• The Impact of Translating Resource-Rich Datasets to Low-Resource Languages Through Multi-Lingual Text Processing 

      Memon, Abdul Ghafoor; Imran, Ali Shariq; Daudpota, Sher Muhammad; Kastrati, Zenun; Somro, Abdullah; Batra, Rakhi; Wani, Mudasir Ahmad (Journal article; Peer reviewed, 2021)
    • IRL-Net: Inpainted Region Localization Network via Spatial Attention 

      Daryani, Amir Etefaghi; Mirmahdi, Mahdieh; Hassanpour, Ahmad; Shahreza, Hatef Otroshi; Yang, Bian; Fierrez, Julian (Journal article; Peer reviewed, 2023)
      Identifying manipulated regions in images is a challenging task due to the existence of very accurate image inpainting techniques leaving almost unnoticeable traces in tampered regions. These image inpainting methods can ...
    • Long-Term Video QoE Assessment Studies: A Systematic Review 

      Cieplínska, Natalia; Janowski, Lucjan; De Moor, Katrien; Wierzchoń, Michał (Peer reviewed; Journal article, 2023)
      Although longitudinal studies are common in other disciplines, such as psychology, medicine, or User Experience, they are rarely used in Quality of Experience (QoE). However, observing users over time can provide useful ...
    • Multilingual Audio-Visual Smartphone Dataset and Evaluation 

      Mandalapu, Hareesh; Reddy, P. N. Aravinda; Ramachandra, Raghavendra; Rao, Krothapalli Sreenivasa; Mitra, Pabitra; Prasanna, S. R. Mahadeva; Busch, Christoph (Peer reviewed; Journal article, 2021)
      Smartphones have been employed with biometric-based verification systems to provide security in highly sensitive applications. Audio-visual biometrics are getting popular due to their usability, and also it will be challenging ...
    • Multimodality for Reliable Single Image Based Face Morphing Attack Detection 

      Ramachandra, Raghavendra; Li, Guoqiang (Peer reviewed; Journal article, 2022)
      Face morphing attacks have demonstrated a high vulnerability on human observers and commercial off-the-shelf Face Recognition Systems (FRS), especially in the border control scenario. Therefore, detecting face morphing ...
    • Online Machine Learning for 1-Day-Ahead Prediction of Indoor Photovoltaic Energy 

      Krämer, Frank Alexander; Asad, Hafiz Areeb; Bach, Kerstin; Renner, Christian (Peer reviewed; Journal article, 2023)
      We explore the potential for predicting indoor photovoltaic energy on a forecasting horizon of up to 24 hours. The objective is to enable energy management approaches that exploit harvesting opportunities more strategically, ...
    • Performance Analysis of Bidirectional Multi-Hop Vehicle-to-Vehicle Visible Light Communication 

      Refas, Souad; Acheli, Dalila; Yahia, Selma; Meraihi, Yassine; Ramdane-Cherif, Amar; Van, Nhan Vo; Ho, Tu Dac (Peer reviewed; Journal article, 2023)
    • Physical-layer Security Improvement in MIMO OFDM Systems using Multilevel Chaotic Encryption 

      Hasan, Mohammad Mahmudul; Cheffena Gebresilassie, Michael; Petrovic, Slobodan (Peer reviewed; Journal article, 2023)
      Ensuring physical-layer security (PLS) in wireless communication has always been a challenge due to the broadcasting nature of the transmission. In this work, a multilevel chaotic encryption (MCE) system is proposed to ...
    • Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews 

      Casino, Fran; Dasaklis, Thomas K.; Spathoulas, Georgios; Anagnostopoulos, Marios; Ghosal, Amrita; Borocz, Istvan; Solanas, Agusti; Conti, Mauro; Patsakis, Constantinos (Peer reviewed; Journal article, 2022)
      Due to its critical role in cybersecurity, digital forensics has received significant attention from researchers and practitioners alike. The ever increasing sophistication of modern cyberattacks is directly related to the ...
    • Security Properties of Light Clients on the Ethereum Blockchain 

      Paavolainen, Santeri; Carr, Christopher (Peer reviewed; Journal article, 2020)
      Ethereum is a decentralized blockchain, known as being the second most popular public blockchain after Bitcoin. Since Ethereum is decentralised the canonical state is determined by the Ethereum network participants via a ...
    • Security Threats to 5G Networks for Social Robots in Public Spaces: A Survey 

      Oruma, Samson Ogheneovo; Petrovic, Slobodan (Peer reviewed; Journal article, 2023)
      This paper surveys security threats to 5G-enabled wireless access networks for social robots in public spaces (SRPS). The use of social robots (SR) in public areas requires specific Quality of Service (QoS) planning to ...
    • SFTSDH: Applying Spring Security Framework with TSD-Based OAuth2 to Protect Microservice Architecture APIs 

      Chatterjee, Ayan; Gerdes, Martin; Khatiwada, Pankaj; Prinz, Andreas (Peer reviewed; Journal article, 2022)
      The Internet of Medical Things (IoMT) combines medical devices and applications that use network technologies to connect healthcare information systems (HIS). IoMT is reforming the medical industry by adopting information ...
    • SoK of Used Cryptography in Blockchain 

      Raikwar, Mayank; Gligoroski, Danilo; Kralevska, Katina (Journal article; Peer reviewed, 2019)
      The underlying fundaments of blockchain are cryptography and cryptographic concepts that provide reliable and secure decentralized solutions. Although many recent papers study the use-cases of blockchain in different ...
    • Unmanned Aerial Vehicles as Data Mules: An Experimental Assessment 

      Palma, David; Zolich, Artur Piotr; Jiang, Yuming; Johansen, Tor Arne (Journal article; Peer reviewed, 2017)
      Communication in remote locations, specially in high-latitude regions, such as the Arctic, is challenged by the lack of infrastructures and by the limited availability of resources. However, these regions have high scientific ...
    • Unsupervised Denoising for Super-Resolution (UDSR) of Real-World Images 

      Prajapati, Kalpesh; Chudasama, Vishal; Patel, Heena; Sarvaiya, Anjali; Upla, Kishor; Raja, Kiran; Ramachandra, Raghavendra; Busch, Christoph (Peer reviewed; Journal article, 2022)
      Single Image Super-Resolution (SISR) using Convolutional Neural Networks (CNNs) for many applications in supervised manner has resulted in significant improvement in state-of-the-art performance. Such supervised models ...