Home > Research > Security Lancaster (Academic Centre of Excellence) > Publications & Outputs
View graph of relations

Security Lancaster (Academic Centre of Excellence)

  1. Published

    Characterising Electronic Document Use, Reuse, Coverage and Multi-Document Interaction

    Alexander, J. & Cockburn, A., 2008, NZCSRSC '08: New Zealand Computer Science Research Student Conference 2008. p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    Characterising and exploiting workloads of highly interactive video-on-demand

    Brampton, A., MacQuire, A., Fry, M., Rai, I., Race, N. J. P. & Mathy, L., 1/02/2009, In: Multimedia Systems. 15, 1, p. 3-17 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Certification of Forensic Anthropology Practice in the United Kingdom and the Development of a Discipline Code of Practice

    Hackman, L., Black, S., Nic Daeid, N. & Davies, C., 08/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  4. Published

    Ceremonies for end-to-end verifiable elections

    Kiayias, A., Zacharias, T. & Zhang, B., 03/2017, PKC 2017: Public-Key Cryptography – PKC 2017 : 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II Editors (view affiliations). Springer, p. 305-334 30 p. (Lecture Notes in Computer Science; vol. 10175).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Capacity issues in meshed high data rate WPANs

    Mahmud, S. A., Khan, S., Ni, Q. & Al-Raweshidy, H. S., 2008, Advanced Information Networking and Applications - Workshops, 2008. AINAW 2008. 22nd International Conference on. New York: IEEE, p. 1285-1290 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Capacity analysis of reservation-based random access for broadband wireless access networks

    Vinel, A., Ni, Q., Staehle, D. & Turlikov, A., 02/2009, In: IEEE Journal on Selected Areas in Communications. 27, 2, p. 172-181 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Can you detect early dementia from an email? A proof of principle study of daily computer use to detect cognitive and functional decline

    Stringer, G., Couth, S., Brown, L. J. E., Montaldi, D., Gledson, A., Mellor, J., Sutcliffe, A., Sawyer, P., Keane, J., Bull, C., Zeng, X., Rayson, P. & Leroi, I., 07/2018, In: International Journal of Geriatric Psychiatry. 33, 7, p. 867-874 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Can programming frameworks bring smartphones into the mainstream of psychological science?

    Piwek, L., Ellis, D. A. & Andrews, S., 23/08/2016, In: Frontiers in Psychology. 7, 6 p., 1252.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    CacheCast: Eliminating Redundant Link Traffic for Single Source Multiple Destination Transfers

    Srebrny, P., Plagemann, T., Goebel, V. & Mauthe, A., 2010, ICDCS '10: Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems. Washington, DC, USA: IEEE Computer Society, p. 209-220 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Cache as a service: leveraging SDN to efficiently and transparently support Video-on-Demand on the last mile

    Georgopoulos, P., Broadbent, M., Plattner, B. & Race, N., 08/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  11. Published

    Cache as a service: leveraging SDN to efficiently and transparently support Video-on-Demand on the last mile

    Georgopoulos, P., Broadbent, M., Plattner, B. & Race, N., 2014, 23rd International Conference on Computer Communications and Networks (ICCCN 2014). IEEE, p. 1-9 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    BurstProbe: Debugging Time-Critical Data Delivery in Wireless Sensor Networks

    Brown, J., McCarthy, B., Roedig, U., Voigt, T. & Sreenan, C. J., 2011, Proceedings of the 8th European conference on Wireless Sensor Networks (EWSN'11). Marrón, P. J. & Whitehouse, K. (eds.). Springer, Vol. 6567. p. 195-210 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    Building a Spanish lexicon for corpus analysis

    Jiménez, R.-M., Sanjurjo-González, H., Rayson, P. E. & Piao, S. S., 4/05/2017, Languages at the Crossroads: Training, Accreditation and Context of Use : 35th Edition of the International Conference of the Spanish Association of Applied Linguistics. Jaén: Universidad de Jaén, p. 227-236 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    British Muslims: Sectarian Movements

    Knott, K., 26/03/2018, Lancaster : Centre for Research and Evidence on Security Threats.

    Research output: Other contribution

  15. Published

    British Muslims: Mosques

    Knott, K., 26/03/2018, Lancaster : Centre for Research and Evidence on Security Threats.

    Research output: Other contribution

  16. Published

    British Muslims: Gender and Generations

    Knott, K., 26/03/2018, Lancaster : Centre for Research and Evidence on Security Threats.

    Research output: Other contribution

  17. Published

    British Muslims: Families and Family Life

    Knott, K., 26/03/2018, Lancaster : Centre for Research and Evidence on Security Threats.

    Research output: Other contribution

  18. Published

    British Muslims: Demography and Communities

    Knott, K., 26/03/2018, Lancaster : Centre for Research and Evidence on Security Threats.

    Research output: Other contribution

  19. Published

    British Muslims: Charities and Organisations

    Knott, K., 26/03/2018, Lancaster : Centre for Research and Evidence on Security Threats.

    Research output: Other contribution

  20. Published

    British Muslims: A History

    Knott, K., 26/03/2018, Lancaster : Centre for Research and Evidence on Security Threats.

    Research output: Other contribution

  21. Published

    Bringing replication and reproduction together with generalisability in NLP: Three reproduction studies for Target Dependent Sentiment Analysis

    Moore, A. & Rayson, P. E., 20/08/2018, Proceedings of the 27th International Conference on Computational Linguistics. Santa Fe, New Mexico, USA: Association for Computational Linguistics, p. 1132-1134 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Brief announcement: statement voting and liquid democracy

    Zhang, B. & Zhou, H.-S., 25/07/2017, PODC '17 Proceedings of the ACM Symposium on Principles of Distributed Computing. New York: ACM, p. 359-361 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Body recovery from hostile environments: A test of three kits

    Thomson, G. S. & Black, S. M., 2012, In: Forensic Science International. 220, 1-3, p. 147-153 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    Body modification

    Thompson, T. & Black, S., 2007, Forensic human identification. Thompson, T. & Black, S. (eds.). Boca Raton: CRC Press, p. 379-399 21 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  25. Published

    Body farms

    Black, S., 1/12/2017, In: Forensic Science, Medicine and Pathology. 13, 4, p. 475-476 2 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Blueshifts of the emission energy in type-II quantum dot and quantum ring nanostructures

    Hodgson, P. D., Young, R. J., Kamarudin, M. A., Carrington, P. J., Krier, A., Zhuang, Q. D., Smakman, E. P., Koenraad, P. M. & Hayne, M., 21/08/2013, In: Journal of Applied Physics. 114, 7, 7 p., 073519.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    Biphoton interference with a quantum dot source of entangled light

    Hudson, A. J., Stevenson, R. M., Young, R. J., Atkinson, P., Cooper, K., Ritchie, D. A. & Shields, A. J., 04/2008, In: Physica E: Low-dimensional Systems and Nanostructures. 40, 6, p. 1888-1890 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    Biphoton interference with a quantum dot entangled light source

    Stevenson, R. M., Hudson, A. J., Young, R. J., Atkinson, P., Cooper, K., Ritchie, D. A. & Shields, A. J., 14/05/2007, In: Optics Express. 15, 10, p. 6507-6512 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  29. Published

    Biphoton interference and coherence of a quantum dot source of entangled photons

    Young, R., 15/11/2011.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  30. Published

    Biometrics within the SuperIdentity project: A new approach to spanning multiple identity domains

    Guest, R., Miguel-Hurtado, O., Stevenage, S. V., Neil, G. J. & Black, S., 15/12/2014, 2014 International Carnahan Conference on Security Technology (ICCST). Institute of Electrical and Electronics Engineers Inc., p. 152-157 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    Big data oriented novel background subtraction algorithm for urban surveillance systems

    Hu, L., Ni, Q. & Yuan, F., 06/2018, In: Big Data Mining and Analytics. 1, 2, p. 137-145 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. Published

    BGPStream: A software framework for live and historical BGP data analysis

    Orsini, C., King, A., Giordano, D., Giotsas, V. & Dainotti, A., 14/11/2016, IMC '16 Proceedings of the 2016 Internet Measurement Conference. New York: Association for Computing Machinery, Inc, p. 429-444 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    Beyond content delivery: can ICNs help emergency scenarios?

    Tyson, G., Bodanese, E., Bigham, J. & Mauthe, A., 05/2014, In: IEEE Network. 28, 3, p. 44-49 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  34. Published

    Bell-Inequality Violation with a Triggered Photon-Pair Source

    Young, R. J., Stevenson, R. M., Hudson, A. J., Nicoll, C. A., Ritchie, D. A. & Shields, A. J., 23/01/2009, In: Physical review letters. 102, 3, p. - 4 p., 030406.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    Behavioral consistency in the digital age

    Shaw, H., Taylor, P., Ellis, D. & Conchie, S., 1/03/2022, In: Psychological Science. 33, 3, p. 364-370 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  36. Published

    Becoming a 'Faith Community': British Hindus, Identity, and the Politics of Representation

    Knott, K., 2009, In: Journal of Religion in Europe. 2, 2, p. 85-114 30 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  37. Published

    Beamforming optimization for full-duplex cooperative cognitive radio networks

    Hu, S., Ding, Z., Ni, Q. & Yuan, Y., 3/07/2016, Signal Processing Advances in Wireless Communications (SPAWC), 2016 IEEE 17th International Workshop on. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    Beamforming optimisation in energy harvesting cooperative full-duplex networks with self-energy recycling protocol

    Hu, S., Ding, Z. & Ni, Q., 5/05/2016, In: IET Communications. 10, 7, p. 848-853 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  39. Published

    BCDM: An Early-Stage DDoS Incident Monitoring Mechanism Based on Binary-CNN in IPv6 Network

    Wang, Y., Wang, X., Ni, Q., Yu, W. & Huang, M., 31/10/2024, In: IEEE Transactions on Network and Service Management. 21, 5, p. 5873-5887 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  40. Published

    Baguette: towards end-to-end service orchestration in heterogeneous networks

    Rotsos, C., Farshad, A., Hart, N. P., Aguado, A., Bidkar, S., Sideris, K., King, D., Fawcett, L., Bird, J., Mauthe, A. U., Race, N. J. P. & Hutchison, D., 15/12/2016, International Conference on Ubiquitous Computing and Communications (IUCC'16). IEEE, p. 196-203 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    Auto-tuning Streamed Applications on Intel Xeon Phi

    Zhang, P., Fang, J., Tang, T., Yang, C. & Wang, Z., 25/05/2018, 2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS). IEEE, p. 515-525 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    Auto-tuning MPI Collective Operations on Large-Scale Parallel Systems

    Zheng, W., Fang, J., Chen, J., Pan, X., Wang, H., Huang, C., Sun, X., Tang, T. & Wang, Z., 3/10/2019, The 21st IEEE International Conference on High Performance Computing and Communications. IEEE, p. 670-677 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    Autonomously evolving classifier TEDAClass

    Kangin, D., Angelov, P. & Iglesias, J. A., 20/10/2016, In: Information Sciences. 366, p. 1-11 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  44. Published

    Autonomous visual self-localization in completely unknown environment

    Sadeghi-Tehran, P., Behera, S., Angelov, P. & Andreu, J., 05/2012, Evolving and Adaptive Intelligent Systems (EAIS), 2012 IEEE Conference on. IEEE, p. 90-95 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    Autonomous novelty detection and object tracking in video streams using evolving clustering and Takagi-Sugeno type neuro-fuzzy system.

    Angelov, P., Ramezani, R. & Zhou, X., 2008, IEEE International Joint Conference on Neural Networks, 2008. IJCNN 2008. (IEEE World Congress on Computational Intelligence). . IEEE, p. 1456-1463 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    Autonomous Machine Learning (ALMA): generating rules from data streams

    Angelov, P., 19/09/2011, Proceedings of the Special International Conference on Complex Systems, COSY-2011: 16-19 September 2011. Ohrid, FYR of Macedonia, p. 249-256 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  47. Published

    Autonomous Learning Systems: From Data to Knowledge in Real Time

    Angelov, P., 1/12/2012, Chichester: John Willey and Sons. 288 p.

    Research output: Book/Report/ProceedingsMonograph

  48. Published

    Autonomous learning multi-model systems from data streams

    Angelov, P. P., Gu, X. & Principe, J., 1/08/2018, In: IEEE Transactions on Fuzzy Systems. 26, 4, p. 2213-2224 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  49. Published

    Autonomous Learning Multi-Model Classifier of 0-Order (ALMMo-0)

    Angelov, P. P. & Gu, X., 31/05/2017, IEEE Conference on Evolving and Adaptive Intelligent Systems 2017. p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    Autonomous data-driven clustering for live data stream

    Gu, X. & Angelov, P. P., 9/10/2016, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2016). IEEE, p. 1128-1135 8 p. 1303

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    Autonomous data density based clustering method

    Angelov, P. P., Gu, X., Gutierrez, G., Iglesias, J. A. & Sanchis, A., 24/07/2016, p. 2405-2413. 9 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  52. Published

    Autonomous anomaly detection

    Gu, X. & Angelov, P. P., 31/05/2017, IEEE Conference on Evolving and Adaptive Intelligent Systems. p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    Autonomic diagnosis of anomalous network traffic.

    Marnerides, A., Pezaros, D. P. & Hutchison, D., 14/06/2010. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Otherpeer-review

  54. Published

    Automatically analysing large texts in a GIS environment: the Registrar General’s reports and cholera in the nineteenth century

    Murrieta-Flores, P., Baron, A., Gregory, I. N., Hardie, A. & Rayson, P. E., 04/2015, In: Transactions in GIS. 19, 2, p. 296-320 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  55. Published

    Automatic Standardization of Spelling for Historical Text Mining

    Baron, A., Rayson, P. & Archer, D., 06/2009.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  56. Published

    Automatic standardisation of texts containing spelling variation: How much training data do you need?

    Baron, A. & Rayson, P., 2009, Proceedings of the Corpus Linguistics Conference: CL2009. Mahlberg , M., González-Díaz, V. & Smith, C. (eds.). Lancaster: Lancaster University, 25 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  57. Published

    Automatic scene recognition for low-resource devices using evolving classifiers

    Andreu, J., Dutta Baruah, R. & Angelov, P., 09/2011, 2011 IEEE International Conference on Fuzzy Systems (FUZZ). IEEE, p. 2779-2785 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  58. Published

    Automatic mobile photographer and picture diary

    Angelov, P., Andreu, J. & Vong, T., 05/2012, Evolving and Adaptive Intelligent Systems (EAIS), 2012 IEEE Conference on. IEEE, p. 102-107

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  59. Published

    Automatic error tagging of spelling mistakes in learner corpora

    Rayson, P. & Baron, A., 2011, A Taste for Corpora: In honour of Sylviane Granger. Meunier, F., De Cock, S., Gilquin, G. & Paquot, M. (eds.). Amsterdam: John Benjamins, Vol. 45. p. 109-126 28 p. (Studies in Corpus Linguistics; vol. 45).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  60. Published

    Automatic and portable mapping of data parallel programs to OpenCL for GPU-based heterogeneous systems

    Wang, Z., Grewe, D. & O'Boyle, M., 01/2015, In: ACM Transactions on Architecture and Code Optimization. 11, 4, 26 p., 42.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  61. Published

    Authors' response: Letter to the editor

    Hackman, L. & Black, S., 2013, In: Journal of Forensic Sciences. 58, 4, p. 1107 1 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  62. Published

    Authentication in stealth distributed hash tables

    MacQuire, A., Brampton, A., Rai, I. A., Race, N. J. P. & Mathy, L., 06/2008, In: Journal of Systems Architecture. 54, 6, p. 607 - 618 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  63. Published

    AURORA: autonomous real-time on-board video analytics

    Angelov, P., Sadeghi Tehran, P. & Clarke, C., 05/2017, In: Neural Computing and Applications. 28, 5, p. 855-865 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  64. Unpublished

    Augmenting ICS cyber security risk assessments: assimilation of socio-technical characteristics and constructs

    Green, B., 2018, (Unpublished) Lancaster University. 314 p.

    Research output: ThesisDoctoral Thesis

  65. Published

    Auditing for privacy in threshold PKE e-voting

    Kiayias, A., Zacharias, T. & Zhang, B., 1/03/2017, In: Information and Computer Security. 25, 1, p. 100-116 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  66. Published

    Attention module-based spatial-temporal graph convolutional networks for skeleton-based action recognition

    Kong, Y., Li, L., Zhang, K., Ni, Q. & Han, J., 30/08/2019, In: Journal of Electronic Imaging. 28, 4, 043032.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  67. Published

    Attack pattern recognition through correlating cyber situational awareness in computer networks

    Shirazi, S. N. U. H., Schaeffer-Filho, A. & Hutchison, D., 1/03/2014, Cyberpatterns: unifying design patterns with security and attack patterns. Blackwell, C. & Zhu, H. (eds.). Cham: Springer International Publishing, p. 125-134 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  68. Published

    Atomic-scale authentication with Resonant Tunnelling Diodes

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R., 27/07/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  69. Published

    Atomic-scale authentication with resonant tunneling diodes

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 2016, In: MRS Advances. 1, 22, p. 1625-1629 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  70. Published

    Atomic-scale authentication using resonant tunnelling diodes

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y. J., Young, M. P., Woodhead, C. S., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 23/02/2015, In: arxiv.org.

    Research output: Contribution to Journal/MagazineJournal article

  71. Published

    Atomic-scale authentication using imperfect semiconductor structures

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M. A., Missous, M., Roedig, U. & Young, R., 1/07/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  72. Published

    ATDT: Autonomous Template-based Detection and Tracking of objects from airborne camera

    Sadeghi Tehran, P. & Angelov, P., 2015, Intelligent Systems 2014: Proceedings of the 7th IEEE International Conference Intelligent Systems IS’2014, September 24‐26, 2014, Warsaw, Poland, Volume 2: Tools, Architectures, Systems, Applications. Filev, D., Jabłkowski, J., Kacprzyk, J., Krawczak, M., Popchev, I., Rutkowski, L., Sgurev, V., Sotirova, E., Szynkarczyk, P. & Zadrozny, S. (eds.). Springer, p. 555-565 11 p. (Advances in Intelligent Systems and Computing; vol. 323).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  73. Published

    At home with users: a comparative view of Living Labs

    Ley, B., Ogonowski, C., Mu, M., Hess, J., Race, N., Randall, D., Rouncefield, M. & Wulf, V., 2015, In: Interacting with Computers. 27, 1, p. 21-35 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  74. Published

    At home in the secular: A spatial analysis of everyday ritual

    Knott, K., 2007, In: Jaarboek Voor Liturgie-Onderzoek. 23, p. 45-62 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  75. Published

    Assurance Techniques for Industrial Control Systems (ICS)

    Knowles, W., Such Aparicio, J. M., Gouglidis, A., Misra, G. & Rashid, A., 10/2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 101-112 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  76. Published

    Assessing the Impact of Malware Attacks in Utility Networks

    König, S., Gouglidis, A., Green, B. & Solar, A., 7/07/2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Springer Birkhäuser, p. 335-351 17 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  77. Published

    Assessing the impact of intra-cloud live migration on anomaly detection

    Shirazi, S. N. U. H., Simpson, S., Marnerides, A., Watson, M., Mauthe, A. & Hutchison, D., 10/2014, Proceedings of 3rd IEEE International Conference on Cloud Networking, IEEE CloudNet 2014. IEEE, p. 52-57 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  78. Published

    AS relationships, customer cones, and validation

    Luckie, M., Huffaker, B., Dhamdhere, A., Giotsas, V. & Claffy, K., 2013, IMC '13 Proceedings of the 2013 conference on Internet measurement conference. New York: ACM, p. 243-256 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  79. Published

    ARTOT: Autonomous Real-Time Object detection and Tracking by a moving camera

    Angelov, P., Gude, C., Sadeghi-Tehran, P. & Ivanov, T., 09/2012, Intelligent Systems (IS), 2012 6th IEEE International Conference. IEEE, p. 446-452 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  80. Published

    ARTOD: Autonomous Real Time Objects Detection by a moving camera using recursive density estimation

    Sadeghi Tehran, P. & Angelov, P., 28/01/2016, Novel applications of intelligent systems. Hadjiski, M., Kasabov, N., Filev, D. & Jotsov, V. (eds.). Cham: Springer Verlag, p. 123-138 16 p. (Studies in Computational Intelligence; vol. 586).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  81. Published

    ARFA: automated real-time flight data analysis using evolving clustering, classifiers and recursive density estimation

    Kolev, D., Angelov, P., Markarian, G., Suvorov, M. & Lysanov, S., 2013, Evolving and Adaptive Intelligent Systems (EAIS), 2013 IEEE Conference on. Piscataway, N.J.: IEEE Press, p. 91-97 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  82. Published

    Area energy and area spectrum efficiency trade-off in 5G heterogeneous networks

    Pervaiz, H. B., Musavian, L. & Ni, Q., 1/10/2015, Communication Workshop (ICCW), 2015 IEEE International Conference on . IEEE, p. 1178-1183 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  83. Published

    Architectures of evolving fuzzy rule-based classifiers

    Angelov, P., Zhou, X., Filev, D. & Lughofer, E., 9/10/2007, Systems, Man and Cybernetics, 2007. ISIC. IEEE International Conference on. IEEE, p. 2050-2055 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  84. Published

    Arabic Dialect Identification in the Context of Bivalency and Code-Switching

    El Haj, M., Rayson, P. E. & Aboelezz, M., 9/05/2018, LREC 2018, Eleventh International Conference on Language Resources and Evaluation. Calzolari, N., Choukri, K., Cieri, C., Declerck, T., Goggi, S., Hasida, K., Isahara, H., Maegaard, B., Mariani, J., Mazo, H., Moreno, A., Odijk, J., Piperidis, S. & Tokunaga, T. (eds.). p. 3622-3627 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  85. Published

    AppMonitor: A Tool for Recording User Actions in Unmodified Windows Applications

    Alexander, J., Cockburn, A. & Lobb, R., 2008, In: Behavior Research Methods. 40, 2, p. 413-421 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  86. Published

    Applying virtual ID

    Black, S. & Hackman, L., 2/09/2010, In: Police Professional. 220, p. 16-18 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  87. Published

    Applying the study of religions in the security domain: knowledge, skills and collaboration

    Knott, K., 11/2018, In: Journal of Religious and Political Practice. 4, 3, p. 332-351 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  88. Published

    Applications of evolving intelligent systems to oil and gas industry.

    Macias Hernandez, J. & Angelov, P., 04/2010, Evolving intelligent systems : methodology and applications. Angelov, P., Filev, D. & Kasabov, N. (eds.). New York, USA: John Wiley and Sons and IEEE Press, p. 401-422 22 p. (IEEE Press series in Computational Intelligence).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  89. Published

    Application of reinforcement learning for security enhancement in cognitive radio networks

    Ling, M. H., Yau, K.-L. A., Qadir, J., Poh, G. S. & Ni, Q., 12/2015, In: Applied Soft Computing. 37, p. 809-829 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  90. Published

    Application of non-orthogonal multiple access in cooperative spectrum-sharing networks over Nakagami-m fading channels

    Lv, L., Ni, Q., Ding, Z. & Chen, J., 06/2017, In: IEEE Transactions on Vehicular Technology. 66, 6, p. 5506-5511 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  91. Published

    Appliance-level Short-term Load Forecasting using Deep Neural Networks

    Ud Din, G. M., Mauthe, A. U. & Marnerides, A., 8/03/2018, 2018 International Conference on Computing, Networking and Communications (ICNC). IEEE, p. 53-57 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  92. Published

    AppIS: Protect Android Apps Against Runtime Repackaging Attacks

    Song, L., Tang, Z., Li, Z., Gong, X., Chen, X., Fang, D. & Wang, Z., 17/12/2017, 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS). IEEE, p. 25-32 8 p. (2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  93. Forthcoming

    Apparatus and method for projecting light through a light dispersive medium

    Young, R. J. (Inventor) & Reid, V. M. (Inventor), 13/11/2015, (Accepted/In press) Priority date 13/11/2015, Priority No. GB1520076.9

    Research output: Patent

  94. Published

    AoI-Minimal Trajectory Planning and Data Collection in UAV-Assisted Wireless Powered IoT Networks

    Hu, H., Xiong, K., Qu, G., Ni, Q., Fan, P. & Letaief, K. B., 15/01/2021, In: IEEE Internet of Things Journal. 8, 2, p. 1211-1223 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  95. Published

    AoI-minimal Power Adjustment in RF-EH-powered Industrial IoT Networks: A Soft Actor-Critic-Based Method

    Ge, Y., Xiong, K., Wang, Q., Ni, Q., Fan, P. & Letaief, K. B., 1/09/2024, In: IEEE Transactions on Mobile Computing. 23, 9, p. 8729 - 8741 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  96. Published

    AoI-Minimal Online Scheduling for Wireless Powered IoT: A Lyapunov Optimization-based Approach

    Hu, H., Xiong, K., Yang, H.-C., Ni, Q., Gao, B., Fan, P. & Letaief, K. B., 1/12/2023, In: IEEE Transactions on Green Communications and Networking. 7, 4, p. 2081-2092

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  97. Published

    Antimonide quantum dot nanostructures for novel photonic device applications

    Krier, A., Carrington, P., Zhuang, Q., Young, R., Hayne, M., Lu, Q., James Asirvatham, J., Wagener, M., Botha, J. R., Koenraad, P. M. & Smakman, E. P., 5/11/2013, The wonder of nanotechnology: quantum optoelectronic devices and applications . SPIE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  98. Published

    Anti-Intelligent UAV Jamming Strategy via Deep Q-Networks

    Gao, N., Qin, Z., Jing, X., Ni, Q. & Jin, S., 1/01/2020, In: IEEE Transactions on Communications. 68, 1, p. 569-581 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  99. Published

    Anti-Intelligent UAV Jamming Strategy via Deep Q-Networks

    Gao, N., Qin, Z., Jing, X. & Ni, Q., 20/05/2019, 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings. IEEE, 6 p. 8762016. (IEEE International Conference on Communications; vol. 2019-May).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  100. Published

    Anticipating bipedalism

    Cunningham, C. A. & Black, S. M., 06/2009, In: Journal of Anatomy. 214, 6, p. 817-829 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top