Computer Science


TitleComputer Science
AlternativeS&T - CS
FacultyFaculty of Science and Technology

Latest research outputs

Sort by Date Title
A qualitative assessment of machine learning support for detecting data completeness and accuracy issues to improve data analytics in big data for the healthcare industry
Juddoo, S. and George, C. 2020. A qualitative assessment of machine learning support for detecting data completeness and accuracy issues to improve data analytics in big data for the healthcare industry. 3rd International Conference on Emerging Trends in Electrical, Electronic and Communications Engineering. Balaclava, Mauritius 25 - 27 Nov 2020 IEEE. pp. 58-66 https://doi.org/10.1109/ELECOM49001.2020.9297009

Conference paper

Context-aware system for cardiac condition monitoring and management: a survey
Ogbuabor, G., Augusto, J., Moseley, R. and Van Wyk, A. 2020. Context-aware system for cardiac condition monitoring and management: a survey. Behaviour and Information Technology. 41 (4), pp. 759-776. https://doi.org/10.1080/0144929X.2020.1836255

Article

Transfer learning for endoscopy disease detection and segmentation with mask-RCNN benchmark architecture
Rezvy, S., Zebin, T., Pang, W., Taylor, S. and Gao, X. 2020. Transfer learning for endoscopy disease detection and segmentation with mask-RCNN benchmark architecture. 2nd International Workshop and Challenge on Computer Vision in Endoscopy. Iowa City, United States 03 Apr 2020 pp. 68-72

Conference paper

ADAPT: Approach to Develop context-Aware solutions for Personalised asthma managemenT
Quinde, M., Augusto, J., Khan, N. and Van Wyk, A. 2020. ADAPT: Approach to Develop context-Aware solutions for Personalised asthma managemenT. Journal of Biomedical Informatics. 111, pp. 1-20. https://doi.org/10.1016/j.jbi.2020.103586

Article

An objective comparison of detection and segmentation algorithms for artefacts in clinical endoscopy
Ali, S., Zhou, F., Braden, B., Bailey, A., Yang, S., Cheng, G., Zhang, P., Li, X., Kayser, M., Soberanis-Mukul, R., Albarqouni, S., Wang, X., Wang, C., Watanabe, S., Oksuz, I., Ning, Q., Yang, S., Khan, M., Gao, X., Realdon, S., Loshchenov, M., Schnabel, J., East, J., Wagnieres, G., Loschenov, V., Grisan, E., Daul, C., Blondel, W. and Rittscher, J. 2020. An objective comparison of detection and segmentation algorithms for artefacts in clinical endoscopy. Scientific Reports. 10 (1), pp. 1-15. https://doi.org/10.1038/s41598-020-59413-5

Article

Modeling and analyzing the Corona-virus warning app with the Isabelle infrastructure framework
Kammueller, F. and Lutz, B. 2020. Modeling and analyzing the Corona-virus warning app with the Isabelle infrastructure framework. Garcia-Alfaro, J., Navarro-Arribas, G. and Herrera-Joancomarti, J. (ed.) International Workshop of Data Privacy Management, DPM'20. University of Surrey, UK 17 - 18 Sep 2020 Springer. pp. 128-144 https://doi.org/10.1007/978-3-030-66172-4_8

Conference paper

Inter-blockchain protocols with the Isabelle Infrastructure framework
Kammueller, F. and Nestmann, U. 2020. Inter-blockchain protocols with the Isabelle Infrastructure framework. Bernardo, B. and Marmsoler, D. (ed.) 2nd Workshop on Formal Methods for Blockchain, co-located with CAV'20. Los Angeles, CA, USA Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH. pp. 11:1-11:12 https://doi.org/10.4230/OASIcs.FMBC.2020.11

Conference paper

A formal development cycle for security engineering in Isabelle
Kammueller, F. 2020. A formal development cycle for security engineering in Isabelle. arxiv.org. https://doi.org/10.48550/arXiv.2001.08983

Working paper

Applying the Isabelle Insider framework to airplane security
Kammueller, F. and Kerber, M. 2020. Applying the Isabelle Insider framework to airplane security. arxiv.org. https://doi.org/10.48550/arXiv.2003.11838

Working paper

Attack Trees in Isabelle for GDPR compliance of IoT healthcare systems
Kammueller, F. 2020. Attack Trees in Isabelle for GDPR compliance of IoT healthcare systems.

Other

Hot coffee: associative memory with bump attractor cell assemblies of spiking neurons
Huyck, C. and Vergani, A. 2020. Hot coffee: associative memory with bump attractor cell assemblies of spiking neurons. Journal of Computational Neuroscience. 48 (3), pp. 299-316. https://doi.org/10.1007/s10827-020-00758-1

Article

5G smart and innovative healthcare services: opportunities, challenges and prospective solutions
Bekaroo, G., Santokhee, A. and Augusto, J. 2020. 5G smart and innovative healthcare services: opportunities, challenges and prospective solutions. in: Bojkovic, Z., Milovanovic, D. and Fowdur, T. (ed.) 5G Multimedia Communication Technology, Multiservices, and Deployment Boca Raton CRC Press. pp. 279-297

Book chapter

The relationships between intelligence and consciousness in natural and artificial systems
Gamez, D. 2020. The relationships between intelligence and consciousness in natural and artificial systems. Journal of Artificial Intelligence and Consciousness. 7 (1), pp. 51-62. https://doi.org/10.1142/S2705078520300017

Article

Correctly slicing extended finite state machines
Amtoft, T., Androutsopoulos, K. and Clark, D. 2020. Correctly slicing extended finite state machines. in: Di Pierro, A., Malacaria, P. and Nagarajan, R. (ed.) From lambda calculus to cybersecurity through program analysis: Essays dedicated to Chris Hankin on the occasion of his retirement Switzerland Springer. pp. 149-197

Book chapter

Deep neural network augmentation: generating faces for affect analysis
Kollias, D., Cheng, S., Ververas, E., Kotsia, I. and Zafeiriou, S. 2020. Deep neural network augmentation: generating faces for affect analysis. International Journal of Computer Vision. 128 (5), pp. 1455-1484. https://doi.org/10.1007/s11263-020-01304-3

Article

An enhanced deep learning architecture for classification of Tuberculosis types from CT lung images
Gao, X., Comley, R. and Khan, M. 2020. An enhanced deep learning architecture for classification of Tuberculosis types from CT lung images. ICIP 2020: 27th IEEE International Conference on Image Processing. Abu Dhabi, Unites Arab Emirates (Virtual Conference) 25 - 28 Oct 2020 IEEE. pp. 2486-2490 https://doi.org/10.1109/ICIP40778.2020.9190815

Conference paper

Survey on the analysis of user interactions and visualization provenance
Xu, K., Ottley, A., Walchshofer, C., Streit, M., Chang, R. and Wenskovitch, J. 2020. Survey on the analysis of user interactions and visualization provenance. Computer Graphics Forum. 39 (3), pp. 757-783. https://doi.org/10.1111/cgf.14035

Article

Fine-grained action recognition by motion saliency and mid-level patches
Liu, F., Zhao, L., Cheng, X., Dai, Q., Shi, X. and Qiao, J. 2020. Fine-grained action recognition by motion saliency and mid-level patches. Applied Sciences. 10 (8). https://doi.org/10.3390/app10082811

Article

Deployment of drone-based small cells for public safety communication system
Ali, K., Nguyen, H., Vien, Q., Shah, P. and Raza, M. 2020. Deployment of drone-based small cells for public safety communication system. IEEE Systems Journal. 14 (2), pp. 2882-2891. https://doi.org/10.1109/JSYST.2019.2959668

Article

Pan: conversational agent for criminal investigations
Hepenstal, S., Zhang, L., Kodagoda, N. and Wong, B. 2020. Pan: conversational agent for criminal investigations. IUI '20: 25th International Conference on Intelligent User Interfaces. Cagliari, Italy 17 - 20 Mar 2020 Association for Computing Machinery (ACM). pp. 134-135 https://doi.org/10.1145/3379336.3381463

Conference paper

Case-based reasoning of a deep learning network for prediction of early stage of oesophageal cancer
Gao, X., Braden, B., Zhang, L., Taylor, S., Pang, W. and Petridis, M. 2020. Case-based reasoning of a deep learning network for prediction of early stage of oesophageal cancer. 24th UK Symposium on Case-Based Reasoning (UKCBR 2019). Cambridge, UK 17 Dec 2019 BCS SGAI: The Specialist Group on Artificial Intelligence. pp. 1-12

Conference item

A game theoretic analysis of resource mining in blockchain
Singh, R., Dwivedi, A., Srivastava, G., Wisznieska-Mayszkiel, A. and Cheng, X. 2020. A game theoretic analysis of resource mining in blockchain. Cluster Computing. 23 (3), pp. 2035-2046. https://doi.org/10.1007/s10586-020-03046-w

Article

Design and validation of a meter band rate in OpenFlow and OpenDaylight for optimizing QoS
Breiki, M., Zhou, S. and Luo, Y. 2020. Design and validation of a meter band rate in OpenFlow and OpenDaylight for optimizing QoS. Advances in Science, Technology and Engineering Systems Journal. 5 (2), pp. 35-43. https://doi.org/10.25046/aj050205

Article

Describing and simulating concurrent quantum systems
Bornat, R., Boender, J., Kammueller, F., Poly, G. and Nagarajan, R. 2020. Describing and simulating concurrent quantum systems. Biere, A. and Parker, D. (ed.) International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 20). Dublin 27 - 30 Apr 2020 Springer. pp. 271-277 https://doi.org/10.1007/978-3-030-45237-7_16

Conference paper

A smart environments architecture (Search)
Augusto, J., Gimenez Manuel, J., Quinde, M., Oguego, C., Ali, M. and James-Reynolds, C. 2020. A smart environments architecture (Search). Applied Artificial Intelligence. 34 (2), pp. 155-186. https://doi.org/10.1080/08839514.2020.1712778

Article

Use of a big data analysis technique for extracting HRA data from event investigation reports based on the Safety-II concept
Ham, D. and Park, J. 2020. Use of a big data analysis technique for extracting HRA data from event investigation reports based on the Safety-II concept. Reliability Engineering and System Safety. 194, pp. 1-15. https://doi.org/10.1016/j.ress.2018.07.033

Article

Am I missing something? Experiences of using social media by blind and partially sighted users
Whitney, G. and Kolar, I. 2020. Am I missing something? Experiences of using social media by blind and partially sighted users. Universal Access in the Information Society. 19 (2), pp. 461-469. https://doi.org/10.1007/s10209-019-00648-z

Article

Analysis of tuberculosis severity levels from CT pulmonary images based on enhanced residual deep learning architecture
Gao, X., James-Reynolds, C. and Currie, E. 2020. Analysis of tuberculosis severity levels from CT pulmonary images based on enhanced residual deep learning architecture. Neurocomputing. 392, pp. 233-244. https://doi.org/10.1016/j.neucom.2018.12.086

Article

Context-aware solutions for asthma condition management: a survey
Quinde, M., Khan, N., Augusto, J., Van Wyk, A. and Stewart, J. 2020. Context-aware solutions for asthma condition management: a survey. Universal Access in the Information Society. 19 (3), pp. 571-593. https://doi.org/10.1007/s10209-018-0641-5

Article

New lace and arsenic: adventures in weak memory with a program logic (v2)
Bornat, R., Alglave, J. and Parkinson, M. 2016. New lace and arsenic: adventures in weak memory with a program logic (v2). arXiv.org arXiv. https://doi.org/10.48550/arXiv.1512.01416

Other

Micro-distortion detection of lidar scanning signals based on geometric analysis
Liu, S., Chen, X., Li, Y. and Cheng, X. 2019. Micro-distortion detection of lidar scanning signals based on geometric analysis. Symmetry. 11 (12), pp. 2-13. https://doi.org/10.3390/sym11121471

Article

Assessing vulnerabilities in IoT-based ambient assisted living systems
Cristescu, I., Gimenez Manuel, J. and Augusto, J. 2020. Assessing vulnerabilities in IoT-based ambient assisted living systems. in: Hernaandez Ramos, J. and Skarmeta, A. (ed.) Security and privacy in Internet of Things: challenges and solutions IOS Press.

Book chapter

Architecture design for disaster resilient management network using D2D technology
Ali, K. 2019. Architecture design for disaster resilient management network using D2D technology. PhD thesis Middlesex University

PhD thesis

A history based logic for dynamic preference updates
Baskent, C. and McCusker, G. 2019. A history based logic for dynamic preference updates. Journal of Logic, Language and Information. https://doi.org/10.1007/s10849-019-09307-1

Article

Revisiting direct neuralisation of first-order logic
Gunn, I. and Windridge, D. 2018. Revisiting direct neuralisation of first-order logic. NeSy 2018 : Thirteenth International Workshop on Neural-Symbolic Learning and Reasoning. Prague, Czech Republic 23 - 24 Aug 2018

Conference paper

A generative adversarial strategy for modeling relation paths in knowledge base representation learning
Zia, T., Zahid, U. and Windridge, D. 2019. A generative adversarial strategy for modeling relation paths in knowledge base representation learning. KR2ML - Knowledge Representation and Reasoning Meets Machine Learning Workshop, NeurIPS 2019, Thirty-third Conference on Neural Information Processing Systems. Vancouver, Canada 09 - 14 Dec 2019

Conference poster

Verifying cryptographic protocols
Ma, X. and Cheng, X. 2005. Verifying cryptographic protocols. IEEE Journal of Intelligent Cybernetic Systems.

Article

Verifying security protocols by knowledge analysis
Ma, X. and Cheng, X. 2008. Verifying security protocols by knowledge analysis. International Journal of Security and Networks. 3 (3), pp. 183-192. https://doi.org/10.1504/IJSN.2008.020092

Article

A security design for cloud computing: an implementation of an on premises authentication with Kerberos and IPSec within a network
Umar, M. and Cheng, X. 2012. A security design for cloud computing: an implementation of an on premises authentication with Kerberos and IPSec within a network. International Journal of Advanced Research in Computer Science. 3 (1), pp. 10-16. https://doi.org/10.26483/ijarcs.v3i1.6040

Article

Comparative experiments on resource discovery in P2P networks
Gautam, S. and Cheng, X. 2014. Comparative experiments on resource discovery in P2P networks. Journal of Next Generation Information Technology. 5 (1), pp. 89-98.

Article

  • 152992
    total views
  • 30330
    total downloads
  • 10299
    views this month
  • 1124
    downloads this month

People

Ademola, Adetunji

Agada, Stephen

Aiash, Mahdi

Alam, Amjad

Ali, Almaas Abdullahi

Ali, Almaas

Ali, Kamran

Alpan, Kezban

Alzazah, Faten

Androutsopoulos, Kelly

Aristodemou, Leonidas

Arusi, Ihab

Arusi, Usama

Attfield, Simon

Augusto, Juan Carlos

Baskent, Can

Batool, Faryal

Belavkin, Roman

Bornat, Richard

Bottone, Michele

Chadebecq, Francois

Cheng, Xiaochun

Chennareddy, Vijay Simha Reddy

Colson, Robert

Cui, Di

Currie, Edward

Dack, John

Dafoulas, George

Dalcher, Darren

Daryanani, Padma

De Raffaele, Clifford

Duncker-Gassen, Elke

Eissa, Ahmed

Evans, Carl

Fields, Bob

Gamez, David

Gao, Xiaohong

George, Carlisle

Georgiadou, Elli

Gkorogiannis, Kyriakos Nikolaos

Hall, Stephen

Ham, Dong-Han

Hara, Sukhvinder

Hashimyar, Mohammad

Heeney, Michael

Huyck, Chris

James-Reynolds, Carl

Ji, Yuehu

Jones, Simon

Joy, Geethu

Jusob, Farad

Kammueller, Florian

Kapetanakis, Stylianos

Kasekende, Usama

Khan, Nawaz

Khoshkholghi, Ali

Kiyani, Anum

Kotsia, Irene

Kruger, Antony

Langari, Bahareh

Lasebae, Aboubaker

Lewis-Smith, Andrew

Loveday, Joanna

Luo, Yuan Roger

Maia, Cristiano

Mapp, Glenford

Marc, Silviu

Martin, Barnaby

Mathusan, Mithila

Menendez Benito, Hector

Minocha, Shailey

Mistry, Kajal

Mistry, Kajal

Mitchell, Ian

Moedeen, Waseemah

Mohajer Ashjaei, Babak

Moseley, Ralph

Mpungu, Cephas

Nagarajan, Raja

Nalli, Giacomo

Neilson, David

Niazi, Noman

Nnawuchi, Uchenna

Oluwagbemi, Olugbenga

Opoku-Brobbey, Michael

Panagakis, Ioannis

Passmore, Peter

Philpot, Adam

Piras, Luca

Quattrone, Giovanni

Rahanu, Harjinder

Raheem, Rand

Rahman, Shahedur

Raimondi, Franco

Ramanna, Sailendra

Sharma, Mrinal

Smith, Serengul

Springett, Mark

Sule, Clifford

Tahmasebi Aria, Farzad

Tirunagari, Santosh

Tsiakara, Ariadni

Tsiakara, Ariadni

Whitney, Gill

Wieclaw, Anna

Windridge, David

Wong, Beng

Xu, Kai

Yetgin, Halil

Zammit, Omar

Zhang, Leishi

Zhang, Xiaojuan

Zhou, Suiping