University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Academic/Research unit is "Faculty of Engineering and Physical Sciences > Computer Science"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Authors | Item Type | No Grouping
Jump to: A | B | C | D | F | G | H | K | L | M | N | P | R | S | T | W | X | Y | Z
Number of items: 57.

A

Almeida, José Bacelar, Baritel-Ruet, Cécile, Barbosa, Manuel, Barthe, Gilles, Dupressoir, François, Grégoire, Benjamin, Laporte, Vincent Laporte, Oliveira, Tiago, Stoughton, Alley and Strub, Pierre-Yves (2019) Machine-Checked Proofs for Cryptographic Standards In: 26th ACM Conference on Computer and Communications Security (CCS 2019), 11-15 Nov 2019, London, UK.

B

Bandyopadhyay, Anjan, Xhafa, Fatos, Mallik, Saurav, Krause, Paul, Mukhopadhyay, Sajal, Singh, Vikash Kumar and Maulik, Ujjwal (2019) A Framework for Allocation of IoT Devices to the Fog Service Providers in Strategic Setting In: International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 2019-11-07-2019-11-09, Antwerp, Belgium.

Belardinelli, F., Boureanu, I., Dima, C. and Malvone, V. (2019) Verifying Strategic Abilities in Multi-agent Systems with Private-Data Sharing In: 18th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2019), 2019-05-13-2019-05-17, Montreal, Canada.

C

Chen, Huangke, Cheng, Ran, Pedrycz, Witold and Jin, Yaochu (2019) Solving Many-Objective Optimization Problems via Multistage Evolutionary Search IEEE Transactions on Systems, Man, and Cybernetics: Systems. pp. 1-13.

Chothia, Tom, Boureanu, Ioana and Chen, Liqun (2019) Making Contactless EMV Robust Against Rogue Readers Colluding With Relay Attackers In: 23rd  International Conference on Financial Cryptography and Data Security (FC 19), 18–22 Feb 2019, St. Kitts Marriott Resort, St. Kitts.

Christidis, Angelos, Davies, Roy and Moschoyiannis, Sotiris (2019) Serving Machine Learning Workloads in Resource Constrained Environments - a Serverless Deployment Example In: IEEE SOCA 2019 (The 12th IEEE International Conference on Service Oriented Computing and Applications), 2019-11-18-2019-11-21, Kaohsiung, Taiwan.

D

Dalvandi, Mohammadsadegh, Butler, Michael and Fathabadi, Asieh Salehi (2019) SEB-CG: Code Generation Tool with Algorithmic Refinement Support for Event-B In: Workshop on Practical Formal Verification for Software Dependability (AFFORD 2019), 07 Oct 2019, Porto, Portugal.

Dalvandi, Mohammadsadegh and Dongol, Brijesh (2019) Towards Deductive Verification of C11 Programs with Event-B and ProB In: 21st Workshop on Formal Techniques for Java-like Programs (FTfJP 2019), 15-19 Jul 2019, Novotel London West, Hammersmith, London, United Kingdom.

Derrick, John, Doherty, Simon, Dongol, Brijesh, Schellhorn, Gerhard and Wehrheim, Heike (2019) Verifying Correctness of Persistent Concurrent Data Structures In: 23rd International Symposium on Formal Methods (FM'19), 07-11 Oct 2019, Porto, Portugal.

Dghaym, Dana, Dalvandi, Mohammadsadegh, Poppleton, Michael and Snook, Colin (2019) Formalising the Hybrid ERTMS Level 3 specification in iUML-B and Event-B International Journal on Software Tools for Technology Transfer.

Doherty, Simon, Dongol, Brijesh, Wehrheim, Heike and Derrick, John (2019) Verifying C11 Programs Operationally In: PPoPP 2019: 24th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming, 16–20 Feb 2019, Washington, DC, USA.

Dongol, Brijesh, Hayes, Ian, Meinicke, Larissa and Struth, Georg (2019) Cylindric Kleene Lattices for Program Construction In: 13th International Conference on Mathematics of Program Construction, 07-09 Oct 2019, Porto, Portugal.

Dongol, Brijesh, Jagadeesan, Radha and Riely, James (2019) Modular Transactions: Bounding Mixed Races in Space and Time In: PPoPP 2019: 24th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming, 16–20 Feb 2019, Washington, DC, USA.

F

Fathabadi, Asieh Salehi, Dalvandi, Mohammadsadegh, Butler, Michael and Al-Hashimi, Bashir M. (2019) Verifying Cross-layer Interactions through Formal Model-based Assertion Generation IEEE Embedded Systems Letters.

Feng, Qi, He, Debiao, Zeadally, Sherali, Kumar, Neeraj and Liang, Kaitai (2019) Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices IEEE Systems Journal, 13 (3). pp. 2775-2785.

Ferrag, Mohamed Amine, Maglaras, Leandros, Moschoyiannis, Sotiris and Janicke, Helge (2019) Deep Learning for Cyber Security Intrusion Detection: Approaches, Datasets, and Comparative Study Journal of Information Security and Applications.

G

Gardham, Daniel and Manulis, Mark (2019) Hierarchical Attribute-Based Signatures: Short Keys and Optimal Signature Length In: International Conference on Applied Cryptography and Network Security.

Gerault, David and Boureanu, Ioana (2019) Distance bounding under different assumptions In: ACM WiSec 2019, 2019-05-15-2019-05-17, Miami, Florida, USA.

Gillam, Lee (2019) Will Cloud Gain an Edge, or, CLOSER, to the Edge In: 8th International Conference (CLOSER 2018), 19-21 Mar 2018, Funchal, Madeira, Portugal.

Granger, Robert (2019) On the Enumeration of Irreducible Polynomials over GF(q) with Prescribed Coefficients Finite Fields and Their Applications, 57. pp. 156-229.

H

Han, Jinguang, Chen, Liqun, Schneider, Steve, Treharne, Helen and Wesemeyer, Steve (2019) Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials IEEE Transactions on Dependable and Secure Computing.

Han, Jinguang, Chen, Liqun, Susilo, Willy, Huang, Xinyi, Castiglione, Aniello and Liang, Kaitai (2019) Fine-grained information flow control using attributes Information Sciences, 484. pp. 167-182.

He, Cheng, Li, Lianghao, Tian, Ye, Zhang, Xingyi, Cheng, Ran, Jin, Yaochu and Yao, Xin (2019) Accelerating Large-scale Multi-objective Optimization via Problem Reformulation IEEE Transactions on Evolutionary Computation.

He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil and Loukas, George (2019) A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality IEEE Access, 7. pp. 50658-50668.

Huang, Meijuan, Yang, Bo, Zhao, Yi, Liang, Kaitai, Xue, Liang and Yang, Xiaoyi (2019) CCA-Secure Deterministic Identity-Based Encryption Scheme Journal of Universal Computer Science, 25 (3). pp. 245-269.

K

Karlsen, Matthew, Moschoyiannis, Sotiris K. and Georgiev, Vladmir (2019) Learning versus optimal intervention in random Boolean networks. Applied Network Science, 4, 129.

Karlsen, Matthew R., Moschoyiannis, Sotiris K. and Georgiev, Vlad B. (2019) Learning versus optimal intervention in random Boolean networks Applied Network Science, 4 (129).

Koutroumpouchos, Nikos, Ntantogian, Christoforos, Menesidou, Sofia-Anna, Liang, Kaitai, Gouvas, Panagiotis, Xenakis, Christos and Giannetsos, Thanassis (2019) Secure Edge Computing with Lightweight Control-Flow Property-based Attestation In: 2019 IEEE Conference on Network Softwarization (NetSoft 2019), 24-28 Jun 2019, Paris, France.

L

Lewis, James, Gerault, David and Boureanu, Ioana (2019) "Here and There at Once, with my Mobile Phone!" In: 16th International Conference on Security and Cryptography (Secrypt 2019), 2019-07-26-2019-07-28, Prague, Czech Republic.

Li, Yunpeng, Pal, Soumyasundar and Coates, Mark J. (2019) Invertible Particle-Flow-Based Sequential MCMC With Extension to Gaussian Mixture Noise Models IEEE TRANSACTIONS ON SIGNAL PROCESSING, 67 (9). pp. 2499-2512.

Liu, Jia and Manulis, Mark (2019) pRate: Anonymous Star Rating with Rating Secrecy In: International Conference on Applied Cryptography and Network Security.

Lu, Xiuhua, Wen, Qiaoyan, Yin, Wei, Liang, Kaitai, Jin, Zhengping, Panaousis, Emmanouil and Chen, Jiageng (2019) Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation Symmetry, 11 (2).

M

Mavropoulos, Orestis, Mouratidis, Haralambos, Fish, Andrew and Panaousis, Emmanouil (2019) Apparatus: A Framework for Security Analysis in Internet of Things Systems Ad Hoc Networks, 92 (101743).

Moschoyiannis, Sotiris, Maglaras, Leandros and Manaf, Nurulhuda A (2019) Trace-based Verification of Rule-based Service Choreographies In: The 11th IEEE International Conference on Service Oriented Computing and Applications (IEEE SOCA 2018), 20-22 Nov 2018, Paris, France.

Moschoyiannis, Sotiris and Shcherbinin, Vasily (2019) Fine tuning run parameter values in rule-based machine learning In: 3rd International Joint Conference on Rules and Reasoning (RuleML+RR 2019), 16-19 Sep 2019, Bolzano, Italy.

N

Ning, Jianting, Xu, Jia, Liang, Kaitai, Zhang, Fan and Chang, Ee-Chien (2019) Passive Attacks Against Searchable Encryption IEEE Transactions on Information Forensics and Security, 14 (3). pp. 789-802.

Ning, Zhenhu, Xu, Guangquan, Xiong, Naixue, Yang, Yongli, Shen, Changxiang, Panaousis, Emmanouil, Wang, Hao and Liang, Kaitai (2019) TAW: Cost-Effective Threshold Authentication with Weights for Internet of Things IEEE Access, 7. pp. 30112-30125.

P

Panda, Sakshyam, Woods, Daniel W, Laszka, Aron, Fielder, Andrew and Panaousis, Emmanouil (2019) Post-incident audits on cyber insurance discounts Computers & Security, 87, 101593. pp. 1-10.

Pang, Shanchen, Gao, Qian, Liu, Ting, He, Hua, Xu, Guangquan and Liang, Kaitai (2019) A Behavior Based Trustworthy Service Composition Discovery Approach in Cloud Environment IEEE Access, 7. pp. 56492-56503.

Papagiannis, Georgios and Moschoyiannis, Sotiris (2019) Learning to Control Random Boolean Networks: A Deep Reinforcement Learning Approach In: 8th International Conference on Complex Networks and their Applications (Complex Networks 2019), 10-12 Dec 2019, Lisbon, Portugal.

Partachi, Profir-Petru, Dash, Santanu, Treude, Christoph and Barr, Earl T. (2019) POSIT: Simultaneously Tagging Natural and Programming Languages In: (ICSE) International Conference on Software Engineering, May 23-29, 2020, Seoul, South Korea.

R

Rubio, Juan E., Manulis, Mark, Alcaraz, Cristina and Lopez, Javier (2019) Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics In: European Symposium on Research in Computer Security, Toulouse, France.

S

Sinnari, Doaa, Krause, Paul and Abulkhair, Maysoon (2019) Effectiveness and Usability of a Developed Collaborative Online Tool for Children with ADHD In: ArtsIT 2018 - 7th EAI International Conference: ArtsIT, Interactivity & Game Creation, 24-26 October 2018, Braga, Portugal.

Sun, Yanan, Wang, Handing, Xue, Bing, Jin, Yaochu, Yen, Gary G. and Zhang, Mengjie (2019) Surrogate-Assisted Evolutionary Deep Learning Using an End-to-End Random Forest-based Performance Predictor IEEE Transactions on Evolutionary Computation.

T

Tian, Ye, Cheng, Ran, Zhang, Xingyi, Li, Miqing and Jin, Yaochu (2019) Diversity Assessment of Multi-Objective Evolutionary Algorithms: Performance Metric and Benchmark Problems IEEE Computational Intelligence Magazine.

Tian, Ye, Zhang, Xingyi, Wang, Chao and Jin, Yaochu (2019) An Evolutionary Algorithm for Large-Scale Sparse Multi-Objective Optimization Problems IEEE Transactions on Evolutionary Computation.

Tian, Ye, Zheng, Xiutao, Zhang, Xingyi and Jin, Yaochu (2019) Efficient Large-Scale Multi-Objective Optimization Based on A Competitive Swarm Optimizer IEEE Transactions on Cybernetics.

W

Wang, Shuai, Liu, Jing and Jin, Yaochu (2019) Finding Influential Nodes in Multiplex Networks using a Memetic Algorithm IEEE Transactions on Cybernetics.

Wang, Shuai, Liu, Jing and Jin, Yaochu (2019) Robust Structural Balance in Signed Networks using a Multiobjective Evolutionary Algorithm IEEE Computational Intelligence Magazine.

Wang, Shuai, Liu, Jing and Jin, Yaochu (2019) Surrogate-Assisted Robust Optimization of Large-scale Networks Based on Graph Embedding IEEE Transactions on Evolutionary Computation.

Whitefield, Jorden, Chen, Liqun, Sasse, Ralf, Schneider, Steve, Treharne, Helen and Wesemeyer, Stephan (2019) A Symbolic Analysis of ECC-based Direct Anonymous Attestation In: 4th IEEE European Symposium on Security and Privacy, 17-19 Jun 2019, Stockholm, Sweden.

X

Xhafa, Fatos, Kilic, Burak and Krause, Paul (2019) Evaluation of IoT stream processing at edge computing layer for semantic data enrichment Future Generation Computer Systems, 105. pp. 730-736.

Y

Yang, Cuie, Ding, Jinliang, Jin, Yaochu and Chai, Tianyou (2019) Off-line Data-driven Multi-objective Optimization: Knowledge Transfer between Surrogates and Generation of Final Solutions IEEE Transactions on Evolutionary Computation.

Yang, Mengmeng, Zhu, Tianqing, Liang, Kaitai, Zhou, Wanlei and Deng, Robert H. (2019) A blockchain-based location privacy-preserving crowdsensing system Future Generation Computer Systems, 94. pp. 408-418.

Yu, Guo, Jin, Yaochu and Olhofer, Markus (2019) Benchmark Problems and Performance Indicators for Search of Knee Points in Multi-objective Optimization IEEE Transactions on Cybernetics. pp. 1-14.

Z

Zakarya, Muhammad and Gillam, Lee (2019) Managing energy, performance and cost in large scale heterogeneous datacenters using migrations Future Generation Computer Systems, 93. pp. 529-547.

Zakarya, Muhammad and Gillam, Lee (2019) Modelling resource heterogeneities in cloud simulations and quantifying their accuracy Simulation Modelling Practice and Theory, 94. pp. 43-65.

This list was generated on Sun Mar 29 05:43:42 2020 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800