
-
Photo-Realistic Facial Details Synthesis from Single Immage
We present a single-image 3D face synthesis technique that can handle ch...
read it
-
CochleaNet: A Robust Language-independent Audio-Visual Model for Speech Enhancement
Noisy situations cause huge problems for suffers of hearing loss as hear...
read it
-
Blind Inpainting of Large-scale Masks of Thin Structures with Adversarial and Reinforcement Learning
Several imaging applications (vessels, retina, plant roots, road network...
read it
-
Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones
Inter-connected objects, either via public or private networks are the n...
read it
-
Natural Language Generation enhances human decision-making with uncertain information
Decision-making is often dependent on uncertain data, e.g. data associat...
read it
-
Property analysis of symmetric travelling salesman problem instances acquired through evolution
We show how an evolutionary algorithm can successfully be used to evolve...
read it
-
Content Selection in Data-to-Text Systems: A Survey
Data-to-text systems are powerful in generating reports from data automa...
read it
-
Evolution of a Functionally Diverse Swarm via a Novel Decentralised Quality-Diversity Algorithm
The presence of functional diversity within a group has been demonstrate...
read it
-
Optimisation and Illumination of a Real-world Workforce Scheduling and Routing Application via Map-Elites
Workforce Scheduling and Routing Problems (WSRP) are very common in many...
read it
-
Privacy Parameter Variation Using RAPPOR on a Malware Dataset
Stricter data protection regulations and the poor application of privacy...
read it
-
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier
Insider threats continue to present a major challenge for the informatio...
read it
-
The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime
We increasingly live in a world where there is a balance between the rig...
read it
-
AV Speech Enhancement Challenge using a Real Noisy Corpus
This paper presents, a first of its kind, audio-visual (AV) speech enhac...
read it
-
An authentication protocol based on chaos and zero knowledge proof
Port Knocking is a method for authenticating clients through a closed st...
read it
-
Improving Aspect-Level Sentiment Analysis with Aspect Extraction
Aspect-based sentiment analysis (ABSA), a popular research area in NLP h...
read it
-
Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach
Phishing is considered to be one of the most prevalent cyber-attacks bec...
read it
-
BeepTrace: Blockchain-enabled Privacy-preserving Contact Tracing for COVID-19 Pandemic and Beyond
The outbreak of COVID-19 pandemic has exposed an urgent need for effecti...
read it
-
Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques – An Experiment
Attacks by Advanced Persistent Threats (APTs) have been shown to be diff...
read it
-
A Distributed Trust Framework for Privacy-Preserving Machine Learning
When training a machine learning model, it is standard procedure for the...
read it
-
Fast Probabilistic Consensus with Weighted Votes
The fast probabilistic consensus (FPC) is a voting consensus protocol th...
read it
-
Trust-by-Design: Evaluating Issues and Perceptions within Clinical Passporting
A substantial administrative burden is placed on healthcare professional...
read it
-
When to (or not to) trust intelligent machines: Insights from an evolutionary game theory analysis of trust in repeated games
The actions of intelligent agents, such as chatbots, recommender systems...
read it