Department of Electronics, Computing and Mathematics
Type | Department |
---|---|
Faculty | College of Science and Engineering |
Latest research outputs
Sort by Date Title
Cloud forensics and security
Franqueira, Virginia N. L., Lopes, Raul, Jones, Andrew and Storer, Tim 2017. Cloud forensics and security. SpringerOpen.Other
On Locky ransomware, Al Capone and Brexit
MacRae, John and Franqueira, Virginia N. L. 2018. On Locky ransomware, Al Capone and Brexit. in: Springer.Book chapter
Efficient service discovery in decentralized online social networks.
Yuan, Bo, Liu, Lu and Antonopoulos, Nikolaos 2017. Efficient service discovery in decentralized online social networks. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2017.04.022Journal article
A novel multilevel index model for distributed service repositories.
Xu, Zhao, Wu, Yan, Miao, Dejun and Liu, Lu 2017. A novel multilevel index model for distributed service repositories. Tsinghua Science and Technology. https://doi.org/10.23919/TST.2017.7914199Journal article
Link quality aware channel allocation for multichannel body sensor networks.
Gao, Weifeng, Zhao, Zhiwei, Min, Geyong, Cao, Yue, Duan, Hancong, Liu, Lu, Long, Yimiao and Yin, Guangqiang 2017. Link quality aware channel allocation for multichannel body sensor networks. Pervasive and Mobile Computing. https://doi.org/10.1016/j.pmcj.2017.02.004Journal article
Public auditing with privacy protection in a multi-user model of cloud-assisted body sensor networks.
Li, Song, Cui, Jie, Zhong, Hong and Liu, Lu 2017. Public auditing with privacy protection in a multi-user model of cloud-assisted body sensor networks. Sensors. https://doi.org/10.3390/s17051032Journal article
Performance formula-based optimal deployments of multilevel indices for service retrieval.
Wu, Yan, Xu, Wei, Liu, Lu and Miao, Dejun 2017. Performance formula-based optimal deployments of multilevel indices for service retrieval. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.4265Journal article
Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks.
Zhong, Hong, Huang, Bo, Cui, Jie, Xu, Yan and Liu, Lu 2017. Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks. IEEE Access. https://doi.org/10.1109/ACCESS.2017.2782672Journal article
Energy-aware composition for wireless sensor networks as a service.
Zhou, Zhangbing, Zhao, Deng, Liu, Lu and Hung, Patrick C. K. 2017. Energy-aware composition for wireless sensor networks as a service. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2017.02.050Journal article
Inequality indexes as sparsity measures applied to ventricular ectopic beats detection and its efficient hardware implementation.
Baali, Hamza, Zhai, Xiaojun, Djelouat, Hamza, Amira, Abbes and Bensaali, Faycal 2017. Inequality indexes as sparsity measures applied to ventricular ectopic beats detection and its efficient hardware implementation. IEEE Access. https://doi.org/10.1109/ACCESS.2017.2780190Journal article
A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments.
Kazim, M., Liu, Lu, Zhu, Shao Ying and Zheng, Yongjun 2018. A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2873812Journal article
Man-In-The-Middle attacks in Vehicular Ad-Hoc Networks: Evaluating the impact of attackers’ strategies.
Ahmad, F., Adnane, Asma, Franqueira, Virginia N. L., Kurugollu, Fatih and Liu, Lu 2018. Man-In-The-Middle attacks in Vehicular Ad-Hoc Networks: Evaluating the impact of attackers’ strategies. Sensors. 18 (11), p. 4040. https://doi.org/10.3390/s18114040Journal article
An investigation into the impacts of task-level behavioural heterogeneity upon energy efficiency in Cloud datacentres.
Panneerselvam, J., Liu, Lu, Lu, Yao and Antonopoulos, Nikolaos 2018. An investigation into the impacts of task-level behavioural heterogeneity upon energy efficiency in Cloud datacentres. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2017.12.064Journal article
Interest-aware content discovery in peer-to-peer social networks.
Guo, Yonghong, Liu, Lu, Wu, Yan and Hardy, J. 2018. Interest-aware content discovery in peer-to-peer social networks. ACM Transactions on Internet Technology.Journal article
An efficient indexing model for the fog layer of industrial Internet of Things.
Miao, Dejun, Liu, Lu, Xu, Rongyan, Panneerselvam, J., Wu, Yan and Xu, Wei 2018. An efficient indexing model for the fog layer of industrial Internet of Things. IEEE Transactions on Industrial Informatics. https://doi.org/10.1109/TII.2018.2799598Journal article
A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments
Liu, Lu, Zhu, Shao Ying and Kazim, M. 2018. A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2873812Journal article
An approach to optimise resource provision with energy-awareness in datacentres by combating task heterogeneity.
Liu, Lu, Antonopoulos, Nikolaos and Panneerselvam, J. 2018. An approach to optimise resource provision with energy-awareness in datacentres by combating task heterogeneity. IEEE Transactions on Emerging Topics in Computing. https://doi.org/10.1109/TETC.2018.2794328Journal article
TEAM: A trust evaluation and management framework in context-enabled vehicular ad-hoc networks.
Ahmad, F., Franqueira, Virginia N. L. and Adnane, Asma 2018. TEAM: A trust evaluation and management framework in context-enabled vehicular ad-hoc networks. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2837887Journal article
Investigation of indecent images of children cases: Challenges and suggestions collected from the trenches.
Franqueira, Virginia N. L., Bryce, Joanne, Al Mutawa, Noora and Marrington, Andrew 2017. Investigation of indecent images of children cases: Challenges and suggestions collected from the trenches. Digital Investigation. https://doi.org/10.1016/j.diin.2017.11.002Journal article
Parallel Monte Carlo search for Hough Transform.
Lopes, Raul, Franqueira, Virginia N. L., Reid, Ivan D. and Hobson, Peter 2017. Parallel Monte Carlo search for Hough Transform. Journal of Physics: Conference Series. https://doi.org/10.1088/1742-6596/898/7/072052Journal article
Ensemble of ESA/AATSR aerosol optical depth products based on the likelihood estimate method with uncertainties
Xie, Yanqing, Xue, Yong, Che, Yahui, Guang, Jie, Mei, Linlu, Voorhis, Dave, Fan, Cheng, She, Lu and Xu, Hui 2017. Ensemble of ESA/AATSR aerosol optical depth products based on the likelihood estimate method with uncertainties. IEEE Transactions on Geoscience and Remote Sensing. https://doi.org/10.1109/TGRS.2017.2757910Journal article
A cloud-based path-finding framework: Improving the performance of real-time navigation in games
Rowe, Jordan, Whitbrook, Amanda and Chen, Minsi 2017. A cloud-based path-finding framework: Improving the performance of real-time navigation in games. Association of Computing Machinery. https://doi.org/10.1145/3147234.3148097Conference item
Model building
Lowdnes, Val, Berry, Stuart, Trovati, Marcello and Whitbrook, Amanda 2017. Model building. in: Springer.Book chapter
Distributed task rescheduling with time constraints for the optimization of total task allocations in a multirobot system
Turner, Joanna, Meng, Qinggang, Schaefer, Gerald, Whitbrook, Amanda and Soltoggio, Andrea 2017. Distributed task rescheduling with time constraints for the optimization of total task allocations in a multirobot system. IEEE Transactions on Cybernetics. https://doi.org/10.1109/TCYB.2017.2743164Journal article
ECG encryption and identification based security solution on the Zynq SoC for connected health systems
Zhai, Xiaojun, Ait Si Ali, Amine, Amira, Abbes and Bensaali, Faycal 2017. ECG encryption and identification based security solution on the Zynq SoC for connected health systems. Journal of Parallel and Distributed Computing. https://doi.org/10.1016/j.jpdc.2016.12.016Journal article
Verifiable public key encryption scheme with equality test in 5G networks
Xu, Yan, Wang, Ming, Zhong, Hong, Cui, Jie, Liu, Lu and Franqueira, Virginia N. L. 2017. Verifiable public key encryption scheme with equality test in 5G networks. IEEE Access. https://doi.org/10.1109/ACCESS.2017.2716971Journal article
A robust, distributed task allocation algorithm for time-critical, multi agent systems operating in uncertain environments
Whitbrook, Amanda, Meng, Qinggang and Chung, Paul W. H. 2017. A robust, distributed task allocation algorithm for time-critical, multi agent systems operating in uncertain environments.Conference item
Reliable, distributed scheduling and rescheduling for time-critical, multiagent systems
Whitbrook, Amanda, Meng, Qinggang and Chung, Paul W. H. 2017. Reliable, distributed scheduling and rescheduling for time-critical, multiagent systems. IEEE Transactions on Automation Science and Engineering. https://doi.org/10.1109/TASE.2017.2679278Journal article
RTS: road topology-based scheme for traffic condition estimation via vehicular crowdsensing
Shao, Lu, Wang, Cheng, Liu, Lu and Jiang, Changjun 2016. RTS: road topology-based scheme for traffic condition estimation via vehicular crowdsensing. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.3778Journal article
Achieving green IT using VDI in cyber physical society
Liu, Lu, DaSilva, Don-Anthony, Antonopoulos, Nikolaos, Ding, Zhijun and Zhan, Yongzhao 2013. Achieving green IT using VDI in cyber physical society. Journal of Internet Technology.Journal article
Special issue on cyberharassment investigation: Advances and trends
Bryce, Joanne, Franqueira, Virginia N. L. and Marrington, Andrew 2016. Special issue on cyberharassment investigation: Advances and trends. Journal of Digital Forensics, Security and Law (JDFSL).Journal article
Faith in vehicles: A set of evaluation criteria for trust management in vehicular ad-hoc network
Ahmad, F., Hall, Jordan, Adnane, Asma and Franqueira, Virginia N. L. 2017. Faith in vehicles: A set of evaluation criteria for trust management in vehicular ad-hoc network. IEEE.Conference item
Internet-of-Things-based smart cities: Recent advances and challenges.
Mehmood, Yasir, Ahmad, F., Yaqoob, Ibrar, Adnane, Asma, Imran, Muhammad and Guizani, Sghaier 2017. Internet-of-Things-based smart cities: Recent advances and challenges. IEEE Communications Magazine. https://doi.org/10.1109/MCOM.2017.1600514Journal article
Event detection and user interest discovering in social media data streams
Shi, Lei-lei, Liu, Lu, Wu, Yan, Jiang, Liang and Hardy, J. 2017. Event detection and user interest discovering in social media data streams. IEEE Access. https://doi.org/10.1109/ACCESS.2017.2675839Journal article
Collaborative actuation of wireless sensor and actuator networks for the agriculture industry.
Bai, Xingzhen, Liu, Lu, Cao, Maoyong, Panneerselvam, J., Sun, Qiao and Wang, Haixia 2017. Collaborative actuation of wireless sensor and actuator networks for the agriculture industry. IEEE Access. https://doi.org/10.1109/ACCESS.2017.2725342Journal article
InOt-RePCoN: Forecasting user behavioural trend in large-scale cloud environments.
Panneerselvam, J., Liu, Lu and Antonopoulos, Nikolaos 2017. InOt-RePCoN: Forecasting user behavioural trend in large-scale cloud environments. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2017.05.022Journal article
Mobilouds: An energy efficient MCC collaborative framework with extended mobile participation for next generation networks
Panneerselvam, J., Hardy, J., Liu, Lu, Yuan, Bo and Antonopoulos, Nikolaos 2017. Mobilouds: An energy efficient MCC collaborative framework with extended mobile participation for next generation networks. IEEE Access. https://doi.org/10.1109/ACCESS.2016.2602321Journal article
Guide to security assurance for cloud computing
Zhu, Shao Ying, Hill, Richard and Trovati, Marcello 2015. Guide to security assurance for cloud computing. Springer.Book
Big-Data analytics and cloud computing: Theory, algorithms and applications
Hill, Richard, Trovati, Marcello, Liu, Lu, Anjum, Ashiq and Zhu, Shao Ying 2015. Big-Data analytics and cloud computing: Theory, algorithms and applications. Springer.Book
Analysis of HEp-2 images using MD-LBP and MAD-bagging
Schaefer, Gerald, Doshi, Niraj P., Zhu, Shao Ying and Hu, Qinghua 2014. Analysis of HEp-2 images using MD-LBP and MAD-bagging. IEEE. https://doi.org/10.1109/EMBC.2014.6944562Conference item
10818
total views3364
total downloads218
views this month127
downloads this month