Ability to test firmware on embedded devices is critical to discovering
...
Self Sovereign Identity (SSI) is an emerging identity system that facili...
IoT device identification is the process of recognizing and verifying
co...
Colour controlled image generation and manipulation are of interest to
a...
ChatGPT, an AI-based chatbot, was released to provide coherent and usefu...
Designing visually appealing layouts for multimedia documents containing...
Generative models with discrete latent representations have recently
dem...
Flexible resources in built environments are seen as a low-cost opportun...
In recent years, there has been an increasing interest in incorporating
...
Location trajectories collected by smartphones and other devices represe...
6G is envisioned to enable futuristic technologies, which exhibit more
c...
Deception is rapidly growing as an important tool for cyber defence,
com...
Graph Neural Networks (GNNs) have achieved tremendous success in many gr...
Each and every organisation releases information in a variety of forms
r...
Blockchain has the potential to enhance supply chain management systems ...
Autonomic computing investigates how systems can achieve (user) specifie...
Security risk assessment and prediction are critical for organisations
d...
Intrusion Detection Systems (IDS) have been the industry standard for
se...
In this paper we discuss the state of the art of (mobile) multi-hop ad h...
The salient features of blockchain, such as decentralisation and
transpa...
In this work, we propose a privacy-preservation framework, TradeChain, w...
Authorization or access control limits the actions a user may perform on...
The infection rate of COVID-19 and lack of an approved vaccine has force...
We have witnessed the continuing arms race between backdoor attacks and ...
Next-generation mobile networks have proposed the integration of Unmanne...
We propose CrowdPatching, a blockchain-based decentralized protocol, all...
Targeted advertising has transformed the marketing trend for any busines...
The targeted advertising is based on preference profiles inferred via
re...
Deployment of Internet of Things (IoT) in smart buildings has received
c...
The ubiquity of connecting technologies in smart vehicles and the increm...
Recommendation represents a vital stage in developing and promoting the
...
The recent outbreak of COVID-19 has taken the world by surprise, forcing...
Currently, blockchain proposals are being adopted to solve security issu...
We focus on the problem of botnet orchestration and discuss how attacker...
Despite the increasing popularity of commercial usage of UAVs or
drone-d...
An Intrusion Detection System (IDS) aims to alert users of incoming atta...
Personal data is a new economic asset that individuals can trade to gene...
The video footage produced by the surveillance cameras is an important
e...
The Internet of Things (IoT) is transforming our physical world into a
c...
Heterogeneous and dynamic IoT environments require a lightweight, scalab...
Cyberphysical Systems (CPS) are transforming the way we interact with th...
Blockchain is a promising technology for establishing trust in IoT netwo...
Traceability and integrity are major challenges for the increasingly com...
Multi-step passenger demand forecasting is a crucial task in on-demand
v...
This paper presents a new method for recharging flying base stations, ca...
With the widespread adoption of Internet of Things (IoT), billions of
ev...
Security and privacy in Direct Load Control (DLC) is a fundamental chall...
Blockchain is increasingly being used as a distributed, anonymous, trust...
Incentives are key to the success of crowdsourcing which heavily depends...
Data is central to the Internet of Things (IoT) ecosystem. Most of the
c...