University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Academic/Research unit is "Faculty of Engineering and Physical Sciences > Computer Science"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Authors | Item Type | No Grouping
Jump to: A | B | C | D | E | F | G | I | L | M | O | P | R | S | T | V | W | Y | Z
Number of items: 48.


Asghar, HJ, Steinfeld, R, Li, S, Kaafar, MA and Pieprzyk, J (2015) On the Linearization of Human Identification Protocols: Attacks based on Linear Algebra, Coding Theory and Lattices IEEE Transactions on Information Forensics and Security, 10, 8. pp. 1643-1655.


Balntas, V, Tang, L and Mikolajczyk, K (2015) BOLD - Binary online learned descriptor for efficient image matching. In: CVPR 2015, 2015-06-07 - 2015-06-12, Boston, Mass..

Blanco-Gonzalo, R, Poh, N, Wong, R and Sanchez-Reillo, R (2015) Time evolution of face recognition in accessible scenarios Human-centric Computing and Information Sciences, 5 (1).


Cagalj, M, Perkovic, T, Bugaric, M and Li, S (2015) Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks Pervasive and Mobile Computing, 20. pp. 64-81.

Cheng, R, Jin, Y and Narukawa, K (2015) Adaptive reference vector generation for inverse model based evolutionary multiobjective optimization with degenerate and disconnected pareto fronts Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9018. pp. 127-140.

Chrol-Cannon, J and Jin, Yaochu (2015) Learning structure of sensory inputs with synaptic plasticity leads to interference Frontiers in Computational Neuroscience, 9, 103.

Culnane, C, Ryan, PYA, Schneider, SA and Teague, V (2015) vVote: a Verifiable Voting System ACM Transactions on Information and System Security, 18 (1).


Damasceno, M, Canuto, AMP and Poh, N (2015) Multi-privacy biometric protection scheme using ensemble systems. In: International Joint Conference on Neural Networks 2015, 2015-07-12 - 2015-07-17, Killarney, Ireland.


Enshaeifar, S, Kouchaki, S, Cheong Took, C and Sanei, S (2015) Quaternion Singular Spectrum Analysis of Electroencephalogram with Application in Sleep Analysis IEEE Transactions on Neural Systems and Rehabilitation Engineering.


Ferrara, A, Fuchsbauer, GF and Bin Liu, BL (2015) Policy Privacy in Cryptographic Access Control In: 28th IEEE Computer Security Foundations Symposium, 2015-07-13 - 2015-07-17, Verona, IT.


Gillam, Lee, Notley, Scott, Broome, Simon and Garside, Debbie (2015) IPCRESS: TRACKING INTELLECTUAL PROPERTY THROUGH SUPPLY CHAINS IN CLOUDS. In: Enterprise Management Strategies in the Era of Cloud Computing. IGI-Global, pp. 171-191. ISBN 9781466683396

Gillam, Lee and Vartapetiance, Anna (2015) Gambling with Laws and Ethics in Cyberspace In: Human Rights and Ethics: Concepts, Methodologies, Tools, and Applications. IGI-Global, pp. 50-71.

Gisdakis, S, Giannetsos, A and Papadimitratos, P (2015) SHIELD: A Data Verification Framework for Participatory Sensing Systems In: 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015-06-24 - 2015-06-26, New York City, USA.

Granger, Robert (2015) Could, or should, the ancient Greeks have discovered the Lucas-Lehmer test? The Mathematical Gazette, 97 (539). pp. 242-255.

Granger, Robert and Scott, Michael (2015) Faster ECC over F2521-1 In: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, 30 Mar - 01 Apr 2015, Gaithersburg, MD, USA.

Gritti, Clémentine, Susilo, Willy, Plantard, Thomas, Liang, Kaitai and Wong, Duncan S (2015) Broadcast encryption with dealership International Journal of Information Security, 15 (3). pp. 271-283.

Gu, S and Jin, Y (2015) Generating diverse and accurate classifier ensembles using multi-objective optimization IEEE SSCI 2014 - 2014 IEEE Symposium Series on Computational Intelligence - MCDM 2014: 2014 IEEE Symposium on Computational Intelligence in Multi-Criteria Decision-Making, Proceedings. pp. 9-15.


Iorliam, A, Ho, ATS, Poh, N, Tirunagari, S and Bours, P (2015) DATA FORENSIC TECHNIQUES USING BENFORD'S LAW AND ZIPF'S LAW FOR KEYSTROKE DYNAMICS In: 2015 3rd International Workshop on Biometrics and Forensics (IWBF), 2015-03-03 - 2015-03-04, Gjovik, NORWAY.


Li, S, Schmitz, R, Grecos, C and Zhang, X (2015) Content-Fragile Commutative Watermarking-Encryption Based on Pixel Entropy In: 16th International Conference on Advanced Concepts for Intelligent Vision Systems (ACIVS 2015), 2015-10-26 - 2015-10-29, Catania, Italy.

Liang, Kaitai and Susilo, Willy (2015) Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage IEEE Transactions on Information Forensics and Security, 10 (9). pp. 1981-1992.

Liang, Kaitai, Susilo, Willy and Liu, Joseph K (2015) Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage IEEE Transactions Information Forensics and Security, 10 (8). pp. 1578-1589.

Liang, Kaitai, Susilo, Willy, Liu, Joseph K and Wong, Duncan S (2015) Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption Computer Journal Section D: Security in Computer Systems and Networks, 58 (10). pp. 2778-2792.

Liu, Joseph K, Au, Man Ho, Susilo, Willy, Liang, Kaitai, Lu, Rongxing and Srinivasan, Bala (2015) Secure sharing and searching for real-time video data in mobile cloud IEEE Network, 29 (2). pp. 46-50.

Liu, Joseph K, Liang, Kaitai, Susilo, Willy, Liu, Jianghua and Xiang, Yang (2015) Two-Factor Data Security Protection Mechanism for Cloud Storage System IEEE Transactions on Computers, 65 (6). pp. 1992-2004.


Manaf, NA, Moschoyiannis, Sotiris and Krause, Paul (2015) Service Choreography, SBVR, and Time Proceedings CONCUR 2015 - FOCLASA, EPTCS 201. pp. 63-77.

Moschoyiannis, Sotiris, Maglaras, L, Jiang, J, Topalis, F and Maglaras, A (2015) Dynamic Wireless Charging of Electric Vehicles on the Move with Mobile Energy Disseminators International Journal of Advanced Computer Science and Applications (IJACSA), 6 (6). pp. 239-251.


O'Loughlin, John and Gillam, Lee (2015) Addressing Issues of Cloud Resilience, Security and Performance through Simple Detection of Co-locating Sibling Virtual Machine Instances In: CLOSER 2015 - Proceedings of the 5th International Conference on Cloud Computing and Services Science, Lisbon, Portugal, 20-22 May, 2015..

O'Loughlin, John and Gillam, Lee (2015) Re-appraising instance seeking in Public Clouds In: Science and Information Conference (SAI), 2015, 2015-07-28-2016-07-30, London, UK.


Poh, N and Chan, CH (2015) Generalizing DET Curves Across Application Scenarios IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 10 (10). pp. 2171-2181.

Poh, N, Kittler, J, Chan, C-H and Pandit, M (2015) Algorithm to estimate biometric performance change over time IET BIOMETRICS, 4 (4). pp. 236-245.

Poh, N, McGovern, AP and de Lusignan, S (2015) Improving the measurement of longitudinal change in renal function: automated detection of changes in laboratory creatinine assay. J Innov Health Inform, 22 (2). pp. 293-301.


Rahman, T, Mahapatra, M, Laing, E and Jin, Y (2015) Evolutionary non-linear modelling for selecting vaccines against antigenically variable viruses BIOINFORMATICS, 31 (6). pp. 834-840.

Rossides, T, Lloyd, David and Zelik, S (2015) Computing Interacting Multi-fronts in One Dimensional Real Ginzburg Landau Equations JOURNAL OF SCIENTIFIC COMPUTING, 63 (3). pp. 799-819.

Ryan, PYA, Schneider, S and Teague, V (2015) End-to-End Verifiability in Voting Systems, from Theory to Practice IEEE SECURITY & PRIVACY, 13 (3). pp. 59-62.


Shao, Jun, Lu, Rongxing, Lin, Xiaodong and Liang, Kaitai (2015) Secure bidirectional proxy re-encryption for cryptographic cloud storage Pervasive and Mobile Computing, 28. pp. 113-121.

Smyth, B, Ryan, MD and Chen, L (2015) Formal analysis of privacy in Direct Anonymous Attestation schemes Science of Computer Programming, 111 (2). pp. 300-317.


Thorne, Tom (2015) Empirical likelihood tests for nonparametric detection of differential expression from RNA-seq data Statistical Applications in Genetics and Molecular Biology, 14 (6). pp. 575-583.

Tirunagari, S (2015) Data Mining of Causal Relations from Text: Analysing Maritime Accident Investigation Reports

Tirunagari, S (2015) Exploratory Data Analysis of The KelvinHelmholtz instability in Jets

Tirunagari, S, Poh, N, Abdulrahman, H, Nemmour, N and Windridge, D (2015) Breast Cancer Data Analytics With Missing Values: A study on Ethnic, Age and Income Groups

Tirunagari, S, Poh, N, Hu, G and Windridge, D (2015) Identifying Similar Patients Using Self-Organising Maps: A Case Study on Type-1 Diabetes Self-care Survey Responses arXiv.

Tirunagari, S, Poh, N, Windridge, D, Iorliam, A, Suki, N and Ho, ATS (2015) Detection of face spoofing using visual dynamics IEEE Transactions on Information Forensics and Security, 10 (4). pp. 762-777.

Tirunagari, Santosh, Poh, Norman, Bober, Miroslaw and Windridge, David (2015) Windowed DMD as a microtexture descriptor for finger vein counter-spoofing in biometrics. In: IEEE International Workshop on Information Forensics and Security (WIFS), 2015-11-16 - 2015-11-19.

Tome, P, Raghavendra, R, Busch, C, Tirunagari, S, Poh, N, Shekar, BH, Gragnaniello, D, Sansone, C, Verdoliva, L and Marcel, S (2015) The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks. In: 2015 International Conference on Biometrics (ICB), 2015-05-19 - 2015-05-22, Phuket, Thailand.


Vartapetiance, Anna and Gillam, Lee (2015) Adapting for Subject-Specific Term Length using Topic Cost in Author Verification - Notebook for PAN at CLEF 2015 In: Working Notes of CLEF 2015 - Conference and Labs of the Evaluation forum, Toulouse, France, September 8-11, 2015., 2015-09-08-2015-09-11.


Wei, Jiannan, Yang, Guomin, Mu, Yi and Liang, Kaitai (2015) Anonymous Proxy Signature with Hierarchical Traceability Computer Journal, 59 (4). pp. 559-569.


Yang, Yanjiang, Liu, Joseph K, Liang, Kaitai, Choo, Kim-Kwang Raymond and Zhou, Jianying (2015) Computer Security -- ESORICS 2015 In: 20th European Symposium on Research in Computer Security, September 21-25, 2015, Vienna, Austria.


Zhang, X, Tian, Y, Cheng, R and Jin, Y (2015) An Efficient Approach to Nondominated Sorting for Evolutionary Multiobjective Optimization IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 19 (2). pp. 201-213.

This list was generated on Sun Feb 28 07:56:23 2021 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800