Skip to main content

Research Repository

Advanced Search

Outputs (99)

Similarity score of two images using different measures. (2021)
Conference Proceeding
APPANA, V., GUTTIKONDA, T.M., SHREE, D., BANO, S. and KURRA, H. 2021. Similarity score of two images using different measures. In Proceedings of the 6th International conference on inventive computation technologies (ICICT 2021), 20-22 January 2021, Coimbatore, India. Piscataway: IEEE [online], pages 741-746. Available from: https://doi.org/10.1109/ICICT50816.2021.9358789

In the field of computer vision and image processing, image similarity has been a central concern for decades. If you compare two pictures, Image Similarity returns a value that tells you how physically they are close. A quantitative measure of the d... Read More about Similarity score of two images using different measures..

Evaluating privacy: determining user privacy expectations on the web. (2021)
Journal Article
PILTON, C., FAILY, S., and HENRIKSEN-BULMER, J. 2021. Evaluating privacy: determining user privacy expectations on the web. Computers and security [online], 105, article 102241. Available from: https://doi.org/10.1016/j.cose.2021.102241

Individuals don’t often have privacy expectations. When asked to consider them, privacy realities were frequently perceived not to meet these expectations. Some websites exploit the trust of individuals by selling, sharing, or analysing their data. W... Read More about Evaluating privacy: determining user privacy expectations on the web..

Fusion of infrared and visible images for remote detection of low-altitude slow-speed small targets. (2021)
Journal Article
SUN, H., LIU, Q., WANG, J., REN, J., WU, Y., ZHAO, H. and LI, H. 2021. Fusion of infrared and visible images for remote detection of low-altitude slow-speed small targets. IEEE journal of selected topics in applied earth observations and remote sensing [online], 14, pages 2971-2983. Available from: https://doi.org/10.1109/JSTARS.2021.3061496

Detection of the low-altitude and slow-speed small (LSS) targets is one of the most popular research topics in remote sensing. Despite of a few existing approaches, there is still an accuracy gap for satisfying the practical needs. As the LSS targets... Read More about Fusion of infrared and visible images for remote detection of low-altitude slow-speed small targets..

A new cost function for spatial image steganography based on 2D-SSA and WMF. (2021)
Journal Article
XIE, G., REN, J., MARSHALL, S., ZHAO, H. and LI, H. 2021. A new cost function for spatial image steganography based on 2D-SSA and WMF. IEEE access [online], 9, pages 30604-30614. Available from: https://doi.org/10.1109/ACCESS.2021.3059690

As an essential tool for secure communications, adaptive steganography aims to communicate secret information with the least security cost. Inspired by the Ranking Priority Profile (RPP), we propose a novel two-step cost function for adaptive stegano... Read More about A new cost function for spatial image steganography based on 2D-SSA and WMF..

LTMS: a lightweight trust management system for wireless medical sensor networks. (2021)
Conference Proceeding
HAJAR, M.S., AL-KADRI, M.O. and KALUTARAGE, H. 2020. LTMS: a lightweight trust management system for wireless medical sensor networks. In Wang, G., Ko, R., Bhuiyan, M.Z.A. and Pan, Y. (eds.). Proceedings of 19th Institute of Electrical and Electronics Engineers (IEEE) Trust, security and privacy in computing and communication international conference 2020 (TrustCom 2020), 29 Dec 2020 - 1 Jan 2021, Guangzhou, China. Piscataway: IEEE [online], pages 1783-1790. Available from: https://doi.org/10.1109/TrustCom50675.2020.00245

Wireless Medical Sensor Networks (WMSNs) offer ubiquitous health applications that enhance patients' quality of life and support national health systems. Detecting internal attacks on WMSNs is still challenging since cryptographic measures can not pr... Read More about LTMS: a lightweight trust management system for wireless medical sensor networks..

Evaluating explainability methods intended for multiple stakeholders. (2021)
Journal Article
MARTIN, K., LIRET, A., WIRATUNGA, N., OWUSU, G. and KERN, M. 2021. Evaluating explainability methods intended for multiple stakeholders. KI - Künstliche Intelligenz [online], 35(3-4), pages 397-411. Available from: https://doi.org/10.1007/s13218-020-00702-6

Explanation mechanisms for intelligent systems are typically designed to respond to specific user needs, yet in practice these systems tend to have a wide variety of users. This can present a challenge to organisations looking to satisfy the explanat... Read More about Evaluating explainability methods intended for multiple stakeholders..

A survey on wireless body area networks: architecture, security challenges and research opportunities. (2021)
Journal Article
HAJAR, M.S., AL-KADRI, M.O. and KALUTARAGE, H.K. 2021. A survey on wireless body area networks: architecture, security challenges and research opportunities. Computers and security [online], 104, article ID 102211. Available from: https://doi.org/10.1016/j.cose.2021.102211

In the era of communication technologies, wireless healthcare networks enable innovative applications to enhance the quality of patients’ lives, provide useful monitoring tools for caregivers, and allows timely intervention. However, due to the sensi... Read More about A survey on wireless body area networks: architecture, security challenges and research opportunities..

Particle swarm optimization for automatically evolving convolutional neural networks for image classification. (2021)
Journal Article
LAWRENCE, T., ZHANG, L., LIM, C.P. and PHILLIPS, E.-J. 2021. Particle swarm optimization for automatically evolving convolutional neural networks for image classification. IEEE access [online], 9, pages 14369-14386. Available from: https://doi.org/10.1109/ACCESS.2021.3052489

Designing Convolutional Neural Networks from scratch is a time-consuming process that requires specialist expertise. While automated architecture generation algorithms have been proposed, the underlying search strategies generally are computationally... Read More about Particle swarm optimization for automatically evolving convolutional neural networks for image classification..

Resource efficient boosting method for IoT security monitoring. (2021)
Conference Proceeding
ZAKARIYYA, I., AL-KADRI, M.O. and KALUTARAGE, H. 2021. Resource efficient boosting method for IoT security monitoring. In Proceedings of 18th Institute of Electrical and Electronics Engineers (IEEE) Consumer communications and networking conference 2021 (CCNC 2021), 9-12 January 2021, [virtual conference]. Piscataway: IEEE [online], article 9369620. Available from: https://doi.org/10.1109/ccnc49032.2021.9369620

Machine learning (ML) methods are widely proposed for security monitoring of Internet of Things (IoT). However, these methods can be computationally expensive for resource constraint IoT devices. This paper proposes an optimized resource efficient ML... Read More about Resource efficient boosting method for IoT security monitoring..