Skip to main content

Research Repository

Advanced Search

All Outputs (14)

Global oceanic mesoscale eddies trajectories prediction with knowledge-fused neural network (2024)
Journal Article
Zhang, X., Huang, B., Chen, G., Ge, L., Radenkovic, M., & Hou, G. (2024). Global oceanic mesoscale eddies trajectories prediction with knowledge-fused neural network. IEEE Transactions on Geoscience and Remote Sensing, 62, Article 4205214. https://doi.org/10.1109/tgrs.2024.3388040

Efficient eddy trajectory prediction driven by multiinformation fusion can facilitate the scientific research of oceanography, while the complicated dynamics mechanism makes this issue challenging. Benefiting from ocean observing technology, the eddy... Read More about Global oceanic mesoscale eddies trajectories prediction with knowledge-fused neural network.

Instant deep sea debris detection for maneuverable underwater machines to build sustainable ocean using deep neural network (2023)
Journal Article
Huang, B., Chen, G., Zhang, H., Hou, G., & Radenkovic, M. (2023). Instant deep sea debris detection for maneuverable underwater machines to build sustainable ocean using deep neural network. Science of the Total Environment, 878, Article 162826. https://doi.org/10.1016/j.scitotenv.2023.162826

Deep sea debris is any persistent man-made material that ends up in the deep sea. The scale and rapidly increasing amount of sea debris are endangering the health of the ocean. So, many marine communities are struggling for the objective of a clean,... Read More about Instant deep sea debris detection for maneuverable underwater machines to build sustainable ocean using deep neural network.

Oceanic Eddy Identification Using Pyramid Split Attention U-Net With Remote Sensing Imagery (2023)
Journal Article
Zhao, N., Huang, B., Yang, J., Radenkovic, M., & Chen, G. (2023). Oceanic Eddy Identification Using Pyramid Split Attention U-Net With Remote Sensing Imagery. IEEE Geoscience and Remote Sensing Letters, 20, Article 1500605. https://doi.org/10.1109/lgrs.2023.3243902

Oceanic eddy is the ubiquitous ocean flow phenomenon, which has been the key factor in the transportation of ocean energy and materials. Consequently, oceanographic understanding can be enhanced by the intelligent identification of eddy. State-of-the... Read More about Oceanic Eddy Identification Using Pyramid Split Attention U-Net With Remote Sensing Imagery.

Resistance to Cybersecurity Attacks in a Novel Network for Autonomous Vehicles (2022)
Journal Article
Brocklehurst, C., & Radenkovic, M. (2022). Resistance to Cybersecurity Attacks in a Novel Network for Autonomous Vehicles. Journal of Sensor and Actuator Networks, 11(3), Article 35. https://doi.org/10.3390/jsan11030035

The increased interest in autonomous vehicles has led to the development of novel networking protocols in VANETS. In such a widespread safety critical application, security is paramount to the implementation of the networks. We view new autonomous ve... Read More about Resistance to Cybersecurity Attacks in a Novel Network for Autonomous Vehicles.

Exploring user behavioral data for adaptive cybersecurity (2019)
Journal Article
Addae, J. H., Sun, X., Towey, D., & Radenkovic, M. (2019). Exploring user behavioral data for adaptive cybersecurity. User Modeling and User-Adapted Interaction, 29(3), 701-750. https://doi.org/10.1007/s11257-019-09236-5

This paper describes an exploratory investigation into the feasibility of predictive analytics of user behavioral data as a possible aid in developing effective user models for adaptive cybersecurity. Partial least squares structural equation modelin... Read More about Exploring user behavioral data for adaptive cybersecurity.

Adaptive Real-Time Predictive Collaborative Content Discovery and Retrieval in Mobile Disconnection Prone Networks (2018)
Journal Article
Radenkovic, M., Huynh, . V. S. H., & Manzoni, P. (2018). Adaptive Real-Time Predictive Collaborative Content Discovery and Retrieval in Mobile Disconnection Prone Networks. IEEE Access, 6, 32188-32206. https://doi.org/10.1109/access.2018.2840040

Emerging mobile environments motivate the need for the development of new distributed technologies which are able to support dynamic peer to peer content sharing, decrease high operating costs, and handle intermittent disconnections. In this paper, w... Read More about Adaptive Real-Time Predictive Collaborative Content Discovery and Retrieval in Mobile Disconnection Prone Networks.

Integrating renewable energy resources into the smart grid: recent developments in information and communication technologies (2018)
Journal Article
Rehmani, M. H., Reisslein, M., Rachedi, A., Erol-Kantarci, M., & Radenkovic, M. (2018). Integrating renewable energy resources into the smart grid: recent developments in information and communication technologies. IEEE Transactions on Industrial Informatics, 14(7), 2814-2825. https://doi.org/10.1109/TII.2018.2819169

Rising energy costs, losses in the present-day electricity grid, risks from nuclear power generation, and global environmental changes are motivating a transformation of the conventional ways of generating electricity. Globally, there is a desire to... Read More about Integrating renewable energy resources into the smart grid: recent developments in information and communication technologies.

Measuring attitude towards personal data for adaptive cybersecurity (2017)
Journal Article
Addae, J. H., Brown, M., Sun, X., Towey, D., & Radenkovic, M. (2017). Measuring attitude towards personal data for adaptive cybersecurity. Information and Computer Security, 25(5), 560-579. https://doi.org/10.1108/ICS-11-2016-0085

© Emerald Publishing Limited. Purpose - This paper presents an initial development of a personal data attitude (PDA) measurement instrument based on established psychometric principles. The aim of the research was to develop a reliable measurement sc... Read More about Measuring attitude towards personal data for adaptive cybersecurity.

Towards low cost prototyping of mobile opportunistic disconnection tolerant networks and systems (2016)
Journal Article
Radenkovic, M., Crowcroft, J., & Rehmani, M. H. (2016). Towards low cost prototyping of mobile opportunistic disconnection tolerant networks and systems. IEEE Access, 4, 5309-5321. https://doi.org/10.1109/ACCESS.2016.2606501

Fast emerging mobile edge computing, mobile clouds, Internet of Things (IoT) and cyber physical systems require many novel realistic real time multi-layer algorithms for a wide range of domains, such as intelligent content provision and processing, s... Read More about Towards low cost prototyping of mobile opportunistic disconnection tolerant networks and systems.

Cognitive privacy for personal clouds (2016)
Journal Article
Radenkovic, M. (2016). Cognitive privacy for personal clouds. Mobile Information Systems, 2016, 1-17. https://doi.org/10.1155/2016/7107103

This paper proposes a novel Cognitive Privacy (CogPriv) framework that improves privacy of data sharing between Personal Clouds for different application types and across heterogeneous networks. Depending on the behaviour of neighbouring network node... Read More about Cognitive privacy for personal clouds.

Wild interdisciplinarity: ethnography and computer science (2016)
Journal Article
Goulden, M., Greiffenhagen, C., Crowcroft, J., McAuley, D., Mortier, R., Radenkovic, M., & Sathiaseelan, A. (in press). Wild interdisciplinarity: ethnography and computer science. International Journal of Social Research Methodology, https://doi.org/10.1080/13645579.2016.1152022

Drawing on the experiences of a novel collaborative project between sociologists and computer scientists, this paper identifies a set of challenges for fieldwork that are generated by this wild interdisciplinarity. Public Access Wi-Fi Service was a p... Read More about Wild interdisciplinarity: ethnography and computer science.

Reputation aware obfuscation for mobile opportunistic networks (2013)
Journal Article
Radenkovic, M., Benslimane, A., & McAuley, D. (2015). Reputation aware obfuscation for mobile opportunistic networks. IEEE Transactions on Parallel and Distributed Systems, 26(1), 230-240. https://doi.org/10.1109/TPDS.2013.265

© 2013 IEEE. Current anonymity techniques for mobile opportunistic networks typically use obfuscation algorithms to hide node's identity behind other nodes. These algorithms are not well suited to sparse and disconnection prone networks with large nu... Read More about Reputation aware obfuscation for mobile opportunistic networks.

Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks (2013)
Journal Article
Zakhary, S., Radenkovic, M., & Benslimane, A. (2014). Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks. IEEE Transactions on Vehicular Technology, 63(2), 893-906. https://doi.org/10.1109/TVT.2013.2279671

This paper proposes a novel fully distributed and collaborative k-anonymity protocol (LPAF) to protect users’ location information and ensure better privacy while forwarding queries/replies to/from untrusted location-based service (LBS) over opportun... Read More about Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks.

Efficient and adaptive congestion control for heterogeneous delay-tolerant networks (2012)
Journal Article
Radenkovic, M., & Grundy, A. (2012). Efficient and adaptive congestion control for heterogeneous delay-tolerant networks. Ad Hoc Networks, 10(7), https://doi.org/10.1016/j.adhoc.2012.03.013

Detecting and dealing with congestion in delay-tolerant networks (DTNs) is an important and challenging problem. Current DTN forwarding algorithms typically direct traffic towards more central nodes in order to maximise delivery ratios and minimise d... Read More about Efficient and adaptive congestion control for heterogeneous delay-tolerant networks.