Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

Items where Author is "Shi, Q"

Up a level
Export as [feed] Atom [feed] RSS
Group by: Item Type | No Grouping
Number of items: 63.

Article

Raschella, A, Hashem Eiza, M, MacKay, M, Shi, Q and Banton, M (2023) A Trust-based Cooperative System for Efficient Wi-Fi Radio Access Networks. IEEE Access. ISSN 2169-3536

Al-Ani, R, Shamsa, TB, Zhou, B and Shi, Q (2023) Privacy and Safety Improvement of VANET Data via a Safety-related Privacy Scheme. International Journal of Information Security. ISSN 1615-5262

Alevizos, L, Eiza, MH, Ta, VT, Shi, Q and Read, J (2022) Blockchain-enabled Intrusion Detection and Prevention System of APTs within Zero Trust Architecture. IEEE Access, 10. pp. 89270-89288.

Kong, Z, Zhang, H, Nie, J, Wen, L, Shi, Q, Ng, SF, Huang, C and George, KP (2021) Exercise Training Increases Serum Cardiac Troponin T Independent of Left Ventricular Mass. International Journal of Sports Medicine. ISSN 0172-4622

Huang, C, Kong, Z, Nie, J, Pan, M, Zhang, H, Shi, Q and George, KP (2021) Impact of high-intensity interval and moderate-intensity continuous exercise on heart rate variability and cardiac troponin. Journal of Sports Medicine and Physical Fitness, 61 (9). pp. 1301-1308. ISSN 0022-4707

Raschella, A, Aldhaibani, OA, Pizzi, S, MacKay, M, Bouhafs, F, Araniti, G, Shi, Q and Lucas-Estañ, MDC (2021) A Centralized Win-Win Cooperative Framework for Wi-Fi and 5G Radio Access Networks. Wireless Communications and Mobile Computing, 2021. ISSN 1530-8669

Adewuyi, AA, Cheng, H, Shi, Q, Cao, J, Wang, X and Zhou, B (2021) SC-TRUST: A Dynamic Model for Trustworthy Service Composition in the Internet of Things. IEEE Internet of Things Journal. ISSN 2327-4662

Mohi-Ud-din, G, Marnerides, A, Shi, Q, Dobbins, C and MacDermott, AM (2020) Deep COLA: A Deep COmpetitive Learning Algorithm for Future Home Energy Management Systems. IEEE Transactions on Emerging Topics in Computational Intelligence, 5 (6). pp. 860-870. ISSN 2471-285X

Naureen, A, Zhang, N, Furber, S and Shi, Q (2020) A GPS-Less Localization and Mobility Modelling (LMM) System for Wildlife Tracking. IEEE Access, 8. 102709 -102732. ISSN 2169-3536

Nafea, H, Kifayat, K, Shi, Q, Qureshi, KN and Askwith, RJ (2019) Efficient Non-Linear Covert Channel Detection in TCP Data Streams. IEEE Access, 8. pp. 1680-1690. ISSN 2169-3536

Teh, PS, Zhang, N, Tan, SY, Shi, Q, Khoh, WH and Nawaz, R (2019) Strengthen user authentication on mobile devices by using user’s touch dynamics pattern. Journal of Ambient Intelligence and Humanized Computing. ISSN 1868-5137

Raschella, A, Bouhafs, F, MacKay, M, Shi, Q, Ortín, J, Gállego, JR and Canales, M (2019) A Dynamic Access Point Allocation Algorithm for Dense Wireless LANs Using Potential Game. Computer Networks. ISSN 1389-1286

G C, D, Bouhafs, F, Raschella, A, MacKay, M and Shi, Q (2019) Radio Resource Management Framework for Energy-Efficient Communications in the Internet-of-Things. Transactions on Emerging Telecommunications Technologies, 30 (12). ISSN 2161-3915

Mac Dermott, AM, Baker, T, Buck, P, Iqbal, F and Shi, Q (2019) The Internet of Things: Challenges and considerations for cybercrime investigations and digital forensics. International Journal of Digital Crime and Forensics (IJDCF), 12 (1). ISSN 1941-6210

Nie, J, Zhang, H, Kong, Z, Wang, C, Liu, Y, Shi, Q and George, KP (2019) The impact of exercise modality and menstrual cycle phase on circulating cardiac troponin T. Journal of Science and Medicine in Sport, 23 (3). pp. 309-314. ISSN 1878-1861

Al-Dahhan, R, Shi, Q, Lee, GM and Kifayat, K (2019) Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption. Sensors, 19 (7). ISSN 1424-8220

Bouhafs, F, Seyedebrahimi, M, Raschella, A, MacKay, M and Shi, Q (2019) Per-Flow Radio Resource Management to Mitigate Interference in Dense IEEE 802.11 Wireless LANs. IEEE Transactions on Mobile Computing. ISSN 1536-1233

Adewuyi, AA, Cheng, H, Shi, Q, Cao, J, MacDermott, Á and Wang, X (2019) CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things. IEEE Internet of Things Journal. ISSN 2327-4662

Zhou, B, Maines, CL, Tang, SOT, Shi, Q, Yang, P, Yang, Q and Qi, J (2018) A 3D Security Modelling Platform for Social IoT Environments. IEEE Transactions on Computational Social Systems, 5 (4). pp. 1174-1188. ISSN 2329-924X

Bouhafs, F, MacKay, M, Raschella, A, Shi, Q, den Hartog, F, Saldana, J, Munilla, R, Ruiz-Mas, J, Fernández-Navajas, J, Almodovar, J and van Adrichem, N (2018) Wi-5: A Programming Architecture for Unlicensed Frequency Bands. IEEE Communications Magazine, 56 (12). pp. 178-185. ISSN 0163-6804

Eiza, MH, Shi, Q, Marnerides, AK, Owens, T and Ni, Q (2018) Efficient, Secure and Privacy-Preserving PMIPv6 Protocol for V2G Networks. IEEE Transactions on Vehicular Technology. ISSN 0018-9545

Jayasinghe, U, Lee, GM, Um, TW and Shi, Q (2018) Machine Learning based Trust Computational Model for IoT Services. IEEE Transactions on Sustainable Computing, 4 (1). pp. 39-52. ISSN 2377-3782

Kifayat, K, Shi, Q, Askwith, RJ and McWhirter, PR (2018) SQL Injection Attack Classification through the Feature Extraction of SQL Query strings using a Gap-Weighted String Subsequence Kernel. Journal of Information Security and Applications, 40. pp. 199-216. ISSN 2214-2126

Asim, M, Yautsiukhin, A, Brucker, A, Baker, T, Shi, Q and Lempereur, B (2018) Security Policy Monitoring of BPMN-based Service Compositions. Journal of Software: Evolution and Process. ISSN 2047-7473

Moara-Nkwe, K, Shi, Q, Lee, GM and Eiza, MH (2018) A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks. IEEE Access, 6. pp. 11374-11387. ISSN 2169-3536

Shone, N, Tran Nguyen, N, Vu Dinh, P and Shi, Q (2018) A Deep Learning Approach to Network Intrusion Detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2 (1). ISSN 2471-285X

Nie, J, Zhang, H, Kong, Z, George, KP, Little, JP, Tong, TK, Li, F and Shi, Q (2017) Impact of high-intensity interval training and moderate-intensity continuous training on resting and post-exercise cardiac troponin T concentration. Experimental Physiology. ISSN 1469-445X

Brucker, A, Zhou, B, Malmignati, F, Shi, Q and Merabti, M (2017) Modelling, Validating, and Ranking of Secure Service Compositions. Software: Practice and Experience. ISSN 0038-0644

Hurst, W, Shone, N, Shi, Q and Bazli, B (2017) Micro-CI: A Model Critical Infrastructure Testbed for Cyber-Security Training and Research. International Journal On Advances in Security, 10 (1&2). pp. 114-125. ISSN 1942-2636

Zhou, B, Zhang, Q, Shi, Q, Yang, Q, Yang, P and Yu, Y (2017) Measuring Web Service Security in the Era of Internet of Things. Computers and Electrical Engineering. ISSN 0045-7906

Raschella, A, Bouhafs, F, Seyedebrahimi, M, MacKay, M and Shi, Q (2017) Quality of Service Oriented Access Point Selection Framework for Large Wi-Fi Networks. IEEE Transactions on Network and Service Management, 14 (2). pp. 441-455. ISSN 1932-4537

Kong, Z, Nie, J, Lin, H, George, KP, Zhao, G, Zhang, H, Tong, TK and Shi, Q (2016) Sex differences in release of cardiac troponin T after endurance exercise. Biomarkers. ISSN 1354-750X

Alohali, BA, Kifayat, K, Shi, Q and Hurst, W (2016) Group Authentication Scheme for Neighbourhood Area Networks(NANs) In Smart Grids. Journal of Sensor and Actuator Networks (JSAN), 5 (2). ISSN 2224-2708

Hashem Eiza, M, Ni, Q and Shi, Q (2016) Secure and Privacy-Aware Cloud-Assisted Video Reporting Service in 5G Enabled Vehicular Networks. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY. ISSN 0018-9545

Hashem Eiza, M, Owens, T, Ni, Q and Shi, Q (2015) Situation-Aware QoS Routing Algorithm for Vehicular Ad hoc Networks. IEEE Transactions on Vehicular Technology. ISSN 1939-9359

Alohali, BA, Kifayat, K, Shi, Q and Hurst, W (2015) A Survey on Cryptography Key Management Schemes for Smart Grid. Journal of Computer Sciences and Applications, Science and Education, 3 (3A). pp. 27-39. ISSN 2328-7268

Mac Dermott, AM, Shi, Q and Kifayat, K (2015) Collaborative Intrusion Detection in Federated Cloud Environments. Journal of Computer Sciences and Applications, 3 (3A). pp. 10-20. ISSN 2328-7268

MacDermott, Á, Shi, Q, Merabti, M and Kifayat, K (2015) Hosting critical infrastructure services in the cloud environment considerations. International Journal of Critical Infrastructures, 11 (4). pp. 365-381. ISSN 1475-3219

Shi, Q, Zhang, N and Merabti, M (2014) Fair signature exchange via delegation on ubiquitous networks. Journal of Computer and System Sciences, 81 (4). pp. 615-631. ISSN 0022-0000

Mac Dermott, AM, Shi, Q and Kifayat, K (2014) An elastic scaling method for cloud security. The Journal of Internet Technology and Secured Transactions (JITST), 3 (2). pp. 254-262. ISSN 2046-3723

Book Section

Zhou, B, Maines, CL, Tang, SO and Shi, Q (2018) A Framework for the Visualisation of Cyber Security Requirements and its Application in BPMN. In: Parkinson, S, Crampton, A and Hill, R, (eds.) Guide to Vulnerability Analysis for Computer Networks and Systems. Springer, pp. 339-366. ISBN 978-3-319-92624-7

Conference or Workshop Item

Hashem Eiza, M, Raschella, A, MacKay, M, Shi, Q and Bouhafs, F (2023) Towards Trusted and Accountable Win-Win SDWN Platform for Trading Wi-Fi Network Access. In: 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC) . (IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA.).

Vu Dinh, P, Tran Nguyen, N, Shone, N, Mac Dermott, AM and Shi, Q (2017) Deep Learning Combined with De - noising Data for Network Intrusion Detection. In: 2017 21st Asia Pacific Symposium on Intelligent and Evolutionary Systems (IES) . (Intelligent and Evolutionary Systems (IES 2017), 15 November 2017 - 17 November 2017, Hanoi, Vietnam).

Mac Dermott, AM, Shi, Q and Kifayat, K (2017) Distributed attack prevention using Dempster-Shafer theory of evidence. In: Intelligent Computing Methodologies , 10363 (LNCS). pp. 203-212. (International Conference on Intelligent Computing (ICIC 2017), 07 August 2017 - 10 August 2017, Liverpool).

Seyedebrahimi, M, Raschella, A, Bouhafs, F, MacKay, M, Shi, Q and Eiza, MH (2016) A Centralised Wi-Fi Management Framework for D2D Communications in Dense Wi-Fi Networks. In: 2016 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN) . (IEEE Conference on Standards for Communications and Networking (CSCN), 31 October 2016 - 02 November 2016, Berlin, GERMANY).

Alohali, BA, Kifayat, K and Shi, Q (2016) Impact of Topology on Service Availability in a Smart Grid Advanced Metering Infrastructure. In: EMERGING 2016: The Eighth International Conference on Emerging Networks and Systems Intelligence . pp. 29-33. (The Eighth International Conference on Emerging Networks and Systems Intelligence, 09 October 2016 - 12 October 2016, Venice, Italy).

Hurst, W, Shone, N, Shi, Q and Bazli, B (2016) MICRO-CI: A Testbed for Cyber-Security Research. In: EMERGING 2016: The Eighth International Conference on Emerging Networks and Systems Intelligence . pp. 17-22. (The Eighth International Conference on Emerging Networks and Systems Intelligence, 09 October 2016 - 12 October 2016, Venice, Italy).

Seyedebrahimi, M, Bouhafs, F, Raschella, A, MacKay, M and Shi, Q (2016) SDN-Based Channel Assignment Algorithm for Interference Management in Dense Wi-Fi Networks. In: 2016 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC) . (European Conference on Networks and Communications (EuCNC), 27 June 2016 - 30 June 2016, Athens, GREECE).

Zhou, B, Shi, Q and Yang, P (2016) A Survey on Quantitative Evaluation of Web Service Security. In: The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 23 August 2016 - 26 August 2016, Tianjin, China.

Raschella, A, Bouhafs, F, Seyedebrahimi, M, MacKay, M and Shi, Q (2016) A Centralized Framework for Smart Access Point Selection based on the Fittingness Factor. In: 2016 23RD INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT) . (23rd International Conference on Telecommunications (ICT), 16 May 2016 - 18 May 2016, Thessaloniki, GREECE).

Hashem Eiza, M, Shi, Q, Marnerides, A and Owens, T (2016) Secure and Privacy-Aware Proxy Mobile IPv6 Protocol for Vehicle-to-Grid Networks. In: 2016 IEEE International Conference on Communications (ICC) . pp. 1-6. (IEEE International Conference on Communications, 23rd - 27th May 2016, Kuala Lumpur - Malaysia).

Shone, N, Dobbins, C, Hurst, W and Shi, Q (2015) Digital Memories Based Mobile User Authentication for IoT. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM) . pp. 1796-1802. (13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC’15), 26th - 28th October 2015, Liverpool, UK).

Zhou, B, Shi, Q, Asim, M and Zarzosa, S (2015) A Policy Specification Language for Composite Services. In: The Fifth International Conference on Advanced Collaborative Networks, Systems and Applications, 11th - 16th October 2015, St. Julians, Malta.

Al-Ani, R, Zhou, B, Shi, Q, Baker, T and Abdlhamed, M Adjusted Location Privacy Scheme in VANET Safety Applications. In: IEEE Explore . (The Third International Workshop on Intelligent Transportation and Connected Vehicles Technologies (ITCVT 2020), 20 April 2020 - 24 April 2020, Budapest, Hungary). (Accepted)

Dinh Vu, P, Shone, N, Phan Huy, D, Shi, Q, Nguyen Viet, H and Tran Nguyen, N Behaviour-aware Malware Classification: Dynamic Feature Selection. In: IEEE Explore . (11th International Conference on Knowledge and Systems Engineering (KSE), 24 October 2019 - 26 October 2019, Da Namg, Vietnam). (Accepted)

Seyedebrahimi, M, Bouhafs, F, Raschella, A, MacKay, M and Shi, Q Fine-Grained Radio Resource Management to Control Interference in Dense Wi-Fi Networks. In: IEEE Wireless Communications and Networking Conference (WCNC) . (IEEE Wireless Communications and Networking Conference (WCNC), 19 March 2017 - 22 March 2017, San Francisco, CA). (Accepted)

Mac Dermott, AM, Baker, T and Shi, Q IoT Forensics: Challenges For The IoA Era. In: 2018 9th IFIP International Conference on New Technologies Mobility and Security (NTMS), 26 February 2018 - 28 February 2018, Paris, France.. (Accepted)

Mac Dermott, AM, Carr, J, Shi, Q, Baharon, MR and Lee, GM Privacy preserving issues in the dynamic internet of things. In: 020 International Symposium on Networks, Computers and Communications (ISNCC’2020) . (IEEE International Symposium on Networks, Computers and Communications (, 20-22 October 2020, Montreal, Canada). (Accepted)

Mac Dermott, AM, Kendrick, P, Idowu, IO, Ashall, M and Shi, Q Securing Things in the Healthcare Internet of Things. In: Global IoT Summit, 17 June 2019 - 19 June 2019, Aarhus, Denmark. (Accepted)

Al-ani, R, Zhou, B, Shi, Q and Sagheer, A A Survey on Secure Safety Applications in VANET. In: The 16th IEEE Conference on Smart City, 28 June 2018 - 30 June 2018, Exeter, UK. (Accepted)

Hartog, FD, Bouhafs, F and Shi, Q Toward secure trading of unlicensed spectrum in cyber-physical systems. In: 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), 11 January 2019 - 14 January 2019, Las Vegas, USA. (Accepted)

Maines, CL, Zhou, B, Tang, SOT and Shi, Q Towards a Framework for the Extension and Visualisation of Cyber Security Requirements in Modelling Language. In: Developments in eSystems Engineering, 14 June 2017 - 16 June 2017, Paris, France. (Accepted)

Brown, J, Gao, R, Ji, Z, Chen, J, Wu, J, Zhang, JF, Zhou, B, Shi, Q, Crawford, J and Zhang, WD A low-power and high-speed True Random Number Generator using generated RTN. In: 2018 Symposia on VLSI Technology and Circuits, 18 June 2018 - 22 June 2018, Hawaii US. (Accepted)

This list was generated on Sat Apr 20 14:36:36 2024 UTC.