Stephen Hailes

Affiliations:
  • University College of London, UK


According to our database1, Stephen Hailes authored at least 118 papers between 1991 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Identifying vulnerabilities of industrial control systems using evolutionary multiobjective optimisation.
Comput. Secur., February, 2024

Moral Alignment for LLM Agents.
CoRR, 2024

Partial Information Decomposition for Data Interpretability and Feature Selection.
CoRR, 2024

Large Language Models are Effective Priors for Causal Graph Discovery.
CoRR, 2024

Graph Reinforcement Learning for Combinatorial Optimization: A Survey and Unifying Perspective.
CoRR, 2024

Dynamics of Moral Behavior in Heterogeneous Populations of Learning Agents.
CoRR, 2024

Information-Theoretic State Variable Selection for Reinforcement Learning.
CoRR, 2024

Trust-based Consensus in Multi-Agent Reinforcement Learning Systems.
Proceedings of the 1st Reinforcement Learning Conference, 2024

2023
Learning Machine Morality through Experience and Interaction.
CoRR, 2023

Tree Search in DAG Space with Model-based Reinforcement Learning for Causal Discovery.
CoRR, 2023

Socio-Technical Security Modelling: Analysis of State-of-the-Art, Application, and Maturity in Critical Industrial Infrastructure Environments/Domains.
CoRR, 2023

Exploring the Security Culture of Operational Technology (OT) Organisations: the Role of External Consultancy in Overcoming Organisational Barriers.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

Modeling Moral Choices in Social Dilemmas with Multi-Agent Reinforcement Learning.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

2022
Graph Neural Modeling of Network Flows.
CoRR, 2022

Improving the Cybersecurity of Critical National Infrastructure using Modelling and Simulation.
CoRR, 2022

Dynamic Network Reconfiguration for Entropy Maximization Using Deep Reinforcement Learning.
Proceedings of the Learning on Graphs Conference, 2022

Correlating Vibration Patterns to Perception of Tactile Information for Long-Term Prosthetic Limb Use and Continued Rehabilitation of Neuropathic Pain.
Proceedings of the International Conference on Rehabilitation Robotics, 2022

Who Watches the Watchers: A Multi-Task Benchmark for Anomaly Detection.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Security Culture in Industrial Control Systems Organisations: A Literature Review.
Proceedings of the Human Aspects of Information Security and Assurance, 2022

An AI -Based Model for Texture Classification from Vibrational Feedback: Towards Development of Self-Adapting Sensory Robotic Prosthesis.
Proceedings of the 9th IEEE RAS/EMBS International Conference for Biomedical Robotics and Biomechatronics, 2022

2021
Planning Spatial Networks.
CoRR, 2021

Solving Graph-based Public Good Games with Tree Search and Imitation Learning.
CoRR, 2021

Solving Graph-based Public Goods Games with Tree Search and Imitation Learning.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Cooperation and Reputation Dynamics with Reinforcement Learning.
Proceedings of the AAMAS '21: 20th International Conference on Autonomous Agents and Multiagent Systems, 2021

2020
Improving the Robustness of Graphs through Reinforcement Learning and Graph Neural Networks.
CoRR, 2020

An Investigation into the Dissipation of Vibrations Using Electromyography towards the Development of Self-Adapting Robotic Prosthesis.
Proceedings of the 8th IEEE RAS/EMBS International Conference for Biomedical Robotics and Biomechatronics, 2020

Partner Selection for the Emergence of Cooperation in Multi-Agent Systems Using Reinforcement Learning.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Hand-Eye Calibration With a Remote Centre of Motion.
IEEE Robotics Autom. Lett., 2019

Understanding The Impact of Partner Choice on Cooperation and Social Norms by means of Multi-agent Reinforcement Learning.
CoRR, 2019

2018
CHESS - Calibrating the Hand-Eye Matrix With Screw Constraints and Synchronization.
IEEE Robotics Autom. Lett., 2018

Online Collective Animal Movement Activity Recognition.
CoRR, 2018

Playground Social Interaction Analysis using Bespoke Wearable Sensors for Tracking and Motion Capture.
Proceedings of the 5th International Conference on Movement and Computing, 2018

2017
Evolving attackers against wireless sensor networks using genetic programming.
IET Wirel. Sens. Syst., 2017

UAV-based SLAM and 3D reconstruction system.
Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics, 2017

2016
Hand-eye calibration for robotic assisted minimally invasive surgery without a calibration object.
Proceedings of the 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2016

Evolving Attackers against Wireless Sensor Networks.
Proceedings of the Genetic and Evolutionary Computation Conference, 2016

Street rehab: Linking accessibility and rehabilitation.
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016

Real-Time Stochastic Optimal Control for Multi-Agent Quadrotor Systems.
Proceedings of the Twenty-Sixth International Conference on Automated Planning and Scheduling, 2016

2015
Real-Time Stochastic Optimal Control for Multi-agent Quadrotor Swarms.
CoRR, 2015

Covert channel attacks in pervasive computing.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communications, 2015

A comparison between smartphone sensors and bespoke sensor devices for wheelchair accessibility studies.
Proceedings of the Tenth IEEE International Conference on Intelligent Sensors, 2015

2014
Policy-enabled internet of things deployable platforms for vaccine cold chains.
Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, 2014

Bi-scale temporal sampling strategy for traffic-induced pollution data with Wireless Sensor Networks.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

Simulating quadrotor UAVs in outdoor scenarios.
Proceedings of the 2014 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2014

2013
Advances in base- and mobile-station aided cooperative wireless communications: An overview.
IEEE Veh. Technol. Mag., 2013

Bias adjustment of spatially-distributed wireless pollution sensors for environmental studies in India.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

Poster abstract: exploiting nonlinear data similarities-a multi-scale nearest-neighbor approach for adaptive sampling in wireless pollution sensor networks.
Proceedings of the 12th International Conference on Information Processing in Sensor Networks (co-located with CPS Week 2013), 2013

2012
Guest Editorial: Communications Challenges and Dynamics for Unmanned Autonomous Vehicles.
IEEE J. Sel. Areas Commun., 2012

Studying the impact of ubiquitous monitoring technology on office worker behaviours: The value of sharing research data.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Making sense of sensor data in practical wireless sensor network designs.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

2011
Mobile Networks and Applications (MONET) Special Issue on Sensor Systems and Software.
Mob. Networks Appl., 2011

Design and evaluation of an adaptive sampling strategy for a wireless air pollution sensor network.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Adaptive Bandwidth-Based Thread Group Scheduler for Compositional Real-Time Middleware Architectures.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

A wearable and flexible Bracelet computer for on-body sensing.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
Evolving the Internet Architecture Through Naming.
IEEE J. Sel. Areas Commun., 2010

Detecting interest cache poisoning in sensor networks using an artificial immune algorithm.
Appl. Intell., 2010

Temporal diversity in recommender systems.
Proceedings of the Proceeding of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, 2010

Practical Sensing for Sprint Parameter Monitoring.
Proceedings of the Seventh Annual IEEE Communications Society Conference on Sensor, 2010

A Lightweight Component-Based Reconfigurable Middleware Architecture and State Ontology for Fault Tolerant Embedded Systems.
Proceedings of the Sensor Systems and Software - Second International ICST Conference, 2010

Temporal Defenses for Robust Recommendations.
Proceedings of the Privacy and Security Issues in Data Mining and Machine Learning, 2010

Stride information monitoring and sensing in sports.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Sensing for Stride Information of Sprinters.
Proceedings of the Wireless Sensor Networks, 7th European Conference, 2010

Towards Precise Synchronisation in Wireless Sensor Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

MIREA: Component-based middleware for reconfigurable, embedded control applications.
Proceedings of the 2010 IEEE International Symposium on Intelligent Control, 2010

2009
ILNP: mobility, multi-homing, localised addressing and security through naming.
Telecommun. Syst., 2009

Experiences from the Public Safety Arena for the Future Internet.
ERCIM News, 2009

Temporal collaborative filtering with adaptive neighbourhoods.
Proceedings of the 32nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2009

Towards Understanding the Requirements and Limitations of Reputation-Based Systems.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

A component-based architecture for cognitive radio resource management.
Proceedings of the 4th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2009

2008
Optimal forwarding for wireless ad hoc networks with game theory.
Int. J. Auton. Adapt. Commun. Syst., 2008

The effect of correlation coefficients on communities of recommenders.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

kNN CF: a temporal social network.
Proceedings of the 2008 ACM Conference on Recommender Systems, 2008

On-body wireless inertial sensing foot control applications.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Load Sharing and Bandwidth Control in Mobile P2P Wireless Sensor Networks.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

Cooperative packet relaying model for wireless ad hoc networks.
Proceedings of the 1st ACM International Workshop on Foundations of Wireless Ad Hoc and Sensor Networking and Computing, 2008

Knowledge Management for the Protection of Information in Electronic Medical Records.
Proceedings of the eHealth Beyond the Horizon, 2008

Trust-Based Collaborative Filtering.
Proceedings of the Trust Management II, 2008

Designing incentive packet relaying strategies for wireless ad hoc networks with game theory.
Proceedings of the Wireless Sensor and Actor Networks II, 2008

MobiRate: making mobile raters stick to their word.
Proceedings of the UbiComp 2008: Ubiquitous Computing, 10th International Conference, 2008

Analysis of Wireless Inertial Sensing for Athlete Coaching Support.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Analysis of Packet Relaying Models and Incentive Strategies in Wireless Ad Hoc Networks with Game Theory.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Sensor Cube: A Modular, Ultra-Compact, Power-Aware Platform for Sensor Networks.
Inf. Media Technol., 2007

A Component-Based Approach to the Design of Networked Control Systems.
Eur. J. Control, 2007

Distributed computation in wireless ad hoc grids with bandwidth control.
Proceedings of the 5th International Conference on Embedded Networked Sensor Systems, 2007

Private distributed collaborative filtering using estimated concordance measures.
Proceedings of the 2007 ACM Conference on Recommender Systems, 2007

A proposal for unifying mobility with multi-homing, NAT, & security.
Proceedings of the Fifth ACM International Workshop on Mobility Management & Wireless Access, 2007

TRULLO - local trust bootstrapping for ubiquitous devices.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Lightweight Distributed Trust Propagation.
Proceedings of the 7th IEEE International Conference on Data Mining (ICDM 2007), 2007

2006
EMMA: Epidemic Messaging Middleware for Ad hoc networks.
Pers. Ubiquitous Comput., 2006

STRUDEL: supporting trust in the dynamic establishment of peering coalitions.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Coalition-Based Peering for Flexible Connectivity.
Proceedings of the IEEE 17th International Symposium on Personal, 2006

MACE: adaptive component management middleware for ubiquitous systems.
Proceedings of the 4th International Workshop on Middleware for Pervasive and Ad-hoc Computing (MPAC 2006), held at the ACM/IFIP/USENIX 7th International Middleware Conference, November 27, 2006

TATA: Towards Anonymous Trusted Authentication.
Proceedings of the Trust Management, 4th International Conference, 2006

B-Trust: Bayesian Trust Framework for Pervasive Computing.
Proceedings of the Trust Management, 4th International Conference, 2006

Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm.
Proceedings of the Artificial Immune Systems, 5th International Conference, 2006

2005
Adaptive Routing for Intermittently Connected Mobile Ad Hoc Networks.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

MOTET: Mobile Transactions using Electronic Tickets.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

A summary of the complex behaviour from simple power conserving protocols.
Proceedings of the IEEE 16th International Symposium on Personal, 2005

2004
An ad hoc mobility model founded on social network theory.
Proceedings of the 7th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2004

Adapting asynchronous messaging middleware to ad hoc networking.
Proceedings of the 2nd Workshop on Middleware for Pervasive and Ad-hoc Computing, 2004

Adaptive resource discovery for ubiquitous computing.
Proceedings of the 2nd Workshop on Middleware for Pervasive and Ad-hoc Computing, 2004

Distributed Knowledge Management for Autonomous Access Control in Computer Networks.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Progressive coding for QoS-enabled streaming of dynamic 3-D meshes.
Proceedings of IEEE International Conference on Communications, 2004

An Access Control Model Based on Distributed Knowledge Management.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Proactive seamless mobility management for future IP radio access networks.
Comput. Commun., 2003

Optimally smooth error resilient streaming of 3D wireframe animations.
Proceedings of the Visual Communications and Image Processing 2003, 2003

Bringing security home: a process for developing secure and usable systems.
Proceedings of the New Security Paradigms Workshop 2003, 2003

The Case for Proactive Mobile IP.
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003

2002
Repair options for 3-D wireframe model animation sequences.
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002

A new audio skew detection and correction algorithm.
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002

2001
Operational and fairness issues with connection-less traffic over IEEE802.11b.
Proceedings of the IEEE International Conference on Communications, 2001

2000
Supporting Trust in Virtual Communities.
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 2000

1998
Power conservation strategy for mobile computers using load sharing.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 1998

1997
A distributed trust model.
Proceedings of the 1997 Workshop on New Security Paradigms, 1997

1992
Some Multimedia Traffic Characterization and Measurement Results.
Proceedings of the Computer Networks, 1992

1991
The design and implementation of Troy, a distributed object-based language.
PhD thesis, 1991


  Loading...