Skip to main content

Research Repository

Advanced Search

All Outputs (517)

TransSLC: skin lesion classification in dermatoscopic images using transformers. (2022)
Conference Proceeding
SARKER, M.M.K., MORENO-GARCÍA, C.F., REN, J. and ELYAN, E. 2022. TransSLC: skin lesion classification in dermatoscopic images using transformers. In Yang, G., Aviles-Rivero, A., Roberts, M. and Schönlieb, C.-B. (eds.) Medical image understanding and analysis: proceedings of 26th Medical image understanding and analysis 2022 (MIUA 2022), 27-29 July 2022, Cambridge, UK. Lecture notes in computer sciences, 13413. Cham: Springer [online], pages 651-660. Available from: https://doi.org/10.1007/978-3-031-12053-4_48

Early diagnosis and treatment of skin cancer can reduce patients' fatality rates significantly. In the area of computer-aided diagnosis (CAD), the Convolutional Neural Network (CNN) has been widely used for image classification, segmentation, and rec... Read More about TransSLC: skin lesion classification in dermatoscopic images using transformers..

Ensemble of deep learning models with surrogate-based optimization for medical image segmentation. (2022)
Conference Proceeding
DANG, T., LUONG, A.V., LIEW, A.W.C., MCCALL, J. and NGUYEN, T.T. 2022. Ensemble of deep learning models with surrogate-based optimization for medical image segmentation. In 2022 IEEE (Institute of Electrical and Electronics Engineers) Congress on evolutionary computation (CEC 2022), co-located with 2022 IEEE International joint conferences on neural networks (IJCNN 2022), 2022 IEEE International conference on fuzzy systems (FUZZ-IEEE 2022), 18-23 July 2022, Padua, Italy. Piscataway: IEEE (online), article #1030. Available from: https://doi.org/10.1109/CEC55065.2022.9870389

Deep Neural Networks (DNNs) have created a breakthrough in medical image analysis in recent years. Because clinical applications of automated medical analysis are required to be reliable, robust and accurate, it is necessary to devise effective DNNs... Read More about Ensemble of deep learning models with surrogate-based optimization for medical image segmentation..

Facility location problem and permutation flow shop scheduling problem: a linked optimisation problem. (2022)
Conference Proceeding
OGUNSEMI, A., MCCALL, J., KERN, M., LACROIX, B., CORSAR, D. and OWUSU, G. 2022. Facility location problem and permutation flow shop scheduling problem: a linked optimisation problem. In Fieldsend, J. (ed.) GECCO'22 companion: proceedings of 2022 Genetic and evolutionary computation conference companion, 9-13 July 2022, Boston, USA, [virtual event]. New York: ACM [online], pages 735-738. Available from: https://doi.org/10.1145/3520304.3529033

There is a growing literature spanning several research communities that studies multiple optimisation problems whose solutions interact, thereby leading researchers to consider suitable approaches to joint solution. Real-world problems, like supply... Read More about Facility location problem and permutation flow shop scheduling problem: a linked optimisation problem..

COVID-19, students and the new educational landscape. (2022)
Conference Proceeding
SIEGEL, A.A., ZARB, M., ANDERSON, E., CRANE, B., GAO, A., LATULIPE, C., LOVELLETTE, E., MCNEILL, F. and MEHARG, D. 2022. COVID-19, students and the new education landscape. In ITiCSE '22: proceedings of the 27th ACM (Association for Computing Machinery) conference on Innovation and technology in computer science education 2022 (ITiCSE'22), 8-13 July 2022, Dublin, Ireland. New York: ACM [online], pages 574-575. Available from: https://doi.org/10.1145/3502717.3532167

Students have experienced incredible shifts in the in their learning environments, brought about by the response of universities to the ever-changing public health mandates driven by waves and stages of the coronavirus pandemic (COVID-19). Initially,... Read More about COVID-19, students and the new educational landscape..

The intersection of evolutionary computation and explainable AI. (2022)
Conference Proceeding
BACARDIT, J., BROWNLEE, A.E.I., CAGNONI, S., IACCA, G., MCCALL, J. and WALKER, D. 2022. The intersection of evolutionary computation and explainable AI. In Fieldsend, J. (ed.) GECCO'22 companion: proceedings of 2022 Genetic and evolutionary computation conference companion, 9-13 July 2022, Boston, USA, [virtual event]. New York: ACM [online], pages 1757-1762. Available from: https://doi.org/10.1145/3520304.3533974

In the past decade, Explainable Artificial Intelligence (XAI) has attracted a great interest in the research community, motivated by the need for explanations in critical AI applications. Some recent advances in XAI are based on Evolutionary Computat... Read More about The intersection of evolutionary computation and explainable AI..

Data visualization using augmented reality for education: a systematic review. (2022)
Conference Proceeding
EKANAYAKE, I. and GAYANIKA, S. 2022. Data visualization using augmented reality for education: a systematic review. In Proceedings of the 7th International conference on business and industrial research (ICBIR 2022), 19-20 May 2022, Bangkok, Thailand. Bangkok: Thai-Nichi Institute of Technology, pages 533-537. Hosted on IEEE Xplore [online]. Available from: https://doi.org/10.1109/ICBIR54589.2022.9786403

Current education systems use data visualization to present the data in a more comprehensible format. Augmented data visualization is an extended version to present the data in a 2D or 3D form in our field of vision. This study conducted a systematic... Read More about Data visualization using augmented reality for education: a systematic review..

Keep the moving vehicle secure: context-aware intrusion detection system for in-vehicle CAN bus security. (2022)
Conference Proceeding
RAJAPAKSHA, S., KALUTARAGE, H., AL-KADRI, M.O., MADZUDZO, G. and PETROVSKI, A.V. 2022. Keep the moving vehicle secure: context-aware intrusion detection system for in-vehicle CAN bus security. In Jančárková, T., Visky, G. and Winther, I. (eds.). Proceedings of 14th International conference on Cyber conflict 2022 (CyCon 2022): keep moving, 31 May - 3 June 2022, Tallinn, Estonia. Tallinn: CCDCOE, pages 309-330. Hosted on IEEE Xplore [online]. Available from: https://doi.org/10.23919/CyCon55549.2022.9811048

The growth of information technologies has driven the development of the transportation sector, including connected and autonomous vehicles. Due to its communication capabilities, the controller area network (CAN) is the most widely used in-vehicle c... Read More about Keep the moving vehicle secure: context-aware intrusion detection system for in-vehicle CAN bus security..

Developing secured android applications by mitigating code vulnerabilities with machine learning. (2022)
Conference Proceeding
SENANAYAKE, J., KALUTARAGE, H., AL-KADRI, M.O., PETROVSKI, A. and PIRAS, L. 2022. Developing secured android applications by mitigating code vulnerabilities with machine learning. In ASIA CCS '22: proceedings of the 17th ACM (Association for Computing Machinery) Asia conference on computer and communications security 2022 (ASIA CCS 2022), 30 May - 3 June 2022, Nagasaki, Japan. New York: ACM [online], pages 1255-1257. Available from: https://doi.org/10.1145/3488932.3527290

Mobile application developers sometimes might not be serious about source code security and publish apps to the marketplaces. Therefore, it is essential to have a fully automated security solutions generator to integrate security-by-design into the d... Read More about Developing secured android applications by mitigating code vulnerabilities with machine learning..

Robust, effective and resource efficient deep neural network for intrusion detection in IoT networks. (2022)
Conference Proceeding
ZAKARIYYA, I., KALUTARAGE, H. and AL-KADRI, M.O. 2022. Robust, effective and resource efficient deep neural network for intrusion detection in IoT networks. In CPPS '22: proceedings of the 8th ACM (Association for Computing Machinery) Cyber-physical system security workshop 2022 (CPSS '22), co-located with the 17th ACM (Association for Computing Machinery) Asia conference on computer and communications security 2022 (ASIACCS '22) Nagasaki, Japan (virtual event). New York: ACM [online], pages 41-51. Available from: https://doi.org/10.1145/3494107.3522772

Internet of Things (IoT) devices are becoming increasingly popular and an integral part of our everyday lives, making them a lucrative target for attackers. These devices require suitable security mechanisms that enable robust and effective detection... Read More about Robust, effective and resource efficient deep neural network for intrusion detection in IoT networks..

Replacing human input in spam email detection using deep learning. (2022)
Conference Proceeding
NICHO, M., MAJDANI, F. and MCDERMOTT, C.D. 2022. Replacing human input in spam email detection using deep learning. In Degen, H. and NTOA, S. (eds.) Artificial intelligence in HCI: proceedings of 3rd International conference on artificial intelligence in HCI (human-computer interaction) 2022 (AI-HCI 2022), co-located with the 24th International conference on human-computer interaction 2022 (HCI International 2022), 26 June - 1 July 2022, [virtual conference]. Lecture notes in artificial intelligence (LNAI), 13336. Cham: Springer [online], pages 387-404. Available from: https://doi.org/10.1007/978-3-031-05643-7_25

The Covid-19 pandemic has been a driving force for a substantial increase in online activity and transactions across the globe. As a consequence, cyber-attacks, particularly those leveraging email as the preferred attack vector, have also increased e... Read More about Replacing human input in spam email detection using deep learning..

Estimation of chlorophyll concentration for environment monitoring in Scottish marine water. (2022)
Conference Proceeding
YAN, Y., ZHANG, Y., REN, J., HADJAL, M., MCKEE, D., KAO, F.-J., and DURRANI, T. 2022. Estimation of chlorophyll concentration for environment monitoring in Scottish marine water. In Liang, Q., Wang, W., Liu, X., Na, Z. and Zhang, B. (eds.) Communications, signal processing and systems: proceedings of the 10th International conference on Communications, signal processing and systems 2021 (CSPS 2021), 21-22 August 2021, Baishishan, China. Lecture notes in electrical engineering, 878. Singapore: Springer [online], 1, pages 582-587. Available from: https://doi.org/10.1007/978-981-19-0390-8_71

Marine Scotland is tasked with reporting on the environmental status of Scottish marine waters, an enormous area of water extending from the shoreline to deep oceanic waters. As one of the most important variables, chlorophyll concentration (Chl) pla... Read More about Estimation of chlorophyll concentration for environment monitoring in Scottish marine water..

Superpixel based sea ice segmentation with high-resolution optical images: analysis and evaluation. (2022)
Conference Proceeding
CHEN, S., YAN, Y., REN, J., HWANG, B., MARSHALL, S. and DARRANI, T. 2022. Superpixel based sea ice segmentation with high-resolution optical images: analysis and evaluation. In Liang, Q., Wang, W., Liu, X., Na, Z. and Zhang, B. (eds.) Communications, signal processing and systems: proceedings of the 10th International conference on Communications, signal processing and systems 2021 (CSPS 2021), 21-22 August 2021, Baishishan, China. Lecture notes in electrical engineering, 878. Singapore: Springer [online], 1, pages 1004-1012. Available from: https://doi.org/10.1007/978-981-19-0390-8_126

By grouping pixels with visual coherence, superpixel algorithms provide an alternative representation of regular pixel grid for precise and efficient image segmentation. In this paper, a multi-stage model is used for sea ice segmentation from the hig... Read More about Superpixel based sea ice segmentation with high-resolution optical images: analysis and evaluation..

A framework for privacy and security requirements analysis and conflict resolution for supporting GDPR compliance through privacy-by-design. (2022)
Conference Proceeding
ALKUBAISY, D., PIRAS, L., AL-OBEIDALLAH, M.G., COX, K. and MOURATIDIS, H. 2022. A framework for privacy and security requirements analysis and conflict resolution for supporting GDPR compliance through privacy-by-design. In Ali, R., Kaindl, H. and Maciaszek, L.A. (eds.). Evaluation of novel approaches to software engineering: revised selected papers from 16th International conference on Evaluation of novel approaches to software engineering 2021 (ENASE 2021), 26-27 April 2021, [virtual conference]. Communications in computer and information science, 1556. Cham: Springer [online], pages 67-87. Available from: https://doi.org/10.1007/978-3-030-96648-5_4

Requirements elicitation, analysis, and, above all, early detection of conflicts and resolution, are among the most important, strategic, complex and crucial activities for preventing software system failures, and reducing costs related to reengineer... Read More about A framework for privacy and security requirements analysis and conflict resolution for supporting GDPR compliance through privacy-by-design..

Integrated design framework for facilitating systems-theoretic process analysis. (2022)
Conference Proceeding
ALTAF, A., FAILY, S., DOGAN, H., THRON, E. and MYLONAS, A. 2022. Integrated design framework for facilitating systems-theoretic process analysis. In Katsikas, S., Lambrinoudakis, C., Cuppens, N. et al (eds.) Computer security: 26th European symposium on research in computer security (ESORICS 2021) international workshops: selected papers from 7th workshop on the security of industrial control systems of cyber-physical systems (CyberICPS 2021), co-located with SECPRE, ADIoT, SPOSE, CPS4CIP, CDT and SECOMANE, 4-8 October 2021, Darmstadt, Germany. Lecture notes in computer science (LNCS), 13106. Cham: Springer [online], pages 58-73. Available from: https://doi.org/10.1007/978-3-030-95484-0_4

Systems-Theoretic Process Analysis (STPA) helps mitigate identified safety hazards leading to unfortunate situations. Usually, a systematic step-by-step approach is followed by safety experts irrespective of any software based tool-support, but ident... Read More about Integrated design framework for facilitating systems-theoretic process analysis..

Cybersecurity user requirements analysis: the ECHO approach. (2022)
Conference Proceeding
KATOS, V., KI-ARIES, D., FAILY, S., GENCHEV, A., BOZHILOVA, M. and STOIANOV, N. 2022. Cybersecurity user requirements analysis: the ECHO approach. In: Shkarlet, S., Morozov, A., Palagin, A., Vinnikov, D., Stoianov, N., Zhelezniak, M. and Kazymyr, V. (eds.) Mathematical modeling and simulation of systems: selected papers from the proceedings of the 16th International scientific-practical conference on mathematical modeling and simulation of systems (MODS 2021), 28 June - 1 July 2021, Chernihiv, Ukraine. Lecture notes in networks and systems, 344. Cham: Springer [online], pages 405-421. Available from: https://link.springer.com/book/9783030899011

Cyber defense requires research and investment in advanced technological solution as well as in the development of effective methods and tools for identifying cyber threats and risks. This implies a need for a well-defined process for user requiremen... Read More about Cybersecurity user requirements analysis: the ECHO approach..

Use-case informed task analysis for secure and usable design solutions in rail. (2021)
Conference Proceeding
ALTAF, A., FAILY, S., DOGAN, H., MYLONAS, A. and THRON, E. 2021. Use-case informed task analysis for secure and usable design solutions in rail. In Percia, D.D., Mermoud, A. and Maillart, T. (eds.). Critical information infrastructures security: revised selected papers of 16th international conference on Critical information infrastructures security 2021 (CRITIS 2021), 27-29 September 2021, Lausanne, Switzerland. Lecture notes in computer science, 13139. Cham: Springer [online], pages 168-185. Available from: https://doi.org/10.1007/978-3-030-93200-8_10

Meeting secure and usable design goals needs the combined effort of safety, security and human factors experts. Human factors experts rely on a combination of cognitive and hierarchical task analysis techniques to support their work. We present an ap... Read More about Use-case informed task analysis for secure and usable design solutions in rail..

AI and cybersecurity 2021: proceedings of the 2021 Workshop on AI and cybersecurity (AI-Cybersec 2021) (2021)
Conference Proceeding
SANI, S. and KALUTARAGE, H. (eds.) 2021. AI and cybersecurity 2021: proceedings of the 2021 Workshop on AI and cybersecurity (AI-Cybersec 2021), co-located with the 41st Specialist Group on Artificial Intelligence international conference on artificial intelligence (SGAI 2021), 14 December 2021, [virtual event]. CEUR workshop proceedings, 3125. Aachen: CEUR-WS [online]. Available from: https://ceur-ws.org/Vol-3125/

This volume consists of the papers that were presented at the 1st International Workshop on Artificial Intelligence and Cyber Security, co-located with the 41st SGAI International Conference on Artificial Intelligence (AI-2021) on December 14th, 2021... Read More about AI and cybersecurity 2021: proceedings of the 2021 Workshop on AI and cybersecurity (AI-Cybersec 2021).

Teaching through a global pandemic: educational landscapes before, during and after COVID-19. (2021)
Conference Proceeding
SIEGEL, A.A., ZARB, M., ALSHAIGY, B., BLANCHARD, J., CRICK, T., GLASSEY, R., HOTT, J.R., LATULIPE, C., RIEDESEL, C., SENAPATHI, M., SIMON and WILLIAMS, D. 2021. Teaching through a global pandemic: educational landscapes before, during and after COVID-19. In ITiCSE-WGR '21: proceedings of the 26th ACM (Association for Computing Machinery) conference Working group reports on Innovation and technology in computer science education 2021, June 26 - July 1 2021, [virtual conference]. New York: ACM [online], pages 1-25. Available from: https://doi.org/10.1145/3502870.3506565

The coronavirus (COVID-19) pandemic has forced an unprecedented global shift within higher education in how instructors communicate with and educate students. This necessary paradigm shift has compelled educators to take a critical look at their teac... Read More about Teaching through a global pandemic: educational landscapes before, during and after COVID-19..

Streaming multi-layer ensemble selection using dynamic genetic algorithm. (2021)
Conference Proceeding
LUONG, A.V., NGUYEN, T.T. and LIEW, A.W.-C. 2021. Streaming multi-layer ensemble selection using dynamic genetic algorithm. In Zhou, J., Salvado, O., Sohel, F., Borges, P. and Wang, S. (eds.). Proceedings of 2021 Digital image computing: techniques and applications (DICTA 2021), 29 November - 1 December 2021, Gold Coast, Australia. Piscataway: IEEE [online], article 9647220. Available from: https://doi.org/10.1109/dicta52665.2021.9647220

In this study, we introduce a novel framework for non-stationary data stream classification problems by modifying the Genetic Algorithm to search for the optimal configuration of a streaming multi-layer ensemble. We aim to connect the two sub-fields... Read More about Streaming multi-layer ensemble selection using dynamic genetic algorithm..

DisCERN: discovering counterfactual explanations using relevance features from neighbourhoods. (2021)
Conference Proceeding
WIRATUNGA, N., WIJEKOON, A., NKISI-ORJI, I., MARTIN, K., PALIHAWADANA, C. and CORSAR, D. 2021. DisCERN: discovering counterfactual explanations using relevance features from neighbourhoods. In Proceedings of 33rd IEEE (Institute of Electrical and Electronics Engineers) International conference on tools with artificial intelligence 2021 (ICTAI 2021), 1-3 November 2021, Washington, USA [virtual conference]. Piscataway: IEEE [online], pages 1466-1473. Available from: https://doi.org/10.1109/ICTAI52525.2021.00233

Counterfactual explanations focus on 'actionable knowledge' to help end-users understand how a machine learning outcome could be changed to a more desirable outcome. For this purpose a counterfactual explainer needs to discover input dependencies tha... Read More about DisCERN: discovering counterfactual explanations using relevance features from neighbourhoods..