University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Academic/Research unit is "Faculty of Engineering and Physical Sciences > Computer Science"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Authors | Item Type | No Grouping
Jump to: A | B | C | D | E | F | G | H | J | K | L | M | O | P | S | T | V | W | X | Z
Number of items: 58.


Ahmadi, Omran, Göloğlu, Faruk, Granger, Robert, McGuire, Gary and Yilmaz, Emrah Sercan (2016) Fibre products of supersingular curves and the enumeration of irreducible polynomials with prescribed coefficients Finite Fields and Their Applications, 42. pp. 128-164.

Alghamdi, Hanan, Tang, Hongying, Waheeb, SA and Peto, T (2016) Automatic Optic Disc Abnormality Detection in Fundus Images: A Deep Learning Approach In: OMIA3 (MICCAI 2016), 2016-10-17 - 2016-10-21, Athens.

Antoniades, Andreas, Spyrou, L, Cheong Took, Clive and Sanei, Saeid (2016) Deep learning for epileptic intracranial EEG data In: 2016 IEEE 26th International Workshop on Machine Learning for Signal Processing (MLSP), 13-16 Sep 2016, Vietri sul Mare, Salerno, Italy.

Au, Man Ho, Liang, Kaitai, Liu, Joseph K and Lu, Rongxing (2016) While Mobile Encounters with Clouds In: 10th International Conference on Network and System Security, Proceedings, 28-30 September, Taipei, Taiwan.


Bendisposto, J, Koerner, P, Leuschel, M, Meijer, J, Pol, JVD, Treharne, H and Whitefield, J (2016) Symbolic Reachability Analysis of B through ProB and LTSmin Integrated Formal Methods (LNCS), 9681. pp. 275-291.

Burton, C, Culnane, C and Schneider, S (2016) vVote: Verifiable Electronic Voting in Practice IEEE Security & Privacy, 14 (4). pp. 64-73.


Cerri, R, Barros, RC, de Carvalho, ACPLF and Jin, Y (2016) Reduction Strategies for Hierarchical Multi-Label Classification in Protein Function Prediction BMC Bioinformatics, 17 (373).

Chen, Liqun, Laing, T and Martin, KM (2016) Efficient, XOR-based ideal (t, n)-threshold schemes In: 15th International Conference on Cryptography and Network Security (CANS 2016), 2016-11-14 - 2016-11-16, Milan, Italy.

Chen, Liqun, Liu, Q, Martin, K and Ng, S-L (2016) Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs IET Information Security, 11 (4). pp. 204-210.

Chen, Liqun and Urian, R (2016) Algorithm agility – discussion on TPM 2.0 ECC functionalities. In: 3rd International conference on Security Standardization Research, 2016-12-05 - 2016-12-06, Gaithersburg, MD, USA.

Cheng, R, Jin, Y, Olhofer, M and Sendhoff, B (2016) A Reference Vector Guided Evolutionary Algorithm for Many-Objective Optimization IEEE Transactions on Evolutionary Computation.

Cheng, R, Jin, Y, Olhofer, M and Sendhoff, B (2016) Test Problems for Large-Scale Multiobjective and Many-Objective Optimization IEEE Transactions on Cybernetics.

Chugh, T, Jin, Yaochu, Miettinen, K, Hakanen, J and Sindhya, K (2016) A Surrogate-assisted Reference Vector Guided Evolutionary Algorithm for Computationally Expensive Many-objective Optimization IEEE Transactions on Evolutionary Computation, 22 (1). pp. 129-142.


Din, N, Smith, Phillip, Emeriewen, K, Sharma, A, Jones, S, Wawrzynski, J, Tang, Hongying, Sullivan, P, Caputo, S and Saleh, GM (2016) Man vs Machine: Software training for surgeons -an objective evaluation of human and computer-based training tools for cataract surgical performance Journal of Ophthalmology, 2016, 3548039.


Enshaeifar, Shirin, Cheong Took, Clive, Cheolsoo, P and Mandic, D (2016) Quaternion Common Spatial Patterns IEEE Transactions on Neural Systems and Rehabilitation Engineering, 25 (8). pp. 1278-1286.


Fielder, A, Panaousis, Emmanouil, Malacaria, P, Hankin, C and Smeraldi, F (2016) Decision support approaches for cyber security investment Decision Support Systems, 86. pp. 13-23.


Gardner, Brian and Gruning, Andre (2016) Supervised Learning in Spiking Neural Networks for Precise Temporal Encoding PLoS One, 11 (8), e0161335.

Giannetsos, Athanasios and Michalas, A (2016) The Data of Things: Strategies, Patterns and Practice of Cloud-based Participatory Sensing In: ICIIT 2016, 2016-03-04 - 2016-03-04, OZO Colombo.

Gillam, L and O'Loughlin, J (2016) Sibling Virtual Machine Co-location Confirmation and Avoidance Tactics for Public Infrastructure Clouds The Journal of Supercomputing, 72 (3). pp. 961-984.

Gillam, Lee and Vartapetiance, Anna (2016) From English to Persian: Conversion of Text Alignment for Plagiarism Detection In: 8th meeting of Forum for Information Retrieval Evaluation 2016 (FIRE 2016), 2016-12-08 - 2016-12-10, Kolkata, India.

Gisdakis, S, Giannetsos, A and Papadimitratos, P (2016) Security, Privacy & Incentive Provision for Mobile Crowd Sensing Systems IEEE Internet of Things Journal, 3 (5). pp. 839-853.

Gisdakis, S, Giannetsos, Athanasios and Papadimitratos, P (2016) Android Privacy C(R)ache: Reading your External Storage for Fun and Profit In: Workshop on Privacy-Aware Mobile Computing (PAMCO) 2016 - In Conjunction with ACM MobiHoc 2016, 2016-07-05 - 2016-07-08, Paderborn, Germany.

Granger, Robert, Jovanovic, Philipp, Mennink, Bart and Neves, Samuel (2016) Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption In: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 08-12 May 2016, Vienna, Austria.


Hansen, MB, Tang, Hongying, Wang, Su, Al Turk, L, Piermarocchi, R, Speckauskas, M, Hense, H-W, Leung, I and Peto, T (2016) Automated detection of Diabetic Retinopathy in Three European Populations Journal of Clinical & Experimental Ophthalmology, 7 (4), 1000582.

Hoang, TS, Schneider, SA, Treharne, H and Williams, DM (2016) Foundations for using Linear Temporal Logic in Event-B refinement Formal Aspects of Computing, 28 (6). pp. 909-935.

Hodgson, D, Smith, A, Dahale, S, Stratford, JP, Li, JV, Gruning, A, Bushell, ME, Marchesi, JR and Avignone Rossa, C (2016) Segregation of the anodic microbial communities in a microbial fuel cell cascade Frontiers in Microbiology.


Jin, Y, Gu, S and Cheng, R (2016) Feature Selection for High Dimensional Classification using A Competitive Swarm Optimizer Soft Computing.

Jin, Yaochu, Wang, Handing and Jansen, JO (2016) Data-Driven Surrogate-Assisted Multi-Objective Evolutionary Optimization of A Trauma System IEEE Transactions on Evolutionary Computation, 20 (6). pp. 939-952.


Kiefer, F and Manulis, Mark (2016) Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols In: The 19th Information Security Conference, 2016-09-07 - 2016-09-09, Honolulu, HI, USA.

Kiefer, F and Manulis, Mark (2016) Universally Composable Two-Server PAKE In: 19th Information Security Conference (ISC), 2016-09-07 - 2016-09-09, Honolulu, HI, USA.

Krause, PJ and Liang, PC (2016) Smartphone-based Real-time Indoor Location Tracking with One-meter Precision IEEE Journal of Biomedical and Health Informatics, 20 (3). pp. 756-762.


Lai, Shangqi, Liu, Joseph K, Choo, Kim-Kwang Raymond and Liang, Kaitai (2016) Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN In: International Conference on Information and Communications Security, 9-11 December 2015, Beijing, China.

Liang, Kaitai, Huang, Xinyi, Guo, Fuchun and Liu, Joseph K (2016) Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data IEEE Trans. Information Forensics and Security, 11 (10). pp. 2365-2376.

Liang, Kaitai, Miyaji, Atsuko and Su, Chunhua (2016) Secure and Traceable Framework for Data Circulation In: ACISP 2016 - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, 4-6 July, Melbourne, VIC, Australia.

Liang, Kaitai, Su, Chunhua, Chen, Jiageng and Liu, Joseph K (2016) Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data In: ASIA CCS '16: 11th ACM on Asia Conference on Computer and Communications Security, May 30 - June 03, 2016, Xi'an, China.

Lin, Chao, Zhu, Fei, Wu, Wei, Liang, Kaitai and Choo, Kim-Kwang Raymond (2016) A New Transitive Signature Scheme In: NSS 2017 International Conference on Network and System Security, 28-30 September, Taipei, Taiwan.

Liu, Weiran, Liu, Jianwei, Wu, Qianhong, Qin, Bo, Liang, Kaitai and Meadows, C. (2016) Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control In: European Symposium on Research in Computer Security ESORICS 2016: Computer Security – ESORICS 2016, September 26-30, 2016,, Heraklion, Greece.

Luo, Chu, Fylakis, Angelos, Partala, Juha, Klakegg, Simon, Gonçalves, Jorge, Liang, Kaitai, Seppänen, Tapio and Kostakos, Vassilis (2016) A data hiding approach for sensitive smartphone data In: UbiComp2016 - 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, Sep. 12-16, Heidelberg, Germany.


Manulis, Mark, Stebila, D, Kiefer, F and Denham, N (2016) Secure modular password authentication for the web using channel bindings International Journal of Information Security, 16 (6). pp. 597-620.


Ong, Eng-Jon, Pugeault, Nicolas, Gilbert, Andrew and Bowden, Richard (2016) Learning multi-class discriminative patterns using episode-trees In: Cloud Computing 2016 - The Seventh International Conference on Cloud Computing, GRIDs, and Virtualization, 2016-03-20 - 2016-03-24, Rome, Italy.


Panaousis, Emmanouil, Karapistoli, E, Elsemary, H, Alpcan, T, Khuzani, MHR and Economides, AA (2016) Game Theoretic Path Selection to Support Security in Device-to-Device Communications Ad Hoc Networks, 56. pp. 28-42.

Phuong, Tran Viet Xuan, Yang, Guomin, Susilo, Willy and Liang, Kaitai (2016) Edit Distance Based Encryption and Its Application ACISP: Australasian Conference on Information Security and Privacy, 2. pp. 103-119.

Poh, N, Blanco-Gonzalo, R, Wong, R and Sanchez-Reillo, R (2016) Blind subjects faces database IET BIOMETRICS, 5 (1). pp. 20-27.


Safaei, A, Tang, HL and Sanei, S (2016) Robust Search-Free Car Number Plate Localization Incorporating Hierarchical Saliency Journal of Computer Science & Systems Biology, 9 (3). pp. 93-103.

Safaei, Amin, Tang, Hongying and Sanei, Saeid (2016) Real Time Search Free Multiple License Plate Recognition Via Likelihood Estimation of Saliency Computers and Electrical Engineering, 56. pp. 15-29.

Saleh, GM, Wawrzynski, J, Caputo, S, Peto, T, Al turk, LI, Wang, S, Hu, Y, Da Cruz, L, Smith, P and Tang, HL (2016) An automated detection system for microaneurysms that is effective across different racial groups Journal of Ophthalmology.

Suki, N, Poh, Norman, Senan, FM, Zamani, NA and Darus, MZA (2016) On the Reproducibility and Repeatability of Likelihood Ratio in Forensics: A case study using Face Biometrics In: 8th IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2016), 2016-09-06 - 2016-09-09, Buffalo, NY, USA.


Thomsen, ASS, Smith, Phillip, Subhi, Y, la Cour, M, Tang, Hongying, Saleh, GM and Konge, L (2016) High correlation between performance on a virtual-reality simulator and real-life cataract surgery Acta Ophthalmologica, 95 (3). pp. 307-311.

Thorne, Tom (2016) NetDiff – Bayesian model selection for differential gene regulatory network inference Scientific Reports, 6, 39224.

Tian, Yangguang, Yang, Guomin, Mu, Yi, Liang, Kaitai and Yu, Yong (2016) One-Round Attribute-Based Key Exchange in the Multi-party Setting In: 10th International Conference, ProvSec 2016, November 10-11, 2016, Nanjing, China.

Tirunagari, S, Bull, S and Poh, Norman (2016) Automatic Classification of Irregularly Sampled Time Series with Unequal Lengths: A Case Study on Estimated Glomerular Filtration Rate In: 2016 IEEE International Workshop on Machine Learning for Signal Processing (MLSP 2016), 2016-09-13 - 2016-09-16, Salerno, Italy.

Tirunagari, Santosh, Bull, SC and Poh, Norman (2016) Automatic Detection of Acute Kidney Injury Episodes from Primary Care Data In: IEEE SSCI CICARE 2016, 2016-12-06 - 2016-12-09, Athens, Greece.


Vartapetiance, Anna and Gillam, Lee (2016) A Big Increase in Known Unknowns: from Author Verification to Author Clustering - Notebook for PAN at CLEF 2016 In: Working Notes of CLEF 2016 - Conference and Labs of the Evaluation forum, \'vora, Portugal, 5-8 September, 2016., 2016-09-05-2016-09-08, Evora, Portugal.


Wang, Shulan, Liang, Kaitai, Liu, Joseph K, Chen, Jianyong, Yu, Jianping and Xie, Weixin (2016) Attribute-Based Data Sharing Scheme Revisited in Cloud Computing IEEE Trans. Information Forensics and Security, 11 (8). pp. 1661-1673.

Wang, Su, Tang, Hongying, Al turk, LI, Hu, Yin, Sanei, Saeid, Saleh, GM and Peto, T (2016) Localising Microaneurysms in Fundus Images Through Singular Spectrum Analysis IEEE Transactions on Biomedical Engineering (TBME)., 64 (5). pp. 990-1002.


Xiang, M, Cheong Took, Clive and Mandic, D (2016) Cost-effective quaternion minimum mean square error estimation: From widely linear to four-channel processing Signal Processing, 136. pp. 81-91.


Zhang, Peng, Chen, Zehong, Liang, Kaitai, Wang, C and Wang, Ting (2016) A Cloud-Based Access Control Scheme with User Revocation and Attribute Update In: 21st Australasian Conference on Information Security and Privacy, 4-6 July, Melbourne, VIC, Australia.

Zhang, X, Tian, Y, Jin, Y and Cheng, R (2016) A Decision Variable Clustering-Based Evolutionary Algorithm for Large-scale Many-objective Optimization IEEE Transactions on Evolutionary Computation.

This list was generated on Sun Feb 28 00:59:38 2021 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800