Computer Science


TitleComputer Science
AlternativeS&T - CS
FacultyFaculty of Science and Technology

Latest research outputs

Sort by Date Title
Enhancing individual UAV path planning with Parallel Multi-Swarm Treatment Coronavirus Herd Immunity Optimizer (PMST-CHIO) algorithm
Fouad, A., Abboudi, A., Huyck, C., Gao, X., Bououden, S., Boulkaibet, I., Khezami, N. and Shall, H. 2024. Enhancing individual UAV path planning with Parallel Multi-Swarm Treatment Coronavirus Herd Immunity Optimizer (PMST-CHIO) algorithm. IEEE Access. https://doi.org/10.1109/ACCESS.2024.3367753

Article

Digital exclusion and relative digital deprivation: Exploring factors and moderators of internet non-use in the UK
Ueno, A., Dennis, C. and Dafoulas, G. 2023. Digital exclusion and relative digital deprivation: Exploring factors and moderators of internet non-use in the UK. Technological Forecasting and Social Change. 197. https://doi.org/10.1016/j.techfore.2023.122935

Article

MesoGraph: automatic profiling of mesothelioma subtypes from histological images
Eastwood, M., Sailem, H., Marc, S., Gao, X., Offman, J., Karteris, E., Fernandez, A., Jonigk, D., Cookson, W., Moffatt, M., Popat, S., Minhas, F. and Robertus, J. 2023. MesoGraph: automatic profiling of mesothelioma subtypes from histological images. Cell Reports Medicine. 4 (10). https://doi.org/10.1016/j.xcrm.2023.101226

Article

Building an intelligent edge environment to provide essential services in smart cities
Karthick, G., Mapp, G. and Crowcroft, J. 2023. Building an intelligent edge environment to provide essential services in smart cities. 18th Workshop on Mobility in the Evolving Internet Architecture . Madrid Spain 06 - 06 Oct 2023 New York, NY, United States Association for Computing Machinery (ACM). pp. 13-18 https://doi.org/10.1145/3615587.3615987

Conference paper

A spiking model of Cell Assemblies: Short term and associative memory
Huyck, C. 2023. A spiking model of Cell Assemblies: Short term and associative memory. Medical Research Archives. 11 (9), pp. 1-20. https://doi.org/10.18103/mra.v11i9.4406

Article

Leveraging oversampling techniques in machine learning models for multi-class malware detection in smart home applications
Chowdhury, A., Isalm, M., Kaisar, S., Naha, R., Khoshkholghi, A., Aiash, M. and Khoda, M. Leveraging oversampling techniques in machine learning models for multi-class malware detection in smart home applications. IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) .

Conference paper

Visual attribution using Adversarial Latent Transformations
Zia, T., Wahab, A., Windridge, D., Tirunagari, S. and Bhatti, N. 2023. Visual attribution using Adversarial Latent Transformations. Computers in Biology and Medicine. https://doi.org/10.1016/j.compbiomed.2023.107521

Article

Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain
Edris, E., Aiash, M., Khoshkholghi, A., Naha, R., Chowdhury, A. and Loo, J. 2023. Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain. Internet of Things. 24. https://doi.org/10.1016/j.iot.2023.100913

Article

Intelligence and consciousness in natural and artificial systems
Gamez, D. 2023. Intelligence and consciousness in natural and artificial systems. in: Chella, A. (ed.) Computational Approaches to Conscious Artificial Intelligence World Scientific.

Book chapter

Pediatrics in artificial intelligence era: A systematic review on challenges, opportunities, and explainability
Balla, Y., Tirunagari, S. and Windridge, D. 2023. Pediatrics in artificial intelligence era: A systematic review on challenges, opportunities, and explainability. Indian Pediatrics. 60 (7), pp. 561-569. https://doi.org/10.1007/s13312-023-2936-8

Article

Malignant Mesothelioma subtyping via sampling driven multiple instance prediction on tissue image and cell morphology data
Eastwood, M., Marc, S., Gao, X., Sailem, H., Offman, J., Karteris, E., Montero Fernandez, A., Jonigk, D., Cookson, W., Moffatt, M., Popat, S., Minhas, F. and Robertus, J. 2023. Malignant Mesothelioma subtyping via sampling driven multiple instance prediction on tissue image and cell morphology data. Artificial Intelligence in Medicine. 143. https://doi.org/10.1016/j.artmed.2023.102628

Article

Android code vulnerabilities early detection using AI-powered ACVED plugin
Senanayake, J., Kalutarage, H., Al-Kadri, M.O., Petrovski, A. and Piras, L. 2023. Android code vulnerabilities early detection using AI-powered ACVED plugin. Atluri, V. and Ferrara, A. (ed.) 37th Annual IFIP WG 11.3 Conference (DBSec 2023). Sophia-Antipolis, France 19 - 21 Jul 2023 Cham Springer. pp. 339–357 https://doi.org/10.1007/978-3-031-37586-6_20

Conference paper

A.I.: Artificial Intelligence as philosophy: Machine consciousness and intelligence
Gamez, D. 2023. A.I.: Artificial Intelligence as philosophy: Machine consciousness and intelligence. in: Johnson, D., Kowalski, D., Lay, C. and Engels, K. (ed.) The Palgrave Handbook of Popular Culture as Philosophy Palgrave Macmillan.

Book chapter

IoT-based emergency vehicle services in intelligent transportation system
Chowdhury, A., Kaisar, S., E.Khoda, M., Naha, R., Khoshkholghi, A. and Aiash, M. 2023. IoT-based emergency vehicle services in intelligent transportation system. Sensors. 23 (11). https://doi.org/10.3390/s23115324

Article

Efficient design for smart environment using Raspberry Pi with Blockchain and IoT (BRIoT)
Ponugumati, S., Ali, K., Lasebae, A., Zahoor, Z., Kiyani, A., Khoshkholghi, A. and Maddu, L. 2023. Efficient design for smart environment using Raspberry Pi with Blockchain and IoT (BRIoT). CCGridW: 4th Workshop on Secure IoT, Edge and Cloud Systems (SioTEC) 2023. Bangalore, India 01 - 04 May 2023 IEEE. pp. 75-80 https://doi.org/10.1109/CCGridW59191.2023.00026

Conference paper

Information fusion-based cybersecurity threat detection for intelligent transportation system
Chowdhury, A., Naha, R., Kaisar, S., Khoshkholghi, A., Ali, K. and Galletta, A. 2023. Information fusion-based cybersecurity threat detection for intelligent transportation system. CCGridW: 4th Workshop on Secure IoT, Edge and Cloud Systems (SioTEC) 2023. Bangalore, India 01 - 04 May 2023 Bangalore, India IEEE. pp. 96-103 https://doi.org/10.1109/CCGridW59191.2023.00029

Conference paper

Consciousness technology in Black Mirror. Do cookies feel pain?
Gamez, D. and Johnson, D. 2020. Consciousness technology in Black Mirror. Do cookies feel pain? in: Johnson, D. (ed.) Black Mirror and Philosophy WileyBlackwell. pp. 273-281

Book chapter

Applying motivational techniques for user adherence to adopt a healthy lifestyle in a gamified application
Fatima, S., Augusto, J., Moseley, R., Urbonas, P., Elliott, A. and Payne, N. 2023. Applying motivational techniques for user adherence to adopt a healthy lifestyle in a gamified application. Entertainment Computing. 46. https://doi.org/10.1016/j.entcom.2023.100571

Article

Effects of camera position on perception of self in 360 degree video and virtual environments
Philpot, A. 2017. Effects of camera position on perception of self in 360 degree video and virtual environments. TVX '17: ACM International Conference on Interactive Experiences for TV and Online Video. Hilversum, The Netherlands 14 - 16 Jun 2017 ACM. pp. 87-97 https://doi.org/10.1145/3084289.3084290

Conference item

Resource saving via ensemble techniques for quantum neural networks
Incudini, M., Grossi, M., Ceschini, A., Mandarino, A., Panella, M., Vallecorsa, S. and Windridge, D. 2023. Resource saving via ensemble techniques for quantum neural networks. https://doi.org/10.48550/arXiv.2303.11283

Pre-print

IHWC: intelligent hidden web crawler for harvesting data in urban domains
Kaur, S., Singh, A., Geetha, G. and Cheng, X. 2021. IHWC: intelligent hidden web crawler for harvesting data in urban domains. Complex & Intelligent Systems. https://doi.org/10.1007/s40747-022-00839-x

Article

Generative recorrupted-to-recorrupted: an unsupervised image denoising network for arbitrary noise distribution
Liu, Y., Wan, B., Shi, D. and Cheng, X. 2023. Generative recorrupted-to-recorrupted: an unsupervised image denoising network for arbitrary noise distribution. Remote Sensing. 15 (2). https://doi.org/10.3390/rs15020364

Article

Developing a novel digital forensics readiness framework for wireless medical networks using specialised logging
Mpungu, C., George, C. and Mapp, G. 2023. Developing a novel digital forensics readiness framework for wireless medical networks using specialised logging. Jahankhani, H. (ed.) 14th ICGS3-22: International Conference on Global Security, Safety and Sustainability. Virtual Conference 07 - 08 Sep 2022 Springer. pp. 203-226 https://doi.org/10.1007/978-3-031-20160-8_12

Conference paper

Android source code vulnerability detection: a systematic literature review
Senanayake, J., Kalutarage, H., Al-Kadri, M., Petrovski, A. and Piras, L. 2023. Android source code vulnerability detection: a systematic literature review. ACM Computing Surveys. 55 (9). https://doi.org/10.1145/3556974

Article

A framework for strategic planning of data analytics in the educational sector
Tsiakara, A. 2022. A framework for strategic planning of data analytics in the educational sector. Masters thesis Middlesex University Computer Science

Masters thesis

Artificial intelligence and automation in endoscopy and surgery
Chadebecq, F., Lovat, L. and Stoyanov, D. 2023. Artificial intelligence and automation in endoscopy and surgery. Nature Reviews Gastroenterology and Hepatology. 20 (3), pp. 171-182. https://doi.org/10.1038/s41575-022-00701-y

Article

Identifying key mechanisms leading to visual recognition errors for missed colorectal polyps using eye-tracking technology
Ahmad, O., Mazomenos, E., Chadebecq, F., Kader, R., Hussein, M., Haidry, R., Puyal, J., Brandao, P., Toth, D. and Mountney, P. 2023. Identifying key mechanisms leading to visual recognition errors for missed colorectal polyps using eye-tracking technology. Journal of Gastroenterology and Hepatology. 38 (5), pp. 768-774. https://doi.org/10.1111/jgh.16127

Article

Knowledge management for the micro enterprise: a taxonomy
Hall, S., Smith, S., Baskent, C. and De Raffaele, C. 2023. Knowledge management for the micro enterprise: a taxonomy. Matos, F. and Rosa, A. (ed.) 24th European Conference on Knowledge Management. Lisboa, Portugal 07 - 08 Sep 2023 Academic Conferences International. https://doi.org/10.34190/eckm.24.1.1268

Conference paper

FedREVAN: real-time detection of vulnerable Android source code through federated neural network with XAI
Senanayake, J., Kalutarage, H., Petrovski, A., Al-Kadri, M. and Piras, L. 2023. FedREVAN: real-time detection of vulnerable Android source code through federated neural network with XAI. ESORICS Workshop on Attacks and Software Protection (WASP). The Hague, The Netherlands 25 - 29 Sep 2023 Springer.

Conference paper

Bridging neuroscience and robotics: spiking neural networks in action
Jones, A., Gandhi, V., Mahiddine, A. and Huyck, C. 2023. Bridging neuroscience and robotics: spiking neural networks in action. Sensors. 23 (21), pp. 1-14. https://doi.org/10.3390/s23218880

Article

A topological features based quantum kernel
Incudini, M., Martini, F., Di Pierro, A. and Windridge, D. 2023. A topological features based quantum kernel. 7th International Conference on Quantum Techniques in Machine Learning. CERN, Geneva 19 - 24 Nov 2023

Conference paper

Review of parameter tuning methods for nature-inspired algorithms
Joy, G., Huyck, C. and Yang, X. 2023. Review of parameter tuning methods for nature-inspired algorithms. in: Yang, X. (ed.) Benchmarks and Hybrid Algorithms in Optimization and Applications Singapore Springer. pp. 33-47

Book chapter

A new perceptron based neural-network algorithm to enhance the scheduling performance of safety-critical WSNs of increased dependability
Al-Nader, I, Lasebae, A. and Raheem, R. 2023. A new perceptron based neural-network algorithm to enhance the scheduling performance of safety-critical WSNs of increased dependability. 8th World Conference on Information Systems for Business Management. Bangkok, Thailand 07 - 08 Sep 2023 Springer.

Conference paper

Using Hidden Markov Chain for improving the dependability of safety-critical WSNs
Al-Nader, I., Lasebae, A. and Raheem, R. 2023. Using Hidden Markov Chain for improving the dependability of safety-critical WSNs. Barolli, L. (ed.) 37th International Conference on Advanced Information Networking and Applications. Federal University of Juiz de Fora, Brazil 29 - 31 Mar 2023 Cham, Switzerland. Springer. pp. 460–472 https://doi.org/10.1007/978-3-031-29056-5_40

Conference paper

Deep combination of radar with optical data for gesture recognition: role of attention in fusion architectures
Towakel, P., Windridge, D. and Nguyen, H. 2023. Deep combination of radar with optical data for gesture recognition: role of attention in fusion architectures. IEEE Transactions on Instrumentation and Measurement. 72, pp. 1-15. https://doi.org/10.1109/TIM.2023.3307768

Article

Associative memory with biologically-inspired cell assemblies
Ji, Y., Gamez, D. and Huyck, C. 2023. Associative memory with biologically-inspired cell assemblies. Samsonovich, A.V. and Liu, T. (ed.) 2023 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence, the 14th Annual Meeting of the BICA Society (BICA*AI 2023). Ningbo, China 13 - 15 Oct 2023 Springer.

Conference paper

Labelled vulnerability dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models
Senanayake, J., Kalutarage, H., Al-Kadri, M., Piras, L. and Petrovski, A. 2023. Labelled vulnerability dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models. International Conference on Security and Cryptography (SECRYPT) 2023. Rome, Italy 10 - 12 Jul 2023 Rome (IT) SciTePress. pp. 659-666 https://doi.org/10.5220/0012060400003555

Conference paper

Goal-modeling privacy-by-design patterns for supporting GDPR compliance
Al-Obeidallah, M., Piras, L., Iloanugo, O., Mouratidis, H., Alkubaisy, D and Dellagiacoma, D. 2023. Goal-modeling privacy-by-design patterns for supporting GDPR compliance. International Conference on Software Technologies (ICSOFT). Rome (Italy) 10 - 12 Jul 2023 Rome (IT) SciTePress. https://doi.org/10.5220/0012080700003538

Conference paper

The quantum path kernel: A generalized neural tangent kernel for deep quantum machine learning
Incudini, M., Grossi, M., Mandarino, A., Vallecorsa, S., Di Pierro, A. and Windridge, D. 2023. The quantum path kernel: A generalized neural tangent kernel for deep quantum machine learning. IEEE Transactions on Quantum Engineering. 4. https://doi.org/10.1109/TQE.2023.3287736

Article

CAGE: Consensus Algorithm Genetically Enhanced
Mitchell, I. and Kamil, M. 2023. CAGE: Consensus Algorithm Genetically Enhanced. Virtual 15th International Conference on Global Security, Safety & Sustainability. Online Springer.

Conference paper