Glasgow Systems
Exploring the design, reliability and sustainability of computing systems at scale
Staff
Publications
2026
Liu, J., Zhao, X., Kim, D., Orchard, J. R., Childs, D. T.D., Taylor, R. J.E., Harvey, P., Sweeney, S. J., Hogg, R. A. (2026) Exploring high efficiency PCSELs using probabilistic Markov chain model. IEEE Journal of Selected Topics in Quantum Electronics, 32, (doi: 10.1109/JSTQE.2026.3677786)
West, K., Moawad, Y., Lehmann, F., Bountris, V., Leser, U., Elkhatib, Y., Thamsen, L. (2026) A systematic evaluation of the potential of carbon-aware execution for scientific workflows. Future Generation Computer Systems, 182, (doi: 10.1016/j.future.2026.108453)
Abdullah, I., Nabi, S. W., Akhtar, J., Javed, N. (2026) Research culture in Pakistan’s Higher Education Institutions (HEIs): Examining the consequences of publication driven policies. Societal Impacts, 7, (doi: 10.1016/j.socimp.2026.100183)
Alsubhi, A., Dardha, O., Gay, S. J. (2026) Design and evaluation of Coconut: typestates for C++ Science of Computer Programming, 250, (doi: 10.1016/j.scico.2025.103398)
D'Agata, L., Agulló-Domingo, C., Vera-López, Ó., Shivdikar, K., Yudha, A. W. B., Yaman, F., Kaeli, D., Abellán, J. L., Colbert, I., Cano Reyes, J. (2026) GPU Acceleration of Sparse Fully Homomorphic Encrypted DNNs. (doi: 10.1145/3805621.3807642)
Krishnamohan, T., Harvey, P. (2026) Energy-Aware Optimal Service Function Chain Embedding in Emulated Multi-Access Edge Computing for Internet of Things. (doi: 10.1145/3802513.3803485)
Saha, R., Haris, J., Bohm Agostini, N., Kaeli, D., Cano, J. (2026) PoTAcc: a pipeline for end-to-end acceleration of power-of-two quantized DNNs. IEEE Transactions on Circuits and Systems for Artificial Intelligence,
Mahboob, T., Li, M., Shah, A. A., Pezaros, D. (2026) Enhancing smart grid cyber resilience against FDI attacks using multi-agent recurrent DDPG. Network,
Nahalka, M., Cook, M., Pezaros, D. (2026) Heterogeneous Graph Fusion for Multi-Modal Industrial Anomaly Detection.
Babalola, O., Cano, J., Tran, N. H., Deepaisarn, S., Truong, N. (2026) Survey of privacy preserving federated tree-based learning. Artificial Intelligence Review, (doi: 10.1007/s10462-026-11555-0)
Liu, Y., Chen, J., Bi, T., Grundy, J., Wang, Y., Yu, J., Chen, T., Tang, Y., Zheng, Z. (2026) An empirical study on low code programming using traditional vs large language model support. Journal of Systems and Software, 234, (doi: 10.1016/j.jss.2025.112727)
Cook, M. M., Stoica, A. M., Shah, A. A., Pezaros, D. (2026) With power comes responsibility: attack synthesis for industrial control systems using large language models. ACM Transactions on Privacy and Security,
Holik, F., Jouet, S., DEOL, B. S., Mahboob, T., Shah, A. A., Pezaros, D. (2026) In-Network Cyber Protection for Modern EPES: The COCOON Programmable Node Architecture.
Peacock, C., Storer, T. (2026) Beyond the Numbers: Evaluating DevOps Adoption in an Enterprise Software Development Organisation.
Tan, Z., Singer, J., Anagnostopoulos, C. (2026) Attesting LLM Pipelines: Enforcing Verifiable Training and Release Claims.
Liu, T. H. Z., Seow, C. K., Goh Gek Chuah, K. (2026) ATGLNets: Adaptive Temporal Gated Liquid Neural Networks for Non-Intrusive Load Monitoring. (doi: 10.1109/ISGTAsia63446.2025.11431318)
Li, S., Papadopoulou, N., Vanderbauwhede, W. (2026) A Streaming FPGA Architecture for Sparse Matrix Multiplication with Sparsity-Aware Data Reordering.
Boswell, E., Xian, X., Wang, M., McQuistin, S., Perkins, C. (2026) Black Holes and Prisoners: Understanding AS112 Deployment Characteristics. (doi: 10.1007/978-3-032-18268-5_9)
Yu, R., Diao, Y., Kizilkaya, B., Wang, C., Zhao, P., Li, E. (2026) Human behavior anonymization for secure teleoperation. IEEE Transactions on Information Forensics and Security,
Lyko, T., Elkhatib, Y., Ramdhany, R., Race, N. (2026) Beyond bitrate: understanding the QoE impact of playback rate and seeking in adaptive video streaming. ACM Transactions on Multimedia Computing, Communications, and Applications, 22, (doi: 10.1145/3796724)
Sawilam, M., Kizilkaya, B., Imran, M. A., Flynn, D., Taha, A., Ansari, S. (2026) Virtual private power plants (VPPP): VPN-backed cybersecurity for resilient DER aggregation. Cyber-Physical Energy Systems,
Deng, Z., Meng, Z., Huang, L., Zhang, Y., Zhang, J., Wang, C., Li, E., Zhao, P. G. (2026) Rethinking Human Biometric Security Under Behavioral Copy and Robot Repla.
Szafarczyk, R., Nabi, S. W., Vanderbauwhede, W. (2026) Optimising stencil code on FPGAs by trading data movement for compute using compiler rewrite rules. International Journal of Parallel Programming, 54, (doi: 10.1007/s10766-025-00809-z)
Ali, H. A., Ever, E., Kizilkaya, B., Raza Khan, M. T., Ur Rehman, M., Ansari, S., Imran, M. A., Yazici, A. (2026) An edge-intelligent three-tier framework for real-time forest fire detection, integrating WSNs, WMSNs, and UAVs. Internet of Things, 36, (doi: 10.1016/j.iot.2025.101861)
Liu, Z., Tang, Y., Li, M., Long, Y., Shang, L. F., Luo, X. (2026) LLM-CompDroid: repairing configuration compatibility bugs in android apps with pre-trained large language models. ACM Transactions on Software Engineering and Methodology, 35, (doi: 10.1145/3736406)
Abram, H., Papadopoulou, N., Domke, J., Pericas, M. (2026) Cross-Architecture Autotuning for Single-Source Heterogeneous Programming Models.
Feng, K., Singer, J., Marnerides, A. (2026) Hardfuzz: DataFlow-Guided On-Device Fuzzing for Microcontrollers.
Babalola, O., Cano, J., Deepaisarn, S., Truong, N. (2026) FedRand: A Federated Random Forest Learning Technique for Anomaly Detection in IoT Networks. (doi: 10.1109/Trustcom66490.2025.00135)
Molloy, R., Cook, M. M., Pezaros, D. (2026) Not All Who Wander are Lost: Industrial Network Topology Inference via Tomography Probing.
Ding, S., Flynn, D., Harvey, P. (2026) Automated Digital Twin Generation for Network Testing: A Multi-Topology Validation.
Liang, G., Yang, M., Liu, D. (2026) Pilot-Free Channel Inference via Multimodal Flow Matching.
Mahboob, T., Holik, F., Shah, A. A., Pezaros, D. (2026) Securing Smart Grids Against PSSE FDI Attacks.
Al-Quraan, M., Cheng, R., Evripidou, S., Li, X., Greening, P., Flynn, D., Imran, M. A., Pezaros, D., Taha, A. (2026) Towards Decarbonised Mobility: Beam Blockage Impacts in 5G-Driven Digital Twin-enabled Intelligent Transport Systems.
Holik, F., Jouet, S., Pezaros, D. (2026) An eBPF-Based Programmable Network Architecture for OT Digital Resilience Use-Cases. (doi: 10.1109/ISCC65549.2025.11325939)
Barr, M., Andrei, O., Morrison, A., Nabi, S. W. (2026) Developing Future Skills Through Reflection: Lessons From a Work-based Degree Programme.
Maguire, J., Draper, S., Wilde, A. (2026) Limited Choices, Greater Engagement: Involving Cyber Security Students in Inclusive Assessment Design. (doi: 10.1145/3772338.3772346)
West, K., Reid, M., Elkhatib, Y., Thamsen, L. (2026) Ichnos: a Carbon Footprint Estimator for Scientific Workflows.
Qin, Y., Singer, J., Wang, X. (2026) Evaluating and Enhancing Memory Safety in LLM-Generated Code on CHERI.
2025
(2025) Languages, Compilers, Analysis - From Beautiful Theory to Useful Practice: Essays Dedicated to Alan Mycroft on the Occasion of His Retirement. 15500, (doi: 10.1007/978-3-032-08187-2)
Tang, Y., Cao, H., Chen, Y., Lo, D. (2025) Characterising Bugs in Jupyter Platform. (doi: 10.1145/3756681.3756932)
Louloudakis, N., Gibson, P., Cano, J., Rajan, A. (2025) FetaFix: Automatic Fault Localization and Repair of Deep Learning Model Conversions. (doi: 10.1145/3756681.3756931)
Evripidou, S., Li, X., Alquran, M., Cheng, R., Taha, A., Imran, M., Flynn, D., Pezaros, D. (2025) Organisational cybersecurity challenges in digital twin development: a critical analysis. SSRN, (doi: 10.2139/ssrn.5954026)
Lu, F., Kizilkaya, B. (2025) A Lightweight Visual Query System for Resource-Constrained Windows Log Analysis.
Aljohani, K., Kizilkaya, B., Siddiquah, A., Alshehhi, A., Hussain, S., Imran, M. A., Ansari, S. (2025) A Human-Centric Framework for SRK-Aligned Haptic Interaction in VR-Based Immersive Engineering Learning Environments.
Shi, J., Pezaros, D., Elkhatib, Y. (2025) xMem: A CPU-Based Approach for Accurate Estimation of GPU Memory in Deep Learning Training Workloads. (doi: 10.1145/3721462.3770773)
Hassouna, S., Kazim, J., Kizilkaya, B., Ansari, S., Nasir, A., Imran, M. A., Abbasi, Q. H. (2025) RIS-Assisted Open RAN for Real-Time Teleoperation.
Kee, B. H., Seow, C. K., Sanan, D., Lee, J. H. J. (2025) Pragmatic Indoor Localization with Quantum Computing. (doi: 10.1109/WF-IoT64238.2025.11270714)
Yang, H., Wang, Y., Seow, C. K., Sun, M., Joseph, W., Plets, D. (2025) A novel credibility evaluation and mitigation for ranging measurement in UWB localization. Measurement, 256, (doi: 10.1016/j.measurement.2025.117721)
Ding, S., Flynn, D., Harvey, P. (2025) Automatic Generation of Digital Twins for Network Testing. (doi: 10.1109/ICDCSW63273.2025.00122)
Tan, Z., Wang, Q., Anagnostopoulos, C., Puthiya Parambath, S., Singer, J., Temple, S. (2025) Distributed Log-driven Anomaly Detection System Based on Evolving Decision Making. (doi: 10.1109/ICDCSW63273.2025.00045)
Tan, Z., Anagnostopoulos, C., Singer, J. (2025) Distributed Temporal Graph Learning with Provenance for APT Detection in Supply Chains. (doi: 10.1109/ICDCSW63273.2025.00071)
Yanagida, R., Singer, J., Harvey, P., Wong, L., Perkins, C. (2025) Distributing Quality of Service (QoS) Policies in Name-based Networks. (doi: 10.1109/ICDCSW63273.2025.00123)
Alsharif, G., Anagnostopoulos, C., Marnerides, A. (2025) Incremental Learning Detection of Distributed Financially Motivated Attacks in Energy Markets. (doi: 10.1109/ICDCSW63273.2025.00038)
Yanagida, R., Singer, J., Harvey, P., Wong, L., Perkins, C. (2025) Name-based Quality for Name-based Networks. (doi: 10.1109/ICDCSW63273.2025.00057)
Miyata, S., Miyata, T., Harvey, P., Khan, I. (2025) On the Effectiveness of Task Off-loading in Edge based Federated Learning Environment. (doi: 10.1109/ICDCSW63273.2025.00120)
Rodgers, P., Harvey, P. (2025) The xApp Store: A Framework for xApp Onboarding and Deployment in O-RAN. (doi: 10.1109/ICDCSW63273.2025.00121)
Tan, Z., Anagnostopoulos, C., Parambath, S. P., Xiao, K., Singer, J. (2025) Unified Parallel Semantic Log Parsing based on Causal Graph Construction for Attack Attribution. (doi: 10.1109/ICDCSW63273.2025.00020)
Dong, S., Zhao, H., Harvey, P. (2025) Code vs Serialized AST Inputs for LLM-Based Code Summarization: An Empirical Study.
Singer, J., Smith, L. (2025) The Norcroft Compiler at Arm. Springer
Sun, X., Singer, J., Wang, Z. (2025) Sweet or Sour CHERI: Performance Characterization of the Arm Morello Platform. (doi: 10.1109/IISWC66894.2025.00042)
Fraser, D., Miller, A., Cook, M., Pezaros, D. (2025) Online Model Checking for Anomaly Detection in Industrial Control Systems. (doi: 10.1007/978-3-032-10794-7_9)
Almeida, R., Das, S., Archibald, B., Calder, M., Sevegnani, M. (2025) Modelling Railway Networks with Bigraphs: Electrification, Failures, and Optimisation. (doi: 10.1007/978-3-032-10762-6_22)
Hu, W., Henderson, P., Cano, J. (2025) ICE-Pruning: an Iterative Cost-Efficient Pruning Pipeline for Deep Neural Networks. (doi: 10.1109/IJCNN64981.2025.11227410)
Yu, R., Chen, K., Deng, Z., Wang, C., Kizilkaya, B., Li, E. (2025) Haptic-Based User Authentication for Tele-robotic System. (doi: 10.1109/RO-MAN63969.2025.11217596)
Lyko, T., Austin, E., Lee, A., Elkhatib, Y., Race, N. (2025) The Double-Edged Impact of User Customisation on QoE in Personalised Media Experiences. (doi: 10.1109/QoMEX65720.2025.11219986)
Dahoua, A., Shah, S. T., Ullah, I., Mahboob, T., Abdellatif, A. G., Elaziz, M. A., Almogren, A., Shawky, M. A. (2025) Reconfigurable intelligent surfaces for enhanced localisation: advancing performance with KAN-based deep learning models. Internet of Things, 34, (doi: 10.1016/j.iot.2025.101813)
Mahboob, T., Holik, F., Shah, A. A., Pezaros, D. (2025) Adaptive Learning Feature Quantization for In-network FDI Detection in IEC 61850 Digital Substations. (doi: 10.1109/SmartGridComm65349.2025.11204560)
Hassouna, S., Kaur, J., Kizilkaya, B., Kazim, J. u. R., Ansari, S., Kherani, A. A., Lall, B., Abbasi, Q. H., Imran, M. (2025) Development of open radio access networks (O-RAN) for real-time robotic teleoperation. Communications Engineering, 4, (doi: 10.1038/s44172-025-00524-0)
Holik, F., Mcilwraith, K., Shah, A. A., Pezaros, D. P. (2025) In-Network GOOSE Encryption with eBPF-based Programmable Network Architecture. (doi: 10.1109/SmartGridComm65349.2025.11204611)
Krishnamohan, T., Harvey, P. (2025) OpenRASE: Service Function Chain Emulation.
Rose, J., Cook, M. M., Holik, F., Pezaros, D. (2025) We’re eBPF’d: Exploring Adversarial Manipulation of ELF Files in eBPF-based Programmable Network Stacks. (doi: 10.1109/CNS66487.2025.11194984)
Singer, J., Draper, S. (2025) Let's Take Esoteric Programming Languages Seriously. (doi: 10.1145/3759429.3762632)
Morris, N., Archibald, B., Mehr, S. H. M. (2025) TideScript: A Domain Specific Language for Peptide Chemistry. (doi: 10.1145/3759429.3762627)
Yang, J., Shah, A. A., Pezaros, D. (2025) A game-theoretic task offloading framework for blockchain-enabled UAV–satellite MEC systems. IEEE Networking Letters, (doi: 10.1109/LNET.2025.3615273)
Yang, M., Liang, G., Liu, D., Zhang, L., Huang, K. (2025) Channel Capacity-Aware Distributed Encoding for Multi-View Sensing and Edge Inference. (doi: 10.1109/ICC52391.2025.11161623)
Aljohani, K., Kizilkaya, B., Hussain, S., Abbasi, Q. H., Imran, M. A., Ansari, S. (2025) A Comparative Analysis of 5G and WiFi6 for VR Immersive Education. (doi: 10.1109/ICVR66534.2025.11172602)
Yang, J., Shah, A. A., Pezaros, D. (2025) Priority-Aware Task Offloading in UAV-Assisted Satellite MEC Networks. (doi: 10.1109/ICCWorkshops67674.2025.11162374)
Liang, C., Sun, Y., Liu, D., Yu, D., Imran, M. A. (2025) Safeguarded AI-driven semantic communication: design principles, architecture, and challenges. IEEE Communications Standards Magazine, (doi: 10.1109/MCOMSTD.2025.3602816)
Yang, J., Shah, A. A., Pezaros, D. (2025) Task offloading and resource allocation in Mobile Edge Computing assisted vehicular networks across multiple regions. IEEE Transactions on Vehicular Technology, (doi: 10.1109/TVT.2025.3611347)
Ullah, R., Abbas, H., Nabi, S. W. (2025) Exploring Advanced Deep Learning Models for Super Resolution of 3D Dental CBCT Volumes. (doi: 10.5281/zenodo.17038615)
Liu, X., Zhou, Y., Tang, Y., Qian, J., Zhou, Y. (2025) Human-in-the-loop online just-in-time software defect prediction: What have we achieved and what do we still miss? Science of Computer Programming, 244, (doi: 10.1016/j.scico.2025.103296)
Romero-Organvidez, D., Diaz, O., Tang, Y., Benavides, D. (2025) Feedback Analysis in Software Product Line Forked Developments. (doi: 10.1145/3744915.3748465)
Gan, C. M., Seow, C. K., Keoh, S. L., Yao, D., Cen, Y., Cai, Y., Jain, N., Cao, Q. (2025) ConfMan Web 3.0: Decentralized Academic Conference Management System with Rust and Web 3.0. (doi: doi:10.1109/COMPSAC65507.2025.00237)
Das, S., Almeida, R., Archibald, B., Sevegnani, M. (2025) Formal Analysis of Resilience in Transport Systems with Bigraphs. (doi: 10.1007/978-3-032-02018-5_31)
Warburton, E., Elhabbash, A., Ezzini, S., Elkhatib, Y. (2025) The IoT Whisperer: a Framework for Intelligent IoT Service Composition through LLMs. (doi: 10.1109/CLOUD67622.2025.00016)
Chyzy, J., Cook, M. M., Pezaros, D. (2025) On the Cost of Asset Discovery Techniques for Industrial Control Systems. (doi: 10.1109/ICPS65515.2025.11087898)
Zhang, Y., McQuistin, S., Karan, M., Ramirez-Centeno, H. E., Perkins, C., Tyson, G., Castro, I. (2025) Two Decades of IETF Affiliations: Evolution and Impact. (doi: 10.1145/3744200.3744757)
Lee, J. H. J., Seow, C. K. (2025) Single mmWave Radar-Based Pose Detection for Non-Intrusive Patient Monitoring. (doi: 10.1109/memea65319.2025.11068103)
Sawilam, M., Kizilkaya, B., Flynn, D., Taha, A., Imran, M. A., Ansari, S. (2025) A Secure and Scalable Architecture for Virtual Power Plants Inspired by VPN Principles. (doi: 10.1109/GPECOM65896.2025.11061942)
Soomro, P. N., Papadopoulou, N., Pericas, M. (2025) Accordion: a Malleable Pipeline Scheduling Approach for Adaptive SLO-Aware Inference Serving. (doi: 10.1145/3719276.3725190)
West, K., Lehmann, F., Bountris, V., Leser, U., Elkhatib, Y., Thamsen, L. (2025) Exploring the Potential of Carbon-Aware Execution for Scientific Workflows. (doi: 10.1109/CCGRID64434.2025.00056)
Holik, F., Cook, M. M., Shah, A. A., Pezaros, D. (2025) Network-Wide Service Deployment Using Centrally Orchestrated, eBPF-Based Programmable Dataplanes. (doi: 10.1109/EuCNC/6GSummit63408.2025.11036869)
Althubiti, E., Archibald, B., Sevegnani, M. (2025) Formalising privacy regulations with bigraphs. Software and Systems Modeling, (doi: 10.1007/s10270-025-01293-2)
Liu, Z., Tang, Q., Nie, S., Wu, S., Zhang, L. F., Tang, Y. (2025) KEENHash: Hashing Programs into Function-aware Embeddings for Large-scale Binary Code Similarity Analysis. (doi: 10.1145/372891)
Mitchell, D., Gu, Y., Blanche, J., Harper, S., Archibald, B., Sevegnani, M., Flynn, D. (2025) A cyber physical architecture for symbiotic multi-robot fleet management. Springer
Daniel, G., Hall, C., Hammer, P., MacDonald, A.-A., Marwick-Best, H., McKenzie, E., Popa, G., Somerville, D., Storer, T. (2025) Out of the Day Job: Perspectives of Industry Practitioners in Co-Design and Delivery of Software Engineering Courses. (doi: 10.1145/3724363.3729090)
Tan, Z. X., Seow, C. K., Cai, Y., Cao, Q. (2025) Tree pruning simulation and tree growth modelling. Springer
Tan, Z., Anagnostopoulos, C., Singer, J. (2025) OSPtrack: A Labeled Dataset Targeting Simulated Execution of Open-Source Software. (doi: 10.1109/MSR66628.2025.00102)
Wang, H., Jacob, D., Kelly, D., Elkhatib, Y., Singer, J., Wang, Z. (2025) SecureMind: a Framework for Benchmarking Large Language Models in Memory Bug Detection and Repair. (doi: 10.1145/3735950.3735954)
Nabi, S. W., Andrei, O., Barr, M., Cutts, Q., Maguire, J., Morrison, A., Parkinson, J., Somerville, D., Storer, T. (2025) Assessing Work-Based Learning in the Senior Years of a Software Engineering Graduate Apprenticeship Program. (doi: 10.1109/CSEET66350.2025.00010)
Barr, M., Nabi, S. W., Andrei, O. (2025) The Development of Reflective Practice on a Work-Based Software Engineering Program: a Longitudinal Study. (doi: 10.1109/CSEET66350.2025.00012)
Azam, N., Chak, A., Michala, A., Ansari, S., Truong, N. B. (2025) A practical solution for modelling GDPR-compliance based on defeasible logic reasoning. Expert Systems with Applications, 277, (doi: 10.1016/j.eswa.2025.127140)
Thamsen, L., Elkhatib, Y., Harvey, P., Nabi, S. W., Singer, J., Vanderbauwhede, W. (2025) Energy-aware workflow execution: an overview of techniques for saving energy and emissions in scientific compute clusters. arXiv, (doi: 10.48550/arXiv.2506.04062)
Chong, Y.-W., Yau, K.-L. A., Ibrahim, N. F., Rahim, S. K. A., Keoh, S. L., Basuki, A. (2025) Federated learning for intelligent transportation systems: use cases, open challenges, and opportunities. IEEE Intelligent Transportation Systems Magazine, 17, pp. 18-32. (doi: 10.1109/MITS.2024.3451479)
Sawilam, M., Kizilkaya, B., Taha, A., Flynn, D., Imran, M. A., Ansari, S. (2025) Impact of virtual power plants on grid stability and renewable energy integration in smart cities Using IoT. Energy Reports, 13, pp. 3312-3323. (doi: 10.1016/j.egyr.2025.02.048)
Andrei, O., Barr, M., Nabi, S. W., Morrison, A. (2025) Understanding Skill Transfer Between University and Workplace Through Reflective Practice: A Software Engineering Work-Based Learning Experience. (doi: 10.1145/3724363.3729119)
Abram, H., Papadopoulou, N., Pericas, M. (2025) Exploring SYCL as a Portability Layer for High-Performance Computing on CPUs. (doi: 10.23919/ISC.2025.11017734)
Diao, Y., Zhang, Y., De Martini, D., Zhao, P. G., Li, E. L. (2025) Task-oriented co-design of communication, computing, and control for edge-enabled industrial cyber-physical systems. IEEE Journal on Selected Areas in Communications, (doi: 10.1109/JSAC.2025.3574605)
Haris, J., Cano, J. (2025) Accelerating Transposed Convolutions on FPGA-based Edge Devices.
Xu, X., Meng, Z., Li, E., Khamis, M., Zhao, P. G., Bretin, R. (2025) Understanding Dynamic Human-Robot Proxemics in the Case of Four-Legged Canine-Inspired Robots. (doi: 10.1109/ICRA55743.2025.11128622)
Holik, F., Cook, M. M., Deol, B. S., Shah, A. A., Pezaros, D. P. (2025) Dashboard Orchestration of eBPF-based Programmable OT Networks. (doi: 10.1109/INFOCOMWKSHPS65812.2025.11152767)
Holik, F., Cook, M. M., Pezaros, D. (2025) Resilient Network Architecture with eBPF-based Programmability and Centralised Orchestration. (doi: 10.1109/INFOCOMWKSHPS65812.2025.11152786)
Haris, J., Cano, J. (2025) SECDA Design Suite: Efficient Hardware-Software Co-Design of DNN Accelerator.
Durci, A., Shah, A. A., Pezaros, D. (2025) AI in Space: Evaluating ML Algorithms for Onboard Decision-Making in Nanosatellites. (doi: 10.1109/INFOCOMWKSHPS65812.2025.11152837)
Haris, J., Cano, J. (2025) F-BFQ: Flexible Block Floating-Point Quantization Accelerator for LLMs.
Cook, M. M., Pezaros, D. (2025) Artefact Provenance Graphs for Anomaly Inference in Industrial Control Systems. (doi: 10.1007/978-3-031-92882-6_10)
Yang, J., Meng, Z., Xu, X., Chen, K., Li, E. L., Zhao, P. G. (2025) Task-Oriented Edge-Assisted Cooperative Data Compression, Communications and Computing for UGV-Enhanced Warehouse Logistics. (doi: 10.1109/CCNC54725.2025.10976157)
Le Brun, M. A., Fowler, S., Dardha, O. (2025) Multiparty Session Types with a Bang! (doi: 10.1007/978-3-031-91121-7_6)
Archibald, B., Sevegnani, M., Xu, M. (2025) Modelling and verifying BDI agents under uncertainty. Science of Computer Programming, 242, (doi: 10.1016/j.scico.2024.103254)
Yu, R., Kizilkaya, B., Meng, Z., Li, E., Zhao, P. (2025) Robot adversarial attack on keystroke dynamics based user authentication system. IEEE Robotics and Automation Letters, 10, pp. 4850-4857. (doi: 10.1109/LRA.2025.3550727)
Wafi, A., Elhabbash, A., Elkhatib, Y. (2025) TRANSITIVE: opTimising netwoRk trAnsfer aNd planS In mulTI-cloud enVironmEnts. (doi: 10.1109/UCC63386.2024.00054)
Louloudakis, N., Gibson, P., Cano, J., Rajan, A. (2025) Exploring Robustness of Image Recognition Models on Hardware Accelerators. (doi: 10.1109/ICSTW64639.2025.10962531)
Tang, Y., Luo, X., Zhou, Y. (2025) A systematic study on real-world android app bundles. IEEE Transactions on Software Engineering, (doi: 10.1109/TSE.2025.3560026)
Diao, Y., Zhang, Y., She, C., Zhao, P. G., Li, E. L. (2025) Aligning Task- and Reconstruction-Oriented Communications for Edge Intelligence. IEEE Journal on Selected Areas in Communications, (doi: 10.1109/JSAC.2025.3559121)
Ji, Y., Dai, T., Zhou, Z., Tang, Y., He, J. (2025) Artemis: Toward Accurate Detection of Server-Side Request Forgeries through LLM-Assisted Inter-Procedural Path-Sensitive Taint Analysis. (doi: 10.1145/3720488)
Marcon, C., Allignol, C., Picard, C., Archibald, B., Sevegnani, M., Thirioux, X. (2025) BiCoq : Bigraphs Formalisation with Coq. (doi: 10.1145/3672608.3707824)
Abioye, A. O., Hunt, W., Gu, Y., Schneiders, E., Naiseh, M., Archibald, B., Sevegnani, M., Ramchurn, S. D., Fishcer, J. E., Soorati, M. (2025) A user study evaluation of predictive formal modelling at runtime in human-swarm interaction. ACM Transactions on Human-Robot Interaction, (doi: 10.1145/3727989)
Duato, J., Mestre, J. I., Dolz, M. F., Quintana-Orti, E. S., Cano, J. (2025) Decoupling Structural and Quantitative Knowledge in ReLU-based Deep Neural Networks. (doi: 10.1145/3721146.3721950)
Ferguson, A., Gibson, P., D'Agata, L., McLeod, P., Yaman, F., Das, A., Colbert, I., Cano, J. (2025) Exploiting Unstructured Sparsity in Fully Homomorphic Encrypted DNNs. (doi: 10.1145/3721146.3721948)
Xu, M., Archibald, B., Sevegnani, M. (2025) CAN-Verify: automated analysis for BDI agents. Science of Computer Programming, 241, (doi: 10.1016/j.scico.2024.103233)
Liu, J., Zhao, X., Bian, Z., Harvey, P., Watson, S., Sweeney, S. J., Hogg, R. (2025) Interdependence of parasitic losses in photonic crystal surface emitting lasers. AIP Advances, 15, (doi: 10.1063/5.0252646)
Albalwe, M., Archibald, B., Sevegnani, M. (2025) Modelling Real-time Systems with Bigraphs. (doi: 10.4204/EPTCS.417.6)
Yang, H., Wang, Y., Seow, C. K., Li, Z., Sun, M., Dec Cock, C. (2025) NLOS identification and ranging trustworthiness for indoor positioning with LLM-based UWB-IMU fusion. IEEE Transactions on Instrumentation and Measurement, (doi: 10.1109/TIM.2025.3554900)
Yang, H., Wang, Y., Seow, C. K., Sun, M., Coene, S., Huang, L. (2025) Fuzzy transformer machine learning for UWB NLOS Identification and Ranging Mitigation. IEEE Transactions on Instrumentation and Measurement, 74, (doi: 10.1109/TIM.2025.3548180)
Alsharif, G. O., Anagnostopoulos, C., Marnerides, A. K. (2025) Energy market manipulation via false-data injection attacks: a review. IEEE Access, 13, pp. 42559-42573. (doi: 10.1109/ACCESS.2025.3548914)
Gibson, P., Cano, J., Crowley, E., Storkey, A., O'Boyle, M. (2025) DLAS: A conceptual model for across-stack Deep Learning Acceleration. ACM Transactions on Architecture and Code Optimization, 22, pp. 1-28. (doi: 10.1145/3688609)
Perkins, C. (2025) IRTF Code of Conduct. Internet RFC, (doi: 10.17487/RFC9775)
Archibald, B., Calder, M., Sevegnani, M. (2025) Practical modelling with bigraphs. Formal Aspects of Computing, (doi: 10.1145/3721142)
Szafarczyk, R., Nabi, S. W., Vanderbauwhede, W. (2025) Dynamic Loop Fusion in High-Level Synthesis. (doi: 10.1145/3706628.3708871)
Cheng, J. Y. S., Pang, Z. J. A., Lim, E. I. H.-E., Chan, S. W. H., Sim, L. W. X., Koko, M., Cao, Q., Keoh, S. L. (2025) Strategies and Implications of Peer Assessment in Software Engineering Education. (doi: 10.1109/FIE61694.2024.10892827)
Szafarczyk, R., Nabi, S. W., Vanderbauwhede, W. (2025) Compiler Support for Speculation in Decoupled Access/Execute Architectures. (doi: 10.1145/3708493.3712695)
Lowther, D., Jacob, D., Trevor, J., Singer, J. (2025) Secure Scripting with CHERIoT MicroPython. (doi: 10.1145/3708493.3712694)
Holik, F., Cook, M. M., Li, X., Shah, A. A., Pezaros, D. (2025) Programmable data planes for increased digital resilience in OT networks. IEEE Communications Magazine, (doi: 10.1109/MCOM.001.2400446)
Li, X., Leong, K., Seow, C. K., Pugeault, N., Cao, Q. (2025) Efficient Autonomous Exploration with Dueling DDQN Enhancing Active SLAM through Reinforcement Learning. (doi: 10.1109/ICRAE64368.2024.10851611)
Su, J., Chen, J., Fang, Z., Lin, X., Tang, Y., Zheng, Z. (2025) SmartOracle: generating smart contract oracle via fine-grained invariant detection. IEEE Transactions on Software Engineering, 51, pp. 947-959. (doi: 10.1109/tse.2025.3534567)
Karan, V. M., McQuistin, S., Yanagida, R., Perkins, C., Tyson, G., Castro, I., Healey, P., Purver, M. (2025) A Dataset for Expert Reviewer Recommendation with Large Language Models as Zero-shot Rankers.
Zhang, B., Liu, D., Simeone, O., Wang, G., Pezaros, D., Zhu, G. (2025) Personalizing Low-rank Bayesian Neural Networks Via Federated Learning.
Tan, Z., Parambath, S., Anagnostopoulos, C., Singer, J., Marnerides, A. K. (2025) Advanced persistent threats based on supply chain vulnerabilities: challenges, solutions & future directions. IEEE Internet of Things Journal, (doi: 10.1109/JIOT.2025.3528744)
Sharma, V., Pau, D. P., Cano, J. (2025) Biases in Edge Language Models: Detection, Analysis, and Mitigation.
Choudhury, V., Gay, S. J. (2025) The Duality of λ-Abstraction. (doi: 10.5281/zenodo.14015102)
Andrei, O., Nabi, S. W., Barr, M., Petrovska, O. (2025) Integrating Socially Responsible Computing Competencies in Computer Science and Software Engineering Education. (doi: 10.1145/3702212.3702225)
Maguire, J., English, R., Cao, Q., Seow, C. K. (2025) Themes in the Declared Use of Generative Artificial Intelligence in Assessment. (doi: 10.1145/3702212.3702217)
Liow, H. J. K., Yau, P. C., Tang, L. M., Seow, C. K., Cao, Q. (2025) Peer-Assessed (Evaluated) Automated Grading System. (doi: 10.1145/3702386.3702404)
Trammell, B., Welzl, M., Enghardt, R., Fairhurst, G., Kühlewind, M., Perkins, C.S., Tiesel, P.S., Pauly, T. (2025) An abstract Application Programming Interface (API) for Transport Services. Internet RFC, (doi: 10.17487/RFC9622)
Pauly, T., Trammell, B., Brunstrom, A., Fairhurst, G., Perkins, C.S. (2025) Architecture and requirements for Transport Services. Internet RFC, (doi: 10.17487/RFC9621)
Lua, Z. Z., Seow, C. K., Chan, R. C. B., Cai, Y., Cao, Q. (2025) Automated Bitcoin trading dApp using price prediction from a deep learning model. Risks, 13, (doi: 10.3390/risks13010017)
Gay, S. J., Vasconcelos, V. T. (2025) Session Types. Cambridge University Press
2024
Ghosh, B., Li, E., Guha, T. (2024) Active Listener: Continuous Generation of Listener’s Head Motion Response in Dyadic Interactions. (doi: 10.1109/ICASSP49660.2025.10889429)
Al Haffar, N., Bandyopadhyay, S., Lukowski, L., Manyam, N., Salman, A., Somerville, D., Storer, T., Tsiapali, S. E., Vaughan, T. (2024) A retrospective of work-based learning within an in-house student-delivered software service. Routledge
Daly, A., Lee, G. M., Truong, N. B. (2024) A Blockchain-Based Data Sharing Scheme Using Attribute-Based Encryption and Fungible Tokens. (doi: 10.1109/GLOBECOM52923.2024.10901604)
Yi Chan, E. M., Seow, C. K., Wee Tan, E. S., Wang, M., Yau, P. C., Cao, Q. (2024) SketchBoard: Sketch-Guided Storyboard Generation for Game Characters in the Game Industry. (doi: 10.1109/INDIN58382.2024.10774282)
Bjurling, B., Raza, S. (2024) Cyber threat intelligence meets the analytic tradecraft. ACM Transactions on Privacy and Security, 28, (doi: 10.1145/3701299)
Nabi, S. W., Somerville, D. (2024) The role of reflection in effective work-based learning and assessment. Routledge
Hu, W., Henderson, P., Cano, J. (2024) DQA: An Efficient Method for Deep Quantization of Deep Neural Network Activations.
Karakostas, D., Kiayias, A., Zacharias, T. (2024) Blockchain bribing attacks and the efficacy of counterincentives. (doi: 10.1145/3658644.3670330)
Constitution, Europe, External Affairs and Culture Committee, , , (2024) Constitution, Europe, External Affairs and Culture Committee 27th Meeting, 2024 (Session 6), Thursday, 5 December, Inquiry into the Teview of the EU-UK Trade and Cooperation Agreement – Phase 2: Trade in Services and Mobility of People.
Jamwal, S., Cano, J., Lee, G. M., Tran, N. H., Truong, N. (2024) A survey on Ethereum pseudonymity: Techniques, challenges, and future directions. Journal of Network and Computer Applications, 232, (doi: 10.1016/j.jnca.2024.104019)
Peevers, G., McMaster, T., Bhardwaj, N., Shah, J. A., Keoh, S. L., Goh, C. S., Kim, Y. (2024) Supporting a Mindset Shift to Blended Learning at the University of Glasgow Singapore.
Park, S.-H., Mahboob, T., Shah, S. T., Shawky, M. A., Choi, M., Chung, M. Y. (2024) Blockchain-assisted dynamic resource pool selection for D2D roaming scenarios. IEEE Open Journal of the Communications Society, (doi: 10.1109/OJCOMS.2024.3507378)
Guo, M., Liu, D., Simeone, O., Wen, D. (2024) Efficient wireless federated learning via low-rank gradient factorization. IEEE Transactions on Vehicular Technology, (doi: 10.1109/TVT.2024.3506950)
Saha, R., Haris, J., Cano, J. (2024) Accelerating PoT Quantization on Edge Devices. (doi: 10.1109/ICECS61496.2024.10849093)
Evripidou, S., McKendrick Watson, J. D. (2024) Understanding Operational Technology Personnel's Mindsets and Their Effect on Cybersecurity Perceptions: A Qualitative Study With Operational Technology Cybersecurity Practitioners. (doi: 10.1145/3688459.3688472)
Jiang, J., Li, Z., Qin, H., Jiang, M., Luo, X., Wu, X., Wang, H., Tang, Y., Qian, C., Chen, T. (2024) Unearthing gas-wasting code smells in smart contracts with large language models. IEEE Transactions on Software Engineering, (doi: 10.1109/TSE.2024.3491578)
Yu, L., Kizilkaya, B., Qi, L., Ge, Y., Ansari, S., Popoola, O., Imran, M. A., Ahmad, W. (2024) Beyond the Classroom: A Systematic Review of Revolutionizing Education with Immersive Virtual Reality.
Maguire, J., English, R. (2024) Developing Assessment Literacy through Active Learning. (doi: 10.21125/iceri.2024.2390)
Nahalka, M., Cook, M. M., Pezaros, D. (2024) The Good, the Bad and the Ugly: Investigating the Effectiveness of Graph Deep Neural Networks for Anomaly Detection in Industrial Control Systems. (doi: 10.1007/978-3-031-81900-1_2)
Maguire, J., Brown, N. (2024) Work in Progress Workshop: Themes, Challenges and Opportunities. (doi: 10.1145/3689535.3689550)
Karkashina, T., Shah, A. A., Pezaros, D. P. (2024) In-Network Real-Time Flow Classification Using Hierarchical Decision Trees. (doi: 10.23919/CNSM62983.2024.10814623)
Avogaro, A., Toaiari, A., Cunico, F., Xu, X., Dafas, H., Vinciarelli, A., Li, E., Cristani, M. (2024) Exploring 3D Human Pose Estimation and Forecasting from the Robot’s Perspective: The HARPER Dataset. (doi: 10.1109/IROS58592.2024.10802238)
Yang, H., Wang, Y., Seow, C., Sun, M., Plets, D. (2024) UWB NLOS Identification and Mitigation based on Bidirectional Encoder Representations from Transformer (BERT) Deep Learning. (doi: 10.1109/IPIN62893.2024.10786116)
Das, D., Diaz, C., Kiayias, A., Zacharias, T. (2024) Are continuous stop-and-go mixnets provably secure? Proceedings on Privacy Enhancing Technologies, 2024, pp. 665-683. (doi: 10.56553/popets-2024-0136)
Yanagida, R., Bhatti, S. N. (2024) Mobility–multihoming duality. Future Internet, 16, (doi: 10.3390/fi16100358)
Ji, Y., Dai, T., Tang, Y., He, J. (2024) Poster: Whether We Are Good Enough to Detect Server-Side Request Forgeries in PHP-native Applications? (doi: 10.1145/3658644.3691419)
Djouela Kamgang, I. R., Elhabbash, A., Elkhatib, Y. (2024) PricingTheCloud: A Pricing Estimator for an Informed Cloud-Migration Process. (doi: 10.1007/978-3-031-81226-2_10)
Sharma, V., Pau, D., Cano, J. (2024) Efficient Tiny Machine Learning for Human Activity Recognition on Low-Power Edge Devices. (doi: 10.1109/RTSI61910.2024.10761203)
Li, M., Shah, A. A., Pezaros, D. (2024) Federated Learning with Sharpness-aware Minimisation for Intrusion Detection in Smart Grids.
Albalwe, M., Archibald, B., Sevegnani, M. (2024) Modelling and analysing routing protocols diagrammatically with bigraphs. Formal Aspects of Computing, 36, (doi: 10.1145/3685934)
Peevers, G., McMaster, T., Bhardwaj, N., Shah, J. A., Keoh, S. L., Goh, C. S., Kim, Y. (2024) A Collaborative Journey: Redesigning University of Glasgow Singapore’s Programmes for Blended Delivery.
Dafas, H., Li, E., Cross, E. (2024) Walking the Line: Assessing the Role of Gait in a Quadruped Robot’s Perception. (doi: 10.1109/RO-MAN60168.2024.10731163)
Li, S., Trinder, P., De Troyer, C., Lubbers, M., Ramsingh, A. (2024) The Benefits of Tierless Elixir/Potato for Engineering IoT Systems. (doi: 10.1145/3677995.3678197)
Alasmari, O. A. F., Singer, J., Bikanga Ada, M. (2024) Online Coding Tutorial Systems: A New Category of Programming Learning Platforms. (doi: 10.1109/compsac61105.2024.00356)
English, R., Maguire, J., Wilde, A. (2024) Principles for inclusive assessment design in cyber security education. Springer
Gupta, S. R., Papadopoulou, N., Chen, J., Pericàs, M. (2024) Co-Design of Convolutional Algorithms and Long Vector RISC-V Processors for Efficient CNN Model Serving. (doi: 10.1145/3673038.3673121)
Meng, R., Shah, A. A., Jamshed, M. A., Pezaros, D. (2024) Federated Learning-based Intrusion Detection Framework for Internet of Things and Edge Computing backed Critical Infrastructure. (doi: 10.1109/ICCWorkshops59551.2024.10615814)
Kizilkaya, B., She, C., Zhao, G., Imran, M. A. (2024) Intelligent Mode-switching Framework for Teleoperation. (doi: 10.1109/ICRA57147.2024.10611333)
Kouzapas, D., Gutkovas, R. F., Voinea, A. L., Gay, S. J. (2024) A session type system for asynchronous unreliable broadcast communication. Logical Methods in Computer Science, 20, pp. 13:1-13:54. (doi: 10.46298/lmcs-20(3:13)2024)
Elhabbash, A., Elkhatib, Y., Nundloll, V., Sanz Marco, V., Blair, G. S. (2024) Principled and automated system of systems composition using an ontological architecture. Future Generation Computer Systems, 157, pp. 499-515. (doi: 10.1016/j.future.2024.03.034)
Qin, Y., Jacob, D., Singer, J. (2024) Characterizing Dynamic Memory Behavior in WebAssembly Workloads. (doi: 10.1109/ispass61541.2024.00047)
Chin, X. J. L., Seow, C. K., Cai, Y., Zhu, Y., Wang, M., Cao, Q. (2024) Enhancing student learning and engagement with object-oriented block-based programming tool. International Journal of Information and Education Technology, 14, pp. 910-919. (doi: 10.18178/ijiet.2024.14.7.2117)
Anastasiadis, P., Papadopoulou, N., Koziris, N., Goumas, G. (2024) Uncut-GEMMs : Communication-aware Matrix Multiplication on Multi-GPU Nodes. (doi: 10.1109/CLUSTER59578.2024.00020)
Archibald, B., Sevegnani, M. (2024) A Bigraphs Paper of Sorts. (doi: 10.1007/978-3-031-64285-2_2)
Haris, J., Saha, R., Hu, W., Cano, J. (2024) Designing Efficient LLM Accelerators for Edge Devices.
Chia, Y. X., Seow, C. K., Chen, K., Cao, Q. (2024) Exploring Resource Prediction Models Based on Custom Kubernetes Auto-scaling Metrics. (doi: 10.1109/ICCCBDA61447.2024.10569815)
Alsubhi, A. H., Dardha, O. (2024) Coconut: Typestates for Embedded Systems. (doi: 10.1007/978-3-031-62697-5_12)
Labrosse, N., Belk, J., Busquier Cerdan, H., Cheng, W., Grey, S., Maguire, J., Prime, C., Rivera, E., Soler, L., Speirits, F. (2024) Enabling Change for Inclusive Assessment in Quantitative Disciplines.
Lyko, T., Elkhatib, Y., Ramdhany, R., Race, N. (2024) Drop or Stop: Investigating the Impact of Playback Rate on QoE in Adaptive Video Streaming. (doi: 10.1109/QoMEX61742.2024.10598252)
Le Brun, M. A., Dardha, O. (2024) MAGπ!: The Role of Replication in Typing Failure-Prone Communication. (doi: 10.1007/978-3-031-62645-6_6)
Almazarqi, H. A., Woodyard, M., Marnerides, A. K. (2024) Macroscopic Insights of IoT Botnet Dynamics via AS-level Tolerance Assessment. (doi: 10.1109/ICC51166.2024.10622782)
Liu, Z., Tang, Y., Luo, X., Zhou, Y., Zhang, L. F. (2024) No need to lift a finger anymore? Assessing the quality of code generation by ChatGPT. IEEE Transactions on Software Engineering, 50, pp. 1548-1584. (doi: 10.1109/TSE.2024.3392499)
Cham, X. T., Soh, M. L., Trujillano, F., Yau, P. C.Y., Chen Fung Choy, O., Cheh, X., Fornace, K., Poh, Y. J. N., Seow, C. K., Hesse, H., Cao, Q., Garay, G. J. (2024) AI-Assisted Manual Segmentation Web Application for Geospatial Satellite and Imagery Data. (doi: 10.1109/WF-IoT58464.2023.10539446)
Wang, Y. J., Seow, C. K., Hesse, H., Wang, V. (2024) Digital Solutions for Natural Event Management: Leveraging IoT and Drones for Biodiversity Conservation and Disease Control. (doi: 10.1109/WF-IoT58464.2023.10539556)
Yong, K. E., Hui Kieu, D. K., Goh, Y. K., Zhang, X., Loo, X. H., Tong, H. G., Yau, P. C., Seow, C. K., Fornace, K., Hesse, H. (2024) Drone Navigation System for Autonomous Mosquito Sampling in Tree Canopies. (doi: 10.1109/wf-iot58464.2023.10539459)
Barnes, M. R., Karan, M., McQuistin, S., Perkins, C., Tyson, G., Purver, M., Castro, I., Clegg, R. G. (2024) Temporal Network Analysis of Email Communication Patterns in a Long Standing Hierarchy. (doi: 10.1609/icwsm.v18i1.31302)
Casadei, R., Esterle, L., Gamble, R., Harvey, P., Wanner, E. F. (2024) Editorial: Understanding and engineering cyber-physical collectives. Frontiers in Robotics and AI, 11, (doi: 10.3389/frobt.2024.1407421)
do Carmo Alves, M. A., Varma, A., Elkhatib, Y., Marcolino, L. S. (2024) It Is Among Us: Identifying Adversaries in Ad-hoc Domains Using Q-valued Bayesian Estimations.
Alasmari, O. A. F., Singer, J., Bikanga Ada, M. (2024) Python OCTS: Design, Implementation, and Evaluation of an Online Coding Tutorial System Prototype. (doi: 10.1109/EDUNINE60625.2024.10500548)
Niu, X., Cook, M., Pezaros, D. (2024) Examining the Suitability of Stream Ciphers for Modbus-TCP Encryption on Resource Constrained Devices. (doi: 10.1145/3642974.3652287)
Boswell, E., Perkins, C. (2024) RIPEn at Home – Surveying Internal Domain Names using RIPE Atlas. (doi: 10.23919/TMA62044.2024.10559012)
Cavoj, S., Nikitin, I., Perkins, C., Dardha, O. (2024) Session Types for the Transport Layer: Towards an Implementation of TCP. (doi: 10.4204/EPTCS.401.3)
Naila, N., Chak, A., Michala, L., Ansari, S., Truong, N. (2024) Modelling GDPR-compliance Based on Defeasible Logic Reasoning: Insights from Time Complexity Perspective. (doi: 10.1109/TrustCom63139.2024.00286)
Cao, H., Li, S., Zhou, Y., Fan, M., Zhao, X., Tang, Y. (2024) Cheating your apps: black-box adversarial attacks on deep learning apps. Journal of Software: Evolution and Process, 36, (doi: 10.1002/smr.2528)
Groen, D., Papadopoulou, N., Anastasiadis, P., Lawenda, M., Szustak, L., Gogolenko, S., Arabnejad, H., Jahani, A. (2024) Large-scale parallelization of human migration simulation. IEEE Transactions on Computational Social Systems, 11, pp. 2135-2146. (doi: 10.1109/TCSS.2023.3292932)
Archibald, B., Calder, M., Sevegnani, M., Xu, M. (2024) Quantitative modelling and analysis of BDI agents. Software and Systems Modeling, 23, pp. 343-367. (doi: 10.1007/s10270-023-01121-5)
Tang, Y., Liu, Z., Zhou, Z., Luo, X. (2024) ChatGPT vs SBST: a comparative assessment of unit test suite generation. IEEE Transactions on Software Engineering, (doi: 10.1109/tse.2024.3382365)
Keoh, S. L., Chan, C. B., Silverajan, B., Yiu, S. M. (2024) Editorial: real-world deployment of internet of things (IoT) applications, experiences, and challenges. Frontiers in the Internet of Things, 3, (doi: 10.3389/friot.2024.1398211)
Lim, Y. T., Keoh, S. L., Chong, Y.-W., Ibrahim, N. F., Sharul Kamal, A. R. (2024) An ANN-based Prediction Model for Public Bus Journey Time. (doi: 10.1109/ICAIIC60209.2024.10463440)
Kam, S.-H., Chong, Y.-W., Ibrahim, N. F., Keoh, S. L., Phon-Amnuaisuk, S., Sharul Kamal, A. R. (2024) Predicting Estimated Time of Arrival Using Boosting Models. (doi: 10.1109/ICAIIC60209.2024.10463273)
Abioye, A. O., Hunt, W., Gu, Y., Schneiders, E., Naiseh, M., Fischer, J. E., Ramchurn, S. D., Soorati, M. D., Archibald, B., Sevegnani, M. (2024) The Effect of Predictive Formal Modelling at Runtime on Performance in Human-Swarm Interaction. (doi: 10.1145/3610978.3640725)
Barr, M., Andrei, O., Morrison, A., Nabi, S. W. (2024) The Development of Students' Professional Competencies on a Work-Based Software Engineering Program. (doi: 10.1145/3626252.3630944)
Yang, H., Wang, Y., Xu, S., Bi, J., Jia, H., Seow, C. K. (2024) UWB ranging errors mitigation with novel CIR feature parameters and two-step NLOS identification. Sensors, 24, (doi: 10.3390/s24051703)
Yang, H., Wang, Y., Xu, S., Bi, J., Jia, H., Seow, C. K. (2024) Ultra-wideband ranging error mitigation with novel channel impulse response feature parameters and two-step non-line-of-sight identification. Sensors, 24, (doi: 10.3390/s24051703)
Haris, J., Agostini, N. B., Tumeo, A., Kaeli, D., Cano, J. (2024) Data Transfer Optimizations for Host-CPU and Accelerators in AXI4MLIR. (doi: 10.48550/arXiv.2402.19184)
Agostini, N. B., Haris, J., Gibson, P., Jayaweera, M., Rubin, N., Tumeo, A., Abellán, J. L., Cano Reyes, J., Kaeli, D. (2024) AXI4MLIR: User-Driven Automatic Host Code Generation for Custom AXI-Based Accelerators. (doi: 10.1109/CGO57630.2024.10444801)
Zhang, B., Liu, D., Simeone, O., Zhu, G. (2024) Bayesian Over-the-Air FedAvg via Channel Driven Stochastic Gradient Langevin Dynamics. (doi: 10.1109/GLOBECOM54140.2023.10437650)
Azam, N., Michala, A. L., Ansari, S., Truong, N. B. (2024) Modelling Technique for GDPR-compliance: Toward a Comprehensive Solution. (doi: 10.1109/GLOBECOM54140.2023.10437389)
Healey, P. G.T., Khare, P., Tyson, G., Karan, M., Castro, I., Shekhar, R., McQuistin, S., Perkins, C., Purver, M. (2024) Power and vulnerability: Managing sensitive language in organizational communication. Frontiers in Psychology, 14, (doi: 10.3389/fpsyg.2023.1266425)
Zhou, Z., Zhou, Y., Fang, C., Chen, Z., Luo, X., He, J., Tang, Y. (2024) Coverage goal selector for combining multiple criteria in search-based unit test generation. IEEE Transactions on Software Engineering, (doi: 10.1109/tse.2024.3366613)
Szafarczyk, R., Nabi, S. W., Vanderbauwhede, W. (2024) A High-Frequency Load-Store Queue with Speculative Allocations for High-Level Synthesis. (doi: 10.1109/ICFPT59805.2023.00018)
Arkko, J., Perkins, C. S., Krishnan, S. (2024) Report from the IAB Workshop on Environmental Impact of Internet Applications and Systems, 2022. Internet RFC, (doi: 10.17487/RFC9547)
Alasmari, O. A., Singer, J., Bikanga Ada, M. (2024) Do Current Online Coding Tutorial Systems Address Novice Programmer Difficulties? (doi: 10.1145/3629296.3629333)
Quek, S. W. D., Teo, J. K. F., Louahemmsabah, N., Tong, Y. B. C., Poh, A. Z. R., Cao, Q., Seow, C. K., Yau, P. C., Chen, A. Q. (2024) Improving Teamwork in Software Engineering Projects in Higher Education. (doi: 10.1109/FIE58773.2023.10343476)
Koehler, T., Goens, A., Bhat, S., Grosser, T., Trinder, P., Steuwer, M. (2024) Guided equality saturation. Proceedings of the ACM on Programming Languages, 8, (doi: 10.1145/3632900)
Feng, K., Cook, M. M., Marnerides, A. K. (2024) Sizzler: sequential fuzzing in ladder diagrams for vulnerability detection and discovery in Programmable Logic Controllers. IEEE Transactions on Information Forensics and Security, 19, pp. 1660-1671. (doi: 10.1109/TIFS.2023.3340615)
2023
Kang, D. M., Faahym, H., Meftah, S., Keoh, S. L., Khin, M. M. A. (2023) Practical Deep Neural Network Protection for Unmodified Applications in Intel Software Guard Extension Environments. Springer
Hoo, F., Tan, F. S. L., Chan, R. C. B., Waszecki, P., Keoh, S. L., Seow, C. K., Li, D., Cao, Q., Sum, C. S. (2023) 5G-Wi-SUN for Building Management System. (doi: 10.1109/ACIIS59385.2023.10367377)
Liu, J., Gao, Y., Ivanov, P., Harvey, P., Hogg, R. (2023) Probabilistic Markov chain modelling of photonic crystal surface emitting lasers. Applied Physics Letters, 123, (doi: 10.1063/5.0168073)
Zhang, M., Li, Y., Liu, D., Jin, R., Zhu, G., Zhong, C., Quek, T. Q.S. (2023) Joint compression and deadline optimization for wireless federated learning. IEEE Transactions on Mobile Computing, (doi: 10.1109/tmc.2023.3344108)
Lixin, S., Storer, T. (2023) A Case Study of DevOps Adoption within a Large Financial Organisation. (doi: 10.1109/ICSME58846.2023.00053)
Louloudakis, N., Gibson, P., Cano Reyes, J., Rajan, A. (2023) DeltaNN: Assessing the Impact of Computational Environment Parameters on the Performance of Image Recognition Models. (doi: 10.1109/ICSME58846.2023.00054)
Elijah, O., Keoh, S. L., bin Abdul Rahim, S. K., Seow, C. K., Cao, Q., bin Sarijari, M. A., Ibrahim, N. F., Basuki, A. (2023) Transforming urban mobility with internet of things: public bus fleet tracking using proximity-based bluetooth beacons. Frontiers in the Internet of Things, 2, (doi: 10.3389/friot.2023.1255995)
Mitchell, D. et al. (2023) Lessons learned: symbiotic autonomous robot ecosystem for nuclear environments. IET Cyber-Systems and Robotics, 5, (doi: 10.1049/csy2.12103)
Anastasiadis, P., Papadopoulou, N., Goumas, G., Koziris, N., Hoppe, D., Zhong, L. (2023) PARALiA: a performance aware runtime for auto-tuning linear algebra on heterogeneous systems. ACM Transactions on Architecture and Code Optimization, 20, (doi: 10.1145/3624569)
Shah, A. A., Ansari, S., Jamshed, M. A., Sambo, Y., Ur Rehman, M. (2023) The role of 6G and beyond for urban air mobility and utilising space systems for road to net-zero carbon. Institution of Engineering and Technology
Gu, Y., Hunt, W., Archibald, B., Xu, M., Sevegnani, M., Soorati, M. D. (2023) Successful Swarms: Operator Situational Awareness with Modelling and Verification at Runtime. (doi: 10.1109/RO-MAN57019.2023.10309626)
Cui, M., Papadopoulou, N., Pericàs, M. (2023) Analysis and Characterization of Performance Variability for OpenMP Runtime. (doi: 10.1145/3624062.3624239)
Rani Gupta, S., Papadopoulou, N., Pericàs, M. (2023) Challenges and Opportunities in the Co-design of Convolutions and RISC-V Vector Processors. (doi: 10.1145/3624062.3624232)
Liu, Z., Zhang, L. F., Tang, Y. (2023) Enhancing Malware Detection for Android Apps: Detecting Fine-granularity Malicious Components. (doi: 10.1109/ASE56229.2023.00074)
Louloudakis, N., Gibson, P., Cano, J., Rajan, A. (2023) Fault Localization for Buggy Deep Learning Framework Conversions in Image Recognition. (doi: 10.1109/ASE56229.2023.00147)
Xu, M., Rivoalen, T., Archibald, B., Sevegnani, M. (2023) CAN-verify: A Verification Tool for BDI Agents. (doi: 10.1007/978-3-031-47705-8_19)
Szafarczyk, R., Nabi, S. W., Vanderbauwhede, W. (2023) Compiler Discovered Dynamic Scheduling of Irregular Code in High-Level Synthesis. (doi: 10.1109/FPL60245.2023.00009)
Wang, Y., Zhang, P., Sun, M., Lu, Z., Yang, Y., Tang, Y., Qian, J., Li, Z., Zhou, Y. (2023) Uncovering bugs in code coverage profilers via control flow constraint solving. IEEE Transactions on Software Engineering, 49, pp. 4964-4987. (doi: 10.1109/TSE.2023.3321381)
McQuistin, S., Snyder, P., Perkins, C., Haddadi, H., Tyson, G. (2023) A First Look at the Privacy Harms of the Public Suffix List. (doi: 10.1145/3618257.3624836)
Almazarqi, H. A., Woodyard, M., Mursch, T., Pezaros, D., Marnerides, A. K. (2023) Tracking IoT P2P Botnet Loaders in the Wild. (doi: 10.1109/ICC45041.2023.10279593)
Lowther, D., Jacob, D., Singer, J. (2023) CHERI Performance Enhancement for a Bytecode Interpreter. (doi: 10.1145/3623507.3623552)
Lowther, D., Jacob, D., Singer, J. (2023) Morello MicroPython: A Python Interpreter for CHERI. (doi: 10.1145/3617651.3622991)
Harvey, P. (2023) HSBooster Report - Standardisation for OntoCommons. (doi: 10.5281/ZENODO.8414882)
Tang, W., Hillerström, D., McKinna, J., Steuwer, M., Dardha, O., Fu, R., Lindley, S. (2023) Structural Subtyping as Parametric Polymorphism. Proceedings of the ACM on Programming Languages, 7, pp. 1093-1121. (doi: 10.1145/3622836)
Maguire, J., Parkinson, J., Cutts, Q., Fincher, S. (2023) Expanding the Circle of Critical Friends in UK Computing Education Research with the Works-in-Progress (WiP) Workshop. (doi: 10.1145/3610969.3613385)
Hasan, S., Elkhatib, Y. (2023) On the interplay between self-adaptation and energy efficiency. Springer
Kizilkaya, B., Popoola, O., Zhao, G., Imran, M. A. (2023) 5G-based Low-Latency Teleoperation: Two-way Timeout Approach. (doi: 10.1007/978-3-031-43360-3_38)
Elhabbash, A., Rogoda, K., Elkhatib, Y. (2023) MARTIN: An End-to-end Microservice Architecture for Predictive Maintenance in Industry 4.0. (doi: 10.1109/SSE60056.2023.00013)
Yang, J., Shah, A. A., Pezaros, D. (2023) A survey of energy optimization approaches for computational task offloading and resource allocation in MEC networks. Electronics, 12, (doi: 10.3390/electronics12173548)
Cook, M. M., Marnerides, A. K., Johnson, C., Pezaros, D. (2023) A survey on industrial control system digital forensics: challenges, advances and future directions. IEEE Communications Surveys and Tutorials, 25, pp. 1705-1747. (doi: 10.1109/COMST.2023.3264680)
Fincher, S., Maguire, J. (2023) Works-in-Progress (WiP) Workshop.
Sim, Y. H. R. S., Lua, Z. Z., Kelaver, K. K., Chua, J. Q., Lim, I. Z. J., Cao, Q., Keoh, S. L., Lim, L. H. I. (2023) Experiences and Lessons Learned from Real-World Projects in Software Engineering Subject. (doi: 10.1109/CSEET58097.2023.00036)
Stouka, A.-P., Zacharias, T. (2023) On the (De) centralization of FruitChains. (doi: 10.1109/csf57540.2023.00020)
Noor Soomro, P., Papadopoulou, N., Pericàs, M. (2023) ODIN: Overcoming Dynamic Interference in iNference Pipelines. (doi: 10.1007/978-3-031-39698-4_12)
De Muijnck-Hughes, J., Urlea, C., Voinea, L., Vanderbauwhede, W. (2023) Capable: A Mechanised Imperative Language with Native Multiparty Session Types.
McQuistin, S., Karan, M., Khare, P., Perkins, C., Purver, M., Healey, P., Castro, I., Tyson, G. (2023) Errare humanum est: What do RFC Errata say about Internet Standards? (doi: 10.23919/TMA58422.2023.10198980)
Ayaz, F., Zakariyya, I., Cano Reyes, J., Keoh, S. L., Singer, J., Pau, D., Kharbouche-Harrari, M. (2023) Improving Robustness Against Adversarial Attacks with Deeply Quantized Neural Networks. (doi: 10.1109/IJCNN54540.2023.10191429)
(2023) Euro-Par 2023: Parallel Processing. 29th International Conference on Parallel and Distributed Computing, Limassol, Cyprus, August 28 – September 1, 2023, Proceedings. (doi: 10.1007/978-3-031-39698-4)
Maguire, J. (2023) How to succeed at a CS Ed Ph.D. Doctoral Consortium.
Andrei, O., Nabi, S. W. (2023) On Students’ Experiences with Algorithm Tracing using Pair Programming. (doi: 10.1145/3568812.3603477)
Fowler, S., Attard, D. P., Sowul, F., Gay, S., Trinder, P. (2023) Special delivery: programming with mailbox types. Proceedings of the ACM on Programming Languages, 7, (doi: 10.1145/3607832)
Tan, Q. (M.), Cao, Q., Seow, C. K., Yau, C. (P.) (2023) Information extraction system for invoices and receipts. Springer
Rani Gupta, S., Papadopoulou, N., Pericàs, M. (2023) Accelerating CNN Inference on Long Vector Architectures Via Co-design. (doi: 10.1109/ipdps54959.2023.00024)
Lyko, T., Elkhatib, Y., Ramdhany, R., Race, N. (2023) Differential QoE in Picture-in-Picture Gaming Videos: A Subjective Study. (doi: 10.1109/QoMEX58391.2023.10178572)
Mpakos, P., Galanopoulos, D., Anastasiadis, P., Papadopoulou, N., Koziris, N., Goumas, G. (2023) Feature-based SpMV Performance Analysis on Contemporary Devices. (doi: 10.1109/ipdps54959.2023.00072)
Abadi, A., Murdoch, S. J., Zacharias, T. (2023) Recurring Contingent Service Payment. (doi: 10.1109/eurosp57164.2023.00049)
Fowler, S., Kokke, W., Dardha, O., Lindley, S., Morris, J. G. (2023) Separating sessions smoothly. Logical Methods in Computer Science, 19, (doi: 10.46298/lmcs-19(3:3)2023)
Hu, W., Gibson, P., Cano, J. (2023) ICE-Pick: Iterative Cost-Efficient Pruning for DNNs.
De Muijnck-Hughes, J., Vanderbauwhede, W. (2023) Wiring Circuits Is Easy as {0, 1, ω}, or Is It. . . (Artifact) (doi: 10.4230/DARTS.9.2.4)
De Muijnck-Hughes, J., Vanderbauwhede, W. (2023) Wiring Circuits Is Easy as {0,1,ω}, or Is It... (doi: 10.4230/LIPIcs.ECOOP.2023.8)
Fowler, S., Attard, D. P., Sowul, F., Gay, S., Trinder, P. (2023) Artifact for "Special Delivery: Programming with Mailbox Types" (doi: 10.5281/zenodo.8126809)
Yu, R., Kizilkaya, B., Meng, Z., Li, E., Zhao, G., Imran, M. (2023) Robot Mimicry Attack on Keystroke-Dynamics User Identification and Authentication System. (doi: 10.1109/ICRA48891.2023.10161423)
Karan, M., Khare, P., Shekhar, R., McQuistin, S., Perkins, C., Castro, I., Tyson, G., Healey, P. G.T., Purver, M. (2023) LEDA: a Large-Organization Email-Based Decision-Dialogue-Act Analysis Dataset. (doi: 10.18653/v1/2023.findings-acl.378)
Aboba, B., Salgueiro, G., Perkins, C. (2023) Multiplexing scheme updates for QUIC. Internet RFC, (doi: 10.17487/RFC9443)
Zhang, Z., Elkhatib, Y., Elhabbash, A. (2023) NLP-based Generation of Ontological System Descriptions for Composition of Smart Home Devices. (doi: 10.1109/ICWS60048.2023.00055)
Xing, H., Zhu, G., Liu, D., Wen, H., Huang, K., Wu, K. (2023) Task-oriented integrated sensing, computation and communication for wireless edge AI. IEEE Network, 37, pp. 135-144. (doi: 10.1109/MNET.011.2300046)
Kizilkaya, B., She, C., Zhao, G., Imran, M. A. (2023) Task-oriented prediction and communication co-design for haptic communications. IEEE Transactions on Vehicular Technology, 72, pp. 8987-9001. (doi: 10.1109/TVT.2023.3247442)
Khare, P., Shekhar, R., Karan, M., McQuistin, S., Perkins, C., Castro, I., Tyson, G., Healey, P. G.T., Purver, M. (2023) Tracing Linguistic Markers of Influence in a Large Online Organisation. (doi: 10.18653/v1/2023.acl-short.8)
Oh, Q. Q., Seow, C. K., Yusuff, M., Pranata, S., Cao, Q. (2023) The Impact of Face Mask and Emotion on Automatic Speech Recognition (ASR) and Speech Emotion Recognition (SER) (doi: 10.1109/ICCCBDA56900.2023.10154691)
Xin, X., Keoh, S. L., Sevegnani, M., Saerbeck, M. (2023) Run-Time Probabilistic Model Checking for Failure Prediction: A Smart Lift Case Study. (doi: 10.1109/WF-IoT54382.2022.10152177)
Wang, Y. J., Yu, K., Seow, C. K., Hesse, H., Wang, V. (2023) Workshop: Internet of Things (IoT) for Intelligent Mobility and Dynamics: Interconnecting Air, Ground and Human. (doi: 10.1109/WF-IoT54382.2022.10152131)
Fúster De La Fuente, J., Pendás Recondo, Á., Wong, L., Harvey, P. (2023) Enabling Auditable Trust in Autonomous Networks with Ethereum and IPFS. (doi: 10.1109/noms56928.2023.10154327)
Welzl, M., Ott, J., Perkins, C., Islam, S., Kutscher, D. (2023) How not to IETF: Lessons Learned From Failed Standardization Attempts. (doi: 10.1109/PerComWorkshops56833.2023.10150250)
Xu, X., Keoh, S. L., Seow, C. K., Cao, Q., Rahim, S. K. b. A. (2023) Towards Prediction of Bus Arrival Time using Multi-layer Perceptron (MLP) and MLP Regressor. (doi: 10.1109/ICBIR57571.2023.10147614)
Arapinis, M., Kocsis, Á., Lamprou, N., Medley, L., Zacharias, T. (2023) Universally Composable Simultaneous Broadcast against a Dishonest Majority and Applications. (doi: 10.1145/3583668.3594591)
Chan, Y. C., Gan, C. M., Lim, C. Y., Tan, T. H., Cao, Q., Seow, C. K. (2023) Learning CS Subjects of Professional Software Development and Team Projects. (doi: 10.1109/TALE54877.2022.00020)
Thong, M. J. Q., Yau, A. Q. X., Goh, S. A., Gu, J., Cao, Q., Keoh, S. L. (2023) Learning Experiences and Analysis in Professional Software Development Subject. (doi: 10.1109/TALE54877.2022.00123)
Singer, J. (2023) Towards Secure MicroPython on Morello (WIP) (doi: 10.1145/3589610.3596272)
Bramley, J., Jacob, D., Lascu, A., Singer, J., Tratt, L. (2023) Picking a CHERI Allocator: Security and Performance Considerations. (doi: 10.1145/3591195.3595278)
Cao, Q., Seow, C. K., Lim, L. H. I., Keoh, S. L., Dale, V., Honeychurch, S., Tasler, N., Bremner, D. (2023) Learners’ differences in blended learner-centric approach for a common programming subject. International Journal of Information and Education Technology, 13, pp. 906-913. (doi: 10.18178/ijiet.2023.13.6.1886)
Archibald, B., Calder, M., Sevegnani, M., Xu, M. (2023) Quantitative Verification and Strategy Synthesis for BDI Agents. (doi: 10.1007/978-3-031-33170-1_15)
Kliks, A., Dryjanski, M., Ram, V., Wong, L., Harvey, P. (2023) Towards autonomous open radio access networks. ITU Journal on Future and Evolving Technologies, 4, pp. 251-268. (doi: 10.52953/GJII3746)
Elkhatib, Y., Povedano Poyato, J. (2023) An Evaluation of Service Mesh Frameworks for Edge Systems. (doi: 10.1145/3578354.3592867)
Sanders, K., Maguire, J., McGill, M. (2023) Criteria and Scrutiny: Computing Education Research. (doi: 10.4230/DagRep.12.10.225)
Si, M., Wang, Y., Zhou, N., Seow, C., Siljak, H. (2023) A hybrid indoor altimetry based on barometer and UWB. Sensors, 23, (doi: 10.3390/s23094180)
Si, M., Wang, Y., Siljak, H., Seow, C., Yang, H. (2023) A lightweight CIR-based CNN with MLP for NLOS/LOS identification in a UWB positioning system. IEEE Communications Letters, 27, pp. 1332-1336. (doi: 10.1109/LCOMM.2023.3260953)
Prickett, T., Yang, L., Irons, A., Miller, K., Brooke, P., Crick, T., Hayes, A., Davenport, J. H., English, R., Maguire, J., Bechkoum, K., Jones, A. (2023) Challenges and opportunities of teaching cybersecurity in mainstream computing programmes in UK university computing programmes. Springer
Mei, Y., Rong, Y., Liu, S., Guo, Z., Yang, Y., Lu, H., Tang, Y., Zhou, Y. (2023) Deriving thresholds of object-oriented metrics to predict defect-proneness of classes: a large-scale meta-analysis. International Journal of Software Engineering and Knowledge Engineering, 33, pp. 651-695. (doi: 10.1142/s0218194023500110)
Moawad, Y., Vanderbauwhede, W., Steijl, R. (2023) Quantum circuit-width reduction through parameterisation and specialisation. Algorithms, 16, (doi: 10.3390/a16050241)
Liu, D., Simeone, O. (2023) Wireless federated Langevin Monte Carlo: repurposing channel noise for Bayesian sampling and privacy. IEEE Transactions on Wireless Communications, 22, pp. 2946-2961. (doi: 10.1109/TWC.2022.3215663)
Le Brun, M. A., Dardha, O. (2023) MAGπ: Types for Failure-Prone Communication. (doi: 10.1007/978-3-031-30044-8_14)
Gam, Y. C. A., Cao, Q., Seow, C. K. (2023) Predictive Information Workflow of Forecasting Number of COVID-19 Confirmed Cases. (doi: 10.1109/IUCC-CIT-DSCI-SmartCNS57392.2022.00018)
Azam, N., Michala, L., Ansari, S., Truong, N. (2023) Data privacy threat modelling for autonomous systems: a survey from the GDPR’s perspective. IEEE Transactions on Big Data, 9, pp. 388-414. (doi: 10.1109/TBDATA.2022.3227336)
Perkins, C. (2023) Sending RTP Control Protocol (RTCP) feedback for congestion control in interactive multimedia conferences. Internet RFC, (doi: 10.17487/RFC9392)
Yu, L., Wang, H., Luo, X., Zhang, T., Liu, K., Chen, J., Zhou, H., Tang, Y., Xiao, X. (2023) Towards automatically localizing function errors in mobile apps with user reviews. IEEE Transactions on Software Engineering, 49, pp. 1464-1486. (doi: 10.1109/TSE.2022.3178096)
Haris, J., Gibson, P., Cano, J., Bohm Agostini, N., Kaeli, D. (2023) SECDA-TFLite: a toolkit for efficient development of FPGA-based DNN accelerators for edge inference. Journal of Parallel and Distributed Computing, 173, pp. 140-151. (doi: 10.1016/j.jpdc.2022.11.005)
Draper, S., Maguire, J. (2023) The different types of contributions to knowledge (in CER): All needed, but not all recognised. ACM Transactions on Computing Education, 23, (doi: 10.1145/3487053)
Szafarczyk, R., Nabi, S. W., Vanderbauwhede, W. (2023) Reducing FPGA Memory Footprint of Stencil Codes through Automatic Extraction of Memory Patterns. (doi: 10.1109/FPL57034.2022.00033)
Rasheed, F., Saleem, Y., Yau, K.-L. A., Chong, Y.-W., Keoh, S. L. (2023) The role of deep learning in parking space identification and prediction systems. Computers, Materials and Continua, 75, pp. 761-784.
Yang, H., Wang, Y., Seow, C. K., Sun, M., Si, M., Huang, L. (2023) UWB sensor based indoor LOS/NLOS localization with support vector machine learning. IEEE Sensors Journal, 23, pp. 2988-3004. (doi: 10.1109/JSEN.2022.3232479)
Lubbers, M., Koopman, P., Ramsingh, A., Singer, J., Trinder, P. (2023) Could tierless languages reduce IoT development grief? ACM Transactions on Internet of Things, 41, (doi: 10.1145/3572901)
MacGregor, R., Archibald, B., Trinder, P. (2023) Generic exact combinatorial search at HPC scale. International Journal of Parallel Programming, 51, pp. 83-106. (doi: 10.1007/s10766-022-00744-3)
Gibson, P., Cano, J. (2023) Transfer-Tuning: Reusing Auto-Schedules for Efficient Tensor Program Code Generation. (doi: 10.1145/3559009.3569682)
Ko, A. J., Draper, S., Maguire, J., Pajunen, J., Tedre, M., Sinclair, J., Szabo, C. (2023) A dialog about the special issues on theory. ACM Transactions on Computing Education, 23, (doi: 10.1145/3554982)
Maguire, J., English, R., Draper, S. (2023) Engaging Students in Threat Thinking with the Cyber Security Cinema. (doi: 10.1145/3573260.3573264)
Maguire, J., Franqueira, V. (2023) Engaging and Active Security Education 2023 (EASE 2023) Workshop.
English, R., Maguire, J. (2023) Exploring Student Perceptions and Expectations of Cyber Security. (doi: 10.1145/3573260.3573267)
Maguire, J., English, R., Draper, S. (2023) Research-led Active Learning Sessions in Cyber Security through Research Paper Reading. (doi: 10.1145/3573260.3573269)
Alharbi, N., Mackenzie, L., Pezaros, D. (2023) Evaluation of Graph Routing Single Objective Paths Using Pre-set Unequal Clustering. (doi: 10.1109/ITNAC55475.2022.9998382)
Fúster de la Fuente, J. et al. (2023) Build your own closed loop: Graph-based proof of concept in closed loop for autonomous networks. ITU Journal on Future and Evolving Technologies, (doi: 10.52953/opdk5666)
Evripidou, S., Ani, U. D., Hailes, S., Watson, J. D. M. (2023) Drawing on the Success of Developing a Safety Culture to Improve the Security Culture in Companies That Use Operational Technology. (doi: 10.3850/978-981-18-8071-1_p297-cd)
Evripidou, S., Ani, U. D., Hailes, S., Watson, J. D. M. (2023) Exploring the Security Culture of Operational Technology (OT) Organisations: The Role of External Consultancy in Overcoming Organisational Barriers.
do Carmo Alves, M. A., Varma, A., Elkhatib, Y., Marcolino, L. S. (2023) Information-Guided Planning: An Online Approach for Partially Observable Problems.
Cook, M. M., Marnerides, A. K., Pezaros, D. P. (2023) PLCPrint: fingerprinting memory attacks in programmable logic controllers. IEEE Transactions on Information Forensics and Security, 18, pp. 3376-3387. (doi: 10.1109/TIFS.2023.3277688)
2022
Alhamed, M., Storer, T. (2022) Evaluation of Context-Aware Language Models and Experts for Effort Estimation of Software Maintenance Issues. (doi: 10.1109/ICSME55016.2022.00020)
Louloudakis, N., Gibson, P., Cano, J., Rajan, A. (2022) Assessing Robustness of Image Recognition Models to Changes in the Computational Environment.
Zhou, N., Si, M., Li, D., Seow, C. K., Mi, J. (2022) An indoor UWB 3D positioning method for coplanar base stations. Sensors, 22, (doi: 10.3390/s22249634)
Singer, J. (2022) Introduction. Springer
Almazarqi, H. A., Woodyard, M., Mursch, T., Pezaros, D., Marnerides, A. K. (2022) Macroscopic Analysis of IoT Botnets. (doi: 10.1109/GLOBECOM48099.2022.10001223)
Alhaizaey, Y., Singer, J., Michala, A. L. (2022) Optimizing Heterogeneous Task Allocation for Edge Compute Micro Clusters Using PSO Metaheuristic. (doi: 10.1109/FMEC57183.2022.10062755)
Tian, J., Elhabbash, A., Elkhatib, Y. (2022) Predicting Cloud Performance Using Real-time VM-level Metrics. (doi: 10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00184)
Singer, J., Rastello, F. (2022) Standard construction and destruction algorithms. Springer
Qin, Y., Jacob, D., Singer, J. (2022) Characterizing WebAssembly Bytecode. (doi: 10.1145/3546918.3560809)
Barr, M., Nabi, S. W. (2022) The Development of Students' Employability Skills on a Work-Based Software Engineering Degree Programme. (doi: 10.1109/FIE56618.2022.9962611)
Xin, X., Keoh, S. L., Sevegnani, M., Saerbeck, M., Khoo, T. P. (2022) Adaptive model verification for modularized industry 4.0 applications. IEEE Access, 10, pp. 125353-125364. (doi: 10.1109/ACCESS.2022.3225399)
Wetprasit, S., Cao, Q., Seow, C. K. (2022) Recommender System for Coupon Discount of E-commerce Applications. (doi: 10.1109/DSIT55514.2022.9943917)
Huang, L., Meng, Z., Deng, Z., Wang, C., Li, L., Zhao, G. (2022) Toward verifying the user of motion-controlled robotic arm systems via the robot behavior. IEEE Internet of Things Journal, 9, pp. 22422-22433. (doi: 10.1109/JIOT.2021.3121623)
Sanders, K., Maguire, J., McGill, M. M. (2022) Criteria and Scrutiny in Computing Education Research.
Zhang, X., Zhang, B., Kiayias, A., Zacharias, T., Ren, K. (2022) An efficient E2E crowd verifiable e-voting system. IEEE Transactions on Dependable and Secure Computing, 19, pp. 3607-3620. (doi: 10.1109/TDSC.2021.3103336)
Louloudakis, N., Gibson, P., Cano, J., Rajan, A. (2022) Exploring Effects of Computational Parameter Changes to Image Recognition Systems. arXiv,
Wu, D., Ullah, R., Harvey, P., Kilpatrick, P., Spence, I., Varghese, B. (2022) FedAdapt: Adaptive offloading for IoT Devices in federated learning. IEEE Internet of Things Journal, 9, pp. 20889-20901. (doi: 10.1109/JIOT.2022.3176469)
Feng, Z., Seow, C. K., Cao, Q. (2022) GNSS Anti-spoofing Detection based on Gaussian Mixture Model Machine Learning. (doi: 10.1109/ITSC55140.2022.9922109)
Elhabbash, A., Elkhatib, Y., Bouloukakis, G., Salama, M. (2022) A Middleware for Automatic Composition and Mediation in IoT Systems. (doi: 10.1145/3567445.3567451)
Tang, Y., Zhou, H., Luo, X., Chen, T., Wang, H., Xu, Z., Cai, Y. (2022) XDebloat: towards automated feature-oriented app debloating. IEEE Transactions on Software Engineering, 48, pp. 4501-4520. (doi: 10.1109/TSE.2021.3120213)
Liu, X., Ho So, C., Kizilkaya, B., Xue, Y., Zhao, G., Xi, N. (2022) Telerobotic Operations Using Network Address Translation (NAT) Traversal. (doi: 10.1109/cyber55403.2022.9907382)
Moawad, Y., Vanderbauwhede, W., Steijl, R. (2022) Investigating hardware acceleration for simulation of CFD quantum circuits. Frontiers in Mechanical Engineering, 8, (doi: 10.3389/fmech.2022.925637)
Lua, W. K. H., Yau, P. C.Y., Seow, C. K., Dennis, W. (2022) Lightweight CNN-Based Deep Neural Networks Application in Safety Measurement. (doi: 10.1109/PRAI55851.2022.9904161)
Mitchell, S. N. et al. (2022) FAIR Data Pipeline: provenance-driven data management for traceable scientific workflows. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 380, (doi: 10.1098/rsta.2021.0300)
Ramsingh, A., Singer, J., Trinder, P. (2022) Classifying the Reliability of the Microservice Architectures. (doi: 10.5220/0011381700003318)
Alharbi, N., Mackenzie, L., Pezaros, D. (2022) Enhancing graph routing algorithm of industrial wireless sensor networks using the covariance-matrix adaptation evolution strategy. Sensors, 22, (doi: 10.3390/s22197462)
Chia, W. M. D., Keoh, S. L., Goh, C., Johnson, C. (2022) Risk assessment methodologies for autonomous driving: a survey. IEEE Transactions on Intelligent Transportation Systems, 23, pp. 16923-16939. (doi: 10.1109/TITS.2022.3163747)
Kizilkaya, B., Khirakova, E., Cooper, E., Olusholaq, O., Zhao, G., Wessels, B., Challinor, J., Imran, M. A. (2022) Robotics-in-Care: Capabilities, Challenges, and Opportunities.
Zhou, Z., Zhou, Y., Fang, C., Chen, Z., Tang, Y. (2022) Selectively Combining Multiple Coverage Goals in Search-Based Unit Test Generation. (doi: 10.1145/3551349.3556902)
Archibald, B., Calder, M., Sevegnani, M., Xu, M. (2022) Verifying BDI Agents in Dynamic Environments. (doi: 10.18293/SEKE2022-149)
Dardha, O., Giachino, E., Sangiorgi, D. (2022) Session Types Revisited: A Decade Later. (doi: 10.1145/3551357.3556676)
Karakostas, D., Kiayias, A., Zacharias, T. (2022) Blockchain Nash Dynamics and the Pursuit of Compliance. (doi: 10.1145/3558535.3559781)
Becker, B. A., Bradley, S., Maguire, J., Black, M., Crick, T., Saqr, M., Sentance, S., Quille, K. (2022) CER in the UK & Ireland. Springer
Randtoul, A., Trinder, P. (2022) A reliability benchmark for actor-based server languages. (doi: 10.1145/3546186.3549928)
Xu, R. (C.), Michala, A. L., Trinder, P. (2022) CAEFL: composable and environment aware federated learning models. (doi: 10.1145/3546186.3549927)
ten Oever, N., Cath, C., Kühlewind, M., Perkins, C. S. (2022) Report from the IAB workshop on analyzing IETF data (aid) 2021. Internet RFC, (doi: 10.17487/RFC9307)
Cook, M., Paterson, C., Marnerides, A. K., Pezaros, D. (2022) Anomaly Diagnosis in Cyber-Physical Systems. (doi: 10.1109/ICC45855.2022.9838968)
Ullah, R., Wu, D., Harvey, P., Kilpatrick, P., Spence, I., Varghese, B. (2022) FedFly: toward migration in edge-based distributed federated learning. IEEE Communications Magazine, 60, pp. 42-48. (doi: 10.1109/mcom.003.2100964)
Tang, Y., Wang, H., Zhan, X., Luo, X., Zhou, Y., Zhou, H., Yan, Q., Sui, Y., Keung, J. (2022) A systematical study on application performance management libraries for apps. IEEE Transactions on Software Engineering, 48, pp. 3044-3065. (doi: 10.1109/TSE.2021.3077654)
Wang, Z., Elkhatib, Y., Elhabbash, A. (2022) HolonCraft – an Architecture for Dynamic Construction of Smart Home Workflows. (doi: 10.1109/FiCloud57274.2022.00036)
Yanev, M., Harvey, P. (2022) Herding the FLOQ: Flow Optimised Queueing. (doi: 10.23919/IFIPNetworking55013.2022.9829812)
Evripidou, S., Ani, U. D., D McK. Watson, J. D. M., Hailes, S. (2022) Security Culture in Industrial Control Systems Organisations: A Literature Review. (doi: 10.1007/978-3-031-12172-2_11)
Aljabri, J., Michala, A. L., Singer, J. (2022) ELSA: a keyword-based searchable encryption for cloud-edge assisted industrial internet of things. (doi: 10.1109/CCGrid54584.2022.00035)
Anderson, D., Harvey, P., Kaneta, Y., Papadopoulos, P., Rodgers, P., Roper, M. (2022) Towards evolution-based autonomy in large-scale systems. (doi: 10.1145/3520304.3533975)
Haris, J., Gibson, P., Cano, J., Agostini, N. B., Kaeli, D. (2022) Hardware/Software Co-Design of Edge DNN Accelerators with TFLite.
Gibson, P., Cano, J. (2022) Productive Reproducible Workflows for DNNs: A Case Study for Industrial Defect Detection.
Almasan, P., Ferriol-Galmes, M., Paillisse, J., Suarez-Varela, J., Perino, D., Lopez, D., Agustin Pastor Perales, A., Harvey, P., Ciavaglia, L., Wong, L., Ram, V., Xiao, S., Shi, X., Cheng, X., Cabellos-Aparicio, A., Barlet-Ros, P. (2022) Network digital twin: context, enabling technologies, and opportunities. IEEE Communications Magazine, 60, pp. 22-27. (doi: 10.1109/mcom.001.2200012)
Khare, P., Karan, M., McQuistin, S., Perkins, C., Tyson, G., Purver, M., Healey, P., Castro, I. (2022) The Web We Weave: Untangling the Social Graph of the IETF.
Vourganas, I., Attar, H., Michala, A. L. (2022) Accountable, Responsible, Transparent Artificial Intelligence in Ambient Intelligence Systems for Healthcare. Springer
Adoga, H. U., Elkhatib, Y., Pezaros, D. P. (2022) On the Performance Benefits of Heterogeneous Virtual Network Function Execution Frameworks. (doi: 10.1109/NetSoft54395.2022.9844115)
Archibald, B., Calder, M., Sevegnani, M. (2022) Probabilistic bigraphs. Formal Aspects of Computing, 34, (doi: 10.1145/3545180)
Michala, A. L., Attar, H., Vourganas, I. (2022) Secure data transfer and provenance for distributed healthcare. Springer
Kizilkaya, B., Ever, E., Yatbaz, H. Y., Yazici, A. (2022) An effective forest fire detection framework using heterogeneous wireless multimedia sensor networks. ACM Transactions on Multimedia Computing, Communications, and Applications, 18, (doi: 10.1145/3473037)
Stocker, A., Alshawish, A., Bor, M., Vidler, J., Gouglidis, A., Scott, A., Marnerides, A., De Meer, H., Hutchison, D. (2022) An ICT architecture for enabling ancillary services in Distributed Renewable Energy Sources based on the SGAM framework. Energy Informatics, 5, (doi: 10.1186/s42162-022-00189-5)
Maguire, J. (2022) Shaping Software Engineering with Lessons from the Past.
Aparecido do Carmo Alves, M., Varma, A., Elkhatib, Y., Soriano Marcolino, L. (2022) AdLeap-MAS: An Open-source Multi-Agent Simulator for Ad-hoc Reasoning.
Stjerngren, A., Gibson, P., Cano, J. (2022) Bifrost: End-to-End Evaluation and optimization of Reconfigurable DNN Accelerators. (doi: 10.1109/ISPASS55109.2022.00042)
Miliadis, P., Mpakos, P., Papadopoulou, N., Goumas, G., Pnevmatikatos, D. (2022) Modeling the Scalability of the EuroExa Reconfigurable Accelerators - Preliminary Results. (doi: 10.1007/978-3-031-04580-6_22)
Xu, G., Li, S., Zhou, H., Liu, S., Tang, Y., Li, L., Luo, X., Xiao, X., Xu, G., Wang, H. (2022) Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit. (doi: 10.1145/3485447.3512151)
Barr, N., Singer, J., Yao, E., Ahmed, S., Paschke, B., Donaldson, P., Watts, C. (2022) Transforming the VLE: A Standards-Based Approach to Enriching Learning Infrastructure.
Chong, Y.-W., Villanueva-Libunao, K., Chee, S.-Y., Alvarez, M. J., Yau, K.-L. A., Keoh, S. L. (2022) Artificial intelligence policies to enhance urban mobility in Southeast Asia. Frontiers in Sustainable Cities, 4, (doi: 10.3389/frsc.2022.824391)
Archibald, B., Calder, M., Sevegnani, M., Xu, M. (2022) Modelling and verifying BDI agents with bigraphs. Science of Computer Programming, 215, (doi: 10.1016/j.scico.2021.102760)
Jindal, A., Marnerides, A. K., Spachos, P., Dvir, A. (2022) Guest editorial: Smart computing for smart cities. IET Smart Cities, 4, pp. 1-2. (doi: 10.1049/smc2.12024)
Gay, S. J., Pocas, D., Vasconcelos, V. T. (2022) The Different Shades of Infinite Session Types. (doi: 10.1007/978-3-030-99253-8_18)
Upadhyay, P., Czerkawski, M., Davison, C., Cardona, J., Macdonald, M., Andonovic, I., Michie, C., Atkinson, R., Papadopoulou, N., Nikas, K., Tachtatzis, C. (2022) A flexible multi-temporal and multi-modal framework for Sentinel-1 and Sentinel-2 analysis ready data. Remote Sensing, 14, (doi: 10.3390/rs14051120)
Abbas, A., Khan, M. A., Latif, S., Ajaz, M., Shah, A. A., Ahmad, J. (2022) A new ensemble-based intrusion detection system for Internet of Things. Arabian Journal for Science and Engineering, 47, pp. 1805-1819. (doi: 10.1007/s13369-021-06086-5)
Jacob, D., Singer, J. (2022) Capability Boehm: Challenges and Opportunities for Garbage Collection with Capability Hardware. (doi: 10.1145/3516807.3516823)
Liu, D., Simeone, O. (2022) Channel-driven Monte Carlo sampling for Bayesian distributed learning in wireless data centers. IEEE Journal on Selected Areas in Communications, 40, pp. 562-577. (doi: 10.1109/JSAC.2021.3118406)
Vanderbauwhede, W. (2022) Making legacy Fortran code type safe through automated program transformation. Journal of Supercomputing, 78, pp. 2988-3028. (doi: 10.1007/s11227-021-03839-9)
Michala, A. L., Vourganas, I., Coraddu, A. (2022) Vibration edge computing in maritime IoT. ACM Transactions on Internet of Things, 3, (doi: 10.1145/3484717)
AlHarbi, N., Mackenzie, L., Pezaros, D. (2022) Effect of Unequal Clustering Algorithms in WirelessHART networks. (doi: 10.1109/MENACOMM50742.2021.9678302)
Lee, J. S. A., Bin Abbas, M. F., Seow, C. K., Cao, Q., Yar, K. P., Keoh, S. L., McLoughlin, I. (2022) Non-verbal auditory aspects of human-service robot interaction. (doi: 10.1109/SOLI54607.2021.9672366)
Maguire, J. (2022) Assessing Knowledge and Skills in Forensics with Alternative Assessment Pathways. (doi: 10.1145/3498343.3498351)
Maguire, J., Draper, S. (2022) Promoting Engagement in Remote Computing Ethics Education. (doi: 10.1145/3498343.3498345)
Si, M., Wang, Y., Seow, C. K., Cao, H., Liu, H., Huang, L. (2022) An adaptive weighted Wi-Fi FTM-based positioning method in an NLOS environment. IEEE Sensors Journal, 22, pp. 472-480. (doi: 10.1109/JSEN.2021.3124275)
Chu, Y. H., Keoh, S. L., Seow, C. K., Cao, Q., Wen, K., Tan, S. Y. (2022) GPS Signal Authentication Using a Chameleon Hash Keychain. (doi: 10.1007/978-3-030-93511-5_10)
Dardha, O., Pérez, J. A. (2022) Comparing type systems for deadlock freedom. Journal of Logical and Algebraic Methods in Programming, 124, (doi: 10.1016/j.jlamp.2021.100717)
Aljabri, J., Michala, A. L., Singer, J. (2022) ELSA: Edge Lightweight Searchable Attribute-based encryption Multi-keyword Scalability. (doi: 10.1109/DSC54232.2022.9888846)
(2022) Euro-Par 2022: Parallel Processing. 28th International Conference on Parallel and Distributed Computing, Glasgow, UK, August 22–26, 2022, Proceedings. 13440, (doi: 10.1007/978-3-031-12597-3)
Chia, W. M. D., Keoh, S. L., Michala, A. L., Goh, C. (2022) Infrastructure-based pedestrian risk tagging methodology to support AV risk assessment. IEEE Access, 10, pp. 71462-71480. (doi: 10.1109/ACCESS.2022.3188306)
Tan, D. H. A., Seow, C. K., Wen, K. (2022) Multi-Sensor Based IoT Indoor Localization. (doi: 10.1109/ICNSC52481.2021.9702235)
Lyko, T., Elkhatib, Y., Sparks, M., Race, N., Ramdhany, R. (2022) QoE Assessment for Multi-Video Object Based Media. (doi: 10.1109/QoMEX55416.2022.9900905)
2021
Haris, J., Gibson, P., Cano, J., Bohm Agostini, N., Kaeli, D. (2021) SECDA: Efficient Hardware/Software Co-design of FPGA-based DNN Accelerators for Edge Inference. (doi: 10.1109/SBAC-PAD53543.2021.00015)
Maguire, J., Mac Dermott, Á. (2021) Engaging and Active Security Education 2022 (EASE 2022) Workshop.
Archibald, B., Calder, M., Sevegnani, M., Xu, M. (2021) Probabilistic BDI Agents: Actions, Plans, and Intentions. (doi: 10.1007/978-3-030-92124-8_15)
Arapinis, M., Lamprou, N., Zacharias, T. (2021) Astrolabous: a Universally Composable Time-Lock Encryption Scheme. (doi: 10.1007/978-3-030-92075-3_14)
Archibald, B., Kulcsár, G., Sevegnani, M. (2021) A tale of two graph models: a case study in wireless sensor networks. Formal Aspects of Computing, 33, pp. 1249-1277. (doi: 10.1007/s00165-021-00558-z)
Wu, Z., Ma, C., Shi, X., Wu, L., Zhang, D., Tang, Y., Stojmenovic, M. (2021) BRNN-GAN: generative adversarial networks with bi-directional recurrent neural networks for multivariate time series imputation. (doi: 10.1109/ICPADS53394.2021.00033)
Cohen, C., Nabi, S. W., Higham, C. F., Putnam, M., Kootstra, G. J., van Hell, J. (2021) Individual variation in the structure of bilingual grammars. Language, 97, pp. 752-792. (doi: 10.1353/lan.2021.0064)
Raj, R., Sabin, M., Impagliazzo, J., Bowers, D., Daniels, M., Hermans, F., Kiesler, N., Kumar, A. N., MacKellar, B., McCauley, R., Nabi, S. W., Oudshoorn, M. (2021) Professional Competencies in Computing Education. (doi: 10.1145/3502870.3506570)
Almazarqi, H. A., Marnerides, A., Mursch, T., Woodyard, M., Pezaros, D. (2021) Profiling IoT Botnet Activity in the Wild. (doi: 10.1109/GLOBECOM46510.2021.9686012)
Elhabbash, A., Elkhatib, Y. (2021) Energy-Aware Placement of Device-to-Device Mediation Services in IoT System. (doi: 10.1007/978-3-030-91431-8_21)
Khan, T. M., Nabi, S. W. (2021) English versus Native Language for Higher Education in Computer Science: a Pilot Study. (doi: 10.1145/3488042.3488070)
Maguire, J., English, R. (2021) Opportunities to Fail: Using Peer-review to Support Assessment Literacy in Cyber Security. (doi: 10.1145/3488042.3489967)
Ohba, Y., Koh, J., Ng, N., Keoh, S. L. (2021) Performance Evaluation of a Blockchain-based Content Distribution over Wireless Mesh Networks. (doi: 10.1109/WF-IoT51360.2021.9595503)
McQuistin, S., Karan, M., Khare, P., Perkins, C., Tyson, G., Purver, M., Healey, P., Iqbal, W., Qadir, J., Castro, I. (2021) Characterising the IETF Through the Lens of RFC Deployment. (doi: 10.1145/3487552.3487821)
Khan, M. A., Khan, M. A., Jan, S. U., Ahmad, J., Jamal, S. S., Shah, A. A., Pitropakis, N., Buchanan, W. J. (2021) A deep learning-based intrusion detection system for MQTT enabled IoT. Sensors, 21, (doi: 10.3390/s21217016)
Yang, Z., Keung, J., Kabir, M. A., Yu, X., Tang, Y., Zhang, M., Feng, S. (2021) AComNN: Attention enhanced Compound Neural Network For financial time-series forecasting with cross-regional features. Applied Soft Computing, 111, (doi: 10.1016/j.asoc.2021.107649)
Bhatti, S. N., Haywood, G., Yanagida, R. (2021) End-to-End Privacy for Identity & Location with IP. (doi: 10.1109/ICNP52444.2021.9651909)
Kizilkaya, B., Chang, B., Ansari, S., Sambo, Y., Zhao, G., Imran, M. (2021) Age of Control Process for Real-Time Wireless Control. (doi: 10.1109/PIMRC50174.2021.9569528)
Archibald, B., Calder, M., Sevegnani, M., Xu, M. (2021) Observable and Attention-Directing BDI Agents for Human-Autonomy Teaming. (doi: 10.4204/EPTCS.348.12)
Archibald, B., Burns, K., McCreesh, C., Sevegnani, M. (2021) Practical Bigraphs via Subgraph Isomorphism.
Lindsay, D., Yeung, G., Elkhatib, Y., Garraghan, P. (2021) An Empirical Study of Inter-cluster Resource Orchestration within Federated Cloud Clusters. (doi: 10.1109/JCC53141.2021.00019)
Dong, S., Sun, Y., Bohm Agostini, N., Karimi, E., Lowell, D., Zhou, J., Cano, J., Abellán, J. L., Kaeli, D. (2021) Spartan: a sparsity-adaptive framework to accelerate deep neural network training on GPUs. IEEE Transactions on Parallel and Distributed Systems, 32, pp. 2448-2463. (doi: 10.1109/TPDS.2021.3067825)
Jakobsen, M., Ravier, A., Dardha, O. (2021) Papaya: Global Typestate Analysis of Aliased Objects. (doi: 10.1145/3479394.3479414)
Cutts, Q., Maguire, J., Fincher, S., Parkinson, J. (2021) Forming Community in Computing Science Education with Research in Practice Project Activities. (doi: 10.1145/3481282.3481285)
(2021) Proceedings of the United Kingdom and Ireland Computing Education Research conference. (doi: 10.1145/3481282)
Varghese, B., de Lara, E., Ding, A. Y., Hong, C.-H., Bonomi, F., Dustdar, S., Harvey, P., Hewkin, P., Shi, W., Thiele, M., Willis, P. (2021) Revisiting the arguments for edge computing research. IEEE Internet Computing, 25, pp. 36-42. (doi: 10.1109/MIC.2021.3093924)
MacGregor, R., Trinder, P., Loidl, H.-W. (2021) Improving GHC Haskell NUMA Profiling. (doi: 10.1145/3471873.3472974)
Kokke, W., Dardha, O. (2021) Deadlock-Free Session Types in Linear Haskell. (doi: 10.1145/3471874.3472979)
Fowler, S., Kokke, W., Dardha, O., Lindley, S., Morris, J. G. (2021) Separating Sessions Smoothly. (doi: 10.4230/LIPIcs.CONCUR.2021.36)
Lofqvist, M., Cano, J. (2021) Optimizing Data Processing in Space for Object Detection in Satellite Imagery.
Huang, L., Mengy, Z., Deng, Z., Wang, C., Li, E., Zhao, G. (2021) Extracting Human Behavioral Biometrics From Robot Motions.
Huser, C., Campbell, S., Fontaine, S., Jamieson, S., Marks, L., Singer, J., Young, R. (2021) Lessons learned from early adopters of blended and online learning. Journal of Perspectives in Applied Academic Practice, 9, pp. 137-145. (doi: 10.14297/jpaap.v9i2.488)
Bellamy, G., Brown, R., Cleland Woods, H., Labrosse, N., Senn, H., Singer, J., Vezza, M. (2021) Togetherness: the central tenet of an effective institutional online pivot. Journal of Perspectives in Applied Academic Practice, 9, pp. 82-90. (doi: 10.14297/jpaap.v9i2.491)
Chang, B., Li, L., Zhao, G., Chen, Z., Imran, M. A. (2021) Autonomous D2D transmission scheme in URLLC for real-time wireless control systems. IEEE Transactions on Communications, 69, pp. 5546-5558. (doi: 10.1109/TCOMM.2021.3075680)
Guo, X., Khalid, M. A., Domingos, I., Michala, A. L., Adriko, M., Rowell, C., Ajambo, D., Garrett, A., Kar, S., Yan, X., Reboud, J., Tukahebwa, E. M., Cooper, J. M. (2021) Smartphone-based DNA diagnostics for malaria detection using deep learning for local decision support and blockchain technology for security. Nature Electronics, 4, pp. 615-624. (doi: 10.1038/s41928-021-00612-x)
Huang, L., Meng, Z., Deng, Z., Wang, C., Li, L., Zhao, G. (2021) Robot Behavior-Based User Authentication for Motion-Controlled Robotic Systems. (doi: 10.1109/INFOCOMWKSHPS51825.2021.9484589)
Tong, X., Meng, Z., Zhao, G., Li, L., Chen, Z. (2021) How to Quantify Packet Importance for Real-Time Control: A Feature-Oriented Perspective. (doi: 10.1109/WFCS46889.2021.9483612)
Alhaizaey, Y., Singer, J., Michala, A. L. (2021) Optimizing Task Allocation for Edge Micro-Clusters in Smart Cities. (doi: 10.1109/WoWMoM51794.2021.00062)
Khalid, M., Iman, K., Ghafoor, A., Saboor, M., Ali, A., Muaz, U., Basharat, A. R., Tahir, T., Abubakar, M., Akhter, M. A., Nabi, S. W., Vanderbauwhede, W., Ahmad, F., Wajid, B., Chaudhary, S. U. (2021) PERCEPTRON: an open-source GPU-accelerated proteoform identification pipeline for top-down proteomics. Nucleic Acids Research, 49, pp. W510-W515. (doi: 10.1093/nar/gkab368)
Fairhurst, G., Perkins, C. (2021) Considerations around transport header confidentiality, network operations, and the evolution of Internet transport protocols. Internet RFC, (doi: 10.17487/RFC9065)
Harvey, P., Fowler, S., Dardha, O., Gay, S. J. (2021) Multiparty Session Types for Safe Runtime Adaptation in an Actor Language. (doi: 10.4230/LIPIcs.ECOOP.2021.10)
Arkko, J., Farrell, S., Kühlewind, M., Perkins, C. (2021) Report from the IAB COVID-19 network impacts workshop 2020. Internet RFC, (doi: 10.17487/RFC9075)
Anastasiadis, P., Gogolenko, S., Papadopoulou, N., Lawenda, M., Arabnejad, H., Jahani, A., Mahmood, I., Groen, D. (2021) P-Flee: An Efficient Parallel Algorithm for Simulating Human Migration. (doi: 10.1109/ipdpsw52791.2021.00159)
Nystrom, E., Jongsuebchoke, D., Storer, T. (2021) Sciit: embedding issue tracking in source control management. Science of Computer Programming, 206, (doi: 10.1016/j.scico.2021.102628)
Zhao, K., Xu, Z., Zhang, T., Tang, Y., Yan, M. (2021) Simplified deep forest model based just-in-time defect prediction for android mobile apps. IEEE Transactions on Reliability, 70, pp. 848-859. (doi: 10.1109/TR.2021.3060937)
(2021) Coordination Models and Languages: 23rd IFIP WG 6.1 International Conference, COORDINATION 2021, Held as Part of the 16th International Federated Conference on Distributed Computing Techniques, DisCoTec 2021, Valletta, Malta, June 14-18, 2021, Proceedings. 12717, (doi: 10.1007/978-3-030-78142-2)
McQuistin, S., Band, V., Jacob, D., Perkins, C. (2021) Investigating Automatic Code Generation for Network Packet Parsing.
Kokke, W., Dardha, O. (2021) Prioritise the Best Variation. (doi: 10.1007/978-3-030-78089-0_6)
Zalakain, U., Dardha, O. (2021) π with Leftovers: a Mechanisation in Agda. (doi: 10.1007/978-3-030-78089-0_9)
Harvey, P., Tatar, A., Imai, P., Wong, L., Bringuier, L. (2021) Evolutionary autonomous networks. Journal of ICT Standardization, 9, pp. 201-228. (doi: 10.13052/jicts2245-800x.927)
Alhamed, M., Storer, T. (2021) Playing Planning Poker in Crowds: Human Computation of Software Effort Estimates. (doi: 10.1109/ICSE43902.2021.00014)
Anastasiadis, P., Papadopoulou, N., Goumas, G., Koziris, N. (2021) CoCoPeLia: Communication-Computation Overlap Prediction for Efficient Linear Algebra on GPUs. (doi: 10.1109/ispass51385.2021.00015)
Zhao, K., Xu, Z., Yan, M., Tang, Y., Fan, M., Catolino, G. (2021) Just-in-Time Defect Prediction for Android Apps via Imbalanced Deep Learning Model. (doi: 10.1145/3412841.3442019)
Giannoula, C., Vijaykumar, N., Papadopoulou, N., Karakostas, V., Fernandez, I., Gomez-Luna, J., Orosa, L., Koziris, N., Goumas, G., Mutlu, O. (2021) SynCron: Efficient Synchronization Support for Near-Data-Processing Architectures. (doi: 10.1109/hpca51647.2021.00031)
Shah, A. A., Piro, G., Grieco, L. A., Boggia, G. (2021) A quantitative cross-comparison of container networking technologies for virtualized service infrastructures in local computing environments. Transactions on Emerging Telecommunications Technologies, 32, (doi: 10.1002/ett.4234)
Liu, D., Zhu, G., Zhang, J., Huang, K. (2021) Data-importance aware user scheduling for communication-efficient edge machine learning. IEEE Transactions on Cognitive Communications and Networking, 7, pp. 265-278. (doi: 10.1109/TCCN.2020.2999606)
Xu, Z., Zhang, T., Keung, J., Yan, M., Luo, X., Zhang, X., Xu, L., Tang, Y. (2021) Feature selection and embedding based cross project framework for identifying crashing fault residence. Information and Software Technology, 131, (doi: 10.1016/j.infsof.2020.106452)
Trinder, P., Valkov, I., Chechina, N. (2021) Reliable distribution of computational load in robot teams. Autonomous Robots, 45, pp. 351-369. (doi: 10.1007/s10514-021-09967-8)
Chang, B., Kizilkaya, B., Li, L., Zhao, G., Chen, Z., Imran, M. A. (2021) Effective age of information in real-time wireless feedback control systems. Science China Information Sciences, 64, (doi: 10.1007/s11432-020-3090-5)
Ang, J. W. D., Seow, C. K., Subramanianz, K., Pranata, S. (2021) Big Data Scenarios Simulator for Deep Learning Algorithm Evaluation for Autonomous Vehicle. (doi: 10.1109/GLOBECOM42002.2020.9322480)
Maguire, J., English, R. (2021) Engaging and Active Security Education (EASE) Workshop.
English, R., Maguire, J., Hayes, A. (2021) Improving Computer Science Student Graduate Skills Through Assessment. (doi: 10.1145/3437914.3437979)
Westerlund, M., Burman, B., Perkins, C., Alvestrand, H., Even, R. (2021) Guidelines for using the multiplexing features of RTP to support multiple media streams. Internet RFC, (doi: 10.17487/RFC8872)
Perkins, C., Westerlund, M., Ott, J. (2021) Media Transport and Use of RTP in WebRTC. Internet RFC, (doi: 10.17487/RFC8834)
Liu, D., Simeone, O. (2021) Privacy for free: wireless federated learning via uncoded transmission with adaptive power control. IEEE Journal on Selected Areas in Communications, 39, pp. 170-185. (doi: 10.1109/JSAC.2020.3036948)
Sarker, Z., Perkins, C., Singh, V., Ramalho, M. (2021) RTP Control Protocol (RTCP) Feedback for Congestion Control. Internet RFC, (doi: 10.17487/RFC8888)
Begen, A., Kyzivat, P., Perkins, C., Handley, M. (2021) SDP: Session Description Protocol. Internet RFC, (doi: 10.17487/RFC8866)
Westerlund, M., Perkins, C., Lennox, J. (2021) Sending Multiple Types of Media in a Single RTP Session. Internet RFC, (doi: 10.17487/RFC8860)
Lennox, J., Westerlund, M., Wu, Q., Perkins, C. (2021) Sending multiple RTP streams in a single RTP session: grouping RTP control protocol (RTCP) reception statistics and other feedback. Internet RFC, (doi: 10.17487/RFC8861)
Liu, D., Zhu, G., Zeng, Q., Zhang, J., Huang, K. (2021) Wireless data acquisition for edge learning: data-importance aware retransmission. IEEE Transactions on Wireless Communications, 20, pp. 406-420. (doi: 10.1109/TWC.2020.3024980)
Ignatius Teo, M., Seow, C. K., Wen, K. (2021) 5G Radar and Wi-Fi Based Machine Learning on Drone Detection and Localization. (doi: 10.1109/ICCCS52626.2021.9449224)
Kizilkaya, B., Zhao, G., Sambo, Y. A., Li, L., Imran, M. A. (2021) 5G-enabled education 4.0: enabling technologies, challenges, and solutions. IEEE Access, 9, pp. 166962-166969. (doi: 10.1109/ACCESS.2021.3136361)
Elhabbash, A., Bahsoon, R., Tino, P., Lewis, P., Elkhatib, Y. (2021) Attaining Meta-Self-Awareness Through Assessment of Quality-of-Knowledge. (doi: 10.1109/ICWS53863.2021.00099)
Elkhatib, Y., Elhabbash, A. (2021) If a System is Learning to Self-adapt, Who's Teaching? (doi: 10.1109/SEAMS51251.2021.00043)
Elkhatib, Y., Hill, K. (2021) Memes to an End: A Look Into What Makes a Meme Offensive.
(2021) Proceedings Combined 28th International Workshop on Expressiveness in Concurrency and 18th Workshop on Structural Operational Semantics, Paris, France (online event), 23rd August 2021. (doi: 10.4204/EPTCS.339)
Chia, W. M. D., Keoh, S. L., Michala, A. L., Goh, C. (2021) Real-time Recursive Risk Assessment Framework for Autonomous Vehicle Operations.
Bader, J., Michala, A. L. (2021) Searchable encryption with access control in Industrial Internet of Things (IIoT) Wireless Communications and Mobile Computing, 2021, (doi: 10.1155/2021/5555362)
Brown, N. C.C., Cutts, Q., Kallia, M., Maguire, J., McNeill, F., Porter, L. (2021) Supporting Computing Educators to Create a Cycle of Teaching and Computing Education Research. (doi: 10.1145/3481282.3483527)
Kizilkaya, B., Meng, Z., Zhao, G., Li, L., Imran, M. A. (2021) Towards 5G-Enabled Education: Remote Laboratory and Training Prototype. (doi: 10.31256/Px3Rq7M)
Al Malwi, W. A. A., Renaud, K., Mackenzie, L. (2021) Users’ information disclosure determinants in social networking sites: a systematic literature review. International Journal of Computer and Information Engineering, 15, pp. 314-321.
2020
Intharawijitr, K., Harvey, P., Imai, P. (2020) A Feasibility Study of Cache in Smart Edge Router for Web-Access Accelerator. (doi: 10.1109/UCC48980.2020.00057)
Lockhart, L., Harvey, P., Imai, P., Willis, P., Varghese, B. (2020) Scission: Performance-driven and Context-aware Cloud-Edge Distribution of Deep Neural Networks. (doi: 10.1109/UCC48980.2020.00044)
Mehta, H. K., Harvey, P., Rana, O., Buyya, R., Varghese, B. (2020) WattsApp: Power-Aware Container Scheduling. (doi: 10.1109/UCC48980.2020.00027)
Kizilkaya, B., Chang, B., Zhao, G., Imran, M. A. (2020) Wireless control for life-critical actions. Wiley-IEEE
Tong, X., Li, L., Zhao, G., Meng, Z., Chen, Z., Yang, G. (2020) Packet Management for Optimizing Control Performance in Real-Time Feedback Control Systems. (doi: 10.1109/IECON43393.2020.9255231)
de Muijnck-Hughes, J., Brady, E., Vanderbauwhede, W. (2020) A Framework for Resource Dependent EDSLs in a Dependently Typed Language (Pearl) (doi: 10.4230/LIPIcs.ECOOP.2020.20)
Ahmad, I., Yau, K.-L. A., Keoh, S. L. (2020) A Hybrid Reinforcement Learning-Based Trust Model for 5G Networks. (doi: 10.1109/AINS50155.2020.9315132)
Singer, J. (2020) Notes on Notebooks: Is Jupyter the Bringer of Jollity? (doi: 10.1145/3426428.3426924)
Jacob, D., Trinder, P., Singer, J. (2020) Pricing Python Parallelism: A Dynamic Language Cost Model for Heterogeneous Platforms. (doi: 10.1145/3426422.3426979)
Gibson, P., Cano, J. (2020) Orpheus: a New Deep Learning Framework for Easy Deployment and Evaluation of Edge Inference. (doi: 10.1109/ISPASS48437.2020.00042)
Zhou, X., Keoh, S. L. (2020) Deployment of Facial Recognition Models at the Edge: a Feasibility Study. (doi: 10.23919/APNOMS50412.2020.9236972)
Bohm Agostini, N., Dong, S., Elmira, K., Marti, T. L., Cano, J., Abellán, J. L., Kaeli, D. (2020) Design Space Exploration of Accelerators and End-to-End DNN Evaluation with TFLITE-SOC. (doi: 10.1109/SBAC-PAD49847.2020.00013)
Petrosino, A., Sciddurlo, G., Grieco, G., Shah, A.A., Piro, G., Grieco, L.A., Boggia, G. (2020) Dynamic management of forwarding rules in a T-SDN architecture with energy and bandwidth constraints. Springer
Nabi, S. W., Maguire, J., Draper, S., Cutts, Q. (2020) Keeping Software Engineering Students in Touch With Not Only What They Are to Learn, But With Why. (doi: 10.1109/CSEET49119.2020.9206237)
Barr, M., Nabi, S. W., Somerville, D. (2020) Online Delivery of Intensive Software Engineering Education During the COVID-19 Pandemic. (doi: 10.1109/CSEET49119.2020.9206196)
Tang, Z., Keoh, S. L. (2020) An Efficient Scheme to Secure Data Provenance in Home Area Networks. (doi: 10.1109/5GWF49715.2020.9221402)
Tong, X., Li, L., Zhao, G., Chang, B., Chen, Z. (2020) Beyond Fresh Update: Packet Management for Real-Time Feedback Control. (doi: 10.1109/PIMRC48278.2020.9217335)
Enghardt, T., Pauly, T., Perkins, C., Rose, K., Wood, C. (2020) A survey of the interaction between security protocols and transport services. Internet RFC, (doi: 10.17487/RFC8922)
Lubbers, M., Koopman, P., Ramsingh, A., Singer, J., Trinder, P. (2020) Tiered versus Tierless IoT Stacks: Comparing Smart Campus Software Architectures. (doi: 10.1145/3410992.3411002)
Xin, X., Keoh, S. L., Sevegnani, M., Saerbeck, M. (2020) Dynamic Probabilistic Model Checking for Sensor Validation in Industry 4.0 Applications. (doi: 10.1109/SmartIoT49966.2020.00016)
Maguire, J., Cutts, Q. (2020) Supporting the Computing Science Education Research Community with Rolling Reviews. (doi: 10.1145/3416465.3416477)
(2020) Proceedings of the United Kingdom and Ireland Computing Education Research conference. (doi: 10.1145/3416465)
Shah, A.A., Mussini, M., Nicassio, F., Parladori, G., Triggiani, F., Grieco, G., Iaffaldano, G., Piro, G. (2020) A Real-time Simulation Framework for Complex and Large-scale Optical Transport Networks based on the SDN Paradigm. (doi: 10.1109/DS-RT50469.2020.9213701)
Dvir, A., Marnerides, A. K., Dubin, R., Golan, N., Hajaj, C. (2020) Encrypted video traffic clustering demystified. Computers and Security, 96, (doi: 10.1016/j.cose.2020.101917)
Chang, B., Li, L., Zhao, G., Meng, Z., Imran, M. A., Chen, Z. (2020) Age of Information for Actuation Update in Real-Time Wireless Control Systems. (doi: 10.1109/INFOCOMWKSHPS50562.2020.9163049)
Lofqvist, M., Cano, J. (2020) Accelerating Deep Learning Applications in Space.
Islam, G., Storer, T. (2020) A case study of agile software development for large-scale safety-critical systems projects. Reliability Engineering and System Safety, 200, (doi: 10.1016/j.ress.2020.106954)
Archibald, B., Calder, M., Sevegnani, M. (2020) Conditional Bigraphs. (doi: 10.1007/978-3-030-51372-6_1)
(2020) Proceedings Combined 27th International Workshop on Expressiveness in Concurrency and 17th Workshop on Structural Operational Semantics, EXPRESS/SOS 2020, and 17th Workshop on Structural Operational Semantics, Online, 31 August 2020. 322, (doi: 10.4204/EPTCS.322)
Wen, K., Seow, C. K., Tan, S. Y. (2020) An Indoor Localization and Tracking System Using Successive Weighted RSS Projection. IEEE Antennas and Wireless Propagation Letters, 19, pp. 1620-1624. (doi: 10.1109/LAWP.2020.3011993)
Shah, A. A., Piro, G., Grieco, L.A., Boggia, G. (2020) A Review of Forwarding Strategies in Transport Software-defined Networks. (doi: 10.1109/ICTON51198.2020.9203103)
McQuistin, S., Band, V., Jacob, D., Perkins, C. (2020) Parsing Protocol Standards to Parse Standard Protocols. (doi: 10.1145/3404868.3406671)
Cohen, C., Higham, C. F., Nabi, S. W. (2020) Deep learnability: using neural networks to quantify language similarity and learnability. Frontiers in Artificial Intelligence, 3, (doi: 10.3389/frai.2020.00043)
Petre, M., Sanders, K., McCartney, R., Ahmadzadeh, M., Connolly, C., Hamouda, S., Harrington, B., Lumbroso, J., Maguire, J., Malmi, L., M. McGill, M., Vahrenhold, J. (2020) Reviewing Computing Education Papers. (doi: 10.1145/3341525.3394994)
Petre, M., Sanders, K., McCartney, R., Ahmadzadeh, M., Connolly, C., Hamouda, S., Harrington, B., Lumbroso, J., Maguire, J., Malmi, L., McGill, M. M., Vahrenhold, J. (2020) Mapping the Landscape of Peer Review in Computing Education Research. (doi: 10.1145/3437800.3439207)
English, R., Maguire, J. (2020) Building in Resilience Through Graduate Skills Computer Science Assessment.
Cook, M., Stavrou, I., Dimmock, S., Johnson, C. (2020) Introducing a Forensics Data Type Taxonomy of Acquirable Artefacts From Programmable Logic Controllers. (doi: 10.1109/CyberSecurity49315.2020.9138879)
Takemi, T., Yoshida, T., Horiguchi, M., Vanderbauwhede, W. (2020) Large-Eddy-simulation analysis of airflows and strong wind hazards in urban areas. Urban Climate, 32, (doi: 10.1016/j.uclim.2020.100625)
Usov, A., Dardha, O. (2020) SFJ: an Implementation of Semantic Featherweight Java. (doi: 10.1007/978-3-030-50029-0_10)
Olukoya, O., Mackenzie, L., Omoronyia, I. (2020) Towards using unstructured user input request for malware detection. Computers and Security, 93, (doi: 10.1016/j.cose.2020.101783)
Voinea, A. L., Dardha, O., Gay, S. J. (2020) Typechecking Java Protocols with [St]Mungo. (doi: 10.1007/978-3-030-50086-3_12)
Archibald, B., Shieh, M.-Z., Hu, Y.-H., Sevegnani, M., Lin, Y.-B. (2020) BigraphTalk: verified design of IoT applications. IEEE Internet of Things Journal, 7, pp. 2955-2967. (doi: 10.1109/JIOT.2020.2964026)
Chang, B., Zhao, G., Zhang, L., Imran, M. A., Chen, Z., Li, L. (2020) Dynamic communication QoS design for real-time wireless control systems. IEEE Sensors Journal, 10, pp. 3005-3015. (doi: 10.1109/JSEN.2019.2957569)
Tasiran, A. C., Kizilkaya, B. (2020) Statistical analysis of low-power sensor motes used in IoT applications. Institution of Engineering and Technology
Keoh, S. L., Tan, H. C., Tang, Z. (2020) Authentication and integrity protection for real-time cyber-physical systems. Springer
Lee, Z. E., Chua, R. L. H., Keoh, S. L., Ohba, Y. (2020) Performance Evaluation of Big Data Processing at the Edge for IoT-Blockchain Applications. (doi: 10.1109/GLOBECOM38437.2019.9013329)
Imran, M. A., Al Ayidh, A., Li, L., Zhao, G., Abbasi, Q. H. (2020) URLLC massive MIMO link operation design for wireless networked control system. John Wiley & sons Ltd
Gay, S. J. (2020) Cables, trains and types. Lecture Notes in Computer Science, 12065, pp. 3-16. (doi: 10.1007/978-3-030-41103-9_1)
Urlea, C., Vanderbauwhede, W., Nabi, S. W. (2020) Efficient FPGA Cost-Performance Space Exploration Using Type-driven Program Transformations. (doi: 10.1109/ReConFig48160.2019.8994801)
English, R., Maguire, J. (2020) Experiences of Assessment in Data and Security Courses using Personal Response Systems. (doi: 10.1145/3383923.3383963)
Olukoya, O., Mackenzie, L., Omoronyia, I. (2020) Security-oriented view of app behaviour using textual descriptions and user-granted permission requests. Computers and Security, 89, (doi: 10.1016/j.cose.2019.101685)
Archibald, B., Maier, P., Stewart, R., Trinder, P. (2020) YewPar: Skeletons for Exact Combinatorial Search. (doi: 10.1145/3332466.3374537)
Lim, L. H. I., Goh, C. S., Davies, J., Yang, H., Keoh, S. L., Howes, D., Dale, V. (2020) Evaluation of Student and Staff Perceptions on L&T Models Across Multiple Disciplines.
Basford, P. J., Johnston, S. J., Perkins, C. S., Garnock-Jones, T., Tso, F. P., Pezaros, D., Mullins, R. D., Yoneki, E., Singer, J., Cox, S. J. (2020) Performance analysis of single board computer clusters. Future Generation Computer Systems, 102, pp. 278-291. (doi: 10.1016/j.future.2019.07.040)
Zhu, G., Liu, D., Du, Y., You, C., Zhang, J., Huang, K. (2020) Toward an intelligent edge: wireless communication meets machine learning. IEEE Communications Magazine, 58, pp. 19-25. (doi: 10.1109/MCOM.001.1900103)
de Muijnck-Hughes, J., Brady, E., Vanderbauwhede, W. (2020) A Framework for Resource Dependent EDSLs in a Dependently Typed Language (Artifact) Dagstuhl Artifacts Series, 6, (doi: 10.4230/DARTS.6.2.2)
Penev, D., Trinder, P. (2020) Comparing Reliability Mechanisms for Secure Web Servers: Actors, Exceptions and Futures. (doi: 10.5220/0010017200510058)
Baldimtsi, F., Kiayias, A., Zacharias, T., Zhang, B. (2020) Crowd Verifiable Zero-Knowledge and End-to-End Verifiable Multiparty Computation. (doi: 10.1007/978-3-030-64840-4_24)
Maguire, J., Cutts, Q., Draper, S. (2020) Demystifying and Decluttering Participation in Software Engineering Education Programmes. (doi: 10.1145/3341525.3393983)
Wallis, W., Kavanagh, W., Miller, A., Storer, T. (2020) Designing a Mobile Game to Generate Player Data - Lessons Learned.
Gibson, P., Cano, J., Turner, J., Crowley, E. J., O’Boyle, M., Storkey, A. (2020) Evaluating Grouped Spatial Pack Convolutions on Edge CPUs.
Haris, J., Cano, J. (2020) Hardware Acceleration of Deep Neural Networks on Edge Devices with FPGAs.
Gibson, P., Cano, J., Turner, J., Crowley, E. J., O’Boyle, M., Storkey, A. (2020) Optimizing Grouped Convolutions on Edge Devices. (doi: 10.1109/ASAP49362.2020.00039)
Jindal, A., Marnerides, A., Mauthe, A. (2020) Tackling energy theft in smart grids through data-driven analysis. (doi: 10.1109/ICNC47757.2020.9049793)
Ahmad, I., Yau, K.-L. A., Mee Hong, L., Keoh, S. L. (2020) Trust and reputation management for securing collaboration in 5G access networks: the road ahead. IEEE Access, 8, pp. 62542-62560. (doi: 10.1109/ACCESS.2020.2984318)
2019
Vourganas, I., Stankovic, V., Stankovic, L., Michala, A. L. (2019) Evaluation of home-based rehabilitation sensing systems with respect to standardised clinical tests. Sensors, 20, (doi: 10.3390/s20010026)
Bob, R., Storer, T. (2019) Behave Nicely! Automatic Generation of Code for Behaviour Driven Development Test Suites. (doi: 10.1109/SCAM.2019.00033)
Alhamed, M., Storer, T. (2019) Estimating Software Task Effort in Crowds. (doi: 10.1109/ICSME.2019.00042)
Edwards, N., Jongsuebchoke, D., Storer, T. (2019) Sciit: Aligning Source Control Management and Issue Tracking Architectures. (doi: 10.1109/ICSME.2019.00069)
Mountrouidou, X., Vosen, D., Kari, C., Azhar, M. Q., Bhatia, S., Gagne, G., Maguire, J., Tudor, L., Yuen, T. T. (2019) Securing the Human: a Review of Literature on Broadening Diversity in Cybersecurity Education. (doi: 10.1145/3344429.3372507)
Maguire, J., Cutts, Q. (2019) Back to the future: shaping software engineering education with lessons from the past. ACM Inroads, 10, pp. 30-42. (doi: 10.1145/3368564)
Cutts, Q., Barr, M., Ada, M. B., Donaldson, P., Draper, S., Parkinson, J., Singer, J., Sundin, L. (2019) Best paper award: Experience report: thinkathon - countering an 'I got it working' mentality with pencil-and-paper exercises. ACM Inroads, 10, pp. 66-73. (doi: 10.1145/3368563)
Zhang, H., Chen, S., Seow, C. K., Tan, S. Y. (2019) Localization in GPS denied environment. International Frequency Sensor Association (IFSA) Publishing
Nabi, S. W., Vanderbauwhede, W. (2019) Automatic pipelining and vectorization of scientific code for FPGAs. International Journal of Reconfigurable Computing, 2019, (doi: 10.1155/2019/7348013)
Lam, T. C. Y., Yew, S. S. L., Keoh, S. L. (2019) Bluetooth Mesh Networking: an Enabler of Smart Factory Connectivity and Management. (doi: 10.23919/APNOMS.2019.8893091)
Zhang, H., Tan, S. Y., Seow, C. K. (2019) TOA-based indoor localization and tracking with inaccurate floor plan map via MRMSC-PHD filter. IEEE Sensors Journal, 19, pp. 9869-9882. (doi: 10.1109/JSEN.2019.2926433)
Nabi, S. W., Vanderbauwhede, W. (2019) FPGA design space exploration for scientific HPC applications using a fast and accurate cost model based on roofline analysis. Journal of Parallel and Distributed Computing, 133, pp. 407-419. (doi: 10.1016/j.jpdc.2017.05.014)
Voinea, A. L., Dardha, O., Gay, S. J. (2019) Resource Sharing via Capability-Based Multiparty Session Types. (doi: 10.1007/978-3-030-34968-4_24)
Jacob, D., Trinder, P., Singer, J. (2019) Python Programmers Have GPUs Too: Automatic Python Loop Parallelization with Staged Dependence Analysis. (doi: 10.1145/3359619.3359743)
Yanagida, R., Bhatti, S. N. (2019) Seamless Internet Connectivity for Ubiquitous Communication. (doi: 10.1145/3341162.3349315)
De Muijnck-Hughes, J., Vanderbauwhede, W. (2019) Well-Typed Models are Correct Models: Applying State-of-the-Art Advances in Programming Language Theory to Systems-on-a-Chip.
Honeychurch, S., Barr, N., Singer, J., Draper, S. (2019) Scaling Assessment with Adaptive Comparative Judgement.
Maguire, J., Draper, S., Cutts, Q. (2019) What Do We Do When We Teach Software Engineering? (doi: 10.1145/3351287.3351295)
Varghese, B., Leitner, P., Ray, S., Chard, K., Barker, A., Elkhatib, Y., Herry, H., Hong, C.-H., Singer, J., Tso, F. P., Yoneki, E., Zhani, M.-F. (2019) Cloud futurology. Computer, 52, pp. 68-77. (doi: 10.1109/MC.2019.2895307)
Chang, B., Zhang, L., Li, L., Zhao, G., Chen, Z. (2019) Optimizing resource allocation in URLLC for real-time wireless control systems. IEEE Transactions on Vehicular Technology, 68, pp. 8916-8927. (doi: 10.1109/TVT.2019.2930153)
Kizilkaya, B., Ever, E., Yazici, A. (2019) Comparative Study on Energy Efficiency of WSNs and WMSNs for Surveillance Applications. (doi: 10.1109/ICT.2019.8798784)
Maguire, J., Sheridan, N., Draper, S., Cutts, Q. (2019) Mentoring Mentors in Cooperative Software Engineering Education Programmes. (doi: 10.1145/3291279.3341205)
Nabi, S. W., Vanderbauwhede, W. (2019) Smart-Cache: Optimising Memory Accesses for Arbitrary Boundaries and Stencils on FPGAs. (doi: 10.1109/IPDPSW.2019.00024)
Gunady, S., Keoh, S. L. (2019) A Non-GPS Based Location Tracking of Public Buses using Bluetooth Proximity Beacons. (doi: 10.1109/WF-IoT.2019.8767198)
Wu, J., Zou, L., Zhao, L., Al-Dubai, A., Mackenzie, L., Min, G. (2019) A multi-UAV clustering strategy for reducing insecure communication range. Computer Networks, 158, pp. 132-142. (doi: 10.1016/j.comnet.2019.04.028)
De Muijnck-Hughes, J., Vanderbauwhede, W. (2019) A typing discipline for hardware interfaces (artifact) Dagstuhl Artifacts Series, 5, pp. 14:1-14:3. (doi: 10.4230/DARTS.5.2.14)
Turner, J., Crowley, E. J., Radu, V., Cano, J., Storkey, A., O'Boyle, M. (2019) Staircase: Distilling with Performance Enhanced Students for Hardware.
de Muijnck-Hughes, J., Vanderbauwhede, W. (2019) A Typing Discipline for Hardware Interfaces. (doi: 10.4230/LIPIcs.ECOOP.2019.6)
Marnerides, A. K., Prince, D., Couzins, J., Mills, R., Giostas, V., McEvatt, P., Markham, D., Irvine, C. (2019) FUJITSU White Paper: Cyber Threat Lab.
Maguire, J., Cutts, Q., Parkinson, J., Barr, M., Somerville, D. (2019) Devising Work-based Learning Curricula With Apprentice Research Software Engineers. (doi: 10.1145/3304221.3325576)
Cutts, Q., Barr, M., Bikanga Ada, M., Donaldson, P., Draper, S., Parkinson, J., Singer, J., Sundin, L. (2019) Experience Report: Thinkathon -- Countering an "I Got It Working" Mentality with Pencil-and-Paper Exercises. (doi: 10.1145/3304221.3319785)
Mohammad, A., Bhatia, S., Gagne, G., Kari, C., Maguire, J., Mountrouidou, X., Tudor, L., Vosen, D., Yuen, T. T. (2019) Securing the Human: Broadening Diversity in Cybersecurity. (doi: 10.1145/3304221.3325537)
Possebon, I. P., Silva, A. S., Granville, L. Z., Schaeffer-Filho, A., Marnerides, A. (2019) Improved Network Traffic Classification Using Ensemble Learning. (doi: 10.1109/ISCC47284.2019.8969637)
Bor, M. C., Marnerides, A. K., Molineux, A., Wattam, S., Roedig, U. (2019) Adversarial Machine Learning in Smart Energy Systems. (doi: 10.1145/3307772.3330171)
Jindal, A., Marnerides, A. K., Scott, A., Hutchison, D. (2019) Identifying Security Challenges in Renewable Energy Systems. (doi: 10.1145/3307772.3330154)
Jacob, D., Singer, J. (2019) ALPyNA: Acceleration of Loops in Python for Novel Architectures. (doi: 10.1145/3315454.3329956)
Shah, A.A., Piro, G., Grieco, L.A., Boggia, G. (2019) A Qualitative Cross-comparison of Emerging Technologies for Software-defined Systems. (doi: 10.1109/SDS.2019.8768566)
Chondros, N., Zhang, B., Zacharias, T., Diamantopoulos, P., Maneas, S., Patsonakis, C., Delis, A., Kiayias, A., Roussopoulos, M. (2019) Distributed, end-to-end verifiable, and privacy-preserving internet voting systems. Computers and Security, 83, pp. 268-299. (doi: 10.1016/j.cose.2019.03.001)
Seow, C. K., Teoh, Y. J. J. (2019) RF and Network Signature-based Machine Learning on Detection of Wireless Controlled Drone. (doi: 10.1109/PIERS-Spring46901.2019.9017231)
Jindal, A., Marnerides, A. K., Gouglidis, A., Mauthe, A., Hutchison, D. (2019) Communication standards for distributed renewable energy sources integration in future electricity distribution networks. (doi: 10.1109/ICASSP.2019.8682207)
Archibald, B., Dunlop, F., Hoffmann, R., McCreesh, C., Prosser, P., Trimble, J. (2019) Sequential and parallel solution-biased search for subgraph algorithms. (doi: 10.1007/978-3-030-19212-9_2)
Dvir, A., Marnerides, A. K., Dubin, R., Golan, N. (2019) Clustering the Unknown - The Youtube Case. (doi: 10.1109/ICCNC.2019.8685364)
de Muijnck-Hughes, J., Brady, E., Vanderbauwhede, W. (2019) Value-Dependent Session Design in a Dependently Typed Language. (doi: 10.4204/EPTCS.291.5)
Singer, J., Honeychurch, S., Barr, N., Draper, S. (2019) From a Thousand Learners to a Thousand Markers: Scaling Peer Feedback with Adaptive Comparative Judgement.
Maguire, J., McVey, M., Nordmann, E., Soler, P. (2019) Technology Beyond the VLE.
Turner, J., Crowley, E. J., Radu, V., Cano Reyes, J., Storkey, A., O'Boyle, M. (2019) Distilling with performance enhanced students. arXiv,
Kizilkaya, B., Caglar, M., Al-Turjman, F., Ever, E. (2019) Binary search tree based hierarchical placement algorithm for IoT based smart parking applications. Internet of Things, 5, pp. 71-83. (doi: 10.1016/J.IOT.2018.12.001)
Vanderbauwhede, W., Nabi, S. W., Urlea, C. (2019) Type-driven automated program transformations and cost modelling for optimising streaming programs on FPGAs. International Journal of Parallel Programming, 47, pp. 114-136. (doi: 10.1007/s10766-018-0572-z)
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Gharibi, W., Mackenzie, L., Khalaf, M. B. (2019) A New Load-Balancing Aware Objective Function for RPL’s IoT Networks. (doi: 10.1109/HPCC/SmartCity/DSS.2018.00151)
Maguire, J., English, R., Draper, S. (2019) Data Protection and Privacy Regulations as an Inter-Active-Constructive Practice. (doi: 10.1145/3294016.3294021)
Alkaldi, N., Renaud, K., Mackenzie, L. (2019) Encouraging Password Manager Adoption by Meeting Adopter Self-Determination Needs.
Ghaleb, B., Al-Dubai, A.-D., Ekonomou, E., Qasem, M., Romdhani, I., Mackenzie, L. (2019) Addressing the DAO insider attack in RPL’s internet of things networks. IEEE Communications Letters, 23, pp. 68-71. (doi: 10.1109/LCOMM.2018.2878151)
Eiza, M. H., Shi, Q., Marnerides, A. K., Owens, T., Ni, Q. (2019) Efficient, secure, and privacy-preserving PMIPv6 protocol for V2G networks. IEEE Transactions on Vehicular Technology, 68, pp. 19-33. (doi: 10.1109/TVT.2018.2880834)
Ghaleb, B., Al-Dubai, A. Y., Ekonomou, E., Alsarhan, A., Nasser, Y., Mackenzie, L. M., Boukerche, A. (2019) A survey of limitations and enhancements of the IPv6 routing protocol for low-power and lossy networks: a focus on core operations. IEEE Communications Surveys and Tutorials, 21, pp. 1607-1635. (doi: 10.1109/COMST.2018.2874356)
Cano, J., Yang, Y., Bodin, B., Nagarajan, V., O’Boyle, M. (2019) Automatic Parameter Tuning of Motion Planning Algorithms. (doi: 10.1109/IROS.2018.8594183)
Chang, B., Zhao, G., Chen, Z., Li, P., Li, L. (2019) D2D Transmission Scheme in URLLC Enabled Real-Time Wireless Control Systems for Tactile Internet. (doi: 10.1109/GLOBECOM38437.2019.9013522)
Marnerides, A. K., Giotsas, V., Mursch, T. (2019) Identifying Infected Energy Systems in the Wild. (doi: 10.1145/3307772.3328305)
Archibald, B., Maier, P., Stewart, R., Trinder, P. (2019) Implementing YewPar: a Framework for Parallel Tree Search. (doi: 10.1007/978-3-030-29400-7_14)
Dale, V. H.M., Singer, J. (2019) Learner experiences of a blended course incorporating a MOOC on Haskell functional programming. Research in Learning Technology, 27, (doi: 10.25304/rlt.v27.2248)
Chen, S.W., Seow, C.K., Tan, S.Y., De Silva, P.B. (2019) Measurements and Characterization of Twisted Radio Wave Multipath for Indoor Wireless Communication and Security System. (doi: 10.1109/PIERS-Fall48861.2019.9021907)
Rovder, S., Cano, J., O’Boyle, M. (2019) Optimising Convolutional Neural Networks Inference on Low-Powered GPUs.
Chang, B., Zhao, G., Chen, Z., Li, L., Imran, M. A. (2019) Packet-drop design in URLLC for real-time wireless control systems. IEEE Access, 7, pp. 183081-183090. (doi: 10.1109/ACCESS.2019.2928681)
Radu, V., Kaszyk, K., Wen, Y., Turner, J., Cano, J., Crowley, E. J., Franke, B., Storkey, A., O’Boyle, M. (2019) Performance Aware Convolutional Neural Network Channel Pruning for Embedded GPUs. (doi: 10.1109/IISWC47752.2019.9042000)
Dwyer, O. P., Marnerides, A. K., Giotsas, V., Mursch, T. (2019) Profiling IoT-based Botnet Traffic Using DNS. (doi: 10.1109/GLOBECOM38437.2019.9014300)
Chee Kiat, S., Renyu, Z., Kai, W., Heng, Z. (2019) Spoofing Attack of Drone. (doi: 10.1109/CompComm.2018.8780865)
Alkharashi, A., Storer, T., Jose, J., Hoskins, A., Happer, C. (2019) Understanding Abusive Behaviour Between Online and Offline Group Discussions. (doi: 10.1145/3290607.3299042)
2018
Perkins, C., Ott, J. (2018) Real-time Audio-Visual Media Transport over QUIC. (doi: 10.1145/3284850.3284856)
Ardeshir-Larijani, E., Gay, S. J., Nagarajan, R. (2018) Automated equivalence checking of concurrent quantum systems. ACM Transactions on Computational Logic, 19, (doi: 10.1145/3231597)
Johnston, S. J., Basford, P. J., Perkins, C. S., Herry, H., Tso, F. P., Pezaros, D., Mullins, R. D., Yoneki, E., Cox, S. J., Singer, J. (2018) Commodity single board computer clusters and their applications. Future Generation Computer Systems, 89, pp. 201-212. (doi: 10.1016/j.future.2018.06.048)
Alayed, W., Mackenzie, L., Pezaros, D. (2018) Analytical Hierarchy Process Multi-Metric Objective Function for RPL. (doi: 10.1109/NCA.2018.8548054)
Cano, J., White, D. R., Bordallo, A., McCreesh, C., Michala, A. L., Singer, J., Nagarajan, V. (2018) Solving the task variant allocation problem in distributed robotics. Autonomous Robots, 42, pp. 1477-1495. (doi: 10.1007/s10514-018-9742-5)
Cano, J., Turner, J., Radu, V., O'Boyle, M. (2018) Accelerating Deep Convolutional Neural Networks on Low Power Embedded Devices.
Vanderbauwhede, W., Davidson, G. (2018) Domain-specific acceleration and auto-parallelization of legacy scientific code in FORTRAN 77 using source-to-source compilation. Computers and Fluids, 173, pp. 1-5. (doi: 10.1016/j.compfluid.2018.06.005)
Maguire, J., Draper, S., Cutts, Q. (2018) Assessing the Unseen: Roles of Confidentiality and Trust in Software Engineering Work-based Learning Programmes [Poster]
Maguire, J., Draper, S., Cutts, Q. (2018) Assessing the Unseen: Roles of Confidentiality and Trust in Software Engineering Work-based Learning Programmes [Presentation]
Maguire, J., Draper, S., English, R. (2018) Scaffolding Video Assignments in Cyber Security.
Nabi, S. W., Vanderbauwhede, W. (2018) MP-STREAM: A Memory Performance Benchmark for Design Space Exploration on Heterogeneous HPC Devices. (doi: 10.1109/IPDPSW.2018.00036)
Kizilkaya, B., Caglar, M., Al-Turjman, F., Ever, E. (2018) An Intelligent Car Park Management System : Hierarchical Placement Algorithm Based on Nearest Location. (doi: 10.1109/WAINA.2018.00151)
Singer, J., Herry, H., Basford, P. J., Hajji, W., Perkins, C. S., Tso, F. P., Pezaros, D., Mullins, R. D., Yoneki, E., Cox, S. J., Johnston, S. J. (2018) Next Generation Single Board Clusters. (doi: 10.1109/NOMS.2018.8406120)
Herry, H., Band, E., Perkins, C., Singer, J. (2018) Peer-to-Peer Secure Updates for Heterogeneous Edge Devices. (doi: 10.1109/NOMS.2018.8406323)
Alshammari, D., Singer, J., Storer, T. (2018) Performance Evaluation of Cloud Computing Simulation Tools. (doi: 10.1109/ICCCBDA.2018.8386571)
Ahsan, S., McQuistin, S., Perkins, C., Ott, J. (2018) DASHing Towards Hollywood. (doi: 10.1145/3204949.3204959)
Maguire, J., Draper, S., English, R. (2018) Consuming versus Authoring: Reflections on Video Assignments for Usable Security.
Baalous, R., Poet, R., Storer, T. (2018) Analyzing Privacy Policies of Zero Knowledge Cloud Storage Applications on Mobile Devices. (doi: 10.1109/IC2E.2018.00047)
Singer, J., Archibald, B. (2018) Functional Baby Talk: Analysis of Code Fragments from Novice Haskell Programmers. Electronic Proceedings in Theoretical Computer Science, 270, pp. 37-51. (doi: 10.4204/EPTCS.270.3)
Lim, B. S., Keoh, S. L., Thing, V. L.L. (2018) Autonomous Vehicle Ultrasonic Sensor Vulnerability and Impact Assessment. (doi: 10.1109/WF-IoT.2018.8355132)
Tan, H. C., Lim, K., Keoh, S. L., Tang, Z., Leong, D., Sum, C. S. (2018) Chameleon: a Blind Double Trapdoor Hash Function for Securing AMI Data Aggregation. (doi: 10.1109/WF-IoT.2018.8355112)
Ng, J., Keoh, S. L., Tang, Z., Ko, H. (2018) SEABASS: Symmetric-keychain Encryption and Authentication for Building Automation Systems. (doi: 10.1109/WF-IoT.2018.8355106)
Maguire, J. (2018) Beyond Capture: Perspectives, Privacy and Pedagogy.
Singer, J., Perkins, C., Herry, H. (2018) Does Disaggregrated Compute Require a New Programming Paradigm?
Kouzapas, D., Dardha, O., Perera, R., Gay, S. J. (2018) Typechecking protocols with Mungo and StMungo: a session type toolchain for Java. Science of Computer Programming, 155, pp. 52-75. (doi: 10.1016/j.scico.2017.10.006)
Liu, D., Huang, K. (2018) Mitigating interference in content delivery networks by spatial signal alignment: the approach of shot-noise ratio. IEEE Transactions on Wireless Communications, 17, pp. 2305-2318. (doi: 10.1109/TWC.2018.2791523)
Chan, F. M., Xu, Q., Seah, H. J., Tang, Z., Keoh, S. L., Aung, K. M. M. (2018) Privacy Preserving Computation in Home Loans using the FRESCO Framework. (doi: 10.1007/978-3-030-03405-4_7)
Singer, J., Dale, V., Vanderbauwhede, W., Barr, N., Sim, A. (2018) Designing and Evaluating a Blended Course which Includes a MOOC [lightning talk]
Nabi, S. W. (2018) Individual Differences in Bilingual Grammars.
Archibald, B., Maier, P., McCreesh, C., Stewart, R., Trinder, P. (2018) Replicable parallel branch and bound search. Journal of Parallel and Distributed Computing, 113, pp. 92-114. (doi: 10.1016/j.jpdc.2017.10.010)
Singer, J., Dale, V. (2018) A Blended Course That Includes a FutureLearn MOOC: Learner and Teacher Experiences.
Alayed, W., Mackenzie, L., Pezaros, D. (2018) Evaluation of RPL’s Single Metric Objective Functions. (doi: 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.98)
Koutsakis, P., Spachos, P., Marnerides, A. (2018) Guest editorial: body sensor networks. IET Wireless Sensor Systems, 8, pp. 1-2. (doi: 10.1049/iet-wss.2017.0162)
Simpson, R., Storer, T. (2018) Third-party verifiable voting systems: addressing motivation and incentives in e-voting. Journal of Information Security and Applications, 38, pp. 132-138. (doi: 10.1016/j.jisa.2017.11.005)
Loukadakis, M., Cano, J., O’Boyle, M. (2018) Accelerating Deep Neural Networks on Low Power Heterogeneous Architectures.
Band, E., Herry, H., Perkins, C., Singer, J. (2018) Peer to Peer Secure Update for Heterogeneous Edge Devices (Extended Abstract)
Dardha, O., Gay, S. J. (2018) A New Linear Logic for Deadlock-Free Session-Typed Processes. (doi: 10.1007/978-3-319-89366-2_5)
Li, L., Zhao, G., Blum, R. S. (2018) A survey of caching techniques in cellular networks: research issues and challenges in content placement and delivery strategies. IEEE Communications Surveys and Tutorials, 20, pp. 1710-1732. (doi: 10.1109/COMST.2018.2820021)
Din, G. M. U., Mauthe, A. U., Marnerides, A. K. (2018) Appliance-level Short-term Load Forecasting using Deep Neural Networks. (doi: 10.1109/ICCNC.2018.8390366)
Turner, J., Cano, J., Radu, V., Crowley, E. J., O’Boyle, M., Storkey, A. (2018) Characterising Across-Stack Optimisations for Deep Convolutional Neural Networks. (doi: 10.1109/IISWC.2018.8573503)
Valkov, I., Chechina, N., Trinder, P. (2018) Comparing Languages for Engineering Server Software: Erlang, Go, and Scala with Akka. (doi: 10.1145/3167132.3167144)
Wallis, T., Storer, T. (2018) Modelling Realistic User Behaviour in Information Systems Simulations as Fuzzing Aspects. (doi: 10.1007/978-3-319-92901-9)
Kiayias, A., Kuldmaa, A., Lipmaa, H., Siim, J., Zacharias, T. (2018) On the Security Properties of e-Voting Bulletin Boards. (doi: 10.1007/978-3-319-98113-0_27)
Olukoya, O., Mackenzie, L., Omoronyia, I. (2018) Permission-based Risk Signals for App Behaviour Characterization in Android Apps. (doi: 10.5220/0007248701830192)
2017
Simpson, R., Storer, T. (2017) Experimenting with Realism in Software Engineering Team Projects: An Experience Report. (doi: 10.1109/CSEET.2017.23)
Chia, M. H., Keoh, S. L., Tang, Z. (2017) Secure Data Provenance in Home Energy Monitoring Networks. (doi: 10.1145/3174776.3174778)
El-Moussa, F., Mauthe, A., Marnerides, A., Watson, M. (2017) Malware detection in migrated virtual machines.
Bin Othman, M. S., Keoh, S. L., Tan, G. (2017) Efficient Journey Planning and Congestion Prediction Through Deep Learning. (doi: 10.1109/ISC2.2017.8090805)
Renaud, K., Zimmermann, V., Maguire, J., Draper, S. (2017) Lessons Learned from Evaluating Eight Password Nudges in the Wild.
Boukoros, S., Nugaliyadde, A., Marnerides, A., Vassilakis, C., Koutsakis, P., Wong, K. W. (2017) Modeling server workloads for campus email traffic using recurrent neural networks. Springer
Zhang, L., Zhao, G., Zhou, W., Li, L., Wu, G., Liang, Y.-C., Li, S. (2017) Primary channel gain estimation for spectrum sharing in cognitive radio networks. IEEE Transactions on Communications, 65, pp. 4152-4162. (doi: 10.1109/TCOMM.2017.2723885)
Dardha, O., Giachino, E., Sangiorgi, D. (2017) Session types revisited. Information and Computation, 256, pp. 253-286. (doi: 10.1016/j.ic.2017.06.002)
Alshammari, D., Singer, J., Storer, T. (2017) Does CloudSim Accurately Model Micro Datacenters? (doi: 10.1109/CLOUD.2017.97)
Maguire, J., English, R. (2017) Lessons Learned From Integrating Industry and Exposing Enterprises to Computing Science Students.
Kolomvatsos, K., Anagnostopoulos, C., Marnerides, A. K., Ni, Q., Hadjiefthymiades, S., Pezaros, D. (2017) Uncertainty-driven Ensemble Forecasting of QoS in Software Defined Networks. (doi: 10.1109/ISCC.2017.8024701)
Grispos, G., Glisson, W. B., Storer, T. (2017) Enhancing security incident response follow-up efforts with lightweight agile retrospectives. Digital Investigation, 22, pp. 62-73. (doi: 10.1016/j.diin.2017.07.006)
Johnson, C. W., Saleem, M. H., Evangelopoulou, M., Cook, M., Harkness, R., Barker, T. (2017) Defending Against Firmware Cyber Attacks on Safety-Critical Systems.
Grispos, G., Glisson, W. B., Bourrie, D., Storer, T., Miller, S. (2017) Security Incident Recognition and Reporting (SIRR): An Industrial Perspective.
Chechina, N., MacKenzie, K., Thompson, S., Trinder, P., Boudeville, O., Fordos, V., Hoch, C., Ghaffari, A., Moro Hernandez, M. (2017) Evaluating scalable distributed Erlang for scalability and reliability. IEEE Transactions on Parallel and Distributed Systems, 28, pp. 2244-2257. (doi: 10.1109/TPDS.2017.2654246)
Storer, T. (2017) Bridging the chasm: a survey of software engineering practice in scientific programming. ACM Computing Surveys, 50, (doi: 10.1145/3084225)
Trinder, P. et al. (2017) Scaling reliably: improving the scalability of the Erlang distributed actor platform. ACM Transactions on Programming Languages and Systems, 39, (doi: 10.1145/3107937)
Maguire, J. (2017) Preserving Privacy and Reconceptualising Sharing in Active Learning Spaces.
Scalas, A., Dardha, O., Hu, R., Yoshida, N. (2017) A Linear Decomposition of Multiparty Sessions for Safe Distributed Programming. (doi: 10.4230/LIPIcs.ECOOP.2017.24)
Trammell, B., Perkins, C., Kühlewind, M. (2017) Post Sockets: Towards an Evolvable Network Transport Interface. (doi: 10.23919/IFIPNetworking.2017.8264874)
Jones, T., Fairhurst, G., Perkins, C. (2017) Raising the Datagram API to Support Transport Protocol Evolution. (doi: 10.23919/IFIPNetworking.2017.8264870)
Kiayias, A., Zacharias, T., Zhang, B. (2017) An efficient E2E verifiable E-voting system without setup assumptions. IEEE Security and Privacy, 15, pp. 14-23. (doi: 10.1109/msp.2017.71)
(2017) Behavioural Types: from Theory to Tools. River Publishers
Dardha, O., Gay, S. J., Kouzapas, D., Perera, R., Voinea, A. L., Weber, F. (2017) Mungo and StMungo: tools for typechecking protocols in Java. River Publishers
Michala, A. L., Vourganas, I. (2017) A Smart Modular Wireless System for Condition Monitoring Data Acquisition.
Maguire, J. (2017) Close Encounters of the Industry Kind.
Ko, H., Jin, J., Keoh, S. L. (2017) ViotSOC: Controlling Access to Dynamically Virtualized IoT Services using Service Object Capability. (doi: 10.1145/3055186.3055194)
Dardha, O., Gorla, D., Varacca, D. (2017) Semantic subtyping for objects and classes. Computer Journal, 60, pp. 636-656. (doi: 10.1093/comjnl/bxw080)
Hussain, M. A., Badar, R., Nabi, S. W. (2017) Comparison of Hand-Written RTL code against High-Level Synthesis for Blowfish and Tiny Encrpytion Algorithm (TEA)
Perkins, C., Singh, V. (2017) Multimedia congestion control: circuit breakers for unicast RTP sessions. Internet RFC, (doi: 10.17487/RFC8083)
Lennox, J., Westerlund, M., Wu, Q., Perkins, C. (2017) Sending multiple RTP streams in a single RTP session. Internet RFC, (doi: 10.17487/RFC8108)
Sim, L. J. H., Ren, S. Q., Keoh, S. L., Aung, K. M. M. (2017) A Cloud Authentication Protocol using One-Time Pad. (doi: 10.1109/TENCON.2016.7848486)
Yin, X., Keoh, S. L. (2017) Personalized Ambience: An Integration of Learning Model and Intelligent Lighting Control. (doi: 10.1109/WF-IoT.2016.7845398)
Nasiri, N., Colangelo, P., Segal, O., Margala, M., Vanderbauwhede, W. (2017) Document Classification Systems in Heterogeneous Computing Environments. (doi: 10.1109/PATMOS.2016.7833702)
Din, G. M. U., Marnerides, A. K. (2017) Short Term Power Load forecasting Using Deep Neural Networks. (doi: 10.1109/iccnc.2017.7876196)
Scalas, A., Dardha, O., Hu, R., Yoshida, N. (2017) A Linear Decomposition of Multiparty Sessions for Safe Distributed Programming (Artifact) (doi: 10.4230/DARTS.3.2.3)
Harvey, P., Sventek, J. (2017) Adaptable Actors: Just What The World Needs. (doi: 10.1145/3144555.3144559)
Kiayias, A., Zacharias, T., Zhang, B. (2017) Ceremonies for End-to-End Verifiable Elections. (doi: 10.1007/978-3-662-54388-7_11)
Kumar, R., Cano, J., Pavlou, D., Stavrou, K., Gibert, E., Martinez, A., González, A. (2017) HW/SW Co-designed Processors: Challenges, Design Choices and a Simulation Infrastructure for Evaluation. (doi: 10.1109/ISPASS.2017.7975290)
Ariffin, M. A. M., Marnerides, A. K., Mauthe, A. U. (2017) Multi-Level Resilience in Networked Environments: Concepts & Principles. (doi: 10.1109/CCNC.2017.7983118)
Maguire, J., Draper, S. (2017) Privacy of Personal Things in Active Learning Spaces Need Individually Evolved Requirements. (doi: 10.1145/3137003.3137009)
Ko, H., Keoh, S. L., Jin, J. (2017) Privacy protection for cloud-based robotic networks. Wiley
Archibald, B., Maier, P., Stewart, R., Trinder, P., De Beule, J. (2017) Towards Generic Scalable Parallel Combinatorial Search. (doi: 10.1145/3115936.3115942)
Postgraduate research students
Refine By
-
{{student.surname}} {{student.forename}}
{{student.surname}} {{student.forename}}
({{student.subject}})
{{student.title}}
Led by Dr Jeremy Singer, the GLASgow Systems Section (GLASS) is a core research hub within the School of Computing Science.
GLASgow Systems (GLASS), led by Dr Jeremy Singer, is a major research group within the School of Computing Science at the University of Glasgow. Our mission is to study parallel & distributed systems, networked systems, and safety-critical software systems, with a particular emphasis on real-world applications across hardware and software layers.
What We Do
We host seven key research labs/groups which:
- explore end-to-end systems research across diverse scales - from embedded systems to data centers
- undertake the development and release of open-source research software used worldwide
- collaborate with industrial and academic partners, including Airbus, Arm, Cisco, EDF, Ericsson, IETF, Microsoft Research, NASA, and more
- actively work with others both within the School and across disciplines, especially Engineering, and international academic institutions.
You can find out more about this work by exploring the tiles below.
Cross-Cutting Research Themes
Members of GLASS play a central role in the School’s interdisciplinary themes, including:
- Cyber Security for Digital Infrastructures (via GCDL)
- Computing Technologies for Healthcare
- Low Carbon & Sustainable Computing
- Programming Languages
- Understandable Autonomous Systems