default search action
Suranga Seneviratne
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c32]Chamara Madarasingha, Thilini Dahanayaka, Kanchana Thilakarathna, Suranga Seneviratne, Young Choon Lee, Salil S. Kanhere, Albert Y. Zomaya, Aruna Seneviratne, Phil Ridley:
Demo: P4 Based In-network ML with Federated Learning to Secure and Slice IoT Networks. WoWMoM 2025: 304-306 - 2024
- [j25]Fariza Rashid, Ben Doyle, Soyeon Caren Han, Suranga Seneviratne:
Phishing URL detection generalisation using Unsupervised Domain Adaptation. Comput. Networks 245: 110398 (2024) - [j24]Ravin Gunawardena, Sandani Jayawardena, Suranga Seneviratne, Rahat Masood, Salil S. Kanhere:
Single-Sensor Sparse Adversarial Perturbation Attacks Against Behavioral Biometrics. IEEE Internet Things J. 11(16): 27303-27321 (2024) - [j23]Tung-Anh Nguyen, Long Tan Le, Tuan Dung Nguyen, Wei Bao, Suranga Seneviratne, Choong Seon Hong, Nguyen H. Tran:
Federated PCA on Grassmann Manifold for IoT Anomaly Detection. IEEE/ACM Trans. Netw. 32(5): 4456-4471 (2024) - [c31]Niruth Bogahawatta, Gerry How, Yasiru Karunanayake, Suranga Seneviratne, Kanchana Thilakarathna, Salil Kahere, Rahat Masood, Aruna Seneviratne:
DEMO : Passive Identification of WiFi Devices in Real-Time. SIGCOMM (Posters and Demos) 2024: 92-94 - [c30]Chamara Madarasingha, Thilini Dahanayaka, Kanchana Thilakarathna, Suranga Seneviratne, Young Choon Lee, Salil S. Kanhere, Aruna Seneviratne, Phil Ridley:
Demo: P4Xtnd: P4 Programmability on Resource Constrained Environments with Extended Network Functionalities. SIGCOMM (Posters and Demos) 2024: 104-106 - [i23]Naveen Karunanayake, Ravin Gunawardena, Suranga Seneviratne, Sanjay Chawla:
Out-of-Distribution Data: An Acquaintance of Adversarial Examples - A Survey. CoRR abs/2404.05219 (2024) - [i22]Charika De Alvis, Suranga Seneviratne:
A Survey of Deep Long-Tail Classification Advancements. CoRR abs/2404.15593 (2024) - [i21]Tung-Anh Nguyen, Long Tan Le, Tuan Dung Nguyen, Wei Bao, Suranga Seneviratne, Choong Seon Hong, Nguyen Hoang Tran:
Federated PCA on Grassmann Manifold for IoT Anomaly Detection. CoRR abs/2407.07421 (2024) - [i20]Dishanika Denipitiyage, Bhanuka Silva, K. Gunathilaka, Suranga Seneviratne, Anirban Mahanti, Aruna Seneviratne, Sanjay Chawla:
Detecting and Characterising Mobile App Metamorphosis in Google Play Store. CoRR abs/2407.14565 (2024) - [i19]Fariza Rashid, Nishavi Ranaweera, Ben Doyle, Suranga Seneviratne:
LLMs are One-Shot URL Classifiers and Explainers. CoRR abs/2409.14306 (2024) - [i18]Omid Tavallaie, Kanchana Thilakarathna, Suranga Seneviratne, Aruna Seneviratne, Albert Y. Zomaya:
SHFL: Secure Hierarchical Federated Learning Framework for Edge Networks. CoRR abs/2409.15067 (2024) - [i17]Bhanuka Silva, Dishanika Denipitiyage, Suranga Seneviratne, Anirban Mahanti, Aruna Seneviratne:
Entailment-Driven Privacy Policy Classification with LLMs. CoRR abs/2409.16621 (2024) - 2023
- [j22]Thilini Dahanayaka, Yasod Ginige, Yi Huang, Guillaume Jourjon, Suranga Seneviratne:
Robust open-set classification for encrypted traffic fingerprinting. Comput. Networks 236: 109991 (2023) - [j21]Tham Nguyen, Naveen Karunanayake, Sicong Wang, Suranga Seneviratne, Peizhao Hu:
Privacy-preserving spam filtering using homomorphic and functional encryption. Comput. Commun. 197: 230-241 (2023) - [j20]Yi Huang, Ying Li, Guillaume Jourjon, Suranga Seneviratne, Kanchana Thilakarathna, Adriel Cheng, Darren Webb, Richard Yi Da Xu:
Calibrated reconstruction based adversarial autoencoder model for novelty detection. Pattern Recognit. Lett. 169: 50-57 (2023) - [c29]Yiyan Wang, Thilini Dahanayaka, Guillaume Jourjon, Suranga Seneviratne:
POSTER: Performance Characterization of Binarized Neural Networks in Traffic Fingerprinting. AsiaCCS 2023: 1034-1036 - [c28]Oshan Jayawardena, Fariza Rashid, Suranga Seneviratne:
Non-Contrastive Learning-based Behavioural Biometrics for Smart IoT Devices. Q2SWinet 2023: 69-78 - [i16]Ravin Gunawardena, Yuemeng Yin, Yi Huang, Rahat Masood, Suranga Seneviratne, Imran Razzak, Nguyen Tran, Aruna Seneviratne:
Usability of Privacy Controls in Top Health Websites. CoRR abs/2303.01838 (2023) - [i15]Naveen Karunanayake, Suranga Seneviratne, Sanjay Chawla:
ExCeL : Combined Extreme and Collective Logit Information for Enhancing Out-of-Distribution Detection. CoRR abs/2311.14754 (2023) - [i14]Charika De Alvis, Dishanika Denipitiyage, Suranga Seneviratne:
Long-Tail Learning with Rebalanced Contrastive Loss. CoRR abs/2312.01753 (2023) - 2022
- [j19]Thilini Dahanayaka, Guillaume Jourjon, Suranga Seneviratne:
Dissecting traffic fingerprinting CNNs with filter activations. Comput. Networks 206: 108770 (2022) - [j18]Ying Li, Yi Huang, Suranga Seneviratne, Kanchana Thilakarathna, Adriel Cheng, Guillaume Jourjon, Darren Webb, David B. Smith, Richard Yi Da Xu:
From traffic classes to content: A hierarchical approach for encrypted traffic classification. Comput. Networks 212: 109017 (2022) - [j17]Yi Huang, Ying Li, Timothy Heyes, Guillaume Jourjon, Adriel Cheng, Suranga Seneviratne, Kanchana Thilakarathna, Darren Webb, Richard Yi Da Xu:
Task adaptive siamese neural networks for open-set recognition of encrypted network traffic with bidirectional dropout. Pattern Recognit. Lett. 159: 132-139 (2022) - [j16]Naveen Karunanayake, Jathushan Rajasegaran, Ashanie Gunathillake, Suranga Seneviratne, Guillaume Jourjon:
A Multi-Modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps: A Case Study on Google Play Store. IEEE Trans. Mob. Comput. 21(1): 16-30 (2022) - [c27]Thilini Dahanayaka, Zhiyi Wang, Guillaume Jourjon, Suranga Seneviratne:
Inline Traffic Analysis Attacks on DNS over HTTPS. LCN 2022: 132-139 - [i13]Oshan Jayawardana, Fariza Rashid, Suranga Seneviratne:
Non-Contrastive Learning-based Behavioural Biometrics for Smart IoT Devices. CoRR abs/2210.12964 (2022) - 2021
- [j15]Jiawei Zhao, Rahat Masood, Suranga Seneviratne:
A Review of Computer Vision Methods in Network Security. IEEE Commun. Surv. Tutorials 23(3): 1838-1878 (2021) - [j14]Harini Kolamunna, Thilini Dahanayaka, Junye Li, Suranga Seneviratne, Kanchana Thilakaratne, Albert Y. Zomaya, Aruna Seneviratne:
DronePrint: Acoustic Signatures for Open-set Drone Detection and Identification with Online Data. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(1): 20:1-20:31 (2021) - [j13]Yizhou Yang, David Smith, Jathushan Rajasegaran, Suranga Seneviratne:
Power Control for Body Area Networks: Accurate Channel Prediction by Lightweight Deep Learning. IEEE Internet Things J. 8(5): 3567-3575 (2021) - [j12]Jinani Sooriyaarachchi, Suranga Seneviratne, Kanchana Thilakarathna, Albert Y. Zomaya:
MusicID: A Brainwave-Based User Authentication System for Internet of Things. IEEE Internet Things J. 8(10): 8304-8313 (2021) - [j11]Chamara Kattadige, Kwon Nung Choi, Achintha Wijesinghe, Arpit Nama, Kanchana Thilakarathna, Suranga Seneviratne, Guillaume Jourjon:
SETA++: Real-Time Scalable Encrypted Traffic Analytics in Multi-Gbps Networks. IEEE Trans. Netw. Serv. Manag. 18(3): 3244-3259 (2021) - [c26]Alexander Vaskevich, Thilini Dahanayaka, Guillaume Jourjon, Suranga Seneviratne:
SMAUG: Streaming Media Augmentation Using CGANs as a Defence Against Video Fingerprinting. NCA 2021: 1-10 - 2020
- [j10]Kwon Nung Choi, Harini Kolamunna, Akila Uyanwatta, Kanchana Thilakarathna, Suranga Seneviratne, Ralph Holz, Mahbub Hassan, Albert Y. Zomaya:
LoRadar: LoRa sensor network monitoring through passive packet sniffing. Comput. Commun. Rev. 50(4): 10-24 (2020) - [c25]Zainab Abaid, Arash Shaghaghi, Ravin Gunawardena, Suranga Seneviratne, Aruna Seneviratne, Sanjay Jha:
Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud. CISIS 2020: 111-121 - [c24]Kwon Nung Choi, Thilini Dahanayaka, David Kennedy, Kanchana Thilakarathna, Suranga Seneviratne, Salil S. Kanhere, Prasant Mohapatra:
Poster Abstract: Passive Activity Classification of Smart Homes through Wireless Packet Sniffing. IPSN 2020: 347-348 - [c23]Thilini Dahanayaka, Guillaume Jourjon, Suranga Seneviratne:
Understanding Traffic Fingerprinting CNNs. LCN 2020: 65-76 - [c22]Kalana Abeywardena, Jiawei Zhao, Lexi Brent, Suranga Seneviratne, Ralph Holz:
Triplet Mining-based Phishing Webpage Detection. LCN 2020: 377-380 - [c21]Weixian Yao, Yexuan Li, Weiye Lin, Tianhui Hu, Imran Chowdhury, Rahat Masood, Suranga Seneviratne:
Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps. LCN 2020: 381-384 - [c20]Kwon Nung Choi, Achintha Wijesinghe, Chamara Manoj Madarasingha Kattadige, Kanchana Thilakarathna, Suranga Seneviratne, Guillaume Jourjon:
SETA: Scalable Encrypted Traffic Analytics in Multi-Gbps Networks. LCN 2020: 389-392 - [c19]Jung-Chang Liou, Sajal Jain, Sooraj Randhir Singh, Dhit Taksinwarajan, Suranga Seneviratne:
Side-channel information leaks of Z-wave smart home IoT devices: demo abstract. SenSys 2020: 637-638 - [c18]Namalka Liyanage, Kalana Abeywardena, Sakila S. Jayaweera, Chamith Wijenayake, Chamira U. S. Edussooriya, Suranga Seneviratne:
Making Sense of Occluded Scenes using Light Field Pre-processing and Deep-learning. TENCON 2020: 538-543 - [i12]Jiawei Zhao, Rahat Masood, Suranga Seneviratne:
A Review of Computer Vision Methods in Network Security. CoRR abs/2005.03318 (2020) - [i11]Zainab Abaid, Arash Shaghaghi, Ravin Gunawardena, Suranga Seneviratne, Aruna Seneviratne, Sanjay Jha:
Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud. CoRR abs/2005.07987 (2020) - [i10]Jinani Sooriyaarachchi, Suranga Seneviratne, Kanchana Thilakarathna, Albert Y. Zomaya:
MusicID: A Brainwave-based User Authentication System for Internet of Things. CoRR abs/2006.01751 (2020) - [i9]Naveen Karunanayake, Jathushan Rajasegaran, Ashanie Gunathillake, Suranga Seneviratne, Guillaume Jourjon:
A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps: A Case Study on Google Play Store. CoRR abs/2006.02231 (2020) - [i8]Weixian Yao, Yexuan Li, Weiye Lin, Tianhui Hu, Imran Chowdhury, Rahat Masood, Suranga Seneviratne:
Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps. CoRR abs/2007.03905 (2020) - [i7]Sicong Wang, Naveen Karunanayake, Tham Nguyen, Suranga Seneviratne:
Privacy-Preserving Spam Filtering using Functional Encryption. CoRR abs/2012.04163 (2020)
2010 – 2019
- 2019
- [j9]Mosarrat Jahan, Suranga Seneviratne, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay K. Jha:
Light weight and fine-grained access mechanism for secure access to outsourced data. Concurr. Comput. Pract. Exp. 31(23) (2019) - [c17]Jathushan Rajasegaran, Vinoj Jayasundara, Sandaru Jayasekara, Hirunima Jayasekara, Suranga Seneviratne, Ranga Rodrigo:
DeepCaps: Going Deeper With Capsule Networks. CVPR 2019: 10725-10733 - [c16]Yizhou Yang, David B. Smith, Suranga Seneviratne:
Deep Learning Channel Prediction for Transmit Power Control in Wireless Body Area Networks. ICC 2019: 1-6 - [c15]Vinoj Jayasundara, Sandaru Jayasekara, Hirunima Jayasekara, Jathushan Rajasegaran, Suranga Seneviratne, Ranga Rodrigo:
TextCaps: Handwritten Character Recognition With Very Small Datasets. WACV 2019: 254-262 - [c14]Jathushan Rajasegaran, Naveen Karunanayake, Ashanie Gunathillake, Suranga Seneviratne, Guillaume Jourjon:
A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps. WWW 2019: 3165-3171 - [i6]Vinoj Jayasundara, Sandaru Jayasekara, Hirunima Jayasekara, Jathushan Rajasegaran, Suranga Seneviratne, Ranga Rodrigo:
TextCaps : Handwritten Character Recognition with Very Small Datasets. CoRR abs/1904.08095 (2019) - [i5]Jathushan Rajasegaran, Vinoj Jayasundara, Sandaru Jayasekara, Hirunima Jayasekara, Suranga Seneviratne, Ranga Rodrigo:
DeepCaps: Going Deeper with Capsule Networks. CoRR abs/1904.09546 (2019) - [i4]Hirunima Jayasekara, Vinoj Jayasundara, Jathushan Rajasegaran, Sandaru Jayasekara, Suranga Seneviratne, Ranga Rodrigo:
TimeCaps: Capturing Time Series Data with Capsule Networks. CoRR abs/1911.11800 (2019) - [i3]Yining Hu, Suranga Seneviratne, Kanchana Thilakarathna, Kensuke Fukuda, Aruna Seneviratne:
Characterizing and Detecting Money Laundering Activities on the Bitcoin Network. CoRR abs/1912.12060 (2019) - 2018
- [j8]Jagmohan Chauhan, Suranga Seneviratne, Yining Hu, Archan Misra, Aruna Seneviratne, Youngki Lee:
Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks. Computer 51(5): 60-67 (2018) - [j7]Jagmohan Chauhan, Jathushan Rajasegaran, Suranga Seneviratne, Archan Misra, Aruna Seneviratne, Youngki Lee:
Performance Characterization of Deep Learning Models for Breathing-based Authentication on Resource-Constrained Devices. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(4): 158:1-158:24 (2018) - [c13]Madhusanka Liyanage, Jukka Salo, An Braeken, Tanesh Kumar, Suranga Seneviratne, Mika Ylianttila:
5G Privacy: Scenarios and Solutions. 5G World Forum 2018: 197-203 - [c12]Harini Kolamunna, Ilias Leontiadis, Diego Perino, Suranga Seneviratne, Kanchana Thilakarathna, Aruna Seneviratne:
A First Look at SIM-Enabled Wearables in the Wild. Internet Measurement Conference 2018: 77-83 - [c11]Ying Li, Yi Huang, Richard Yi Da Xu, Suranga Seneviratne, Kanchana Thilakarathna, Adriel Cheng, Darren Webb, Guillaume Jourjon:
Deep Content: Unveiling Video Streaming Content from Encrypted WiFi Traffic. NCA 2018: 1-8 - [i2]Jathushan Rajasegaran, Suranga Seneviratne, Guillaume Jourjon:
A Neural Embeddings Approach for Detecting Mobile Counterfeit Apps. CoRR abs/1804.09882 (2018) - 2017
- [j6]Kanchana Thilakarathna, Suranga Seneviratne, Kamal Gupta, Mohamed Ali Kâafar, Aruna Seneviratne:
A deep dive into location-based communities in social discovery networks. Comput. Commun. 100: 78-90 (2017) - [j5]Suranga Seneviratne, Yining Hu, Tham Nguyen, Guohao Lan, Sara Khalifa, Kanchana Thilakarathna, Mahbub Hassan, Aruna Seneviratne:
A Survey of Wearable Devices and Challenges. IEEE Commun. Surv. Tutorials 19(4): 2573-2620 (2017) - [j4]Didi Surian, Suranga Seneviratne, Aruna Seneviratne, Sanjay Chawla:
App Miscategorization Detection: A Case Study on Google Play. IEEE Trans. Knowl. Data Eng. 29(8): 1591-1604 (2017) - [j3]Suranga Seneviratne, Aruna Seneviratne, Mohamed Ali Kâafar, Anirban Mahanti, Prasant Mohapatra:
Spam Mobile Apps: Characteristics, Detection, and in the Wild Analysis. ACM Trans. Web 11(1): 4:1-4:29 (2017) - [c10]Jagmohan Chauhan, Yining Hu, Suranga Seneviratne, Archan Misra, Aruna Seneviratne, Youngki Lee:
BreathPrint: Breathing Acoustics-based User Authentication. MobiSys 2017: 278-291 - [c9]Mosarrat Jahan, Suranga Seneviratne, Ben Chu, Aruna Seneviratne, Sanjay K. Jha:
Privacy preserving data access scheme for IoT devices. NCA 2017: 217-226 - [i1]Jagmohan Chauhan, Suranga Seneviratne, Yining Hu, Archan Misra, Aruna Seneviratne, Youngki Lee:
BreathRNNet: Breathing Based Authentication on Resource-Constrained IoT Devices using RNNs. CoRR abs/1709.07626 (2017) - 2016
- [c8]Muhammad Ikram, Narseo Vallina-Rodriguez, Suranga Seneviratne, Mohamed Ali Kâafar, Vern Paxson:
An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps. Internet Measurement Conference 2016: 349-364 - [c7]Jagmohan Chauhan, Suranga Seneviratne, Mohamed Ali Kâafar, Anirban Mahanti, Aruna Seneviratne:
Characterization of early smartwatch apps. PerCom Workshops 2016: 1-6 - 2015
- [c6]Suranga Seneviratne, Fangzhou Jiang, Mathieu Cunche, Aruna Seneviratne:
SSIDs in the wild: Extracting semantic information from WiFi SSIDs. LCN 2015: 494-497 - [c5]Suranga Seneviratne, Harini Kolamunna, Aruna Seneviratne:
A measurement study of tracking in paid mobile applications. WISEC 2015: 7:1-7:6 - [c4]Suranga Seneviratne, Aruna Seneviratne, Mohamed Ali Kâafar, Anirban Mahanti, Prasant Mohapatra:
Early Detection of Spam Mobile Apps. WWW 2015: 949-959 - 2014
- [j2]Suranga Seneviratne, Aruna Seneviratne, Prasant Mohapatra, Anirban Mahanti:
Predicting user traits from a snapshot of apps installed on a smartphone. ACM SIGMOBILE Mob. Comput. Commun. Rev. 18(2): 1-8 (2014) - [j1]Suranga Seneviratne, Aruna Seneviratne, Prasant Mohapatra, Anirban Mahanti:
Your Installed Apps Reveal Your Gender and More! ACM SIGMOBILE Mob. Comput. Commun. Rev. 18(3): 55-61 (2014) - [c3]Suranga Seneviratne, Aruna Seneviratne, Prasant Mohapatra, Anirban Mahanti:
Your installed apps reveal your gender and more! SPME@MobiCom 2014: 1-6 - 2013
- [c2]Aruna Seneviratne, Kanchana Thilakarathna, Suranga Seneviratne, Mohamed Ali Kâafar, Prasant Mohapatra:
Reconciling bitter rivals: Towards privacy-aware and bandwidth efficient mobile Ads delivery networks. COMSNETS 2013: 1-10 - [c1]Suranga Seneviratne, Aruna Seneviratne, Prasant Mohapatra, Pierre-Ugo Tournoux:
Characterizing WiFi connection and its impact on mobile users: practical insights. WiNTECH 2013: 81-88
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint