- Caching and Content Delivery
- Advanced Malware Detection Techniques
- Cooperative Communication and Network Coding
- Opportunistic and Delay-Tolerant Networks
- Microplastics and Plastic Pollution
- Adversarial Robustness in Machine Learning
- Blockchain Technology Applications and Security
- Pharmaceutical and Antibiotic Environmental Impacts
- Advanced Sensor and Energy Harvesting Materials
- Advanced Data Storage Technologies
- Image and Video Quality Assessment
- EEG and Brain-Computer Interfaces
- Anomaly Detection Techniques and Applications
- Software Engineering Research
- Advanced Image Processing Techniques
- Advanced Vision and Imaging
- Speech and Audio Processing
- Gaze Tracking and Assistive Technology
- IoT and Edge/Fog Computing
- Recycling and Waste Management Techniques
- Speech Recognition and Synthesis
- Covalent Organic Framework Applications
- Network Security and Intrusion Detection
- Hydrogels: synthesis, properties, applications
- Advanced Cellulose Research Studies
Technological University Dublin
2023-2025
Hunan University
2022-2025
Shannon Applied Biotechnology Centre
2022-2024
University of British Columbia
2022-2024
Chinese Academy of Sciences
2024
University of Science and Technology of China
2023-2024
Technological University of the Shannon: Midlands Midwest
2022-2024
University of Pennsylvania
2024
China University of Geosciences
2022
Zhejiang Ocean University
2022
Abstract The adoption of hydrogels in most applications is hampered by their high free water content, which limits mechanical performance and environmental resilience. Herein, this issue simultaneously addressed modulating the state intermolecular interactions polyacrylamide (PAM) hydrogels. Specifically, PAM are toughened sugaring‐out using a monosaccharide (glucose, G). Glucose found to facilitate hydrogen bonding interchain interactions. Meanwhile, hygroscopicity glucose converts some...
Interfacial assemblies formed by colloidal complexation are effective in multiphase stabilization, as shown structured liquids and Pickering emulgels. Herein, we demonstrate a type of biobased system that spontaneously stabilizes an organic phase continuous hydrogel phase. Specifically, triterpene extracted from bark (betulin, BE) is added to containing coniferous resin (rosin acid, diterpene). BE take part strong noncovalent interactions with the nanochitin dispersed aqueous (hydrogel)...
Payment channel networks (PCNs) are a viable solution to the issue of blockchain scalability by offering off-chain transactions between two untrusted peers, without committing each transaction blockchain. The payment cannot be used when its deposit is depleted, which hinders completion, such as it overly utilized in one direction. However, they migrate from another facilitate completion depletion arises. This limitation arises basic design assumption channels, i.e., independent others. To...
Graph Neural Networks (GNNs) play a pivotal role in graph-based tasks for their proficiency representation learning. Among the various GNN methods, spectral GNNs employing polynomial filters have shown promising performance on involving both homophilous and heterophilous graph structures. However, The scalability of large graphs is limited because they learn coefficients through multiple forward propagation executions during propagation. Existing works attempted to scale up by eliminating...
Future link prediction is a fundamental challenge in various real-world dynamic systems. To address this, numerous temporal graph neural networks (temporal GNNs) and benchmark datasets have been developed. However, these often feature excessive repeated edges lack complex sequential dynamics, key characteristic inherent many applications such as recommender systems ``Who-To-Follow'' on social networks. This oversight has led existing methods to inadvertently downplay the importance of...
Currently, microservices are trending as the most popular software application design architecture. Software organisations also being targeted by more cyber-attacks every day and newer security measures in high demand. One available measure is of anomaly detection, which defined discovery irregular or unusual activity that occurs to a greater lesser degree than normal occurrences data series. In this paper, we continue existing work where various real-world executed against running...
Marine microplastics (MPs) contamination has become an enormous hazard to aquatic creatures and human life. For MP identification, many Machine learning (ML) based approaches have been proposed using Attenuated Total Reflection Fourier Transform Infrared Spectroscopy (ATR-FTIR). One major challenge for training identification models now is the imbalanced inadequate samples in datasets, especially when these conditions are combined with copolymers mixtures. To improve ML performance...
The significance of synthetic foams as insulative materials stems from their mechanical and water resistance well cost-effectiveness. Broadly, the design building envelopes should also consider fire mold impacts on environment (end life compostability). This study addresses these issues considering ever-increasing demand for sustainable sources to develop highly porous materials. We introduce a versatile strategy based wet-foam laying cellulosic fibers that leads hierarchical structures...
Electromyogram (EMG) signal has been long used in human-robot interface literature, especially the area of rehabilitation. Recent rapid development artificial intelligence (AI) provided powerful machine learning tools to better explore rich information embedded EMG signals. For our specific application task this work, i.e. estimate human finger force based on signal, a LightGBM (Gradient Boosting Machine) model used. The main contribution study is an objective and automatic optimal feature...
Evolving computing technologies such as cloud, edge computing, and the Internet of Things (IoT) are creating a more complex, dispersed, dynamic enterprise operational environment. New security architectures those based on concept Zero Trust (ZT) emerging to meet challenges posed by these changes. ZT systems treat internal external networks untrusted subject both same checking control prevent data breaches limit lateral movement. Context awareness is notion from field ubiquitous that used...
Moisture-driven actuators featuring programmable stimuli-responsiveness and a rapid response have garnered substantial research attention. Cellulose-based face challenges, including prolonged unstable responsiveness, along with inadequate interfacial bonding. Herein, we developed bilayer structured moisture actuator by integrating multiscale cellulose fibers chitosan. The protonated chitosan forms strong electrostatic attractions negatively charged nanofibrils (CNF), achieving robust...
Ethereum is a promising but revolutionary blockchain approach to support rich computational services enabled by Turing-complete instructions, also known as smart contract. Using contract "back-end", any party can publish its Decentralized Applications (DApps) available all Internet users. In other words, and enable evolving existing applications decentralised versions. With the developments of versatile applications, QoS requirements be very different. For example, new-age such AR/VR quite...
Content replication and name-based routing lead to a natural multi-source multipath transmission paradigm in NDN. Due the unique connectionless characteristic of NDN, current end-to-end congestion control schemes (e.g. MPTCP) cannot be used directly on This paper proposes Network Utility Maximization (NUM) model formulate NDN with in-network caches. From this model, family receiver-driven solutions can derived, named as path-specified control. The enables content consumers separate traffic...
Deep learning techniques have been widely adopted for cyber defence applications such as malware detection and anomaly detection. The ever-changing nature of threats has made a constantly evolving field. Smart manufacturing is critical to the broader thrust towards Industry 4.0 5.0. Developing advanced technologies in smart requires enabling paradigm shift manufacturing, while cyber-attacks significantly threaten manufacturing. For example, attack (e.g., backdoor) occurs during model's...
Threat intelligence sharing is posited as an important aid to help counter cybersecurity attacks and a number of threat communities exist. There general consensus that many challenges remain be overcome achieve fully effective sharing, including concerns about privacy, negative publicity, policy/legal issues expense amongst others. One recent trend undertaken address this the use decentralized blockchain based architectures. However while these platforms can increase effectiveness they do...
Deep Learning (DL) models deliver superior performance and have achieved remarkable results for classification vision tasks. However, recent research focuses on exploring these Neural Networks (DNNs) weaknesses as can be vulnerable due to transfer learning outsourced training data. This paper investigates the feasibility of generating a stealthy invisible backdoor attack during phase deep models. For developing poison dataset, an interpolation technique is used corrupt sub-feature space...
Deep neural networks are susceptible to various backdoor attacks, such as training time where the attacker can inject a trigger pattern into small portion of dataset control model's predictions at runtime. Backdoor attacks dangerous because they do not degrade performance. This paper explores feasibility new type attack, <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">data-free</i> backdoor. Unlike traditional that require poisoning data and...