default search action
BibTeX records: Suranga Seneviratne
@inproceedings{DBLP:conf/wowmom/MadarasinghaDTS25, author = {Chamara Madarasingha and Thilini Dahanayaka and Kanchana Thilakarathna and Suranga Seneviratne and Young Choon Lee and Salil S. Kanhere and Albert Y. Zomaya and Aruna Seneviratne and Phil Ridley}, title = {Demo: {P4} Based In-network {ML} with Federated Learning to Secure and Slice IoT Networks}, booktitle = {25th {IEEE} International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2024, Perth, Australia, June 4-7, 2024}, pages = {304--306}, publisher = {{IEEE}}, year = {2025}, url = {https://doi.org/10.1109/WoWMoM60985.2024.00056}, doi = {10.1109/WOWMOM60985.2024.00056}, timestamp = {Tue, 16 Jul 2024 15:16:13 +0200}, biburl = {https://dblp.org/rec/conf/wowmom/MadarasinghaDTS25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/RashidDHS24, author = {Fariza Rashid and Ben Doyle and Soyeon Caren Han and Suranga Seneviratne}, title = {Phishing {URL} detection generalisation using Unsupervised Domain Adaptation}, journal = {Comput. Networks}, volume = {245}, pages = {110398}, year = {2024}, url = {https://doi.org/10.1016/j.comnet.2024.110398}, doi = {10.1016/J.COMNET.2024.110398}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/RashidDHS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/GunawardenaJSMK24, author = {Ravin Gunawardena and Sandani Jayawardena and Suranga Seneviratne and Rahat Masood and Salil S. Kanhere}, title = {Single-Sensor Sparse Adversarial Perturbation Attacks Against Behavioral Biometrics}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {16}, pages = {27303--27321}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2024.3401101}, doi = {10.1109/JIOT.2024.3401101}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/GunawardenaJSMK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/BogahawattaHKST24, author = {Niruth Bogahawatta and Gerry How and Yasiru Karunanayake and Suranga Seneviratne and Kanchana Thilakarathna and Salil Kahere and Rahat Masood and Aruna Seneviratne}, title = {{DEMO} : Passive Identification of WiFi Devices in Real-Time}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2024 Conference: Posters and Demos, Sydney, NSW, Australia, August 4-8, 2024}, pages = {92--94}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3672202.3673716}, doi = {10.1145/3672202.3673716}, timestamp = {Thu, 08 Aug 2024 10:47:09 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/BogahawattaHKST24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/MadarasinghaDTS24, author = {Chamara Madarasingha and Thilini Dahanayaka and Kanchana Thilakarathna and Suranga Seneviratne and Young Choon Lee and Salil S. Kanhere and Aruna Seneviratne and Phil Ridley}, title = {Demo: P4Xtnd: {P4} Programmability on Resource Constrained Environments with Extended Network Functionalities}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2024 Conference: Posters and Demos, Sydney, NSW, Australia, August 4-8, 2024}, pages = {104--106}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3672202.3673731}, doi = {10.1145/3672202.3673731}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/MadarasinghaDTS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-05219, author = {Naveen Karunanayake and Ravin Gunawardena and Suranga Seneviratne and Sanjay Chawla}, title = {Out-of-Distribution Data: An Acquaintance of Adversarial Examples - {A} Survey}, journal = {CoRR}, volume = {abs/2404.05219}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.05219}, doi = {10.48550/ARXIV.2404.05219}, eprinttype = {arXiv}, eprint = {2404.05219}, timestamp = {Wed, 15 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-05219.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-15593, author = {Charika De Alvis and Suranga Seneviratne}, title = {A Survey of Deep Long-Tail Classification Advancements}, journal = {CoRR}, volume = {abs/2404.15593}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.15593}, doi = {10.48550/ARXIV.2404.15593}, eprinttype = {arXiv}, eprint = {2404.15593}, timestamp = {Mon, 03 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-15593.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2407-07421, author = {Tung{-}Anh Nguyen and Long Tan Le and Tuan Dung Nguyen and Wei Bao and Suranga Seneviratne and Choong Seon Hong and Nguyen Hoang Tran}, title = {Federated {PCA} on Grassmann Manifold for IoT Anomaly Detection}, journal = {CoRR}, volume = {abs/2407.07421}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2407.07421}, doi = {10.48550/ARXIV.2407.07421}, eprinttype = {arXiv}, eprint = {2407.07421}, timestamp = {Fri, 16 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2407-07421.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2407-14565, author = {Dishanika Denipitiyage and B. Silva and K. Gunathilaka and Suranga Seneviratne and Anirban Mahanti and Aruna Seneviratne and Sanjay Chawla}, title = {Detecting and Characterising Mobile App Metamorphosis in Google Play Store}, journal = {CoRR}, volume = {abs/2407.14565}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2407.14565}, doi = {10.48550/ARXIV.2407.14565}, eprinttype = {arXiv}, eprint = {2407.14565}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2407-14565.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/DahanayakaGHJS23, author = {Thilini Dahanayaka and Yasod Ginige and Yi Huang and Guillaume Jourjon and Suranga Seneviratne}, title = {Robust open-set classification for encrypted traffic fingerprinting}, journal = {Comput. Networks}, volume = {236}, pages = {109991}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109991}, doi = {10.1016/J.COMNET.2023.109991}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/DahanayakaGHJS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/NguyenKWSH23, author = {Tham Nguyen and Naveen Karunanayake and Sicong Wang and Suranga Seneviratne and Peizhao Hu}, title = {Privacy-preserving spam filtering using homomorphic and functional encryption}, journal = {Comput. Commun.}, volume = {197}, pages = {230--241}, year = {2023}, url = {https://doi.org/10.1016/j.comcom.2022.11.002}, doi = {10.1016/J.COMCOM.2022.11.002}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/NguyenKWSH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/prl/HuangLJSTCWX23, author = {Yi Huang and Ying Li and Guillaume Jourjon and Suranga Seneviratne and Kanchana Thilakarathna and Adriel Cheng and Darren Webb and Richard Yi Da Xu}, title = {Calibrated reconstruction based adversarial autoencoder model for novelty detection}, journal = {Pattern Recognit. Lett.}, volume = {169}, pages = {50--57}, year = {2023}, url = {https://doi.org/10.1016/j.patrec.2023.03.026}, doi = {10.1016/J.PATREC.2023.03.026}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/prl/HuangLJSTCWX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/WangDJS23, author = {Yiyan Wang and Thilini Dahanayaka and Guillaume Jourjon and Suranga Seneviratne}, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {{POSTER:} Performance Characterization of Binarized Neural Networks in Traffic Fingerprinting}, booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {1034--1036}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856.3592827}, doi = {10.1145/3579856.3592827}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/WangDJS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mswim/JayawardenaRS23, author = {Oshan Jayawardena and Fariza Rashid and Suranga Seneviratne}, editor = {Ahmed Mostefaoui and Peng Sun}, title = {Non-Contrastive Learning-based Behavioural Biometrics for Smart IoT Devices}, booktitle = {Proceedings of the 19th {ACM} International Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet 2023, Montreal, Quebec, Canada, 30 October 2023 - 3 November 2023}, pages = {69--78}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3616391.3622773}, doi = {10.1145/3616391.3622773}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mswim/JayawardenaRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-01838, author = {Ravin Gunawardena and Yuemeng Yin and Yi Huang and Rahat Masood and Suranga Seneviratne and Imran Razzak and Nguyen Tran and Aruna Seneviratne}, title = {Usability of Privacy Controls in Top Health Websites}, journal = {CoRR}, volume = {abs/2303.01838}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.01838}, doi = {10.48550/ARXIV.2303.01838}, eprinttype = {arXiv}, eprint = {2303.01838}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-01838.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-14754, author = {Naveen Karunanayake and Suranga Seneviratne and Sanjay Chawla}, title = {ExCeL : Combined Extreme and Collective Logit Information for Enhancing Out-of-Distribution Detection}, journal = {CoRR}, volume = {abs/2311.14754}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.14754}, doi = {10.48550/ARXIV.2311.14754}, eprinttype = {arXiv}, eprint = {2311.14754}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-14754.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-01753, author = {Charika De Alvis and Dishanika Denipitiyage and Suranga Seneviratne}, title = {Long-Tail Learning with Rebalanced Contrastive Loss}, journal = {CoRR}, volume = {abs/2312.01753}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.01753}, doi = {10.48550/ARXIV.2312.01753}, eprinttype = {arXiv}, eprint = {2312.01753}, timestamp = {Tue, 12 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-01753.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/DahanayakaJS22, author = {Thilini Dahanayaka and Guillaume Jourjon and Suranga Seneviratne}, title = {Dissecting traffic fingerprinting CNNs with filter activations}, journal = {Comput. Networks}, volume = {206}, pages = {108770}, year = {2022}, url = {https://doi.org/10.1016/j.comnet.2022.108770}, doi = {10.1016/J.COMNET.2022.108770}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/DahanayakaJS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LiHSTCJWSX22, author = {Ying Li and Yi Huang and Suranga Seneviratne and Kanchana Thilakarathna and Adriel Cheng and Guillaume Jourjon and Darren Webb and David B. Smith and Richard Yi Da Xu}, title = {From traffic classes to content: {A} hierarchical approach for encrypted traffic classification}, journal = {Comput. Networks}, volume = {212}, pages = {109017}, year = {2022}, url = {https://doi.org/10.1016/j.comnet.2022.109017}, doi = {10.1016/J.COMNET.2022.109017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/LiHSTCJWSX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/prl/HuangLHJCSTWX22, author = {Yi Huang and Ying Li and Timothy Heyes and Guillaume Jourjon and Adriel Cheng and Suranga Seneviratne and Kanchana Thilakarathna and Darren Webb and Richard Yi Da Xu}, title = {Task adaptive siamese neural networks for open-set recognition of encrypted network traffic with bidirectional dropout}, journal = {Pattern Recognit. Lett.}, volume = {159}, pages = {132--139}, year = {2022}, url = {https://doi.org/10.1016/j.patrec.2022.05.011}, doi = {10.1016/J.PATREC.2022.05.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/prl/HuangLHJCSTWX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/KarunanayakeRGS22, author = {Naveen Karunanayake and Jathushan Rajasegaran and Ashanie Gunathillake and Suranga Seneviratne and Guillaume Jourjon}, title = {A Multi-Modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps: {A} Case Study on Google Play Store}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {21}, number = {1}, pages = {16--30}, year = {2022}, url = {https://doi.org/10.1109/TMC.2020.3007260}, doi = {10.1109/TMC.2020.3007260}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/KarunanayakeRGS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/DahanayakaWJS22, author = {Thilini Dahanayaka and Zhiyi Wang and Guillaume Jourjon and Suranga Seneviratne}, editor = {Sharief Oteafy and Eyuphan Bulut and Florian Tschorsch}, title = {Inline Traffic Analysis Attacks on {DNS} over {HTTPS}}, booktitle = {47th {IEEE} Conference on Local Computer Networks, {LCN} 2022, Edmonton, AB, Canada, September 26-29, 2022}, pages = {132--139}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/LCN53696.2022.9843593}, doi = {10.1109/LCN53696.2022.9843593}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/lcn/DahanayakaWJS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-12964, author = {Oshan Jayawardana and Fariza Rashid and Suranga Seneviratne}, title = {Non-Contrastive Learning-based Behavioural Biometrics for Smart IoT Devices}, journal = {CoRR}, volume = {abs/2210.12964}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.12964}, doi = {10.48550/ARXIV.2210.12964}, eprinttype = {arXiv}, eprint = {2210.12964}, timestamp = {Fri, 28 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-12964.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/ZhaoMS21, author = {Jiawei Zhao and Rahat Masood and Suranga Seneviratne}, title = {A Review of Computer Vision Methods in Network Security}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {23}, number = {3}, pages = {1838--1878}, year = {2021}, url = {https://doi.org/10.1109/COMST.2021.3086475}, doi = {10.1109/COMST.2021.3086475}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/ZhaoMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imwut/KolamunnaDLSTZS21, author = {Harini Kolamunna and Thilini Dahanayaka and Junye Li and Suranga Seneviratne and Kanchana Thilakaratne and Albert Y. Zomaya and Aruna Seneviratne}, title = {DronePrint: Acoustic Signatures for Open-set Drone Detection and Identification with Online Data}, journal = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.}, volume = {5}, number = {1}, pages = {20:1--20:31}, year = {2021}, url = {https://doi.org/10.1145/3448115}, doi = {10.1145/3448115}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imwut/KolamunnaDLSTZS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/YangSRS21, author = {Yizhou Yang and David Smith and Jathushan Rajasegaran and Suranga Seneviratne}, title = {Power Control for Body Area Networks: Accurate Channel Prediction by Lightweight Deep Learning}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {5}, pages = {3567--3575}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3024820}, doi = {10.1109/JIOT.2020.3024820}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/YangSRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/Sooriyaarachchi21, author = {Jinani Sooriyaarachchi and Suranga Seneviratne and Kanchana Thilakarathna and Albert Y. Zomaya}, title = {MusicID: {A} Brainwave-Based User Authentication System for Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {10}, pages = {8304--8313}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3044726}, doi = {10.1109/JIOT.2020.3044726}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/Sooriyaarachchi21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/KattadigeCWNTSJ21, author = {Chamara Kattadige and Kwon Nung Choi and Achintha Wijesinghe and Arpit Nama and Kanchana Thilakarathna and Suranga Seneviratne and Guillaume Jourjon}, title = {{SETA++:} Real-Time Scalable Encrypted Traffic Analytics in Multi-Gbps Networks}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {18}, number = {3}, pages = {3244--3259}, year = {2021}, url = {https://doi.org/10.1109/TNSM.2021.3085097}, doi = {10.1109/TNSM.2021.3085097}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/KattadigeCWNTSJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/VaskevichDJS21, author = {Alexander Vaskevich and Thilini Dahanayaka and Guillaume Jourjon and Suranga Seneviratne}, editor = {Mauro Andreolini and Mirco Marchetti and Dimiter R. Avresky}, title = {{SMAUG:} Streaming Media Augmentation Using CGANs as a Defence Against Video Fingerprinting}, booktitle = {20th {IEEE} International Symposium on Network Computing and Applications, {NCA} 2021, Boston, MA, USA, November 23-26, 2021}, pages = {1--10}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/NCA53618.2021.9685579}, doi = {10.1109/NCA53618.2021.9685579}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nca/VaskevichDJS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/ChoiKUTSHHZ20, author = {Kwon Nung Choi and Harini Kolamunna and Akila Uyanwatta and Kanchana Thilakarathna and Suranga Seneviratne and Ralph Holz and Mahbub Hassan and Albert Y. Zomaya}, title = {\emph{LoRadar}: LoRa sensor network monitoring through passive packet sniffing}, journal = {Comput. Commun. Rev.}, volume = {50}, number = {4}, pages = {10--24}, year = {2020}, url = {https://doi.org/10.1145/3431832.3431835}, doi = {10.1145/3431832.3431835}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccr/ChoiKUTSHHZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisis-spain/AbaidSGSS020, author = {Zainab Abaid and Arash Shaghaghi and Ravin Gunawardena and Suranga Seneviratne and Aruna Seneviratne and Sanjay Jha}, editor = {{\'{A}}lvaro Herrero and Carlos Cambra and Daniel Urda and Javier Sedano and H{\'{e}}ctor Quinti{\'{a}}n and Emilio Corchado}, title = {Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud}, booktitle = {13th International Conference on Computational Intelligence in Security for Information Systems, {CISIS} 2020, Burgos, Spain, September 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1267}, pages = {111--121}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57805-3\_11}, doi = {10.1007/978-3-030-57805-3\_11}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisis-spain/AbaidSGSS020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipsn/ChoiDKTSKM20, author = {Kwon Nung Choi and Thilini Dahanayaka and David Kennedy and Kanchana Thilakarathna and Suranga Seneviratne and Salil S. Kanhere and Prasant Mohapatra}, title = {Poster Abstract: Passive Activity Classification of Smart Homes through Wireless Packet Sniffing}, booktitle = {19th {ACM/IEEE} International Conference on Information Processing in Sensor Networks, {IPSN} 2020, Sydney, Australia, April 21-24, 2020}, pages = {347--348}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/IPSN48710.2020.00-13}, doi = {10.1109/IPSN48710.2020.00-13}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ipsn/ChoiDKTSKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/DahanayakaJS20, author = {Thilini Dahanayaka and Guillaume Jourjon and Suranga Seneviratne}, editor = {Hwee{-}Pink Tan and Lyes Khoukhi and Sharief Oteafy}, title = {Understanding Traffic Fingerprinting CNNs}, booktitle = {45th {IEEE} Conference on Local Computer Networks, {LCN} 2020, Sydney, Australia, November 16-19, 2020}, pages = {65--76}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/LCN48667.2020.9314785}, doi = {10.1109/LCN48667.2020.9314785}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/lcn/DahanayakaJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/AbeywardenaZBSH20, author = {Kalana Abeywardena and Jiawei Zhao and Lexi Brent and Suranga Seneviratne and Ralph Holz}, editor = {Hwee{-}Pink Tan and Lyes Khoukhi and Sharief Oteafy}, title = {Triplet Mining-based Phishing Webpage Detection}, booktitle = {45th {IEEE} Conference on Local Computer Networks, {LCN} 2020, Sydney, Australia, November 16-19, 2020}, pages = {377--380}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/LCN48667.2020.9314828}, doi = {10.1109/LCN48667.2020.9314828}, timestamp = {Wed, 20 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/AbeywardenaZBSH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/YaoLLHCMS20, author = {Weixian Yao and Yexuan Li and Weiye Lin and Tianhui Hu and Imran Chowdhury and Rahat Masood and Suranga Seneviratne}, editor = {Hwee{-}Pink Tan and Lyes Khoukhi and Sharief Oteafy}, title = {Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps}, booktitle = {45th {IEEE} Conference on Local Computer Networks, {LCN} 2020, Sydney, Australia, November 16-19, 2020}, pages = {381--384}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/LCN48667.2020.9314784}, doi = {10.1109/LCN48667.2020.9314784}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/YaoLLHCMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/ChoiWKTSJ20, author = {Kwon Nung Choi and Achintha Wijesinghe and Chamara Manoj Madarasingha Kattadige and Kanchana Thilakarathna and Suranga Seneviratne and Guillaume Jourjon}, editor = {Hwee{-}Pink Tan and Lyes Khoukhi and Sharief Oteafy}, title = {{SETA:} Scalable Encrypted Traffic Analytics in Multi-Gbps Networks}, booktitle = {45th {IEEE} Conference on Local Computer Networks, {LCN} 2020, Sydney, Australia, November 16-19, 2020}, pages = {389--392}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/LCN48667.2020.9314837}, doi = {10.1109/LCN48667.2020.9314837}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/ChoiWKTSJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sensys/LiouJSTS20, author = {Jung{-}Chang Liou and Sajal Jain and Sooraj Randhir Singh and Dhit Taksinwarajan and Suranga Seneviratne}, editor = {Jin Nakazawa and Polly Huang}, title = {Side-channel information leaks of Z-wave smart home IoT devices: demo abstract}, booktitle = {SenSys '20: The 18th {ACM} Conference on Embedded Networked Sensor Systems, Virtual Event, Japan, November 16-19, 2020}, pages = {637--638}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3384419.3430436}, doi = {10.1145/3384419.3430436}, timestamp = {Wed, 04 May 2022 13:03:25 +0200}, biburl = {https://dblp.org/rec/conf/sensys/LiouJSTS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tencon/LiyanageAJWES20, author = {Namalka Liyanage and Kalana Abeywardena and Sakila S. Jayaweera and Chamith Wijenayake and Chamira U. S. Edussooriya and Suranga Seneviratne}, title = {Making Sense of Occluded Scenes using Light Field Pre-processing and Deep-learning}, booktitle = {2020 {IEEE} Region 10 Conference, {TENCON} 2020, Osaka, Japan, November 16-19, 2020}, pages = {538--543}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TENCON50793.2020.9293774}, doi = {10.1109/TENCON50793.2020.9293774}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tencon/LiyanageAJWES20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-03318, author = {Jiawei Zhao and Rahat Masood and Suranga Seneviratne}, title = {A Review of Computer Vision Methods in Network Security}, journal = {CoRR}, volume = {abs/2005.03318}, year = {2020}, url = {https://arxiv.org/abs/2005.03318}, eprinttype = {arXiv}, eprint = {2005.03318}, timestamp = {Sat, 09 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-03318.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-07987, author = {Zainab Abaid and Arash Shaghaghi and Ravin Gunawardena and Suranga Seneviratne and Aruna Seneviratne and Sanjay Jha}, title = {Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud}, journal = {CoRR}, volume = {abs/2005.07987}, year = {2020}, url = {https://arxiv.org/abs/2005.07987}, eprinttype = {arXiv}, eprint = {2005.07987}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-07987.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-01751, author = {Jinani Sooriyaarachchi and Suranga Seneviratne and Kanchana Thilakarathna and Albert Y. Zomaya}, title = {MusicID: {A} Brainwave-based User Authentication System for Internet of Things}, journal = {CoRR}, volume = {abs/2006.01751}, year = {2020}, url = {https://arxiv.org/abs/2006.01751}, eprinttype = {arXiv}, eprint = {2006.01751}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-01751.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-02231, author = {Naveen Karunanayake and Jathushan Rajasegaran and Ashanie Gunathillake and Suranga Seneviratne and Guillaume Jourjon}, title = {A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps: {A} Case Study on Google Play Store}, journal = {CoRR}, volume = {abs/2006.02231}, year = {2020}, url = {https://arxiv.org/abs/2006.02231}, eprinttype = {arXiv}, eprint = {2006.02231}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-02231.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-03905, author = {Weixian Yao and Yexuan Li and Weiye Lin and Tianhui Hu and Imran Chowdhury and Rahat Masood and Suranga Seneviratne}, title = {Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps}, journal = {CoRR}, volume = {abs/2007.03905}, year = {2020}, url = {https://arxiv.org/abs/2007.03905}, eprinttype = {arXiv}, eprint = {2007.03905}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-03905.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-04163, author = {Sicong Wang and Naveen Karunanayake and Tham Nguyen and Suranga Seneviratne}, title = {Privacy-Preserving Spam Filtering using Functional Encryption}, journal = {CoRR}, volume = {abs/2012.04163}, year = {2020}, url = {https://arxiv.org/abs/2012.04163}, eprinttype = {arXiv}, eprint = {2012.04163}, timestamp = {Wed, 09 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-04163.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/JahanSRSSJ19, author = {Mosarrat Jahan and Suranga Seneviratne and Partha Sarathi Roy and Kouichi Sakurai and Aruna Seneviratne and Sanjay K. Jha}, title = {Light weight and fine-grained access mechanism for secure access to outsourced data}, journal = {Concurr. Comput. Pract. Exp.}, volume = {31}, number = {23}, year = {2019}, url = {https://doi.org/10.1002/cpe.4736}, doi = {10.1002/CPE.4736}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/JahanSRSSJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/RajasegaranJJJS19, author = {Jathushan Rajasegaran and Vinoj Jayasundara and Sandaru Jayasekara and Hirunima Jayasekara and Suranga Seneviratne and Ranga Rodrigo}, title = {DeepCaps: Going Deeper With Capsule Networks}, booktitle = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2019, Long Beach, CA, USA, June 16-20, 2019}, pages = {10725--10733}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2019}, url = {http://openaccess.thecvf.com/content\_CVPR\_2019/html/Rajasegaran\_DeepCaps\_Going\_Deeper\_With\_Capsule\_Networks\_CVPR\_2019\_paper.html}, doi = {10.1109/CVPR.2019.01098}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/RajasegaranJJJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/Yang0S19, author = {Yizhou Yang and David B. Smith and Suranga Seneviratne}, title = {Deep Learning Channel Prediction for Transmit Power Control in Wireless Body Area Networks}, booktitle = {2019 {IEEE} International Conference on Communications, {ICC} 2019, Shanghai, China, May 20-24, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICC.2019.8761432}, doi = {10.1109/ICC.2019.8761432}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/Yang0S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wacv/JayasundaraJJRS19, author = {Vinoj Jayasundara and Sandaru Jayasekara and Hirunima Jayasekara and Jathushan Rajasegaran and Suranga Seneviratne and Ranga Rodrigo}, title = {TextCaps: Handwritten Character Recognition With Very Small Datasets}, booktitle = {{IEEE} Winter Conference on Applications of Computer Vision, {WACV} 2019, Waikoloa Village, HI, USA, January 7-11, 2019}, pages = {254--262}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/WACV.2019.00033}, doi = {10.1109/WACV.2019.00033}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wacv/JayasundaraJJRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/RajasegaranKGSJ19, author = {Jathushan Rajasegaran and Naveen Karunanayake and Ashanie Gunathillake and Suranga Seneviratne and Guillaume Jourjon}, editor = {Ling Liu and Ryen W. White and Amin Mantrach and Fabrizio Silvestri and Julian J. McAuley and Ricardo Baeza{-}Yates and Leila Zia}, title = {A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps}, booktitle = {The World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA, May 13-17, 2019}, pages = {3165--3171}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3308558.3313427}, doi = {10.1145/3308558.3313427}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/RajasegaranKGSJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-08095, author = {Vinoj Jayasundara and Sandaru Jayasekara and Hirunima Jayasekara and Jathushan Rajasegaran and Suranga Seneviratne and Ranga Rodrigo}, title = {TextCaps : Handwritten Character Recognition with Very Small Datasets}, journal = {CoRR}, volume = {abs/1904.08095}, year = {2019}, url = {http://arxiv.org/abs/1904.08095}, eprinttype = {arXiv}, eprint = {1904.08095}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-08095.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-09546, author = {Jathushan Rajasegaran and Vinoj Jayasundara and Sandaru Jayasekara and Hirunima Jayasekara and Suranga Seneviratne and Ranga Rodrigo}, title = {DeepCaps: Going Deeper with Capsule Networks}, journal = {CoRR}, volume = {abs/1904.09546}, year = {2019}, url = {http://arxiv.org/abs/1904.09546}, eprinttype = {arXiv}, eprint = {1904.09546}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-09546.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-11800, author = {Hirunima Jayasekara and Vinoj Jayasundara and Jathushan Rajasegaran and Sandaru Jayasekara and Suranga Seneviratne and Ranga Rodrigo}, title = {TimeCaps: Capturing Time Series Data with Capsule Networks}, journal = {CoRR}, volume = {abs/1911.11800}, year = {2019}, url = {http://arxiv.org/abs/1911.11800}, eprinttype = {arXiv}, eprint = {1911.11800}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-11800.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-12060, author = {Yining Hu and Suranga Seneviratne and Kanchana Thilakarathna and Kensuke Fukuda and Aruna Seneviratne}, title = {Characterizing and Detecting Money Laundering Activities on the Bitcoin Network}, journal = {CoRR}, volume = {abs/1912.12060}, year = {2019}, url = {http://arxiv.org/abs/1912.12060}, eprinttype = {arXiv}, eprint = {1912.12060}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-12060.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ChauhanSHMSL18, author = {Jagmohan Chauhan and Suranga Seneviratne and Yining Hu and Archan Misra and Aruna Seneviratne and Youngki Lee}, title = {Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks}, journal = {Computer}, volume = {51}, number = {5}, pages = {60--67}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2381119}, doi = {10.1109/MC.2018.2381119}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ChauhanSHMSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imwut/ChauhanRSMSL18, author = {Jagmohan Chauhan and Jathushan Rajasegaran and Suranga Seneviratne and Archan Misra and Aruna Seneviratne and Youngki Lee}, title = {Performance Characterization of Deep Learning Models for Breathing-based Authentication on Resource-Constrained Devices}, journal = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.}, volume = {2}, number = {4}, pages = {158:1--158:24}, year = {2018}, url = {https://doi.org/10.1145/3287036}, doi = {10.1145/3287036}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imwut/ChauhanRSMSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/5gwf/LiyanageSBKSY18, author = {Madhusanka Liyanage and Jukka Salo and An Braeken and Tanesh Kumar and Suranga Seneviratne and Mika Ylianttila}, title = {5G Privacy: Scenarios and Solutions}, booktitle = {{IEEE} 5G World Forum, 5GWF 2018, Silicon Valley, CA, USA, July 9-11, 2018}, pages = {197--203}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/5GWF.2018.8516981}, doi = {10.1109/5GWF.2018.8516981}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/5gwf/LiyanageSBKSY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/KolamunnaLPSTS18, author = {Harini Kolamunna and Ilias Leontiadis and Diego Perino and Suranga Seneviratne and Kanchana Thilakarathna and Aruna Seneviratne}, title = {A First Look at SIM-Enabled Wearables in the Wild}, booktitle = {Proceedings of the Internet Measurement Conference 2018, {IMC} 2018, Boston, MA, USA, October 31 - November 02, 2018}, pages = {77--83}, publisher = {{ACM}}, year = {2018}, url = {https://dl.acm.org/citation.cfm?id=3278540}, timestamp = {Fri, 25 Oct 2019 09:51:49 +0200}, biburl = {https://dblp.org/rec/conf/imc/KolamunnaLPSTS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/LiHXSTCWJ18, author = {Ying Li and Yi Huang and Richard Yi Da Xu and Suranga Seneviratne and Kanchana Thilakarathna and Adriel Cheng and Darren Webb and Guillaume Jourjon}, title = {Deep Content: Unveiling Video Streaming Content from Encrypted WiFi Traffic}, booktitle = {17th {IEEE} International Symposium on Network Computing and Applications, {NCA} 2018, Cambridge, MA, USA, November 1-3, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NCA.2018.8548317}, doi = {10.1109/NCA.2018.8548317}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nca/LiHXSTCWJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-09882, author = {Jathushan Rajasegaran and Suranga Seneviratne and Guillaume Jourjon}, title = {A Neural Embeddings Approach for Detecting Mobile Counterfeit Apps}, journal = {CoRR}, volume = {abs/1804.09882}, year = {2018}, url = {http://arxiv.org/abs/1804.09882}, eprinttype = {arXiv}, eprint = {1804.09882}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-09882.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ThilakarathnaSG17, author = {Kanchana Thilakarathna and Suranga Seneviratne and Kamal Gupta and Mohamed Ali K{\^{a}}afar and Aruna Seneviratne}, title = {A deep dive into location-based communities in social discovery networks}, journal = {Comput. Commun.}, volume = {100}, pages = {78--90}, year = {2017}, url = {https://doi.org/10.1016/j.comcom.2016.11.008}, doi = {10.1016/J.COMCOM.2016.11.008}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/ThilakarathnaSG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/SeneviratneHNLK17, author = {Suranga Seneviratne and Yining Hu and Tham Nguyen and Guohao Lan and Sara Khalifa and Kanchana Thilakarathna and Mahbub Hassan and Aruna Seneviratne}, title = {A Survey of Wearable Devices and Challenges}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {19}, number = {4}, pages = {2573--2620}, year = {2017}, url = {https://doi.org/10.1109/COMST.2017.2731979}, doi = {10.1109/COMST.2017.2731979}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/SeneviratneHNLK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/SurianSSC17, author = {Didi Surian and Suranga Seneviratne and Aruna Seneviratne and Sanjay Chawla}, title = {App Miscategorization Detection: {A} Case Study on Google Play}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {29}, number = {8}, pages = {1591--1604}, year = {2017}, url = {https://doi.org/10.1109/TKDE.2017.2686851}, doi = {10.1109/TKDE.2017.2686851}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tkde/SurianSSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tweb/SeneviratneSKMM17, author = {Suranga Seneviratne and Aruna Seneviratne and Mohamed Ali K{\^{a}}afar and Anirban Mahanti and Prasant Mohapatra}, title = {Spam Mobile Apps: Characteristics, Detection, and in the Wild Analysis}, journal = {{ACM} Trans. Web}, volume = {11}, number = {1}, pages = {4:1--4:29}, year = {2017}, url = {https://doi.org/10.1145/3007901}, doi = {10.1145/3007901}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tweb/SeneviratneSKMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/ChauhanHSMSL17, author = {Jagmohan Chauhan and Yining Hu and Suranga Seneviratne and Archan Misra and Aruna Seneviratne and Youngki Lee}, editor = {Tanzeem Choudhury and Steven Y. Ko and Andrew Campbell and Deepak Ganesan}, title = {BreathPrint: Breathing Acoustics-based User Authentication}, booktitle = {Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys'17, Niagara Falls, NY, USA, June 19-23, 2017}, pages = {278--291}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3081333.3081355}, doi = {10.1145/3081333.3081355}, timestamp = {Fri, 10 Dec 2021 17:15:01 +0100}, biburl = {https://dblp.org/rec/conf/mobisys/ChauhanHSMSL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/JahanSCSJ17, author = {Mosarrat Jahan and Suranga Seneviratne and Ben Chu and Aruna Seneviratne and Sanjay K. Jha}, editor = {Aris Gkoulalas{-}Divanis and Miguel P. Correia and Dimiter R. Avresky}, title = {Privacy preserving data access scheme for IoT devices}, booktitle = {16th {IEEE} International Symposium on Network Computing and Applications, {NCA} 2017, Cambridge, MA, USA, October 30 - November 1, 2017}, pages = {217--226}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/NCA.2017.8171357}, doi = {10.1109/NCA.2017.8171357}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nca/JahanSCSJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-07626, author = {Jagmohan Chauhan and Suranga Seneviratne and Yining Hu and Archan Misra and Aruna Seneviratne and Youngki Lee}, title = {BreathRNNet: Breathing Based Authentication on Resource-Constrained IoT Devices using RNNs}, journal = {CoRR}, volume = {abs/1709.07626}, year = {2017}, url = {http://arxiv.org/abs/1709.07626}, eprinttype = {arXiv}, eprint = {1709.07626}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-07626.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/IkramVSKP16, author = {Muhammad Ikram and Narseo Vallina{-}Rodriguez and Suranga Seneviratne and Mohamed Ali K{\^{a}}afar and Vern Paxson}, editor = {Phillipa Gill and John S. Heidemann and John W. Byers and Ramesh Govindan}, title = {An Analysis of the Privacy and Security Risks of Android {VPN} Permission-enabled Apps}, booktitle = {Proceedings of the 2016 {ACM} on Internet Measurement Conference, {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016}, pages = {349--364}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2987471}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/IkramVSKP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/ChauhanSKMS16, author = {Jagmohan Chauhan and Suranga Seneviratne and Mohamed Ali K{\^{a}}afar and Anirban Mahanti and Aruna Seneviratne}, title = {Characterization of early smartwatch apps}, booktitle = {2016 {IEEE} International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016, Sydney, Australia, March 14-18, 2016}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/PERCOMW.2016.7457170}, doi = {10.1109/PERCOMW.2016.7457170}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/ChauhanSKMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/SeneviratneJCS15, author = {Suranga Seneviratne and Fangzhou Jiang and Mathieu Cunche and Aruna Seneviratne}, editor = {Salil S. Kanhere and Jens T{\"{o}}lle and Soumaya Cherkaoui}, title = {SSIDs in the wild: Extracting semantic information from WiFi SSIDs}, booktitle = {40th {IEEE} Conference on Local Computer Networks, {LCN} 2015, Clearwater Beach, FL, USA, October 26-29, 2015}, pages = {494--497}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/LCN.2015.7366361}, doi = {10.1109/LCN.2015.7366361}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/SeneviratneJCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SeneviratneKS15, author = {Suranga Seneviratne and Harini Kolamunna and Aruna Seneviratne}, title = {A measurement study of tracking in paid mobile applications}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {7:1--7:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766523}, doi = {10.1145/2766498.2766523}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SeneviratneKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/SeneviratneSKMM15, author = {Suranga Seneviratne and Aruna Seneviratne and Mohamed Ali K{\^{a}}afar and Anirban Mahanti and Prasant Mohapatra}, editor = {Aldo Gangemi and Stefano Leonardi and Alessandro Panconesi}, title = {Early Detection of Spam Mobile Apps}, booktitle = {Proceedings of the 24th International Conference on World Wide Web, {WWW} 2015, Florence, Italy, May 18-22, 2015}, pages = {949--959}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2736277.2741084}, doi = {10.1145/2736277.2741084}, timestamp = {Tue, 27 Dec 2022 09:06:31 +0100}, biburl = {https://dblp.org/rec/conf/www/SeneviratneSKMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmobile/SeneviratneSMM14, author = {Suranga Seneviratne and Aruna Seneviratne and Prasant Mohapatra and Anirban Mahanti}, title = {Predicting user traits from a snapshot of apps installed on a smartphone}, journal = {{ACM} {SIGMOBILE} Mob. Comput. Commun. Rev.}, volume = {18}, number = {2}, pages = {1--8}, year = {2014}, url = {https://doi.org/10.1145/2636242.2636244}, doi = {10.1145/2636242.2636244}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmobile/SeneviratneSMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmobile/SeneviratneSMM14a, author = {Suranga Seneviratne and Aruna Seneviratne and Prasant Mohapatra and Anirban Mahanti}, title = {Your Installed Apps Reveal Your Gender and More!}, journal = {{ACM} {SIGMOBILE} Mob. Comput. Commun. Rev.}, volume = {18}, number = {3}, pages = {55--61}, year = {2014}, url = {https://doi.org/10.1145/2721896.2721908}, doi = {10.1145/2721896.2721908}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmobile/SeneviratneSMM14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/SeneviratneSMM14, author = {Suranga Seneviratne and Aruna Seneviratne and Prasant Mohapatra and Anirban Mahanti}, editor = {Ersin Uzun and Mohamed Ali K{\^{a}}afar}, title = {Your installed apps reveal your gender and more!}, booktitle = {Proceedings of the {ACM} MobiCom Workshop on Security and Privacy in Mobile Environments, SPME@MobiCom 2014, Maui, Hawaii, USA, September 11, 2014}, pages = {1--6}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2646584.2646587}, doi = {10.1145/2646584.2646587}, timestamp = {Tue, 06 Nov 2018 16:59:00 +0100}, biburl = {https://dblp.org/rec/conf/mobicom/SeneviratneSMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/SeneviratneTSKM13, author = {Aruna Seneviratne and Kanchana Thilakarathna and Suranga Seneviratne and Mohamed Ali K{\^{a}}afar and Prasant Mohapatra}, title = {Reconciling bitter rivals: Towards privacy-aware and bandwidth efficient mobile Ads delivery networks}, booktitle = {Fifth International Conference on Communication Systems and Networks, {COMSNETS} 2013, Bangalore, India, January 7-10, 2013}, pages = {1--10}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/COMSNETS.2013.6465567}, doi = {10.1109/COMSNETS.2013.6465567}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/comsnets/SeneviratneTSKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/SeneviratneSMT13, author = {Suranga Seneviratne and Aruna Seneviratne and Prasant Mohapatra and Pierre{-}Ugo Tournoux}, editor = {Albert Banchs and Sunghyun Choi}, title = {Characterizing WiFi connection and its impact on mobile users: practical insights}, booktitle = {Proceedings of the 8th {ACM} International Workshop on Wireless Network Testbeds, Experimental Evaluation {\&} Characterization, WiNTECH 2013, Miami, Florida, USA, September 30, 2013}, pages = {81--88}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2505469.2505480}, doi = {10.1145/2505469.2505480}, timestamp = {Mon, 08 Jul 2024 12:54:25 +0200}, biburl = {https://dblp.org/rec/conf/mobicom/SeneviratneSMT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.