Home > Research > Security Lancaster (Academic Centre of Excellence) > Publications & Outputs
View graph of relations

Security Lancaster (Academic Centre of Excellence)

  1. 2017
  2. Published

    SEEAD: A Semantic-based Approach for Automatic Binary Code De-obfuscation

    Tang, Z., Wang, L., Kuang, K., Xue, C., Gong, X., Chen, X., Fang, D. & Wang, Z., 11/09/2017, 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17). IEEE, p. 261-268 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    End-to-end Deep Learning of Optimization Heuristics

    Cummins, C., Petoumenos, P., Wang, Z. & Leather, H., 9/09/2017, The 26th International Conference on Parallel Architectures and Compilation Techniques (PACT) 2017. IEEE, p. 219-232 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Using Design Fiction to Inform Shape-Changing Interface Design and Use

    Sturdee, M., Coulton, P. & Alexander, J. M., 6/09/2017, In: The Design Journal. 20, Suppl. 1, p. S4146-S4157 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Uncertainty-driven Ensemble Forecasting of QoS in Software Defined Networks

    Kolomvatsos, K., Anagnostopoulos, C., Marnerides, A., Ni, Q., Hadjiefthymiades, S. & Pezaros, D., 4/09/2017, Computers and Communications (ISCC), 2017 IEEE Symposium on. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    A new type of distance metric and its use for clustering

    Gu, X., Angelov, P. P., Kangin, D. & Principe, J., 09/2017, In: Evolving Systems. 8, 3, p. 167-177 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    An exact algorithm for a resource allocation problem in mobile wireless communications

    Letchford, A. N., Ni, Q. & Zhong, Z., 09/2017, In: Computational Optimization and Applications. 68, 2, p. 193-208 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    COUNTER - COrpus of Urdu News TExt Reuse

    Muhammad, S., Nawab, R. M. A. & Rayson, P. E., 09/2017, In: Language Resources and Evaluation. 51, 3, p. 777-803 27 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Jumping the gun: faster response latencies to deceptive questions in a realistic scenario

    Mapala, T., Warmelink, L. N. & Linkenauger, S. A., 31/08/2017, In: Psychonomic Bulletin and Review. 24, 4, p. 1350-1358 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    N-state random switching based on quantum tunnelling

    Bernardo Gavito, R., J. Urbanos, F., Roberts, J., Sexton, J., Astbury, B., Shokeir, H., Mcgrath, T., Noori, Y., Woodhead, C. S., Missous, M., Roedig, U. & Young, R. J., 31/08/2017, In: Proceedings of SPIE. 10354, p. 103541T 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Statistical Delay QoS Driven Energy Efficiency and Effective Capacity Tradeoff for Uplink Multi-User Multi-Carrier Systems

    Yu, W., Musavian, L. & Ni, Q., 31/08/2017, In: IEEE Transactions on Communications. 65, 8, p. 3494-3508 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    Countering Violent Extremism: An Introduction

    Marsden, S. V., Knott, K. & Lewis, J., 29/08/2017, Centre for Research and Evidence on Security Threats. 7 p.

    Research output: Book/Report/ProceedingsCommissioned report

  13. Published

    Protect sensitive information against channel state information based attacks

    Zhang, J., Tang, Z., Chen, X., Fang, D., Li, R. & Wang, Z., 18/08/2017, 2017 IEEE International Conference on Computational Science and Engineering (CSE) and Embedded and Ubiquitous Computing (EUC). IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research

    Green, B., Le, A. T., Antrobus, R., Roedig, U., Hutchison, D. & Rashid, A., 14/08/2017. 8 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  15. Published

    Exploit Dynamic Data Flows to Protect Software Against Semantic Attacks

    Kuang, K., Tang, Z., Gong, X., Fang, D., Chen, X., Zhang, H. & Wang, Z., 8/08/2017, 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Detecting peering infrastructure outages in the wild

    Giotsas, V., Dietzel, C., Smaragdakis, G., Feldmann, A., Berger, A. & Aben, E., 7/08/2017, SIGCOMM 2017 - Proceedings of the 2017 Conference of the ACM Special Interest Group on Data Communication. New York: Association for Computing Machinery, Inc, p. 446-459 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Lancaster A at SemEval-2017 Task 5: Evaluation metrics matter: predicting sentiment from financial news headlines

    Moore, A. & Rayson, P. E., 4/08/2017, Proceedings of the 11th International Workshop on Semantic Evaluations (SemEval-2017). Stroudsburg, PA: Association for Computational Linguistics, p. 581-585 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. E-pub ahead of print

    Experimental evaluation of the impact of mobility management protocols on HTTP adaptive streaming

    Sani, Y., Isah, M., Edwards, C. J. & Mauthe, A. U., 1/08/2017, (E-pub ahead of print) In: IET Networks.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Panning for gold: automatically analysing online social engineering attack surfaces

    Edwards, M., Larson, R., Green, B., Rashid, A. & Baron, A., 08/2017, In: Computers and Security. 69, p. 18-34 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Soft Computing Applied to Swarm Robotics

    Nedjah, N., Angelov, P., Castillo, O., de Macedo Mourelle, L. & Wang, C., 08/2017, In: Applied Soft Computing. 57, p. 696-697 2 p.

    Research output: Contribution to Journal/MagazineEditorialpeer-review

  21. Published

    Distributed, multi-level network anomaly detection for datacentre networks

    Iordache, M., Jouet, S., Marnerides, A. & Pezaros, D., 31/07/2017, IEEE International Conference on Communications (ICC) 2017. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Learning with noise: enhance distantly supervised relation extraction with dynamic transition matrix

    Luo, B., Feng, Y., Wang, Z., Zhu, Z., Huang, S., Yan, R. & Zhao, D., 30/07/2017, The 55th Annual Meeting of the Association for Computational Linguistics: Proceedings of the Conference, Vol. 1 (Long Papers). Stroudsburg, Pa.: Association for Computational Linguistics, 10 p. P-17 1040

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Fiction and Physicality: a designerly approach towards complexities of emerging technologies

    Hur, Y., Sturdee, M., Alonso, M. B., Markopoulos, P. & Alexander, J., 28/07/2017, In: The Design Journal. 20, Suppl. 1, p. S3849-S3862 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    Brief announcement: statement voting and liquid democracy

    Zhang, B. & Zhou, H.-S., 25/07/2017, PODC '17 Proceedings of the ACM Symposium on Principles of Distributed Computing. New York: ACM, p. 359-361 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    The Manipulative Presentation Techniques of Controlling and Coercive Offenders

    Watson, S. J., Luther, K., Jackson, J., Taylor, P. J. & Alison, L., 25/07/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  26. Published

    Creating CorCenCC (Corpws Cenedlaethol Cymraeg Cyfoes - The National Corpus of Contemporary Welsh)

    Knight, D., Fitzpatrick, T., Morris, S., Evas, J., Rayson, P. E., Spasic, I., Stonelake, M., Mon Thomas, E., Neale, S., Needs, J., Piao, S. S., Rees, M., Watkins, G., Anthony, L., Michael Cobb, T., Deuchar, M., Donnelly, K., McCarthy, M. & Scannell, K., 24/07/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

Back to top