Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

Items where Author is "Shi, Q"

Up a level
Export as [feed] Atom [feed] RSS
Group by: Item Type | No Grouping
Number of items: 64.

Article

Hashem Eiza, M, Thong Ta, V, Shi, Q and Cao, Y (2024) Secure Semi-Automated GDPR Compliance Service with Restrictive Fine-grained Access Control. Security and Privacy. ISSN 2475-6725

Raschella, A, Hashem Eiza, M, MacKay, M, Shi, Q and Banton, M (2023) A Trust-based Cooperative System for Efficient Wi-Fi Radio Access Networks. IEEE Access. ISSN 2169-3536

Al-Ani, R, Shamsa, TB, Zhou, B and Shi, Q (2023) Privacy and Safety Improvement of VANET Data via a Safety-related Privacy Scheme. International Journal of Information Security. ISSN 1615-5262

Alevizos, L, Eiza, MH, Ta, VT, Shi, Q and Read, J (2022) Blockchain-enabled Intrusion Detection and Prevention System of APTs within Zero Trust Architecture. IEEE Access, 10. pp. 89270-89288.

Kong, Z, Zhang, H, Nie, J, Wen, L, Shi, Q, Ng, SF, Huang, C and George, KP (2021) Exercise Training Increases Serum Cardiac Troponin T Independent of Left Ventricular Mass. International Journal of Sports Medicine. ISSN 0172-4622

Huang, C, Kong, Z, Nie, J, Pan, M, Zhang, H, Shi, Q and George, KP (2021) Impact of high-intensity interval and moderate-intensity continuous exercise on heart rate variability and cardiac troponin. Journal of Sports Medicine and Physical Fitness, 61 (9). pp. 1301-1308. ISSN 0022-4707

Raschella, A, Aldhaibani, OA, Pizzi, S, MacKay, M, Bouhafs, F, Araniti, G, Shi, Q and Lucas-Estañ, MDC (2021) A Centralized Win-Win Cooperative Framework for Wi-Fi and 5G Radio Access Networks. Wireless Communications and Mobile Computing, 2021. ISSN 1530-8669

Adewuyi, AA, Cheng, H, Shi, Q, Cao, J, Wang, X and Zhou, B (2021) SC-TRUST: A Dynamic Model for Trustworthy Service Composition in the Internet of Things. IEEE Internet of Things Journal. ISSN 2327-4662

Mohi-Ud-din, G, Marnerides, A, Shi, Q, Dobbins, C and MacDermott, AM (2020) Deep COLA: A Deep COmpetitive Learning Algorithm for Future Home Energy Management Systems. IEEE Transactions on Emerging Topics in Computational Intelligence, 5 (6). pp. 860-870. ISSN 2471-285X

Naureen, A, Zhang, N, Furber, S and Shi, Q (2020) A GPS-Less Localization and Mobility Modelling (LMM) System for Wildlife Tracking. IEEE Access, 8. 102709 -102732. ISSN 2169-3536

Nafea, H, Kifayat, K, Shi, Q, Qureshi, KN and Askwith, RJ (2019) Efficient Non-Linear Covert Channel Detection in TCP Data Streams. IEEE Access, 8. pp. 1680-1690. ISSN 2169-3536

Teh, PS, Zhang, N, Tan, SY, Shi, Q, Khoh, WH and Nawaz, R (2019) Strengthen user authentication on mobile devices by using user’s touch dynamics pattern. Journal of Ambient Intelligence and Humanized Computing. ISSN 1868-5137

Raschella, A, Bouhafs, F, MacKay, M, Shi, Q, Ortín, J, Gállego, JR and Canales, M (2019) A Dynamic Access Point Allocation Algorithm for Dense Wireless LANs Using Potential Game. Computer Networks. ISSN 1389-1286

G C, D, Bouhafs, F, Raschella, A, MacKay, M and Shi, Q (2019) Radio Resource Management Framework for Energy-Efficient Communications in the Internet-of-Things. Transactions on Emerging Telecommunications Technologies, 30 (12). ISSN 2161-3915

Mac Dermott, AM, Baker, T, Buck, P, Iqbal, F and Shi, Q (2019) The Internet of Things: Challenges and considerations for cybercrime investigations and digital forensics. International Journal of Digital Crime and Forensics (IJDCF), 12 (1). ISSN 1941-6210

Nie, J, Zhang, H, Kong, Z, Wang, C, Liu, Y, Shi, Q and George, KP (2019) The impact of exercise modality and menstrual cycle phase on circulating cardiac troponin T. Journal of Science and Medicine in Sport, 23 (3). pp. 309-314. ISSN 1878-1861

Al-Dahhan, R, Shi, Q, Lee, GM and Kifayat, K (2019) Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption. Sensors, 19 (7). ISSN 1424-8220

Bouhafs, F, Seyedebrahimi, M, Raschella, A, MacKay, M and Shi, Q (2019) Per-Flow Radio Resource Management to Mitigate Interference in Dense IEEE 802.11 Wireless LANs. IEEE Transactions on Mobile Computing. ISSN 1536-1233

Adewuyi, AA, Cheng, H, Shi, Q, Cao, J, MacDermott, Á and Wang, X (2019) CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things. IEEE Internet of Things Journal. ISSN 2327-4662

Zhou, B, Maines, CL, Tang, SOT, Shi, Q, Yang, P, Yang, Q and Qi, J (2018) A 3D Security Modelling Platform for Social IoT Environments. IEEE Transactions on Computational Social Systems, 5 (4). pp. 1174-1188. ISSN 2329-924X

Bouhafs, F, MacKay, M, Raschella, A, Shi, Q, den Hartog, F, Saldana, J, Munilla, R, Ruiz-Mas, J, Fernández-Navajas, J, Almodovar, J and van Adrichem, N (2018) Wi-5: A Programming Architecture for Unlicensed Frequency Bands. IEEE Communications Magazine, 56 (12). pp. 178-185. ISSN 0163-6804

Eiza, MH, Shi, Q, Marnerides, AK, Owens, T and Ni, Q (2018) Efficient, Secure and Privacy-Preserving PMIPv6 Protocol for V2G Networks. IEEE Transactions on Vehicular Technology. ISSN 0018-9545

Jayasinghe, U, Lee, GM, Um, TW and Shi, Q (2018) Machine Learning based Trust Computational Model for IoT Services. IEEE Transactions on Sustainable Computing, 4 (1). pp. 39-52. ISSN 2377-3782

Kifayat, K, Shi, Q, Askwith, RJ and McWhirter, PR (2018) SQL Injection Attack Classification through the Feature Extraction of SQL Query strings using a Gap-Weighted String Subsequence Kernel. Journal of Information Security and Applications, 40. pp. 199-216. ISSN 2214-2126

Asim, M, Yautsiukhin, A, Brucker, A, Baker, T, Shi, Q and Lempereur, B (2018) Security Policy Monitoring of BPMN-based Service Compositions. Journal of Software: Evolution and Process. ISSN 2047-7473

Moara-Nkwe, K, Shi, Q, Lee, GM and Eiza, MH (2018) A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks. IEEE Access, 6. pp. 11374-11387. ISSN 2169-3536

Shone, N, Tran Nguyen, N, Vu Dinh, P and Shi, Q (2018) A Deep Learning Approach to Network Intrusion Detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2 (1). ISSN 2471-285X

Nie, J, Zhang, H, Kong, Z, George, KP, Little, JP, Tong, TK, Li, F and Shi, Q (2017) Impact of high-intensity interval training and moderate-intensity continuous training on resting and post-exercise cardiac troponin T concentration. Experimental Physiology. ISSN 1469-445X

Brucker, A, Zhou, B, Malmignati, F, Shi, Q and Merabti, M (2017) Modelling, Validating, and Ranking of Secure Service Compositions. Software: Practice and Experience. ISSN 0038-0644

Hurst, W, Shone, N, Shi, Q and Bazli, B (2017) Micro-CI: A Model Critical Infrastructure Testbed for Cyber-Security Training and Research. International Journal On Advances in Security, 10 (1&2). pp. 114-125. ISSN 1942-2636

Zhou, B, Zhang, Q, Shi, Q, Yang, Q, Yang, P and Yu, Y (2017) Measuring Web Service Security in the Era of Internet of Things. Computers and Electrical Engineering. ISSN 0045-7906

Raschella, A, Bouhafs, F, Seyedebrahimi, M, MacKay, M and Shi, Q (2017) Quality of Service Oriented Access Point Selection Framework for Large Wi-Fi Networks. IEEE Transactions on Network and Service Management, 14 (2). pp. 441-455. ISSN 1932-4537

Kong, Z, Nie, J, Lin, H, George, KP, Zhao, G, Zhang, H, Tong, TK and Shi, Q (2016) Sex differences in release of cardiac troponin T after endurance exercise. Biomarkers. ISSN 1354-750X

Alohali, BA, Kifayat, K, Shi, Q and Hurst, W (2016) Group Authentication Scheme for Neighbourhood Area Networks(NANs) In Smart Grids. Journal of Sensor and Actuator Networks (JSAN), 5 (2). ISSN 2224-2708

Hashem Eiza, M, Ni, Q and Shi, Q (2016) Secure and Privacy-Aware Cloud-Assisted Video Reporting Service in 5G Enabled Vehicular Networks. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY. ISSN 0018-9545

Hashem Eiza, M, Owens, T, Ni, Q and Shi, Q (2015) Situation-Aware QoS Routing Algorithm for Vehicular Ad hoc Networks. IEEE Transactions on Vehicular Technology. ISSN 1939-9359

Alohali, BA, Kifayat, K, Shi, Q and Hurst, W (2015) A Survey on Cryptography Key Management Schemes for Smart Grid. Journal of Computer Sciences and Applications, Science and Education, 3 (3A). pp. 27-39. ISSN 2328-7268

Mac Dermott, AM, Shi, Q and Kifayat, K (2015) Collaborative Intrusion Detection in Federated Cloud Environments. Journal of Computer Sciences and Applications, 3 (3A). pp. 10-20. ISSN 2328-7268

MacDermott, Á, Shi, Q, Merabti, M and Kifayat, K (2015) Hosting critical infrastructure services in the cloud environment considerations. International Journal of Critical Infrastructures, 11 (4). pp. 365-381. ISSN 1475-3219

Shi, Q, Zhang, N and Merabti, M (2014) Fair signature exchange via delegation on ubiquitous networks. Journal of Computer and System Sciences, 81 (4). pp. 615-631. ISSN 0022-0000

Mac Dermott, AM, Shi, Q and Kifayat, K (2014) An elastic scaling method for cloud security. The Journal of Internet Technology and Secured Transactions (JITST), 3 (2). pp. 254-262. ISSN 2046-3723

Book Section

Zhou, B, Maines, CL, Tang, SO and Shi, Q (2018) A Framework for the Visualisation of Cyber Security Requirements and its Application in BPMN. In: Parkinson, S, Crampton, A and Hill, R, (eds.) Guide to Vulnerability Analysis for Computer Networks and Systems. Springer, pp. 339-366. ISBN 978-3-319-92624-7

Conference or Workshop Item

Hashem Eiza, M, Raschella, A, MacKay, M, Shi, Q and Bouhafs, F (2023) Towards Trusted and Accountable Win-Win SDWN Platform for Trading Wi-Fi Network Access. In: 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC) . (IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA.).

Mac Dermott, AM, Carr, J, Shi, Q, Baharon, MR and Lee, GM (2020) Privacy preserving issues in the dynamic internet of things. In: 2020 International Symposium on Networks, Computers and Communications (ISNCC) . (IEEE International Symposium on Networks, Computers and Communications (, 20-22 October 2020, Montreal, Canada).

Al-Ani, R, Zhou, B, Shi, Q, Baker, T and Abdlhamed, M (2020) Adjusted Location Privacy Scheme in VANET Safety Applications. In: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium . (The Third International Workshop on Intelligent Transportation and Connected Vehicles Technologies (ITCVT 2020), 20 April 2020 - 24 April 2020, Budapest, Hungary).

Vu Dinh, P, Shone, N, Phan Huy, D, Shi, Q, Nguyen Viet, H and Tran Nguyen, N (2019) Behaviour-aware Malware Classification: Dynamic Feature Selection. In: 2019 11th International Conference on Knowledge and Systems Engineering (KSE) . (11th International Conference on Knowledge and Systems Engineering (KSE), 24 October 2019 - 26 October 2019, Da Namg, Vietnam).

Mac Dermott, AM, Kendrick, P, Idowu, IO, Ashall, M and Shi, Q (2019) Securing Things in the Healthcare Internet of Things. In: 2019 Global IoT Summit (GIoTS) . (Global IoT Summit, 17 June 2019 - 19 June 2019, Aarhus, Denmark).

Hartog, FD, Bouhafs, F and Shi, Q (2019) Toward secure trading of unlicensed spectrum in cyber-physical systems. In: 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC) . (2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), 11 January 2019 - 14 January 2019, Las Vegas, USA). (Accepted)

Brown, J, Gao, R, Ji, Z, Chen, J, Wu, J, Zhang, JF, Zhou, B, Shi, Q, Crawford, J and Zhang, WD (2018) A low-power and high-speed True Random Number Generator using generated RTN. In: 2018 IEEE Symposium on VLSI Technology . (2018 Symposia on VLSI Technology and Circuits, 18 June 2018 - 22 June 2018, Hawaii US).

Al-ani, R, Zhou, B, Shi, Q and Sagheer, A (2018) A Survey on Secure Safety Applications in VANET. In: 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS) . (The 16th IEEE Conference on Smart City, 28 June 2018 - 30 June 2018, Exeter, UK).

Mac Dermott, AM, Baker, T and Shi, Q (2018) IoT Forensics: Challenges For The IoA Era. In: 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS) . (2018 9th IFIP International Conference on New Technologies Mobility and Security (NTMS), 26 February 2018 - 28 February 2018, Paris, France.).

Vu Dinh, P, Tran Nguyen, N, Shone, N, Mac Dermott, AM and Shi, Q (2017) Deep Learning Combined with De - noising Data for Network Intrusion Detection. In: 2017 21st Asia Pacific Symposium on Intelligent and Evolutionary Systems (IES) . (Intelligent and Evolutionary Systems (IES 2017), 15 November 2017 - 17 November 2017, Hanoi, Vietnam).

Mac Dermott, AM, Shi, Q and Kifayat, K (2017) Distributed attack prevention using Dempster-Shafer theory of evidence. In: Intelligent Computing Methodologies , 10363 (LNCS). pp. 203-212. (International Conference on Intelligent Computing (ICIC 2017), 07 August 2017 - 10 August 2017, Liverpool).

Seyedebrahimi, M, Bouhafs, F, Raschella, A, MacKay, M and Shi, Q (2017) Fine-Grained Radio Resource Management to Control Interference in Dense Wi-Fi Networks. In: IEEE Wireless Communications and Networking Conference (WCNC) . (IEEE Wireless Communications and Networking Conference (WCNC), 19 March 2017 - 22 March 2017, San Francisco, CA).

Seyedebrahimi, M, Raschella, A, Bouhafs, F, MacKay, M, Shi, Q and Eiza, MH (2016) A Centralised Wi-Fi Management Framework for D2D Communications in Dense Wi-Fi Networks. In: 2016 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN) . (IEEE Conference on Standards for Communications and Networking (CSCN), 31 October 2016 - 02 November 2016, Berlin, GERMANY).

Alohali, BA, Kifayat, K and Shi, Q (2016) Impact of Topology on Service Availability in a Smart Grid Advanced Metering Infrastructure. In: EMERGING 2016: The Eighth International Conference on Emerging Networks and Systems Intelligence . pp. 29-33. (The Eighth International Conference on Emerging Networks and Systems Intelligence, 09 October 2016 - 12 October 2016, Venice, Italy).

Hurst, W, Shone, N, Shi, Q and Bazli, B (2016) MICRO-CI: A Testbed for Cyber-Security Research. In: EMERGING 2016: The Eighth International Conference on Emerging Networks and Systems Intelligence . pp. 17-22. (The Eighth International Conference on Emerging Networks and Systems Intelligence, 09 October 2016 - 12 October 2016, Venice, Italy).

Seyedebrahimi, M, Bouhafs, F, Raschella, A, MacKay, M and Shi, Q (2016) SDN-Based Channel Assignment Algorithm for Interference Management in Dense Wi-Fi Networks. In: 2016 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC) . (European Conference on Networks and Communications (EuCNC), 27 June 2016 - 30 June 2016, Athens, GREECE).

Zhou, B, Shi, Q and Yang, P (2016) A Survey on Quantitative Evaluation of Web Service Security. In: The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 23 August 2016 - 26 August 2016, Tianjin, China.

Raschella, A, Bouhafs, F, Seyedebrahimi, M, MacKay, M and Shi, Q (2016) A Centralized Framework for Smart Access Point Selection based on the Fittingness Factor. In: 2016 23RD INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT) . (23rd International Conference on Telecommunications (ICT), 16 May 2016 - 18 May 2016, Thessaloniki, GREECE).

Hashem Eiza, M, Shi, Q, Marnerides, A and Owens, T (2016) Secure and Privacy-Aware Proxy Mobile IPv6 Protocol for Vehicle-to-Grid Networks. In: 2016 IEEE International Conference on Communications (ICC) . pp. 1-6. (IEEE International Conference on Communications, 23rd - 27th May 2016, Kuala Lumpur - Malaysia).

Shone, N, Dobbins, C, Hurst, W and Shi, Q (2015) Digital Memories Based Mobile User Authentication for IoT. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM) . pp. 1796-1802. (13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC’15), 26th - 28th October 2015, Liverpool, UK).

Zhou, B, Shi, Q, Asim, M and Zarzosa, S (2015) A Policy Specification Language for Composite Services. In: The Fifth International Conference on Advanced Collaborative Networks, Systems and Applications, 11th - 16th October 2015, St. Julians, Malta.

Maines, CL, Zhou, B, Tang, SOT and Shi, Q Towards a Framework for the Extension and Visualisation of Cyber Security Requirements in Modelling Language. In: Developments in eSystems Engineering, 14 June 2017 - 16 June 2017, Paris, France. (Accepted)

This list was generated on Thu Sep 26 23:31:35 2024 UTC.