Suranga Seneviratne

Orcid: 0000-0002-5485-5595

According to our database1, Suranga Seneviratne authored at least 73 papers between 2013 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Demo: P4 Based In-network ML with Federated Learning to Secure and Slice IoT Networks.
Proceedings of the 25th IEEE International Symposium on a World of Wireless, 2025

2024
Federated PCA on Grassmann Manifold for IoT Anomaly Detection.
IEEE/ACM Trans. Netw., October, 2024

Single-Sensor Sparse Adversarial Perturbation Attacks Against Behavioral Biometrics.
IEEE Internet Things J., 2024

Entailment-Driven Privacy Policy Classification with LLMs.
CoRR, 2024

SHFL: Secure Hierarchical Federated Learning Framework for Edge Networks.
CoRR, 2024

LLMs are One-Shot URL Classifiers and Explainers.
CoRR, 2024

Detecting and Characterising Mobile App Metamorphosis in Google Play Store.
CoRR, 2024

Federated PCA on Grassmann Manifold for IoT Anomaly Detection.
CoRR, 2024

A Survey of Deep Long-Tail Classification Advancements.
CoRR, 2024

Out-of-Distribution Data: An Acquaintance of Adversarial Examples - A Survey.
CoRR, 2024

Phishing URL detection generalisation using Unsupervised Domain Adaptation.
Comput. Networks, 2024

Demo: P4Xtnd: P4 Programmability on Resource Constrained Environments with Extended Network Functionalities.
Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos, 2024

DEMO : Passive Identification of WiFi Devices in Real-Time.
Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos, 2024

Federated Deep Equilibrium Learning: Harnessing Compact Global Representations to Enhance Personalization.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024

2023
Robust open-set classification for encrypted traffic fingerprinting.
Comput. Networks, November, 2023

Calibrated reconstruction based adversarial autoencoder model for novelty detection.
Pattern Recognit. Lett., May, 2023

Long-Tail Learning with Rebalanced Contrastive Loss.
CoRR, 2023

ExCeL : Combined Extreme and Collective Logit Information for Enhancing Out-of-Distribution Detection.
CoRR, 2023

Usability of Privacy Controls in Top Health Websites.
CoRR, 2023

Privacy-preserving spam filtering using homomorphic and functional encryption.
Comput. Commun., 2023

Non-Contrastive Learning-based Behavioural Biometrics for Smart IoT Devices.
Proceedings of the 19th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, 2023

POSTER: Performance Characterization of Binarized Neural Networks in Traffic Fingerprinting.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
A Multi-Modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps: A Case Study on Google Play Store.
IEEE Trans. Mob. Comput., 2022

Task adaptive siamese neural networks for open-set recognition of encrypted network traffic with bidirectional dropout.
Pattern Recognit. Lett., 2022

From traffic classes to content: A hierarchical approach for encrypted traffic classification.
Comput. Networks, 2022

Dissecting traffic fingerprinting CNNs with filter activations.
Comput. Networks, 2022

Inline Traffic Analysis Attacks on DNS over HTTPS.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

2021
SETA++: Real-Time Scalable Encrypted Traffic Analytics in Multi-Gbps Networks.
IEEE Trans. Netw. Serv. Manag., 2021

Power Control for Body Area Networks: Accurate Channel Prediction by Lightweight Deep Learning.
IEEE Internet Things J., 2021

MusicID: A Brainwave-Based User Authentication System for Internet of Things.
IEEE Internet Things J., 2021

DronePrint: Acoustic Signatures for Open-set Drone Detection and Identification with Online Data.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

A Review of Computer Vision Methods in Network Security.
IEEE Commun. Surv. Tutorials, 2021

SMAUG: Streaming Media Augmentation Using CGANs as a Defence Against Video Fingerprinting.
Proceedings of the 20th IEEE International Symposium on Network Computing and Applications, 2021

2020
Privacy-Preserving Spam Filtering using Functional Encryption.
CoRR, 2020

<i>LoRadar</i>: LoRa sensor network monitoring through passive packet sniffing.
Comput. Commun. Rev., 2020

Making Sense of Occluded Scenes using Light Field Pre-processing and Deep-learning.
Proceedings of the 2020 IEEE Region 10 Conference, 2020

Side-channel information leaks of Z-wave smart home IoT devices: demo abstract.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020

Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

Understanding Traffic Fingerprinting CNNs.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

SETA: Scalable Encrypted Traffic Analytics in Multi-Gbps Networks.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

Triplet Mining-based Phishing Webpage Detection.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

Poster Abstract: Passive Activity Classification of Smart Homes through Wireless Packet Sniffing.
Proceedings of the 19th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2020

Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

2019
Characterizing and Detecting Money Laundering Activities on the Bitcoin Network.
CoRR, 2019

TimeCaps: Capturing Time Series Data with Capsule Networks.
CoRR, 2019

Light weight and fine-grained access mechanism for secure access to outsourced data.
Concurr. Comput. Pract. Exp., 2019

A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps.
Proceedings of the World Wide Web Conference, 2019

TextCaps: Handwritten Character Recognition With Very Small Datasets.
Proceedings of the IEEE Winter Conference on Applications of Computer Vision, 2019

Deep Learning Channel Prediction for Transmit Power Control in Wireless Body Area Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

DeepCaps: Going Deeper With Capsule Networks.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

2018
Performance Characterization of Deep Learning Models for Breathing-based Authentication on Resource-Constrained Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

A Neural Embeddings Approach for Detecting Mobile Counterfeit Apps.
CoRR, 2018

Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks.
Computer, 2018

Deep Content: Unveiling Video Streaming Content from Encrypted WiFi Traffic.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

A First Look at SIM-Enabled Wearables in the Wild.
Proceedings of the Internet Measurement Conference 2018, 2018

5G Privacy: Scenarios and Solutions.
Proceedings of the IEEE 5G World Forum, 2018

2017
Spam Mobile Apps: Characteristics, Detection, and in the Wild Analysis.
ACM Trans. Web, 2017

App Miscategorization Detection: A Case Study on Google Play.
IEEE Trans. Knowl. Data Eng., 2017

BreathRNNet: Breathing Based Authentication on Resource-Constrained IoT Devices using RNNs.
CoRR, 2017

A Survey of Wearable Devices and Challenges.
IEEE Commun. Surv. Tutorials, 2017

A deep dive into location-based communities in social discovery networks.
Comput. Commun., 2017

Privacy preserving data access scheme for IoT devices.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

BreathPrint: Breathing Acoustics-based User Authentication.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

2016
Characterization of early smartwatch apps.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

2015
PrivMetrics: a framework to secure user privacy in smartphones.
PhD thesis, 2015

Early Detection of Spam Mobile Apps.
Proceedings of the 24th International Conference on World Wide Web, 2015

A measurement study of tracking in paid mobile applications.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

SSIDs in the wild: Extracting semantic information from WiFi SSIDs.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

2014
Your Installed Apps Reveal Your Gender and More!
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2014

Predicting user traits from a snapshot of apps installed on a smartphone.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2014

2013
Characterizing WiFi connection and its impact on mobile users: practical insights.
Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, 2013

Reconciling bitter rivals: Towards privacy-aware and bandwidth efficient mobile Ads delivery networks.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013


  Loading...