Damith Chinthana Ranasinghe
Orcid: 0000-0002-2008-9255
According to our database1,
Damith Chinthana Ranasinghe
authored at least 132 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Distributed multi-object tracking under limited field of view heterogeneous sensors with density clustering.
Signal Process., 2025
2024
MexGen: An Effective and Efficient Information Gain Approximation for Information Gathering Path Planning.
IEEE Robotics Autom. Lett., July, 2024
ConservationBots: Autonomous aerial robot for fast robust wildlife tracking in complex terrains.
J. Field Robotics, March, 2024
Multi-Objective Multi-Agent Planning for Discovering and Tracking Multiple Mobile Objects.
IEEE Trans. Signal Process., 2024
GyroCopter: Differential Bearing Measuring Trajectory Planner for Tracking and Localizing Radio Frequency Sources.
CoRR, 2024
On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World.
CoRR, 2024
Bayesian Low-Rank LeArning (Bella): A Practical Approach to Bayesian Neural Networks.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Make out like a (Multi-Armed) Bandit: Improving the Odds of Fuzzer Seed Scheduling with T-Scheduler.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Wisecr: Secure Simultaneous Code Dissemination to Many Batteryless Computational RFID Devices.
IEEE Trans. Dependable Secur. Comput., 2023
NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions.
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Proceedings of the 26th International Conference on Information Fusion, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions.
Dataset, June, 2022
TnT Attacks! Universal Naturalistic Adversarial Patches Against Deep Neural Network Systems.
IEEE Trans. Inf. Forensics Secur., 2022
Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks.
IEEE Trans. Dependable Secur. Comput., 2022
TREVERSE: TRial-and-Error Lightweight Secure ReVERSE Authentication With Simulatable PUFs.
IEEE Trans. Dependable Secur. Comput., 2022
Digit. Signal Process., 2022
Multi-Objective Multi-Agent Planning for Discovering and Tracking Unknown and Varying Number of Mobile Objects.
CoRR, 2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Leaving Your Things Unattended is No Joke! Memory Bus Snooping and Open Debug Interface Exploits.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Bayesian Learning with Information Gain Provably Bounds Risk for a Robust Adversarial Defense.
Proceedings of the International Conference on Machine Learning, 2022
Query Efficient Decision Based Sparse Attacks Against Black-Box Deep Learning Models.
Proceedings of the Tenth International Conference on Learning Representations, 2022
2021
IEEE Trans. Signal Process., 2021
SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices.
IEEE Trans. Dependable Secur. Comput., 2021
Attend and Discriminate: Beyond the State-of-the-Art for Human Activity Recognition Using Wearable Sensors.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021
CoRR, 2021
Guided-GAN: Adversarial Representation Learning for Activity Recognition with Wearables.
CoRR, 2021
Wisecr: Secure Simultaneous Code Disseminationto Many Batteryless Computational RFID Devices.
CoRR, 2021
ReaDmE: Read-Rate Based Dynamic Execution Scheduling for Intermittent RF-Powered Devices.
Proceedings of the IEEE International Conference on RFID, 2021
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
2020
CoRR, 2020
VenueTrace: a privacy-by-design COVID-19 digital contact tracing solution: poster abstract.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Proceedings of the ISWC '20: 2020 ACM International Symposium on Wearable Computers, 2020
LAVAPilot: Lightweight UAV Trajectory Planner with Situational Awareness for Embedded Autonomy to Track and Locate Radio-tags.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2020
Computationally Efficient Methods for Estimating Unknown Input Forces on Structural Systems.
Proceedings of the IEEE 23rd International Conference on Information Fusion, 2020
Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
Multi-Objective Multi-Agent Planning for Jointly Discovering and Tracking Mobile Objects.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
Online UAV Path Planning for Joint Detection and Tracking of Multiple Radio-Tagged Objects.
IEEE Trans. Signal Process., 2019
IEEE Trans. Image Process., 2019
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Trans. Circuits Syst. I Regul. Pap., 2019
Signal Process., 2019
TrackerBots: Autonomous unmanned aerial vehicle for real-time localization and tracking of multiple radio-tagged animals.
J. Field Robotics, 2019
Multi-Objective Multi-Agent Planning for Jointly Discovering and Tracking Mobile Object.
CoRR, 2019
DeepCleanse: Input Sanitization Framework Against Trojan Attacks on Deep Neural Network Systems.
CoRR, 2019
Hash Functions and Benchmarks for Resource Constrained Passive Devices: A Preliminary Study.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019
Super Low Resolution RF Powered Accelerometers for Alerting on Hospitalized Patient Bed Exits.
Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications, 2019
SparseSense: Human Activity Recognition from Highly Sparse Sensor Data-streams Using Set-based Neural Networks.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
Proceedings of the 23rd International Symposium on Wearable Computers, ISWC 2019, London, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices.
Dataset, July, 2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018
Efficient dense labelling of human activity sequences from wearables using fully convolutional networks.
Pattern Recognit., 2018
IACR Cryptol. ePrint Arch., 2018
TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs.
CoRR, 2018
CoRR, 2018
Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems, SenSys 2018, 2018
Field Deployable Real-Time Indoor Spatial Tracking System for Human Behavior Observations.
Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems, SenSys 2018, 2018
Deep Auto-Set: A Deep Auto-Encoder-Set Network for Activity Recognition Using Wearables.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018
bTracked: Highly Accurate Field Deployable Real-Time Indoor Spatial Tracking for Human Behavior Observations.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018
2017
Sequence Learning with Passive RFID Sensors for Real-Time Bed-Egress Recognition in Older People.
IEEE J. Biomed. Health Informatics, 2017
Pervasive Mob. Comput., 2017
A hierarchical model for recognizing alarming states in a batteryless sensor alarm intervention for preventing falls in older people.
Pervasive Mob. Comput., 2017
Pervasive Mob. Comput., 2017
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017
Real-Time Localization and Tracking of Multiple Radio-Tagged Animals with an Autonomous Aerial Vehicle System.
CoRR, 2017
Efficient Dense Labeling of Human Activity Sequences from Wearables using Fully Convolutional Networks.
CoRR, 2017
CoRR, 2017
CoRR, 2017
Modeling Attack Resilient Reconfigurable Latent Obfuscation Technique for PUF based Lightweight Authentication.
CoRR, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 2017 IEEE International Conference on RFID, 2017
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017
2016
Dataset, December, 2016
Effectiveness of a Batteryless and Wireless Wearable Sensor System for Identifying Bed and Chair Exits in Healthy Older People.
Sensors, 2016
Read operation performance of large selectorless cross-point array with self-rectifying memristive device.
Integr., 2016
Learning from Imbalanced Multiclass Sequential Data Streams Using Dynamically Weighted Conditional Random Fields.
CoRR, 2016
Proceedings of the 2016 IEEE International Conference on RFID, 2016
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016
Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016
Proceedings of the 2016 IEEE Asia Pacific Conference on Circuits and Systems, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Exploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Future Large-Scale Memristive Device Crossbar Arrays: Limits Imposed by Sneak-Path Currents on Read Operations.
CoRR, 2015
Proceedings of the 2015 IEEE International Conference on RFID, 2015
Proceedings of the 2015 IEEE International Conference on RFID, 2015
Recognising Activities in Real Time Using Body Worn Passive Sensors With Sparse Data Streams: To Interpolate or Not To Interpolate?
Proceedings of the 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2015
Proceedings of the Artificial Intelligence in Medicine, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
Proceedings of the 17th Australasian Computing Education Conference, 2015
2014
Proceedings of the IEEE International Conference on RFID, 2014
A highly accurate and scalable approach for addressing location uncertainty in asset tracking applications.
Proceedings of the IEEE International Conference on RFID, 2014
Watchdog: a novel, accurate and reliable method for addressing wandering-off using passive RFID tags.
Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, 2014
2013
A Novel Approach for Addressing Wandering Off Elderly Using Low Cost Passive RFID Tags.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013
Evaluation of Wearable Sensor Tag Data Segmentation Approaches for Real Time Activity Classification in Elderly.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013
Automated activity recognition and monitoring of elderly using wireless sensors: Research challenges.
Proceedings of the 5th IEEE International Workshop on Advances in Sensors and Interfaces, 2013
Proceedings of the 2013 IEEE Eighth International Conference on Intelligent Sensors, 2013
Proceedings of the 2013 IEEE Eighth International Conference on Intelligent Sensors, 2013
2012
Adding sense to the Internet of Things - An architecture framework for Smart Object systems.
Pers. Ubiquitous Comput., 2012
Proceedings of the Web Information Systems Engineering - WISE 2012, 2012
Framework for preventing falls in acute hospitals using passive sensor enabled radio frequency identification technology.
Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2012
Towards falls prevention: A wearable wireless and battery-less sensing and automatic identification tag for real time monitoring of human movements.
Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2012
PeerTrack: a platform for tracking and tracing objects in large-scale traceability networks.
Proceedings of the 15th International Conference on Extending Database Technology, 2012
2011
J. Netw. Comput. Appl., 2011
IEEE Intell. Syst., 2011
Comput. J., 2011
Proceedings of the International Conference on Parallel Processing, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
2010
J. Ubiquitous Syst. Pervasive Networks, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
A Condition Monitoring Platform Using COTS Wireless Sensor Networks: Lessons and Experience.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
2007
Methodology for Development and Objective Comparison of Architectures for Networked RFID.
Proceedings of the Dynamics in Logistics, First International Conference, 2007