default search action
Matthew Leeke
Person information
- affiliation: University of Warwick, Coventry, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c24]Zhihao Dai, Ligang He, Shuang-Hua Yang, Matthew Leeke:
Revealing Ongoing Sensor Attacks in Industrial Control System Via Setpoint Modification. DASC/PiCom/CBDCom/CyberSciTech 2023: 191-199 - 2022
- [c23]Zhihao Dai, Matthew Leeke, Yulong Ding, Shuanghua Yang:
A Heterogeneous Redundant Architecture for Industrial Control System Security. PRDC 2022: 89-97 - [c22]Joe Hewett, Mark Etman, Robbie Marseglia, Tomas Mella Pickersgill, Matthew Leeke:
Towards a Dependable Energy Market: Proof of Authority in a Blockchain-based Peer-to-Peer Microgrid. PRDC 2022: 109-118 - [c21]Joe Hewett, Matthew Leeke:
Developing a GPT-3-Based Automated Victim for Advance Fee Fraud Disruption. PRDC 2022: 205-211 - 2021
- [c20]Matthew Leeke:
Reducing Model Complexity and Cost in the Generation of Efficient Error Detection Mechanisms. DASC/PiCom/CBDCom/CyberSciTech 2021: 26-34 - 2020
- [j7]Matthew Leeke:
Simultaneous Fault Models for the Generation and Location of Efficient Error Detection Mechanisms. Comput. J. 63(5): 758-773 (2020) - [j6]Huanzhou Zhu, Ligang He, Matthew Leeke, Rui Mao:
WolfGraph: The edge-centric graph processing on GPU. Future Gener. Comput. Syst. 111: 552-569 (2020) - [c19]Alistair Robinson, Frederick Brown, Nathan Hall, Alex Jackson, Graham Kemp, Matthew Leeke:
CASTLEGUARD: Anonymised Data Streams with Guaranteed Differential Privacy. DASC/PiCom/CBDCom/CyberSciTech 2020: 577-584
2010 – 2019
- 2018
- [j5]Matthew Bradbury, Arshad Jhumka, Matthew Leeke:
Hybrid online protocols for source location privacy in wireless sensor networks. J. Parallel Distributed Comput. 115: 67-81 (2018) - 2017
- [c18]Jake Fairbrother, Matthew Leeke:
On Basis Variables for Efficient Error Detection. DASC/PiCom/DataCom/CyberSciTech 2017: 399-406 - [c17]Matthew Leeke:
Simultaneous Fault Models for the Generation of Efficient Error Detection Mechanisms. ISSRE 2017: 112-123 - 2016
- [c16]Joanna F. Laikin, Matthew Bradbury, Chen Gu, Matthew Leeke:
Towards fake sources for source location privacy in wireless sensor networks with multiple sources. ICCS 2016: 1-6 - 2015
- [j4]Arshad Jhumka, Matthew Bradbury, Matthew Leeke:
Fake source-based source location privacy in wireless sensor networks. Concurr. Comput. Pract. Exp. 27(12): 2999-3020 (2015) - [c15]James Marchant, Nathan Griffiths, Matthew Leeke:
Convention Emergence and Influence in Dynamic Topologies. AAMAS 2015: 1785-1786 - [c14]Chen Gu, Matthew Bradbury, Arshad Jhumka, Matthew Leeke:
Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks. PRDC 2015: 99-108 - [c13]Matthew Bradbury, Matthew Leeke, Arshad Jhumka:
A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks. TrustCom/BigDataSE/ISPA (1) 2015: 531-538 - 2014
- [j3]Peter Coetzee, Matthew Leeke, Stephen A. Jarvis:
Towards unified secure on- and off-line analytics at scale. Parallel Comput. 40(10): 738-753 (2014) - [c12]James Marchant, Nathan Griffiths, Matthew Leeke, Henry Franks:
Destabilising Conventions Using Temporary Interventions. COIN@AAMAS/PRICAI 2014: 148-163 - [c11]Alasdair Thomason, Nathan Griffiths, Matthew Leeke:
Extracting Meaningful User Locations from Temporally Annotated Geospatial Data. IoT360 (2) 2014: 84-90 - [c10]Alasdair Thomason, Matthew Leeke, Nathan Griffiths:
Understanding the Impact of Data Sparsity and Duration for Location Prediction Applications. IoT360 (2) 2014: 192-197 - [c9]James Marchant, Nathan Griffiths, Matthew Leeke:
Destabilising Conventions: Characterising the Cost. SASO 2014: 139-144 - 2013
- [j2]Matthew Leeke, Arshad Jhumka, Sarabjot Singh Anand:
Towards the Design of Efficient Error Detection Mechanisms for Transient Data Errors. Comput. J. 56(6): 674-692 (2013) - [c8]Alasdair Thomason, Matthew Leeke, Matthew Bradbury, Arshad Jhumka:
Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy. TrustCom/ISPA/IUCC 2013: 667-674 - 2012
- [c7]Arshad Jhumka, Matthew Bradbury, Matthew Leeke:
Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources. TrustCom 2012: 760-768 - 2011
- [b1]Matthew Leeke:
Towards the design of efficient error detection mechanisms. University of Warwick, Coventry, UK, 2011 - [j1]Arshad Jhumka, Matthew Leeke, Sambid Shrestha:
On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy. Comput. J. 54(6): 860-874 (2011) - [c6]Adam P. Chester, Matthew Leeke, Mohammad A. Alghamdi, Arshad Jhumka, Stephen A. Jarvis:
A Framework for Data Center Scale Dynamic Resource Allocation Algorithms. CIT 2011: 67-74 - [c5]Matthew Leeke, Saima Arif, Arshad Jhumka, Sarabjot Singh Anand:
A methodology for the generation of efficient error detection mechanisms. DSN 2011: 25-36 - [c4]Arshad Jhumka, Matthew Leeke:
The Early Identification of Detector Locations in Dependable Software. ISSRE 2011: 40-49 - 2010
- [c3]Matthew Leeke, Arshad Jhumka:
Towards Understanding the Importance of Variables in Dependable Software. EDCC 2010: 85-94
2000 – 2009
- 2009
- [c2]Arshad Jhumka, Matthew Leeke:
Issues on the Design of Efficient Fail-Safe Fault Tolerance. ISSRE 2009: 155-164 - [c1]Matthew Leeke, Arshad Jhumka:
Evaluating the Use of Reference Run Models in Fault Injection Analysis. PRDC 2009: 121-124
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint