Browse by Aston Author

2025
Zhou, Mou, Li, Guobin, Shang, Changjing, Jin, Shangzhu, Lin, Jinle, Shen, Liang, Naik, Nitin, Peng, Jun and Shen, Qiang (2025). Adaptive Fuzzy Transformation for Abnormal Breast Mass Detection. Knowledge-Based Systems, 328 ,
Iam-On, Natthakan, Boongoen, Tossapon, Naik, Nitin and Yang, Longzhi (2025). Leveraging ensemble clustering for privacy-preserving data fusion:Analysis of big social-media data in tourism. Information Sciences, 686 ,
Maneerat, Tonkla, Iam-On, Natthakan, Boongoen, Tossapon, Kirimasthong, Khwunta, Naik, Nitin, Yang, Longzhi and Shen, Qiang (2025). Optimisation of multiple clustering based undersampling using artificial bee colony: Application to improved detection of obfuscated patterns without adversarial training. Information Sciences, 687 ,
2024
Naik, Ishita, Naik, Dishita and Naik, Nitin (2024). Artificial Intelligence (AI) Applications in Chemistry. IN: Contributions Presented at the 22nd UK Workshop on Computational Intelligence (UKCI 2023), September 6–8, 2023, Birmingham, UK. Naik, Nitin; Jenkins, Paul; Grace, Paul; Yang, Longzhi and Prajapat, Shaligram (eds) Advances in Computational Intelligence Systems . Springer.
Naik, Dishita and Naik, Nitin (2024). The Changing Landscape of Machine Learning: A Comparative Analysis of Centralized Machine Learning, Distributed Machine Learning and Federated Machine Learning. IN: Contributions Presented at the 22nd UK Workshop on Computational Intelligence (UKCI 2023), September 6–8, 2023, Birmingham, UK. Naik, Nitin; Jenkins, Paul; Grace, Paul; Yang, Longzhi and Pratapat, Shaligram (eds) Advances in Computational Intelligence Systems . Springer, Cham.
Naik, Ishita, Naik, Dishita and Naik, Nitin (2024). Demystifying the Working, Types, Benefits and Limitations of Chatbots. IN: Contributions Presented at the 22nd UK Workshop on Computational Intelligence (UKCI 2023), September 6–8, 2023, Birmingham, UK. Naik, Nitin; Jenkins, Paul; Grace, Paul; Yang, Longzhi and Prajapat, Shaligram (eds) Advances in Computational Intelligence Systems . Springer, Cham.
Naik, Dishita and Naik, Nitin (2024). An Introduction to Federated Learning: Working, Types, Benefits and Limitations. IN: Contributions Presented at the 22nd UK Workshop on Computational Intelligence (UKCI 2023), September 6–8, 2023, Birmingham, UK. Naik, Nitin; Jenkins, Paul; Grace, Paul; Yang, Longzhi and Prajapat, Shaligram (eds) Advances in Computational Intelligence Systems . Springer, Cham.
2023
Wang, Chen, Xu, Jian, Li, Jiarun, Dong, Yan and Naik, Nitin (2023). Outsourced Privacy-Preserving kNN Classifier Model Based on Multi-Key Homomorphic Encryption. Intelligent Automation & Soft Computing, 37 (2), pp. 1421-1436.
Elisa, Noe, Yang, Longzhi, Chao, Fei, Naik, Nitin and Boongoen, Tossapon (2023). A Secure and Privacy-Preserving E-Government Framework using Blockchain and Artificial Immunity. IEEE Access, 11 , pp. 8773-8789.
Tatongjai, Pongsakorn, Boongoen, Tossapon, Iam-On, Natthakan, Naik, Nitin and Yang, Longzhi (2023). Classification of Adversarial Attacks Using Ensemble Clustering Approach. Computers, Materials and Continua, 74 (2), pp. 2479-2498.
2022
Pimsarn, Chutipon, Boongoen, Tossapon, Iam-On, Natthakan, Naik, Nitin and Yang, Longzhi (2022). Strengthening intrusion detection system for adversarial attacks: improved handling of imbalance classification problem. Complex & Intelligent Systems, 8 (6), pp. 4863-4880.
Naik, Nitin, Grace, Paul, Jenkins, Paul, Naik, Kshirasagar and Song, Jingping (2022). An Evaluation of Potential Attack Surfaces Based on Attack Tree Modelling and Risk Matrix Applied to Self-Sovereign Identity. Computers & Security, 120 ,
Zhou, Mou, Shang, Changjing, Li, Guobin, Shen, Liang, Naik, Nitin, Jin, Shangzhu, Peng, Jun and Shen, Qiang (2022). Transformation-Based Fuzzy Rule Interpolation With Mahalanobis Distance Measures Supported by Choquet Integral. IEEE Transactions on Fuzzy Systems ,
2021
Naik, Nitin, Shang, Changjing, Jenkins, Paul and Shen, Qiang (2021). D-FRI-Honeypot:A Secure Sting Operation for Hacking the Hackers Using Dynamic Fuzzy Rule Interpolation. IEEE Transactions on Emerging Topics in Computational Intelligence, 5 (6), pp. 893-907.
Naik, Nitin, Jenkins, Paul, Savage, Nick, Yang, Longzhi, Boongoen, Tossapon and Iam-On, Natthakan (2021). Fuzzy-import hashing: A static analysis technique for malware detection. Forensic Science International: Digital Investigation, 37 ,
Naik, Nitin, Jenkins, Paul, Savage, Nick, Yang, Longzhi, Boongoen, Tossapon, Iam-On, Natthakan, Naik, Kshirasagar and Song, Jingping (2021). Embedded YARA rules:strengthening YARA rules utilising fuzzy hashing and fuzzy rules for malware analysis. Complex & Intelligent Systems, 7 , 687–702.
Naik, Nitin and Jenkins, Paul (2021). Your Identity is Yours: Take Back Control of Your Identity Using GDPR Compatible Self-Sovereign Identity. IN: Proceedings of 2020 7th IEEE International Conference on Behavioural and Social Computing, BESC 2020. GBR: IEEE.
Naik, Kshirasagar, Pandit, Tejas, Naik, Nitin and Shah, Parth (2021). Activity Recognition in Residential Spaces with Internet of Things Devices and Thermal Imaging. Sensors, 21 (3), pp. 1-37.
Naik, Nitin, Jenkins, Paul, Savage, Nick and Yang, Longzhi (2021). A computational intelligence enabled honeypot for chasing ghosts in the wires. Complex & Intelligent Systems, 7 , 477–494.
Albasir, Abdurhman, Hu, Qicheng, Naik, Kshirasagar and Naik, Nitin (2021). Unsupervised detection of security threats in cyberphysical system and IoT devices based on power fingerprints and RBM autoencoders. Journal of Surveillance, Security and Safety, 2 (1), pp. 1-25.
Naik, Nitin, Jenkins, Paul, Cooke, Roger, Gillett, Jonathan and Jin, Yaochu (2021). Evaluating Automatically Generated YARA Rules and Enhancing Their Effectiveness. IN: 2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020. 2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020 . AUS: IEEE.
Naik, Nitin, Jenkins, Paul, Savage, Nick, Yang, Longzhi, Naik, Kshirasagar, Song, Jingping, Boongoen, Tossapon and Iam-On, Natthakan (2021). Fuzzy Hashing Aided Enhanced YARA Rules for Malware Triaging. IN: 2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020. 2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020 . AUS: IEEE.
2020
Naik, Nitin and Jenkins, Paul (2020). Governing Principles of Self-Sovereign Identity Applied to Blockchain Enabled Privacy Preserving Identity Management Systems. IN: ISSE 2020 - 6th IEEE International Symposium on Systems Engineering, Proceedings. ISSE 2020 - 6th IEEE International Symposium on Systems Engineering, Proceedings . AUT: IEEE.
Naik, Nitin and Jenkins, Paul (2020). uPort Open-Source Identity Management System: An Assessment of Self-Sovereign Identity and User-Centric Data Platform Built on Blockchain. IN: ISSE 2020 - 6th IEEE International Symposium on Systems Engineering, Proceedings. ISSE 2020 - 6th IEEE International Symposium on Systems Engineering, Proceedings . AUT: IEEE.
Naik, Nitin, Jenkins, Paul, Savage, Nick, Yang, Longzhi, Naik, Kshirasagar and Song, Jingping (2020). Embedding Fuzzy Rules with YARA Rules for Performance Optimisation of Malware Analysis. IN: 2020 IEEE International Conference on Fuzzy Systems, FUZZ 2020 - Proceedings. IEEE International Conference on Fuzzy Systems . GBR: IEEE.
Naik, Nitin, Jenkins, Paul, Savage, Nick, Yang, Longzhi, Boongoen, Tossapon and Iam-On, Natthakan (2020). Fuzzy-import hashing:A malware analysis approach. IN: 2020 IEEE International Conference on Fuzzy Systems, FUZZ 2020 - Proceedings. IEEE International Conference on Fuzzy Systems . GBR: IEEE.
Naik, Nitin and Jenkins, Paul (2020). Self-Sovereign Identity Specifications: Govern Your Identity Through Your Digital Wallet using Blockchain Technology. IN: Proceedings - 2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2020. Proceedings - 2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2020 . GBR: IEEE.
Song, Jingping, Meng, Qingyu, Luo, Chenke, Naik, Nitin and Xu, Jian (2020). An immunization scheme for ransomware. Computers, Materials and Continua, 64 (2), pp. 1051-1061.
Naik, Nitin, Jenkins, Paul, Savage, Nick, Yang, Longzhi, Naik, Kshirasagar and Song, Jingping (2020). Augmented YARA Rules Fused with Fuzzy Hashing in Ransomware Triaging. IN: 2019 IEEE Symposium Series on Computational Intelligence, SSCI 2019. 2019 IEEE Symposium Series on Computational Intelligence, SSCI 2019 . CHN: IEEE.
Naik, Nitin, Jenkins, Paul, Gillett, Jonathan, Mouratidis, Haralambos, Naik, Kshirasagar and Song, Jingping (2020). Lockout-Tagout Ransomware:A Detection Method for Ransomware using Fuzzy Hashing and Clustering. IN: 2019 IEEE Symposium Series on Computational Intelligence, SSCI 2019. 2019 IEEE Symposium Series on Computational Intelligence, SSCI 2019 . CHN: IEEE.
2019
Naik, Nitin and Shen, Qiang (2019). Integration of Interpolation and Inference with Multi-antecedent Rules. IN: Advances in Computational Intelligence Systems - Contributions Presented at the 19th UK Workshop on Computational Intelligence, 2019. Advances in Intelligent Systems and Computing . GBR: Springer.
2018
Naik, Nitin (2018). LPWAN technologies for IoT systems: choice between ultra narrow band and spread spectrum. IN: 2018 IEEE International Systems Engineering Symposium (ISSE). ITA: IEEE.
2017
Naik, Nitin, Diao, Ren and Shen, Qiang (2017). Dynamic fuzzy rule interpolation and its application to intrusion detection. IEEE Transactions on Fuzzy Systems, 26 (4), pp. 1878-1892.
Naik, Nitin (2017). Choice of effective messaging protocols for IoT systems: MQTT, CoAP, AMQP and HTTP. IN: 2017 IEEE International Systems Engineering Symposium (ISSE). AUT: IEEE.
Naik, Nitin (2017). Docker container-based big data processing system in multiple clouds for everyone. IN: 2017 IEEE International Systems Engineering Symposium (ISSE). AUT: IEEE.
Naik, Nitin, Jenkins, Paul and Newell, David (2017). Choice of suitable Identity and Access Management standards for mobile computing and communication. IN: Proceedings of the 24th International Conference on Telecommunications. Proceedings of the 24th International Conference on Telecommunications: Intelligence in Every Form, ICT 2017 . CYP: IEEE.
Naik, Nitin and Jenkins, Paul (2017). Securing digital identities in the cloud by selecting an apposite federated identity management from SAML, OAuth and OpenID Connect. IN: 11th IEEE International Conference on Research Challenges in Information Science (RCIS). 2017 11th International Conference on Research Challenges in Information Science (RCIS) . GBR: IEEE.
Naik, Nitin (2017). Software CROWD-Sourcing. IN: 11th IEEE International Conference on Research Challenges in Information Science (RCIS). 2017 11th International Conference on Research Challenges in Information Science (RCIS) . GBR: IEEE.
Naik, Nitin, Jenkins, Paul, Davies, Philip and Newell, David (2017). Native Web Communication Protocols and Their Effects on the Performance of Web Services and Systems. IN: 2016 IEEE International Conference on Computer and Information Technology (CIT). FJI: IEEE.
2016
Naik, Nitin (2016). Flooded streets — A crowdsourced sensing system for disaster response: A case study. IN: 2016 IEEE International Symposium on Systems Engineering (ISSE). GBR: IEEE.
Naik, Nitin and Jenkins, Paul (2016). An Analysis of Open Standard Identity Protocols in Cloud Computing Security Paradigm. IN: Proceedings - 2016 IEEE 14th International Conference on Dependable, Autonomic and Secure Computing (DASC). Proceedings - 2016 IEEE 14th International Conference on Dependable, Autonomic and Secure Computing, DASC . NZL: IEEE.
Naik, Nitin and Jenkins, Paul (2016). Web Protocols and Challenges of Web Latency in the Web of Things. IN: 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN). 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN) . AUT: IEEE.
Naik, Nitin and Jenkins, Paul (2016). A Secure Mobile Cloud Identity: Criteria for Effective Identity and Access Management Standards. IN: 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud). GBR: IEEE.
Naik, Nitin (2016). Crowdsourcing, Open-sourcing, Outsourcing and Insourcing Software Development: A Comparative Analysis. IN: 2016 IEEE Symposium on Service-Oriented System Engineering (SOSE). GBR: IEEE.