Publications

523 result(s)
Predicting emotion from music videos: exploring the relative contribution of visual and auditory information to affective responses
Chua, P., Makris, D., Herremans, D., Roig, G., & Agres, K., 2022, arXiv:2202.10453, https://arxiv.org/abs/2202.10453
MusIAC: An extensible generative framework for Music Infilling Application with multi-level Control
Guo R, Simpton I, Kiefer C, Magnusson T, Herremans D, 2022, Proceedings of EvoMUSART, https://arxiv.org/abs/2202.05528
Conditional Drums Generation using Compound Word Representations
Makris D, Guo Z, Kaliakatsos-Papakostas N, Herremans D, 2022, Proceedings of EvoMUSART, Lecture Notes in Computer Science, Vol 13221, Springer, https://arxiv.org/abs/2202.04464
Evaluating Blockchain Protocols with Abusive Modeling
Vishal Sharma, Pawel Szalachowski, and Jianying Zhou, 2022, ACM Asia Conference on Computer and Communications Security (AsiaCCS’22)
Steps Before Syntax: Helping Novice Programmers Solve Problems using the PCDIT Framework
Kurniawan, Oka, Jégourel, Cyrille, Lee, Norman Tiong Seng, De Mari, Matthieu, Poskitt, Christopher M.Proc, 2022, Conference on Software Engineering Education and Training (CSEE&T’22): Special Track of Hawaii International Conference on System Sciences (HICSS’22), 982–991, https://scholarspace.manoa.hawaii.edu/items/36a304be-64cb-4f0d-a40b-959fb8525b1d
An 8-bit In Resistive Memory Computing Core with Regulated Passive Neuron and Bit Line Weight Mapping
Y. Zhang, K. Huang, R. Xiao, B. Wang, Y. Xu, J. Fan, and H. Shen, 2022, IEEE Transactions on Very Large Scale Integration Systems
Computational Assemblies: Analysis, Design and Fabrication
Peng Song, Ziqi Wang, and Marco Livesu, 2022, Eurographics, Tutorial, accepted
Hacker types, motivations and strategies: A comprehensive framework
Chng, Samuel., Lu, Han Yu., Kumar, Ayush., & Yau, David, 2022, Hacker types, motivations and strategies: A comprehensive framework. Computers in Human Behavior Reports, 5, 100167, http://doi.org/10.1016/j.chbr.2022.100167
PLCrypto: A Symmetric Cryptographic Library for Programmable Logic Controllers
Zheng Yang, Zhiting Bao, Chenglu Jin, Zhe Liu, and Jianying Zhou, 2022, Fast Software Encryption Conference (FSE’22)
Time Delay Attack Detection using Recurrent Variational Autoencoder and K-means Clustering
S. Ghahremani, D.K.Y. Yau, J. Albrethsen, R. Kaur, N.M. Cheung, 2021, “Time Delay Attack Detection using Recurrent Variational Autoencoder and K-means Clustering” , IEEE Innovative Smart Grid Technologies (ISGT), Brisbane, Australia