Skip to main content

Research Repository

Advanced Search

Outputs (663)

Beyond the topics: how deep learning can improve the discriminability of probabilistic topic modelling (2020)
Journal Article
Al Moubayed, N., McGough, S., & Awwad Shiekh Hasan, B. (2020). Beyond the topics: how deep learning can improve the discriminability of probabilistic topic modelling. PeerJ Computer Science, 6, Article e252. https://doi.org/10.7717/peerj-cs.252

The article presents a discriminative approach to complement the unsupervised probabilistic nature of topic modelling. The framework transforms the probabilities of the topics per document into class-dependent deep learning models that extract highly... Read More about Beyond the topics: how deep learning can improve the discriminability of probabilistic topic modelling.

Cooperative Control of Heterogeneous Connected Vehicle Platoons: An Adaptive Leader-Following Approach (2020)
Journal Article
Hu, J., Bhowmick, P., Arvin, F., Lanzon, A., & Lennox, B. (2020). Cooperative Control of Heterogeneous Connected Vehicle Platoons: An Adaptive Leader-Following Approach. IEEE Robotics and Automation Letters, 5(2), 977-984. https://doi.org/10.1109/lra.2020.2966412

Automatic cruise control of a platoon of multiple connected vehicles in an automated highway system has drawn significant attention of the control practitioners over the past two decades due to its ability to reduce traffic congestion problems, impro... Read More about Cooperative Control of Heterogeneous Connected Vehicle Platoons: An Adaptive Leader-Following Approach.

Volenti non fit injuria: Ransomware and its Victims (2019)
Presentation / Conference Contribution
Atapour-Abarghouei, A., Bonner, S., & McGough, A. S. (2019). Volenti non fit injuria: Ransomware and its Victims. . https://doi.org/10.1109/bigdata47090.2019.9006298

With the recent growth in the number of malicious activities on the internet, cybersecurity research has seen a boost in the past few years. However, as certain variants of malware can provide highly lucrative opportunities for bad actors, significan... Read More about Volenti non fit injuria: Ransomware and its Victims.

Colour Processing in Adversarial Attacks on Face Liveness Systems (2019)
Presentation / Conference Contribution
Abduh, L., & Ivrissimtzis, I. (2019). Colour Processing in Adversarial Attacks on Face Liveness Systems. In F. P. Vidal, G. K. . L. Tam, & J. C. Roberts (Eds.), Proceedings of Computer Graphics and Visual Computing 2019 (CGVC) (149-152). https://doi.org/10.2312/cgvc.20191272

In the context of face recognition systems, liveness test is a binary classification task aiming at distinguishing between input images that come from real people’s faces and input images that come from photos or videos of those faces, and presented... Read More about Colour Processing in Adversarial Attacks on Face Liveness Systems.

Smart Monitoring of Crops Using Generative Adversarial Networks (2019)
Presentation / Conference Contribution
Kerdegari, H., Razaak, M., Argyriou, V., & Remagnino, P. (2019, December). Smart Monitoring of Crops Using Generative Adversarial Networks. Presented at COMPUTER ANALYSIS OF IMAGES AND PATTERNS, CAIP 2019, PT I Univ Salerno, Dept Comp \& Elect Engn \& Appl Math; SAST Gmbh; A I Tech srl; AI4Health srl; Nexsoft spa; Gesan srl; Hanwha Techwin Europe Ltd; Springer Lecture Notes Comp Sci; Italian Assoc Comp Vi

Latent Bernoulli Autoencoder (2019)
Presentation / Conference Contribution
Fajtl, J., Argyriou, V., Monekosso, D., & Remagnino, P. (2019). Latent Bernoulli Autoencoder.