Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    Multimedia Transmission Over Powerline Channels Using Space Time Diversity Technics

    Zarimpas, V., Lopez Giovaneli, C. & Honary, B., 04/2004, 8th International Symposium on Power-Line Communications and its Applications (ISPLC 2004). p. 312-317 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  2. Published

    New multiplexer for future wireless communication channels

    Zarimpas, V., Honary, B. & Martin, I., 06/2003, 3G Mobile Communication Technologies, 2003. 3G 2003. 4th International Conference on (Conf. Publ. No. 494). IEEE, p. 333–337 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  3. Published

    UWB propagation channel experimental measurement and analysis

    Zeng, Y., Memari, B., Biggs, M., Harding, C. & Honary, B., 09/2009, Ultra-Wideband, 2009. ICUWB 2009. IEEE International Conference on. Vancouver: IEEE, p. 245-250 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  4. Published

    Sender-adaptive and receiver-driven layered multicast for scalable video over the Internet

    Zhang, Q., Guo, Q., Ni, Q., Zhu, W. & Zhang, Y-Q., 04/2005, In : IEEE Transactions on Circuits and Systems for Video Technology. 15, 4, p. 482-495 14 p.

    Research output: Contribution to journalJournal article

  5. Published

    A new partial transmit sequence scheme using genetic algorithm for peak-to-average power ratio reduction in a multi-carrier code division multiple access wireless system

    Zhang, Y., Ni, Q. & Chen, H. H., 2009, In : International Journal of Autonomous and Adaptive Communications Systems. 2, 1, p. 40-57 18 p.

    Research output: Contribution to journalJournal article

  6. Published

    An intelligent genetic algorithm for PAPR reduction in a multi-carrier CDMA wireless system

    Zhang, Y., Ni, Q., Chen, H. H. & Song, Y., 2008, Wireless Communications and Mobile Computing Conference, 2008. IWCMC'08. International. IEEE, p. 1052-1057 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  7. Published

    Advances in base- and mobile-station aided cooperative wireless communications: an overview

    Zhang, R., Wang, L., Parr, G., Aliu, O. G., Awoseyila, B., Azarmi, N., Bhatti, S., Bodanese, E., Chen, H., Dianati, M., Dutta, A., Fitch, M., Giridhar, K., Hailes, S., Hari, K. V. S., Imran, M. A., Jagannatham, AK., Karandikar, A., Kawade, S., Ali Khan, M. Z. & 14 others, Kompalli, S. C., Langdon, P., Narayanan, B., Mauthe, A., McGeehan, J., Mehta, N., Millet, K., Moessner, K., Rajashekar, R., Ramkumar, B., Ribeiro, V., Vasudevan, K., Hanzo, L. & Bigham, J., 1/03/2013, In : IEEE Vehicular Technology Magazine. 8, 1, p. 57-69 13 p.

    Research output: Contribution to journalJournal article

  8. Published

    SBVLC: Secure Barcode-based Visible Light Communication for Smartphones

    Zhang, B., Ren, K., Xing, G., Fu, X. & Wang, C., 1/02/2016, In : IEEE Transactions on Mobile Computing. 15, 2, p. 432-446 15 p.

    Research output: Contribution to journalJournal article

  9. Published

    Look together: using gaze for assisting co-located collaborative search

    Zhang, Y., Pfeuffer, K., Chong, M. K., Alexander, J. M., Bulling, A. & Gellersen, H-W. G., 02/2017, In : Personal and Ubiquitous Computing. 21, 1, p. 173-186 14 p.

    Research output: Contribution to journalJournal article

  10. Published

    Brief announcement: statement voting and liquid democracy

    Zhang, B. & Zhou, H., 25/07/2017, PODC '17 Proceedings of the ACM Symposium on Principles of Distributed Computing. New York: ACM, p. 359-361 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  11. E-pub ahead of print

    A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence

    Zhang, B., Oliynykov, R. & Balogun, H., 2018, p. 1-34, 34 p.

    Research output: Working paper

  12. Published

    Design and Analysis of Secure Quantum Network System with Trusted Repeaters

    Zhang, Y. & Ni, Q., 16/08/2018, IEEE/CIC International Conference on Communications in China (ICCC). IEEE/CIC, p. 511-514 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  13. Published

    Quantum Key Distribution Random Access Network

    Zhang, Y. & Ni, Q., 16/08/2018, IEEE/CIC International Conference on Communications in China (ICCC). IEEE/CIC, p. 174-178 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  14. Published

    A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence

    Zhang, B., Oliynykov, R. & Balogun, H., 25/02/2019. 15 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  15. Published

    On the sustainability of blockchain funding

    Zhang, B. & Balogun, H., 20/11/2018, 2018 IEEE International Conference on Data Mining Workshops (ICDMW). IEEE, p. 89-96 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  16. Published

    Defending Adversarial Attacks on Cloud-aided Automatic Speech Recognition Systems

    Zhang, J., Zhang, B. & Zhang, B., 2/07/2019, SCC '19 Proceedings of the Seventh International Workshop on Security in Cloud Computing. New York: ACM, p. 23-31 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  17. Published

    Recessive Social Networking: Preventing Privacy Leakage against Reverse Image Search

    Zhang, J., Zhang, B. & Lin, J., 19/08/2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, p. 211-219 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  18. Published

    SENTRY: A novel approach for mitigating application layer DDoS threats

    Zhang, H., Taha, A., Trapero, R., Luna, J. & Suri, N., 23/08/2016, 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, p. 465-472 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  19. Published

    DeQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services

    Zhang, H., Trapero, R., Luna, J., Suri, N., X., L. & U., B., 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 27-34 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  20. Published

    Flashlight: A novel monitoring path identification schema for securing cloud services

    Zhang, H., Luna, J., Suri, N. & Trapero, R., 27/08/2018, ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security. ACM, 10 p. 5

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  21. Published

    Monitoring path discovery for supporting indirect monitoring of cloud services

    Zhang, H., Manzoor, S., Suri, N., J., L., A., C., T., G. & Y., C., 17/04/2018, 2018 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 274-277 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  22. Published

    Whetstone: Reliable monitoring of cloud services

    Zhang, H., Luna, J., Trapero, R. & Suri, N., 18/06/2018, 2018 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, p. 115-122 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  23. Published

    A Predictive Controler for Object Tracking of a Mobile Robot

    Zhou, X., Angelov, P. & Wang, C., 11/05/2008, p. 73-82. 10 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  24. Published

    Real-Time joint Landmark Recognition and Classifier Generation by an Evolving Fuzzy System.

    Zhou, X. & Angelov, P., 17/07/2006. 1205 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  25. Published

    An Approach to Autonomous Self-localization of a Mobile Robot in Completely Unknown Environment using Evolving Fuzzy Rule-based Classifier

    Zhou, X. & Angelov, P., 2/04/2007, Computational Intelligence in Security and Defense Applications, 2007. CISDA 2007. IEEE Symposium on. IEEE, p. 131-138 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  26. Published

    Novelty detection and landmark recognition by real-time evolving clustering

    Zhou, X., Angelov, P. & Morris, G., 5/09/2005, The 5th annual UK Workshop on Computational Intelligence, London, Sept 5-7 2005. Mirkin, B. & Magoulas, G. (eds.). p. 155-161 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  27. Published

    P2P Streaming using Multiple Description Coded Video

    Zink, M. & Mauthe, A., 2004, EUROMICRO '04: Proceedings of the 30th EUROMICRO Conference. Washington, DC, USA: IEEE Computer Society, p. 240-247 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  28. Published

    Polishing: A Technique to Reduce Variations in Cached Layer-Encoded Video

    Zink, M., Heckmann, O., Schmitt, J., Mauthe, A. & Steinmetz, R., 2003, EUROMICRO '03: Proceedings of the 29th Conference on EUROMICRO. Washington, DC, USA: IEEE Computer Society, p. 249-254 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

Previous 1...16 17 18 19 20 Next

Back to top