2023.3278668

Generative adversarial networks (GANs) have been advancing and gaining tremendous interests from both academia and industry. With the development of wireless technologies, a huge amount of data generated at the network edge provides an unprecedented... Read More about A Novel Federated Learning Scheme for Generative Adversarial Networks.

Digital Twin Enriched Green Topology Discovery for Next Generation Core Networks (2023)
Journal Article
Duran, K., & Canberk, B. (2023). Digital Twin Enriched Green Topology Discovery for Next Generation Core Networks. IEEE Transactions on Green Communications and Networking, 7(4), 1946 - 1956. https://doi.org/10.1109/tgcn.2023.3282326

Topology discovery is the key function of core network management since it utilizes the perception of data and mapping network devices. Nevertheless, it holds operational and resource efficiency complexities. For example, traditional discovery cannot... Read More about Digital Twin Enriched Green Topology Discovery for Next Generation Core Networks.