Skip to main content

Research Repository

Advanced Search

All Outputs (8)

Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things. (2024)
Journal Article
OTOKWALA, U., PETROVSKI, A. and KALUTARAGE, H. [2024]. Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things. International journal of information security [online], Latest Articles. Available from: https://doi.org/10.1007/s10207-024-00855-7

Embedded systems, including the Internet of Things (IoT), play a crucial role in the functioning of critical infrastructure. However, these devices face significant challenges such as memory footprint, technical challenges, privacy concerns, performa... Read More about Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things..

Exploring representations for optimising connected autonomous vehicle routes in multi-modal transport networks using evolutionary algorithms. (2024)
Journal Article
HAN, K., CHRISTIE, L.A., ZAVOIANU, A.-C. and MCCALL, J.A.W. 2024. Exploring representations for optimising connected autonomous vehicle routes in multi-modal transport networks using evolutionary algorithms. IEEE transactions on intelligent transportation systems, [online], Early Access. Available from: https://doi.org/10.1109/TITS.2024.3374550

The past five years have seen rapid development of plans and test pilots aimed at introducing connected and autonomous vehicles (CAVs) in public transport systems around the world. While self-driving technology is still being perfected, public transp... Read More about Exploring representations for optimising connected autonomous vehicle routes in multi-modal transport networks using evolutionary algorithms..

FedREVAN: real-time detection of vulnerable android source code through federated neural network with XAI. (2024)
Conference Proceeding
SENANAYAKE, J., KALUTARAGE, H., PETROVSKI, A., AL-KADRI, M.O. and PIRAS, L. 2024. FedREVAN: real-time detection of vulnerable android source code through federated neural network with XAI. In Katsikas, S. et al. (eds.) Computer security: revised selected papers from the proceedings of the International workshops of the 28th European symposium on research in computer security (ESORICS 2023 International Workshops), 25-29 September 2023, The Hague, Netherlands. Lecture notes in computer science, 14399. Cham: Springer [online], part II, pages 426-441. Available from: https://doi.org/10.1007/978-3-031-54129-2_25

Adhering to security best practices during the development of Android applications is of paramount importance due to the high prevalence of apps released without proper security measures. While automated tools can be employed to address vulnerabiliti... Read More about FedREVAN: real-time detection of vulnerable android source code through federated neural network with XAI..

Generalizing infrastructure inspection: step transfer learning aided extreme learning machine for automated crack detection in concrete structures. (2024)
Journal Article
SOHAIB, M., HASAN, M.J., CHEN, J. and ZHENG, Z. 2024. Generalizing infrastructure inspection: step transfer learning aided extreme learning machine for automated crack detection in concrete structures. Measurement science and technology [online], 35(5): AI-driven measurement methods for resilient infrastructure and communities, article number 055402. Available from: https://doi.org/10.1088/1361-6501/ad296c

Identification of damage and selection of a restoration strategy in concrete structures is contingent upon automatic inspection for crack detection and assessment. Most research on deep learning models for autonomous inspection has focused solely on... Read More about Generalizing infrastructure inspection: step transfer learning aided extreme learning machine for automated crack detection in concrete structures..

Two-layer ensemble of deep learning models for medical image segmentation. [Article] (2024)
Journal Article
DANG, T., NGUYEN, T.T., MCCALL, J., ELYAN, E. and MORENO-GARCÍA, C.F. 2024. Two-layer ensemble of deep learning models for medical image segmentation. Cognitive computation [online], In Press. Available from: https://doi.org/10.1007/s12559-024-10257-5

One of the most important areas in medical image analysis is segmentation, in which raw image data is partitioned into structured and meaningful regions to gain further insights. By using Deep Neural Networks (DNN), AI-based automated segmentation al... Read More about Two-layer ensemble of deep learning models for medical image segmentation. [Article].

TPAAD: two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network. (2024)
Journal Article
NISA, N., KHAN, A.S., AHMAD, Z. and ABDULLAH, J. 2024. TPAAD: two-phase authentication system for denial of service attack detection and mitigation using machine learning in software-defined network. International journal of network management [online], Early View, article number e2258. Available from: https://doi.org/10.1002/nem.2258

Software-defined networking (SDN) has received considerable attention and adoption owing to its inherent advantages, such as enhanced scalability, increased adaptability, and the ability to exercise centralized control. However, the control plane of... Read More about TPAAD: two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network..

Detection-driven exposure-correction network for nighttime drone-view object detection. (2024)
Journal Article
XI, Y., JIA, W., MIAO, Q., FENG, J., REN, J. and LUO, H. 2024. Detection-driven exposure-correction network for nighttime drone-view object detection. IEEE transactions on geoscience and remote sensing [online], 62, article number 5605014. Available from: https://doi.org/10.1109/TGRS.2024.3351134

Drone-view object detection (DroneDet) models typically suffer a significant performance drop when applied to nighttime scenes. Existing solutions attempt to employ an exposure-adjustment module to reveal objects hidden in dark regions before detecti... Read More about Detection-driven exposure-correction network for nighttime drone-view object detection..

Feature aggregation and region-aware learning for detection of splicing forgery. (2024)
Journal Article
XU, Y., ZHENG, J., REN, J. and FANG, A. 2024. Feature aggregation and region-aware learning for detection of splicing forgery. IEEE signal processing letters [online], 31, pages 696-700. Available from: https://doi.org/10.1109/LSP.2023.3348689

Detection of image splicing forgery become an increasingly difficult task due to the scale variations of the forged areas and the covered traces of manipulation from post-processing techniques. Most existing methods fail to jointly multi-scale local... Read More about Feature aggregation and region-aware learning for detection of splicing forgery..