Skip to main content

Research Repository

Advanced Search

On the Performance of Extended Real-Time Object Detection and Attribute Estimation within Urban Scene Understanding (2019)
Conference Proceeding
Ismail, K., & Breckon, T. (2019). On the Performance of Extended Real-Time Object Detection and Attribute Estimation within Urban Scene Understanding. In 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA), Boca Raton, FL, USA, 2019 (641-646). https://doi.org/10.1109/icmla.2019.00117

Whilst real-time object detection has become an increasingly important task within urban scene understanding for autonomous driving, the majority of prior work concentrates on the detection of obstacles, dynamic scene objects (pedestrians, vehicles)... Read More about On the Performance of Extended Real-Time Object Detection and Attribute Estimation within Urban Scene Understanding.

On the Impact of Object and Sub-Component Level Segmentation Strategies for Supervised Anomaly Detection within X-Ray Security Imagery (2019)
Conference Proceeding
Bhowmik, N., Gaus, Y., Akcay, S., Barker, J., & Breckon, T. (2019). On the Impact of Object and Sub-Component Level Segmentation Strategies for Supervised Anomaly Detection within X-Ray Security Imagery. In 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA), Boca Raton, FL, USA, 2019 (986-991). https://doi.org/10.1109/icmla.2019.00168

X-ray security screening is in widespread use to maintain transportation security against a wide range of potential threat profiles. Of particular interest is the recent focus on the use of automated screening approaches, including the potential anom... Read More about On the Impact of Object and Sub-Component Level Segmentation Strategies for Supervised Anomaly Detection within X-Ray Security Imagery.

Colour Processing in Adversarial Attacks on Face Liveness Systems (2019)
Conference Proceeding
Abduh, L., & Ivrissimtzis, I. (2019). Colour Processing in Adversarial Attacks on Face Liveness Systems. In F. P. Vidal, G. K. . L. Tam, & J. C. Roberts (Eds.), Proceedings of Computer Graphics and Visual Computing 2019 (CGVC) (149-152). https://doi.org/10.2312/cgvc.20191272

In the context of face recognition systems, liveness test is a binary classification task aiming at distinguishing between input images that come from real people’s faces and input images that come from photos or videos of those faces, and presented... Read More about Colour Processing in Adversarial Attacks on Face Liveness Systems.

Region Based Anomaly Detection With Real-Time Training and Analysis (2019)
Conference Proceeding
Adey, P., Bordewich, M., Breckon, T., & Hamilton, O. (2019). Region Based Anomaly Detection With Real-Time Training and Analysis. In 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA), Boca Raton, FL, USA, 2019 (495-499). https://doi.org/10.1109/icmla.2019.00092

We present a method of anomaly detection that is capable of real-time operation on a live stream of images. The real-time performance applies to the training of the algorithm as well as subsequent analysis, and is achieved by substituting the region... Read More about Region Based Anomaly Detection With Real-Time Training and Analysis.

Evaluating the Transferability and Adversarial Discrimination of Convolutional Neural Networks for Threat Object Detection and Classification within X-Ray Security Imagery (2019)
Conference Proceeding
Gaus, Y., Bhowmik, N., Akcay, S., & Breckon, T. (2019). Evaluating the Transferability and Adversarial Discrimination of Convolutional Neural Networks for Threat Object Detection and Classification within X-Ray Security Imagery. In 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA), Boca Raton, FL, USA, 2019 (420-425). https://doi.org/10.1109/icmla.2019.00079

X-ray imagery security screening is essential to maintaining transport security against a varying profile of threat or prohibited items. Particular interest lies in the automatic detection and classification of weapons such as firearms and knives wit... Read More about Evaluating the Transferability and Adversarial Discrimination of Convolutional Neural Networks for Threat Object Detection and Classification within X-Ray Security Imagery.

Using Deep Neural Networks to Address the Evolving Challenges of Concealed Threat Detection within Complex Electronic Items (2019)
Conference Proceeding
Bhowmik, N., Gaus, Y., & Breckon, T. (2019). Using Deep Neural Networks to Address the Evolving Challenges of Concealed Threat Detection within Complex Electronic Items. In Proceeding of the International Symposium on Technologies for Homeland Security (1-6). https://doi.org/10.1109/hst47167.2019.9032920

X-ray baggage security screening is widely used to maintain aviation and transport safety and security. To address the future challenges of increasing volumes and complexities, the recent focus on the use of automated screening approaches are of part... Read More about Using Deep Neural Networks to Address the Evolving Challenges of Concealed Threat Detection within Complex Electronic Items.

Temporal neighbourhood aggregation: predicting future links in temporal graphs via recurrent variational graph convolutions (2019)
Conference Proceeding
Bonner, S., Atapour-Abarghouei, A., Jackson, P., Brennan, J., Kureshi, I., Theodoropoulos, G., …Obara, B. (2019). Temporal neighbourhood aggregation: predicting future links in temporal graphs via recurrent variational graph convolutions. In 2019 IEEE International Conference on Big Data (Big Data) (5336-5345). https://doi.org/10.1109/bigdata47090.2019.9005545

Graphs have become a crucial way to represent large, complex and often temporal datasets across a wide range of scientific disciplines. However, when graphs are used as input to machine learning models, this rich temporal information is frequently di... Read More about Temporal neighbourhood aggregation: predicting future links in temporal graphs via recurrent variational graph convolutions.

Volenti non fit injuria: Ransomware and its Victims (2019)
Conference Proceeding
Atapour-Abarghouei, A., Bonner, S., & McGough, A. S. (2019). Volenti non fit injuria: Ransomware and its Victims. . https://doi.org/10.1109/bigdata47090.2019.9006298

With the recent growth in the number of malicious activities on the internet, cybersecurity research has seen a boost in the past few years. However, as certain variants of malware can provide highly lucrative opportunities for bad actors, significan... Read More about Volenti non fit injuria: Ransomware and its Victims.