University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Academic/Research unit is "Faculty of Engineering and Physical Sciences > Computer Science"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Authors | Item Type | No Grouping
Jump to: A | C | D | G | H | I | J | K | L | M | O | P | Q | R | S | T | V | Y | Z
Number of items: 49.

A

Alshehri, A, Schneider, S, Francillon, A and Rohatgi, P (2014) Formal Security Analysis and Improvement of a Hash-Based NFC M-Coupon Protocol SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2013), 8419. pp. 152-167.

C

Chrol-Cannon, J and Jin, Y (2014) On the Correlation between Reservoir Metrics and Performance for Time Series Classification under the Influence of Synaptic Plasticity PLOS ONE, 9 (7), ARTN e.

Culnane, C and Schneider, S (2014) A Peered Bulletin Board for Robust Use in Verifiable Voting Systems In: Computer Security Foundations Symposium (CSF), 2014 IEEE 27th, 19-22 July 2014, Vienna.

D

Davidson, M, Renaud, K and Li, S (2014) jCAPTCHA: Accessible Human Validation In: 14th International Conference on Computers Helping People with Special Needs (ICCHP 2014), 2014-07-09 - 2014-07-11, Paris, France.

G

Gardner, B, Sporea, I and Grüning, A (2014) Classifying spike patterns by reward-modulated STDP Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8681 L. pp. 749-756.

Gillam, L, Li, B and O'Loughlin, J (2014) Benchmarking cloud performance for service level agreement parameters Int. J. of Cloud Computing, 3 (1). pp. 3-23.

Gillam, L and O'Loughlin, J (2014) Performance Evaluation for Cost-Efficient Public Infrastructure Cloud Use In: GECON 11th International Conference, 16-18 Sept 2014, Cardiff.

Gillam, L and O'Loughlin, J (2014) Should infrastructure clouds be priced entirely on performance? An EC2 case study International Journal of Big Data Intelligence, 1 (4). pp. 215-229.

Gillam, L and Vartapetiance, A (2014) "Our Little Secret": pinpointing potential predators Security Informatics, 3 (3).

Gillam, Lee and Notley, Scott (2014) Evaluating Robustness for 'IPCRESS': Surrey's Text Alignment for Plagiarism Detection---Notebook for PAN at CLEF 2014 In: CLEF 2014 Evaluation Labs and Workshop.

Granger, Robert, Kleinjung, Thorsten and Zumbrägel, Jens (2014) Breaking '128-bit Secure' Supersingular Binary Curves In: 34th Annual Cryptology Conference - Advances in Cryptology (CRYPTO 2014), 17-21 Aug 2014, Santa Barbara, CA, USA.

Gritti, Clémentine, Susilo, Willy, Plantard, Thomas, Liang, Kaitai and Wong, Duncan S (2014) Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 5 (4). pp. 3-28.

Göloğlu, Faruk, Granger, Robert, McGuire, Gary and Zumbrägel, Jens (2014) Solving a 6120-bit DLP on a Desktop Computer In: 20th International Conference on Selected Areas in Cryptography, 14-16 Aug 2013, Burnaby, BC, Canada.

Günther, F, Manulis, M and Peter, A (2014) Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation In: 13th International Conference, CANS 2014, 2014-10-22 - 2014-10-24, Heraklion, Crete, Greece.

H

Huang, Xinyi, Liu, Joseph K, Tang, Shaohua, Xiang, Yang, Liang, Kaitai, Xu, Li and Zhou, Jianying (2014) Cost-Effective Authentic and Anonymous Data Sharing with Forward Security IEEE Transactions on Computers, 64 (4). pp. 971-983.

I

Ioannou, P, Grüning, A and Casey, M (2014) Factors influencing polychronous group sustainability as a model of working memory Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8681 L. pp. 723-731.

J

James, P, Moller, F, Nga Nguyen, H, Roggenbach, M, Schneider, S and Treharne, H (2014) On modelling and verifying railway interlockings: Tracking train lengths Science of Computer Programming, 96 (P3). pp. 315-336.

James, P, Moller, F, Nguyen, HN, Roggenbach, M, Schneider, S and Treharne, H (2014) Techniques for modelling and verifying railway interlockings International Journal on Software Tools for Technology Transfer, 16 (6). pp. 685-711.

K

Kiefer, F and Manulis, M (2014) Zero-Knowledge Password Policy Checks and Verifier-Based PAKE In: 19th European Symposium on Research in Computer Security, 2014-09-07 - 2014-09-11, Wroclaw, Poland.

L

Liang, Kaitai, Au, Man Ho, Liu, Joseph K and Susilo, Willy (2014) A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing Future Generation Computer Systems, 52. pp. 95-108.

Liang, Kaitai, Au, Man Ho, Liu, Joseph K, Susilo, Willy, Wong, Duncan S, Yang, Guomin, Phuong, Tran Viet Xuan and Xie, Qi (2014) A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing IEEE Transactions on Information Forensics and Security, 9 (10). pp. 1667-1680.

Liang, Kaitai, Au, Man Ho, Susilo, Willy, Wong, Duncan S, Yang, Guomin and Yu, Yong (2014) An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing In: International Conference on Information Security Practice and Experience, 5-8 May 2014, Fuzhou, China.

Liang, Kaitai, Chu, Cheng-Kang, Tan, Xiao, Wong, Duncan S, Tang, Chunming and Zhou, Jianying (2014) Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts Theoretical Computer Science, 539. pp. 87-105.

Liang, Kaitai, Fang, Liming, Wong, Duncan S and Susilo, Willy (2014) A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds Concurrency and Computation: Practice and Experience, 27 (8). pp. 2004-2027.

Liang, Kaitai, Liu, Joseph K, Lu, Rongxing and Wong, Duncan S (2014) Privacy Concerns for Photo Sharing in Online Social Networks IEEE Internet Computing, 19 (2). pp. 58-63.

Liang, Kaitai, Liu, Joseph K, Wong, Duncan S and Susilo, Willy (2014) An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing IACR Cryptology ePrint Archive 2014 (473).

Liang, Kaitai, Liu, Joseph K., Wong, Duncan S. and Susilo, Willy (2014) An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing In: 19th European Symposium on Research in Computer Security- ESORICS 2014, 7-11 Sept 2014., Wroclaw, Poland.

M

Moran, M, Heather, J and Schneider, S (2014) Verifying anonymity in voting systems using CSP FORMAL ASPECTS OF COMPUTING, 26 (1). pp. 63-98.

O

Oh, H and Jin, Y (2014) Adaptive swarm robot region coverage using gene regulatory networks Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8717 L. pp. 197-208.

Oh, H and Jin, Y (2014) Evolving hierarchical gene regulatory networks for morphogenetic pattern formation of swarm robots

P

Poh, N, Tirunagari, S and Windridge, D (2014) Challenges in Designing an Online Healthcare Platform for Personalised Patient Analytics In: IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE, 2014-12-09 - 2014-12-12, Orlando, FL.

Q

Qian, C, Yu, Y, Zhou, Z-H and Jin, Y (2014) On the Effectiveness of Sampling for Evolutionary Optimization in Noisy Environments Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8672. pp. 302-311.

R

Ramezan Shirazi, A, Oh, H and Jin, Y (2014) Morphogenetic self-organization of collective movement without directional sensing Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8717 L. pp. 139-150.

S

Schmitz, R, Li, S, Grecos, C and Zhang, X (2014) Towards Robust Invariant Commutative Watermarking-Encryption based on Image Histograms International Journal of Multimedia Data Engineering and Management, 5 (4). pp. 36-52.

Schneider, S, Treharne, H, Wehrheim, H and Williams, D (2014) Managing LTL properties in Event-B refinement Lecture Notes in Computer Science. pp. 221-237.

Schneider, SA, Treharne, HE and Wehrheim, H (2014) The Behavioural Semantics of Event-B Re finement Formal Aspects of Computing: applicable formal methods, 26. pp. 251-280.

Smith, Christopher and Jin, Yaochu (2014) Evolutionary multi-objective generation of recurrent neural network ensembles for time series prediction Neurocomputing, 143. pp. 302-311.

Srinivasan, S, Culnane, C, Heather, J, Schneider, SA and Xia, Z (2014) Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios In: Network and System Security, 2014-10-15 - 2014-10-17, Xi'an, China.

Stathakidis, S, Schneider, Steven and Heather, J (2014) Robustness Modelling and Verification of a Mix Net Protocol In: SSR 2014: Security Standardisation Research, 2014-12-16 - 2014-12-17.

Sun, C, Zeng, J, Jin, Y and Yu, Y (2014) A two-layer surrogate-assisted particle swarm optimization algorithm Soft Computing, 19 (6). pp. 1461-1475.

T

Thomas, SA and Jin, Y (2014) Reconstructing biological gene regulatory networks: Where optimization meets big data Evolutionary Intelligence, 7 (1). pp. 29-47.

Tirunagari, S, Poh, N, Aliabadi, K, Windridge, D and Cooke, D (2014) Patient Level Analytics Using Self-Organising Maps: A Case Study on Type-1 Diabetes Self-care Survey Responses 2014 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING (CIDM). pp. 304-309.

Tistarelli, M, Sun, Y and Poh, N (2014) On the use of discriminative cohort score normalization for unconstrained face recognition IEEE Transactions on Information Forensics and Security, 9 (12). pp. 2063-2075.

V

Vartapetiance, A and Gillam, L (2014) Deception detection: dependable or defective? Social Network Analysis and Mining, 4 (166).

Vartapetiance, Anna and Gillam, Lee (2014) A Trinity of Trials: Surrey's 2014 Attempts at Author Verification---Notebook for PAN at CLEF 2014 In: CLEF 2014 Evaluation Labs and Workshop.

Y

Yang, Anjia, Liang, Kaitai, Zhuang, Yunhui, Wong, Duncan S and Jia, Xiaohua (2014) A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction Security and Communication Networks, 8 (16). pp. 2836-2849.

Yusoff, M-H and Jin, Y (2014) Modeling neural plasticity in echo state networks for time series prediction In: 14th UK Workshop on Computational Intelligence (UKCI), 2014, 2014-09-08 - 2014-09-10, Bradford, UK.

Z

Zhang, T, Jin, Y, Ding, Y and Hao, K (2014) A cytokine network-inspired cooperative control system for multi-stage stretching processes in fiber production Soft Computing, 19 (6). pp. 1523-1540.

Zhou, Z-H, Chawla, NV, Jin, Y and Williams, GJ (2014) Big Data Opportunities and Challenges: Discussions from Data Analytics Perspectives IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE, 9 (4). pp. 62-74.

This list was generated on Fri Apr 10 04:12:07 2020 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800