University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Academic/Research unit is "Faculty of Engineering and Physical Sciences > Computer Science"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Authors | Item Type | No Grouping
Jump to: A | B | C | D | E | G | H | J | K | L | M | N | O | P | S | T | W | Y | Z
Number of items: 62.

A

Albukhanajer, Wissam, Jin, Yaochu and Briffa, JA (2017) Classifer Ensembles for Image Identifcation Using Multi-objective Pareto Features Neurocomputing, 238. pp. 316-327.

Aljaffan, N, Li, Shujun and Yuan, Haiyue (2017) PSV (Password Security Visualizer): From Password Checking to User Education In: Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017; part of HCI International 2017, 2017-07-09 - 2017-07-14, Vancouver, Canada.

Almeida, José Bacelar, Barbosa, Manuel, Barthe, Gilles, Dupressoir, Francois, Grégoire, Benjamin, Laporte, Vincent and Pereira, Vitor (2017) A Fast and Verified Software Stack for Secure Function Evaluation In: The ACM Conference on Computer and Communications Security (CCS 2017), 30 Oct 03 Nov 2017, Dallas, USA.

Alqahtani, Saeed and Li, Shujun (2017) PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices In: ARES 2017, Aug 29 - Sept 1 2017, Reggio Calabria, Italy.

Antoniades, Andreas, Spyrou, Loukianos, Martin-Lopez, David, Valentin, Antonio, Alarcon, Gonzalo, Sanei, Saeid and Cheong Took, Clive (2017) Detection of Interictal Discharges with Convolutional Neural Networks Using Discrete Ordered Multichannel Intracranial EEG IEEE Transactions on Neural Systems and Rehabilitation Engineering, 25 (12). pp. 2285-2294.

Antonopoulos, N and Gillam, Lee (2017) Cloud Computing: Principles, Systems and Applications Computer Communications and Networks . Springer. ISBN 978-3-319-54645-2

Avoine, G, Bingol, MA, Boureanu, Ioana, Capkun, S, Hancke, G, Kardas, S, Kim, CH, Lauradoux, C, Martin, B, Munilla, J, Peinado-Dominguez, A, Bonne Rasmussen, K, Singelee, D, Tchamkerten, A, Trujillo-Rasua, R and Vaudenay, S (2017) Security of Distance-Bounding: A Survey ACM Computing Surveys, 4.

B

Bhargavan, K, Boureanu, Ioana, Fouque, P-A, Onete, C and Richard, B (2017) Content Delivery over TLS: A Cryptographic Analysis of Keyless SSL In: 2nd IEEE European Symposium on Security and Privacy, 2017-04-26 - 2017-04-28, Paris, France.

Boureanu, Ioana, Gerault, D, Lafourcade, P and Onete, C (2017) Breaking and Fixing the HB+DB protocol In: 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, July 18 - 20 , 2017, Boston, USA.

C

Camenisch, J, Chen, Liqun, Drijvers, M, Lehmann, A, Novick, D and Urian, R (2017) One TPM to bind them all: fixing TPM2.0 for provably secure anonymous attestation In: 38th IEEE Symposium on Security and Privacy, 2017-05-22 - 2017-05-24, San Jose, CA.

Chen, Liqun, Laing, TM and Martin, KM (2017) Revisiting and extending the AONT-RS scheme: a robust computationally secure secret sharing scheme In: 9th International Conference on Cryptology and Information Security. AFRICACRYPT 2017, 2017-05-24 - 2017-05-26, Dakar, Senegal.

Cheng, R, Rodemann, T, Fischer, M, Olhofer, M and Jin, Yaochu (2017) Evolutionary Many-objective Optimization of Hybrid Electric Vehicle Control: From General Optimization to Preference Articulation IEEE Transactions on Emerging Topics in Computational Intelligence, 1 (2). pp. 97-111.

Cheong Took, C, Morris, D and Antoniades, A (2017) On making sense of neural networks in road analysis In: International Joint Conference on Neural Networks, 2017-05-14 - 2017-05-19, Anchorage, Alaska USA.

Chrol-Cannon, J, Jin, Yaochu and Gruning, Andre (2017) An Efficient Method for online Detection of Polychronous Patterns in Spiking Neural Networks Neurocomputing, 267. pp. 644-650.

Chronopoulos, M, Panaousis, Emmanouil and Grossklags, J (2017) An Options Approach to Cybersecurity Investment IEEE Access, 6. pp. 12175-12186.

D

Ding, Jinliang, Yang, Cuie, Jin, Yaochu and Chai, Tianyou (2017) Generalized Multi-tasking for Evolutionary Optimization of Expensive Problems IEEE Transactions on Evolutionary Computation.

E

Eftaxias, Konstantinos, Cheong Took, Clive, Venturini, B. and Arscott, D. (2017) Constrained LMS for Dynamic Flow Networks In: 2017 International Joint Conference on Neural Networks (IJCNN), 14-19 May 2017, Anchorage, Alaska USA.

Esam, Nihal, Abbas, Areej and Krause, Paul (2017) Towards Empowering Hearing Impaired Students' Skills in Computing and Technology International Journal of Advanced Computer Science and Applications, 8 (1).

G

Gillam, Lee and Zakarya, Muhammad (2017) Energy Efficient Computing, Clusters, Grids and Clouds: A Taxonomy and Survey Sustainable Computing: Informatics and Systems, 14. pp. 13-33.

Gorogiannis, N, Raimondi, F and Boureanu, Ioana (2017) A Novel Symbolic Approach to Verifying Epistemic Properties of Programs In: Twenty-Sixth International Joint Conference on Artificial Intelligence (IJCAI 2017), 19 - 25 August 2017, Melbourne, Australia.

Granger, Robert (2017) Indiscreet discrete logarithms Nieuw Archief voor Wiskunde, 5/18 (3). pp. 176-183.

Gu, Shenkai and Jin, Yaochu (2017) Multi-Train: A Semi-supervised Heterogeneous Ensemble Classifier Neurocomputing, 249. pp. 202-211.

H

Han, Yuyan, Gong, Dunwei, Jin, Yaochu and Pan, Quanke (2017) Evolutionary Multi-objective Blocking Lot-streaming Flow Shop Scheduling with Machine Breakdowns IEEE Transactions on Cybernetics.

Hosu, V, Hahn, F, Jenadeleh, M, Lin, H, Men, H, Sziranyi, T, Li, Shujun and Saupe, D (2017) The Konstanz Natural Video Database (KoNViD-1k) In: 9th International Conference on Quality of Multimedia Experience (QoMEX 2017), 2017-05-31 - 2017-06-02, Erfurt, Germany.

Hu, Yin, Wang, Su, Ma, N, Hingley-Wilson, Suzie, Rocco, Andrea, McFadden, Johnjoe and Tang, Hongying (2017) Trajectory Energy Minimisation for Cell Growth Tracking and Genealogy Analysis Royal Society Open Science, 4, 170207.

Huang, Kaibin, Manulis, Mark and Chen, Liqun (2017) Password Authenticated Keyword Search 2017 IEEE Symposium on Privacy-Aware Computing (PAC). pp. 129-140.

Huang, Y, Ding, Y, Hao, K and Jin, Yaochu (2017) A multi-objective approach to robust optimization over time considering switching cost Information Sciences, 394-5. pp. 183-197.

J

Jiang, Peng, Guo, Fuchun, Liang, Kaitai, Lai, Jianchang and Wen, Qiaoyan (2017) Searchain: Blockchain-based Private Keyword Search in Decentralized Storage Future Generation Computer Systems.

K

Kandris, Dionisis, Tselikis, George, Anastasiadis, Eleftherios, Panaousis, Emmanouil and Dagiuklas, Tasos (2017) COALA: A Protocol for the Avoidance and Alleviation of Congestion in Wireless Sensor Networks Sensors, 17 (11).

L

Liu, , Gong, D, Sun, J and Jin, Yaochu (2017) A Many-Objective Evolutionary Algorithm Using A One-by-One Selection Strategy IEEE Transactions on Cybernetics, 47 (9). pp. 2689-2702.

M

Meng, Ru, Zhou, Yanwei, Ning, Jianting, Liang, Kaitai, Han, Jinguang and Susilo, Willy (2017) An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups (11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings) In: Provable Security. LNCS, 10592 (10592). Springer International Publishing AG. Part of Springer Nature, pp. 39-56. ISBN 978-3-319-68636-3

N

Ning, Jianting, Cao, Zhenfu, Dong, Xiaolei, Liang, Kaitai, Ma, Hui and Wei, Lifei (2017) Auditable σ-Times Outsourced Attribute-Based Encryption for Access Control in Cloud Computing IEEE Transactions on Information Forensics and Security, 13 (1). pp. 94-105.

O

Ong, Simying, Li, Shujun, Wong, KokSheik and Tan, KuanYew (2017) Fast recovery of unknown coefficients in DCT-transformed images Signal Processing: Image Communication, 58. pp. 1-13.

O’Loughlin, J and Gillam, Lee (2017) A Performance Brokerage for Heterogeneous Clouds Future Generation Computer Systems, 87. pp. 831-845.

P

Poh, Norman, Bull, S, Tirunagari, Santosh, Farmer, C, Cole, N and de Lusignan, Simon (2017) A Factored Co-morbidity Approach for Modelling CKD Progression In: BRS 2017 Conference, 2017-04-26 - 2017-04-28, Nottingham, UK.

Poh, Norman, Bull, S, Tirunagari, Santosh, Williams, John, Cole, N, Farmer, C and de Lusignan, Simon (2017) Identifying Progressive CKD from Primary Care Records – a Study Protocol In: BRS 2017 Conference, 2017-04-26 - 2017-04-28, Nottingham, UK.

Poh, Norman, Bull, S, Tirunagari, Santosh and de Lusignan, Simon (2017) A Probabilistic Broken-stick Model for CKD Staging and Risk Stratification In: BRS 2017 Conference, 2017-04-26 - 2017-04-28, Nottingham, UK.

S

Sandy, Christopher, Rusconi, Patrice and Li, Shujun (2017) Can Humans Detect the Authenticity of Social Media Accounts? In: 3rd IEEE International Conference on Cybernetics (CYBCONF-2017), 21-23 Jun 2017, Exeter, UK.

Savvopoulos, Stylianos and Moschoyiannis, Sotiris (2017) Impact of removing nodes on the controllability of complex networks In: COMPLEX NETWORKS 201: 6th International Conference on Complex Networks and Their Applications, 29 Nov - 01 Dec 2017.

Savvopoulos, Stylianos, Penn, Alexandra and Moschoyiannis, Sotiris (2017) On the interplay between topology and controllability of complex networks In: Conference in Complex Systems (CCS 2017), 17-22 September 2017, Cancun, Mexico.

Shirazi, AR and Jin, Yaochu (2017) A Strategy for Self-Organized Coordinated Motion of a Swarm of Minimalist Robots IEEE Transactions on Emerging Topics in Computational Intelligence, 1 (5). pp. 326-338.

Sinnari, Doaa, Krause, Paul and Abulkhair, Maysoon (2017) Effects of E-Games on the Development of Saudi Children with Attention Deficit Hyperactivity Disorder Cognitively, Behaviourally and Socially: An Experimental Study In: International Conference on Universal Access in Human-Computer Interaction, July 15th-20th 2018, Las Vegas, NV, USA.

Sun, C, Jin, Yaochu, Cheng, R, Ding, J and Zeng, J (2017) Surrogate-assisted Cooperative Swarm Optimization of High-dimensional Expensive Problems IEEE Transactions on Evolutionary Computation, 21 (4). pp. 644-660.

T

Tang, Hongying, Balntas, V and Mikolajczyk, Krystian (2017) Binary Online Learned Descriptors IEEE Transactions on Pattern Analysis and Machine Intelligence, 40 (3). pp. 555-567.

Tian, Y, Cheng, R, Zhang, X, Cheng, F and Jin, Yaochu (2017) An Indicator Based Multi-Objective Evolutionary Algorithm with Reference Point Adaptation for Better Versatility IEEE Transactions on Evolutionary Computation, 22 (4). pp. 609-622.

Tian, Ye, Cheng, Ran, Zhang, Xingyi and Jin, Yaochu (2017) PlatEMO: A MATLAB Platform for Evolutionary Multi-Objective Optimization IEEE Computational Intelligence Magazine, 12 (4). pp. 73-87.

Tirunagari, Santosh (2017) Dynamic mode decomposition for computer vision and signal processing. Doctoral thesis, University of Surrey.

Tirunagari, Santosh, Abasolo, Daniel Emilio, Iorliam, A, Ho, Anthony and Poh, Norman (2017) Using Benford’s Law to Detect Anomalies in Electroencephalogram: An Application to Detecting Alzheimer’s Disease In: IEEE International Conference on Computational Intelligence in Bioinformatics and Computational Biology (IEEE CIBCB 2017), 23 - 25 August 2017, Manchester, UK.

Tirunagari, Santosh, Bull, S, Christopher, F, de Lusignan, Simon and Poh, Norman (2017) Automatically Detecting AKI Events from Primary Care Records In: BRS 2017 Conference, 2017-04-26 - 2017-04-28, Nottingham, UK.

Tirunagari, Santosh, Kouchaki, S, Abasolo, Daniel Emilio and Poh, Norman (2017) One Dimensional Local Binary Patterns of Electroencephalogram Signals for Detecting Alzheimer's Disease In: 22nd International Conference on Digital Signal Processing, August 23 - 25 2017, London, UK.

Tirunagari, Santosh, Poh, Norman, Wells, Kevin, Bober, Miroslaw, Gorden, I and Windridge, David (2017) Movement correction in DCE-MRI through windowed and reconstruction dynamic mode decomposition Machine Vision and Applications, 28 (3-4). pp. 393-407.

W

Wang, Handing, Jin, Yaochu and Doherty, John (2017) Committee-based Active Learning for Surrogate-Assisted Particle Swarm Optimization of Expensive Problems IEEE Transactions on Cybernetics, 47 (9). pp. 2664-2677.

Wang, Handing, Jin, Yaochu and Doherty, John (2017) A Generic Test Suite for Evolutionary Multi-Fidelity Optimization IEEE Transactions on Evolutionary Computation.

Whitefield, Jorden, Chen, Liqun, Giannetsos, Athanasios, Schneider, Steven and Treharne, Helen (2017) Privacy-Enhanced Capabilities for VANETs using Direct Anonymous Attestation In: 2017 IEEE Vehicular Networking Conference (VNC), November 27-29 2017, Turino, Italy.

Whitefield, Jorden, Chen, Liqun, Kargl, F, Paverd, A, Schneider, Steven, Treharne, Helen and Wesemeyer, Stephan (2017) Formal Analysis of V2X Revocation Protocols. Proceedings of STM’17. Lecture Notes in Computer Science., 10547. pp. 147-163.

Wiiliams, Nick and Li, Shujun (2017) Simulating human detection of phishing websites: An investigation into the applicability of ACT-R cognitive behaviour architecture model In: 3rd IEEE International Conference on Cybernetics (CYBCONF 2017), 21 - 23 June 2017, Exeter, England.

Y

Ye, Xin, Liu, Sihao, Yin, Yanli and Jin, Yaochu (2017) User-Oriented Many-Objective Cloud Workflow Scheduling Based on an Improved Knee Point Driven Evolutionary Algorithm Knowledge-Based Systems, 135. pp. 113-124.

Yuan, Haiyue, Li, Shujun, Rusconi, Patrice and Aljffan, N (2017) When Eye-tracking Meets Cognitive Modeling: Applications to Cyber Security Systems In: Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017; part of HCI International 2017, 2017-07-09 - 2017-07-14, Vancouver, Canada.

Z

Zakarya, Muhammad and Gillam, Lee (2017) An energy aware cost recovery approach for virtual machine migration In: Economics of Grids, Clouds, Systems, and Services. GECON 2016 Proceedings. LNCS 10382, 10382 . Springer, pp. 175-190.

Zhang, Xingyi, Zheng, Xiutao, Cheng, Ran, Qiu, Jianfeng and Jin, Yaochu (2017) A Competitive Mechanism Based Multi-objective Particle Swarm Optimizer with Fast Convergence Information Sciences, 427. pp. 63-76.

Zhou, Junwei, Duan, Hui, Liang, Kaitai, Yan, Qiao, Chen, Fei, Yu, F. Richard, Wu, Jieming and Chen, Jianyong (2017) Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation The Computer Journal,, 60 (8). pp. 1210-1222.

Zuo, Cong, Liang, Kaitai, Jiang, Zoe L, Shao, Jun and Fang, Junbin (2017) Cost-effective privacy-preserving vehicular urban sensing system Personal and Ubiquitous Computing, 21 (5). pp. 893-901.

This list was generated on Tue Apr 7 23:36:40 2020 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800