Skip to main content

Matthew Leeke

matthew.jpg




Telephone:
+44 24 7652 3366
E-mail: matthew.leeke@warwick.ac.uk

ACM Member, BCS Member, CAS Member, HEA Fellow, IEEE Member, Turing Fellow

TEACHING

RESEARCH

Context privacy; Dependable software design; Software analysis and testing; Wireless sensor networks

PUBLICATIONS

  • Bradbury, M. and Jhumka, A. and Leeke, M. (2018) Hybrid Online Protocols for Source Location Privacy in Wireless Sensor Networks. Journal of Parallel and Distributed Computing. ISSN: 0743-7315.
  • Fairbrother, J. and Leeke, M. (2017) On Basis Sets Variables for Efficient Error Detection. In: 15th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC'17), 6-11th November, 2017, Florida, USA.
  • Leeke, M. (2017) Simultaneous Fault Models for the Generation of Efficient Error Detection Mechanisms. In: 22nd International Symposium on Software Reliability Engineering (ISSRE’17), 23rd–26th October, 2017, Toulouse, France.
  • Laikin, J. and Bradbury, M. and Gu, C. and Leeke, M. (2016) Towards Fake Sources for Source Location Privacy in Wireless Sensor Networks with Multiple Sources. In: 15th IEEE International Conference on Communication Systems (ICCS'16), 14-16th December, Shenzhen, China.
  • Gu, C. and Bradbury, M. and Jhumka, A. and Leeke, M. (2015) Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks. In: 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC'15), 18-20th November 2015, Zhangjiajie, China.
  • Bradbury, M. and Jhumka, A. and Leeke, M. (2015) A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks. In: 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM'15), 22-24th August 2015, Helsinki, Finland.
  • Jhumka, A. and Bradbury, M. and Leeke, M. (2015) Fake Source-based Source Location Privacy in Wireless Sensor Networks, Concurrency and Computation: Practice and Experience. ISSN 1532-0634.
  • Marchant, J. Griffiths, N. and Leeke, M. Convention Emergence and Influence in Dynamic Topologies, In Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems, (AA- MAS’15), May 4th, 2015, Istanbul, Turkey
  • Marchant, J. and Griffiths, N and Leeke, M. (2015) Manipulating conventions in a particle-based topology. In: 10th Coordination, Organizations, Institutions and Norms in Agent Systems Workshop at 12th International Conference on Autonomous Agents and Multiagent Systems (AAMAS'15), 4-5th May 2015, Istanbul, Turkey.
  • Thomason, A. and Griffiths, N. and Leeke, M. (2014) Extracting Meaningful User Locations from Temporally Annotated Geospatial Data, In: International Conference on Mobility and Smart Cities (Mobility-IoT'14), 27-28th October 2014, Rome, Italy.
  • Thomason, A. and Leeke, M. and Griffiths, N. (2014) Understanding the Impact of Data Sparsity and Duration for Location Prediction Applications, In: International Conference on Mobility and Smart Cities (Mobility-IoT'14), 27-28th October 2014, Rome, Italy.
  • Coetzee, P. and Leeke, M. and Jarvis, S. (2014) Towards Unified Secure On- and Off-Line Analytics at Scale, Parallel Computing, 40 (10). pp.738-753.
  • Marchant, J. and Griffiths, N. and Leeke, M. (2014) Destabilising Conventions: Characterising the Cost, In: 8th IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO'14), 2014, London, United Kingdom.
  • Marchant, J. and Griffiths, N. and Leeke, M. and Franks, H. Destabilising Conventions using Temporary Interventions, In: 17th International Workshop on Coordination, Organisations, Institutions and Norms (COIN’14) - co-located with the 13th International Conference on Autonomous Agents and Multiagent Systems (AAMAS’14), 2014, Paris, France.
  • Thomason, A. and Leeke, M. and Jhumka, A. and Bradbury, M. (2013) Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy, In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM’13), July 16-18th, 2013, Melbourne, Australia.
  • Leeke, M. and Jhumka, A. and Anand, S.S. (2013) Towards the Design of Efficient Error Detection Mechanisms for Transient Data Errors. The Computer Journal, 56 (6). pp.674–692.
  • Jhumka, A. and Bradbury, M. and Leeke, M. (2012) Towards Understanding Source Location Privacy in Wireless Sensor Networks Through Fake Sources. In: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM'12), 25-27th June 2012, Liverpool, UK.
  • Jhumka, A. and Leeke, M. (2011) The Early Identification of Detector Locations in Dependable Software. In: 22nd International Symposium on Software Reliability Engineering (ISSRE'11), November 29th-December 2nd 2011, Hiroshima, Japan.
  • Leeke, M. and Arif, S. and Jhumka, A. and Anand, S.S. (2011) A Methodology for the Generation of Efficient Error Detection Mechanisms. In: 41st IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'11), 27th-30th June 2011, Hong Kong, China.
  • Jhumka, A. and Leeke, M. and Shrestha, S. (2011) On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy. The Computer Journal, 54 (6). pp.860-874.
  • Leeke, M. and Jhumka, A. (2010) Towards Understanding the Importance of Variables in Dependable Software, In: 8th European Dependable Computing Conference (EDCC'10), April 28th, 2010, Valencia, Spain.
  • Jhumka, A. and Leeke, M. (2009) Issues on the Design of Efficient Fail-safe Fault Tolerance, In: 20th IEEE International Symposium on Software Reliability Engineering (ISSRE'09), November 18th, 2009, Bengaluru-Mysuru, India.
  • Leeke, M. and Jhumka, A. (2009) Evaluating the Use of Reference Run Models in Fault Injection Analysis, In: 15th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC'09), November 16th, 2009, Shanghai, China.