Skip to main content

Showing 1–38 of 38 results for author: Seneviratne, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.10599  [pdf, other

    cs.IR cs.DB

    General algorithm of assigning raster features to vector maps at any resolution or scale

    Authors: Nan Xu, Mark Stevenson, Kerry A. Nice, Sachith Seneviratne

    Abstract: The fusion of multi-source data is essential for a comprehensive analysis of geographic applications. Due to distinct data structures, the fusion process tends to encounter technical difficulties in terms of preservation of the intactness of each source data. Furthermore, a lack of generalized methods is a problem when the method is expected to be applicable in multiple resolutions, sizes, or scal… ▽ More

    Submitted 15 July, 2024; originally announced July 2024.

  2. arXiv:2407.07421  [pdf, other

    cs.LG cs.AI cs.CR cs.DC

    Federated PCA on Grassmann Manifold for IoT Anomaly Detection

    Authors: Tung-Anh Nguyen, Long Tan Le, Tuan Dung Nguyen, Wei Bao, Suranga Seneviratne, Choong Seon Hong, Nguyen H. Tran

    Abstract: With the proliferation of the Internet of Things (IoT) and the rising interconnectedness of devices, network security faces significant challenges, especially from anomalous activities. While traditional machine learning-based intrusion detection systems (ML-IDS) effectively employ supervised learning methods, they possess limitations such as the requirement for labeled data and challenges with hi… ▽ More

    Submitted 10 July, 2024; originally announced July 2024.

    Comments: Accepted for publication at IEEE/ACM Transactions on Networking

    Journal ref: IEEE/ACM Transactions on Networking On page(s): 1-16 Print ISSN: 1063-6692 Online ISSN: 1558-2566 Digital Object Identifier: 10.1109/TNET.2024.3423780

  3. arXiv:2406.13272  [pdf, other

    cs.CV

    AniFaceDiff: High-Fidelity Face Reenactment via Facial Parametric Conditioned Diffusion Models

    Authors: Ken Chen, Sachith Seneviratne, Wei Wang, Dongting Hu, Sanjay Saha, Md. Tarek Hasan, Sanka Rasnayaka, Tamasha Malepathirana, Mingming Gong, Saman Halgamuge

    Abstract: Face reenactment refers to the process of transferring the pose and facial expressions from a reference (driving) video onto a static facial (source) image while maintaining the original identity of the source image. Previous research in this domain has made significant progress by training controllable deep generative models to generate faces based on specific identity, pose and expression condit… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

  4. arXiv:2404.15593  [pdf, other

    cs.LG

    A Survey of Deep Long-Tail Classification Advancements

    Authors: Charika de Alvis, Suranga Seneviratne

    Abstract: Many data distributions in the real world are hardly uniform. Instead, skewed and long-tailed distributions of various kinds are commonly observed. This poses an interesting problem for machine learning, where most algorithms assume or work well with uniformly distributed data. The problem is further exacerbated by current state-of-the-art deep learning models requiring large volumes of training d… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

  5. arXiv:2404.05219  [pdf, other

    cs.LG

    Out-of-Distribution Data: An Acquaintance of Adversarial Examples -- A Survey

    Authors: Naveen Karunanayake, Ravin Gunawardena, Suranga Seneviratne, Sanjay Chawla

    Abstract: Deep neural networks (DNNs) deployed in real-world applications can encounter out-of-distribution (OOD) data and adversarial examples. These represent distinct forms of distributional shifts that can significantly impact DNNs' reliability and robustness. Traditionally, research has addressed OOD detection and adversarial robustness as separate challenges. This survey focuses on the intersection of… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

  6. arXiv:2312.10913  [pdf, other

    cs.LG cs.AI

    GINN-LP: A Growing Interpretable Neural Network for Discovering Multivariate Laurent Polynomial Equations

    Authors: Nisal Ranasinghe, Damith Senanayake, Sachith Seneviratne, Malin Premaratne, Saman Halgamuge

    Abstract: Traditional machine learning is generally treated as a black-box optimization problem and does not typically produce interpretable functions that connect inputs and outputs. However, the ability to discover such interpretable functions is desirable. In this work, we propose GINN-LP, an interpretable neural network to discover the form and coefficients of the underlying equation of a dataset, when… ▽ More

    Submitted 14 February, 2024; v1 submitted 17 December, 2023; originally announced December 2023.

    Comments: 14 pages, 12 figures, Accepted by AAAI24

  7. arXiv:2312.01753  [pdf, other

    cs.LG cs.CV

    Long-Tail Learning with Rebalanced Contrastive Loss

    Authors: Charika De Alvis, Dishanika Denipitiyage, Suranga Seneviratne

    Abstract: Integrating supervised contrastive loss to cross entropy-based communication has recently been proposed as a solution to address the long-tail learning problem. However, when the class imbalance ratio is high, it requires adjusting the supervised contrastive loss to support the tail classes, as the conventional contrastive learning is biased towards head classes by default. To this end, we present… ▽ More

    Submitted 8 July, 2024; v1 submitted 4 December, 2023; originally announced December 2023.

  8. arXiv:2311.14754  [pdf, other

    cs.LG

    ExCeL : Combined Extreme and Collective Logit Information for Enhancing Out-of-Distribution Detection

    Authors: Naveen Karunanayake, Suranga Seneviratne, Sanjay Chawla

    Abstract: Deep learning models often exhibit overconfidence in predicting out-of-distribution (OOD) data, underscoring the crucial role of OOD detection in ensuring reliability in predictions. Among various OOD detection approaches, post-hoc detectors have gained significant popularity, primarily due to their ease of use and implementation. However, the effectiveness of most post-hoc OOD detectors has been… ▽ More

    Submitted 23 November, 2023; originally announced November 2023.

  9. arXiv:2309.09446  [pdf, other

    cs.CV

    Scalable Label-efficient Footpath Network Generation Using Remote Sensing Data and Self-supervised Learning

    Authors: Xinye Wanyan, Sachith Seneviratne, Kerry Nice, Jason Thompson, Marcus White, Nano Langenheim, Mark Stevenson

    Abstract: Footpath mapping, modeling, and analysis can provide important geospatial insights to many fields of study, including transport, health, environment and urban planning. The availability of robust Geographic Information System (GIS) layers can benefit the management of infrastructure inventories, especially at local government level with urban planners responsible for the deployment and maintenance… ▽ More

    Submitted 17 September, 2023; originally announced September 2023.

  10. arXiv:2305.06564  [pdf, other

    cs.CV

    Undercover Deepfakes: Detecting Fake Segments in Videos

    Authors: Sanjay Saha, Rashindrie Perera, Sachith Seneviratne, Tamasha Malepathirana, Sanka Rasnayaka, Deshani Geethika, Terence Sim, Saman Halgamuge

    Abstract: The recent renaissance in generative models, driven primarily by the advent of diffusion models and iterative improvement in GAN methods, has enabled many creative applications. However, each advancement is also accompanied by a rise in the potential for misuse. In the arena of the deepfake generation, this is a key societal issue. In particular, the ability to modify segments of videos using such… ▽ More

    Submitted 24 August, 2023; v1 submitted 11 May, 2023; originally announced May 2023.

    Comments: ICCV 2023 Workshop and Challenge on DeepFake Analysis and Detection

  11. arXiv:2305.03273  [pdf, other

    cs.CV cs.AI cs.LG

    Semantic Segmentation using Vision Transformers: A survey

    Authors: Hans Thisanke, Chamli Deshan, Kavindu Chamith, Sachith Seneviratne, Rajith Vidanaarachchi, Damayanthi Herath

    Abstract: Semantic segmentation has a broad range of applications in a variety of domains including land coverage analysis, autonomous driving, and medical image analysis. Convolutional neural networks (CNN) and Vision Transformers (ViTs) provide the architecture models for semantic segmentation. Even though ViTs have proven success in image classification, they cannot be directly applied to dense predictio… ▽ More

    Submitted 5 May, 2023; originally announced May 2023.

    Comments: 35 pages, 13 figures, 2 tables

  12. arXiv:2303.07035  [pdf, other

    cs.CV

    FireRisk: A Remote Sensing Dataset for Fire Risk Assessment with Benchmarks Using Supervised and Self-supervised Learning

    Authors: Shuchang Shen, Sachith Seneviratne, Xinye Wanyan, Michael Kirley

    Abstract: In recent decades, wildfires, as widespread and extremely destructive natural disasters, have caused tremendous property losses and fatalities, as well as extensive damage to forest ecosystems. Many fire risk assessment projects have been proposed to prevent wildfires, but GIS-based methods are inherently challenging to scale to different geographic areas due to variations in data collection and l… ▽ More

    Submitted 21 September, 2023; v1 submitted 13 March, 2023; originally announced March 2023.

    Comments: 10 pages, 6 figures, 1 table, 1 equation

  13. arXiv:2303.06670  [pdf, other

    cs.CV

    Extending global-local view alignment for self-supervised learning with remote sensing imagery

    Authors: Xinye Wanyan, Sachith Seneviratne, Shuchang Shen, Michael Kirley

    Abstract: Since large number of high-quality remote sensing images are readily accessible, exploiting the corpus of images with less manual annotation draws increasing attention. Self-supervised models acquire general feature representations by formulating a pretext task that generates pseudo-labels for massive unlabeled data to provide supervision for training. While prior studies have explored multiple se… ▽ More

    Submitted 23 April, 2024; v1 submitted 12 March, 2023; originally announced March 2023.

  14. arXiv:2303.01838  [pdf, other

    cs.CR

    Usability of Privacy Controls in Top Health Websites

    Authors: Ravin Gunawardena, Yuemeng Yin, Yi Huang, Rahat Masood, Suranga Seneviratne, Imran Razzak, Nguyen Tran, Aruna Seneviratne

    Abstract: With the increasing awareness and concerns around privacy, many service providers offer their users various privacy controls. Through these controls, users gain greater authority over the collection, utilisation, and dissemination of their personal information by the services. However, these controls may be buried deep within menus or settings, making them difficult for a user to access. Additiona… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

  15. arXiv:2210.12964  [pdf, other

    cs.CR cs.AI cs.LG

    Non-Contrastive Learning-based Behavioural Biometrics for Smart IoT Devices

    Authors: Oshan Jayawardana, Fariza Rashid, Suranga Seneviratne

    Abstract: Behaviour biometrics are being explored as a viable alternative to overcome the limitations of traditional authentication methods such as passwords and static biometrics. Also, they are being considered as a viable authentication method for IoT devices such as smart headsets with AR/VR capabilities, wearables, and erables, that do not have a large form factor or the ability to seamlessly interact… ▽ More

    Submitted 24 October, 2022; originally announced October 2022.

    Comments: NA

  16. arXiv:2210.03072  [pdf, ps, other

    cs.CV cs.HC

    IJCB 2022 Mobile Behavioral Biometrics Competition (MobileB2C)

    Authors: Giuseppe Stragapede, Ruben Vera-Rodriguez, Ruben Tolosana, Aythami Morales, Julian Fierrez, Javier Ortega-Garcia, Sanka Rasnayaka, Sachith Seneviratne, Vipula Dissanayake, Jonathan Liebers, Ashhadul Islam, Samir Brahim Belhaouari, Sumaiya Ahmad, Suraiya Jabin

    Abstract: This paper describes the experimental framework and results of the IJCB 2022 Mobile Behavioral Biometrics Competition (MobileB2C). The aim of MobileB2C is benchmarking mobile user authentication systems based on behavioral biometric traits transparently acquired by mobile devices during ordinary Human-Computer Interaction (HCI), using a novel public database, BehavePassDB, and a standard experimen… ▽ More

    Submitted 6 October, 2022; originally announced October 2022.

  17. arXiv:2208.08047  [pdf, other

    cs.CV

    Urban feature analysis from aerial remote sensing imagery using self-supervised and semi-supervised computer vision

    Authors: Sachith Seneviratne, Jasper S. Wijnands, Kerry Nice, Haifeng Zhao, Branislava Godic, Suzanne Mavoa, Rajith Vidanaarachchi, Mark Stevenson, Leandro Garcia, Ruth F. Hunter, Jason Thompson

    Abstract: Analysis of overhead imagery using computer vision is a problem that has received considerable attention in academic literature. Most techniques that operate in this space are both highly specialised and require expensive manual annotation of large datasets. These problems are addressed here through the development of a more generic framework, incorporating advances in representation learning whic… ▽ More

    Submitted 16 August, 2022; originally announced August 2022.

    Comments: Submitted to journal 'Sustainable Cities and Society'

  18. Self-Supervised Vision Transformers for Malware Detection

    Authors: Sachith Seneviratne, Ridwan Shariffdeen, Sanka Rasnayaka, Nuran Kasthuriarachchi

    Abstract: Malware detection plays a crucial role in cyber-security with the increase in malware growth and advancements in cyber-attacks. Previously unseen malware which is not determined by security vendors are often used in these attacks and it is becoming inevitable to find a solution that can self-learn from unlabeled sample data. This paper presents SHERLOCK, a self-supervision based deep learning mode… ▽ More

    Submitted 15 August, 2022; originally announced August 2022.

  19. DALLE-URBAN: Capturing the urban design expertise of large text to image transformers

    Authors: Sachith Seneviratne, Damith Senanayake, Sanka Rasnayaka, Rajith Vidanaarachchi, Jason Thompson

    Abstract: Automatically converting text descriptions into images using transformer architectures has recently received considerable attention. Such advances have implications for many applied design disciplines across fashion, art, architecture, urban planning, landscape design and the future tools available to such disciplines. However, a detailed analysis capturing the capabilities of such models, specifi… ▽ More

    Submitted 3 October, 2022; v1 submitted 3 August, 2022; originally announced August 2022.

    Comments: Accepted to DICTA 2022, released 11000+ environmental scene images generated by Stable Diffusion and 1000+ images generated by DALLE-2

  20. Self-Supervision, Remote Sensing and Abstraction: Representation Learning Across 3 Million Locations

    Authors: Sachith Seneviratne, Kerry A. Nice, Jasper S. Wijnands, Mark Stevenson, Jason Thompson

    Abstract: Self-supervision based deep learning classification approaches have received considerable attention in academic literature. However, the performance of such methods on remote sensing imagery domains remains under-explored. In this work, we explore contrastive representation learning methods on the task of imagery-based city classification, an important problem in urban computing. We use satellite… ▽ More

    Submitted 8 March, 2022; originally announced March 2022.

    Comments: Preprint of https://ieeexplore.ieee.org/document/9647061

  21. Does a Face Mask Protect my Privacy?: Deep Learning to Predict Protected Attributes from Masked Face Images

    Authors: Sachith Seneviratne, Nuran Kasthuriarachchi, Sanka Rasnayaka, Danula Hettiachchi, Ridwan Shariffdeen

    Abstract: Contactless and efficient systems are implemented rapidly to advocate preventive methods in the fight against the COVID-19 pandemic. Despite the positive benefits of such systems, there is potential for exploitation by invading user privacy. In this work, we analyse the privacy invasiveness of face biometric systems by predicting privacy-sensitive soft-biometrics using masked face images. We train… ▽ More

    Submitted 26 January, 2022; v1 submitted 14 December, 2021; originally announced December 2021.

    Comments: Accepted to AJCAI 2021 - 34th Australasian Joint Conference on Artificial Intelligence, Feb 2022, Sydney, Australia. http://ajcai2021.net/program

  22. arXiv:2108.13700  [pdf, other

    cs.CL cs.AI cs.IR cs.SE

    TNNT: The Named Entity Recognition Toolkit

    Authors: Sandaru Seneviratne, Sergio J. Rodríguez Méndez, Xuecheng Zhang, Pouya G. Omran, Kerry Taylor, Armin Haller

    Abstract: Extraction of categorised named entities from text is a complex task given the availability of a variety of Named Entity Recognition (NER) models and the unstructured information encoded in different source document formats. Processing the documents to extract text, identifying suitable NER models for a task, and obtaining statistical information is important in data analysis to make informed deci… ▽ More

    Submitted 31 August, 2021; originally announced August 2021.

    Comments: This demo paper will be submitted at K-Cap 2021

  23. arXiv:2106.15288  [pdf, other

    cs.CV

    MFR 2021: Masked Face Recognition Competition

    Authors: Fadi Boutros, Naser Damer, Jan Niklas Kolf, Kiran Raja, Florian Kirchbuchner, Raghavendra Ramachandra, Arjan Kuijper, Pengcheng Fang, Chao Zhang, Fei Wang, David Montero, Naiara Aginako, Basilio Sierra, Marcos Nieto, Mustafa Ekrem Erakin, Ugur Demir, Hazim Kemal, Ekenel, Asaki Kataoka, Kohei Ichikawa, Shizuma Kubo, Jie Zhang, Mingjie He, Dan Han, Shiguang Shan , et al. (10 additional authors not shown)

    Abstract: This paper presents a summary of the Masked Face Recognition Competitions (MFR) held within the 2021 International Joint Conference on Biometrics (IJCB 2021). The competition attracted a total of 10 participating teams with valid submissions. The affiliations of these teams are diverse and associated with academia and industry in nine different countries. These teams successfully submitted 18 vali… ▽ More

    Submitted 29 June, 2021; originally announced June 2021.

    Comments: Accepted at International Join Conference on Biometrics (IJCB 2021)

  24. Multi-Dataset Benchmarks for Masked Identification using Contrastive Representation Learning

    Authors: Sachith Seneviratne, Nuran Kasthuriaarachchi, Sanka Rasnayaka

    Abstract: The COVID-19 pandemic has drastically changed accepted norms globally. Within the past year, masks have been used as a public health response to limit the spread of the virus. This sudden change has rendered many face recognition based access control, authentication and surveillance systems ineffective. Official documents such as passports, driving license and national identity cards are enrolled… ▽ More

    Submitted 10 June, 2021; originally announced June 2021.

  25. arXiv:2012.04163  [pdf, other

    cs.CR cs.NE

    Privacy-Preserving Spam Filtering using Functional Encryption

    Authors: Sicong Wang, Naveen Karunanayake, Tham Nguyen, Suranga Seneviratne

    Abstract: Traditional spam classification requires the end-user to reveal the content of its received email to the spam classifier which violates the privacy. Spam classification over encrypted emails enables the classifier to classify spam email without accessing the email, hence protects the privacy of email content. In this paper, we construct a spam classification framework that enables the classificati… ▽ More

    Submitted 7 December, 2020; originally announced December 2020.

  26. arXiv:2007.03905  [pdf, other

    cs.CR

    Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps

    Authors: Weixian Yao, Yexuan Li, Weiye Lin, Tianhui Hu, Imran Chowdhury, Rahat Masood, Suranga Seneviratne

    Abstract: Third-party security apps are an integral part of the Android app ecosystem. Many users install them as an extra layer of protection for their devices. There are hundreds of such security apps, both free and paid in Google Play Store and some of them are downloaded millions of times. By installing security apps, the smartphone users place a significant amount of trust towards the security companie… ▽ More

    Submitted 8 July, 2020; originally announced July 2020.

    Comments: 10 pages, 13 figures, 3 tables, conference paper

  27. arXiv:2006.02231  [pdf, other

    cs.CR cs.CV cs.NE

    A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps: A Case Study on Google Play Store

    Authors: Naveen Karunanayake, Jathushan Rajasegaran, Ashanie Gunathillake, Suranga Seneviratne, Guillaume Jourjon

    Abstract: Counterfeit apps impersonate existing popular apps in attempts to misguide users to install them for various reasons such as collecting personal information or spreading malware. Many counterfeits can be identified once installed, however even a tech-savvy user may struggle to detect them before installation. To this end, this paper proposes to leverage the recent advances in deep learning methods… ▽ More

    Submitted 2 June, 2020; originally announced June 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:1804.09882

  28. arXiv:2006.01751  [pdf, other

    cs.CR eess.SP

    MusicID: A Brainwave-based User Authentication System for Internet of Things

    Authors: Jinani Sooriyaarachchi, Suranga Seneviratne, Kanchana Thilakarathna, Albert Y. Zomaya

    Abstract: We propose MusicID, an authentication solution for smart devices that uses music-induced brainwave patterns as a behavioral biometric modality. We experimentally evaluate MusicID using data collected from real users whilst they are listening to two forms of music; a popular English song and individual's favorite song. We show that an accuracy over 98% for user identification and an accuracy over 9… ▽ More

    Submitted 2 June, 2020; originally announced June 2020.

  29. arXiv:2005.07987  [pdf, other

    cs.CR

    Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud

    Authors: Zainab Abaid, Arash Shaghaghi, Ravin Gunawardena, Suranga Seneviratne, Aruna Seneviratne, Sanjay Jha

    Abstract: Secure and privacy-preserving management of Personal Health Records (PHRs) has proved to be a major challenge in modern healthcare. Current solutions generally do not offer patients a choice in where the data is actually stored and also rely on at least one fully trusted element that patients must also trust with their data. In this work, we present the Health Access Broker (HAB), a patient-contro… ▽ More

    Submitted 16 May, 2020; originally announced May 2020.

    Comments: Copy of the paper accepted at 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS)

  30. arXiv:2005.03318  [pdf, other

    cs.NI cs.CR cs.CV

    A Review of Computer Vision Methods in Network Security

    Authors: Jiawei Zhao, Rahat Masood, Suranga Seneviratne

    Abstract: Network security has become an area of significant importance more than ever as highlighted by the eye-opening numbers of data breaches, attacks on critical infrastructure, and malware/ransomware/cryptojacker attacks that are reported almost every day. Increasingly, we are relying on networked infrastructure and with the advent of IoT, billions of devices will be connected to the internet, providi… ▽ More

    Submitted 7 May, 2020; originally announced May 2020.

  31. arXiv:1912.12060  [pdf, other

    cs.SI cs.CR cs.LG

    Characterizing and Detecting Money Laundering Activities on the Bitcoin Network

    Authors: Yining Hu, Suranga Seneviratne, Kanchana Thilakarathna, Kensuke Fukuda, Aruna Seneviratne

    Abstract: Bitcoin is by far the most popular crypto-currency solution enabling peer-to-peer payments. Despite some studies highlighting the network does not provide full anonymity, it is still being heavily used for a wide variety of dubious financial activities such as money laundering, ponzi schemes, and ransom-ware payments. In this paper, we explore the landscape of potential money laundering activities… ▽ More

    Submitted 27 December, 2019; originally announced December 2019.

  32. arXiv:1911.11800  [pdf, other

    cs.LG cs.AI stat.ML

    TimeCaps: Capturing Time Series Data With Capsule Networks

    Authors: Hirunima Jayasekara, Vinoj Jayasundara, Mohamed Athif, Jathushan Rajasegaran, Sandaru Jayasekara, Suranga Seneviratne, Ranga Rodrigo

    Abstract: Capsule networks excel in understanding spatial relationships in 2D data for vision related tasks. Even though they are not designed to capture 1D temporal relationships, with TimeCaps we demonstrate that given the ability, capsule networks excel in understanding temporal relationships. To this end, we generate capsules along the temporal and channel dimensions creating two temporal feature detect… ▽ More

    Submitted 18 June, 2022; v1 submitted 26 November, 2019; originally announced November 2019.

  33. arXiv:1906.05039  [pdf

    cs.CL

    Concept Discovery through Information Extraction in Restaurant Domain

    Authors: Nadeesha Pathirana, Sandaru Seneviratne, Rangika Samarawickrama, Shane Wolff, Charith Chitraranjan, Uthayasanker Thayasivam, Tharindu Ranasinghe

    Abstract: Concept identification is a crucial step in understanding and building a knowledge base for any particular domain. However, it is not a simple task in very large domains such as restaurants and hotel. In this paper, a novel approach of identifying a concept hierarchy and classifying unseen words into identified concepts related to restaurant domain is presented. Sorting, identifying, classifying o… ▽ More

    Submitted 12 June, 2019; originally announced June 2019.

  34. arXiv:1904.09546  [pdf, other

    cs.CV

    DeepCaps: Going Deeper with Capsule Networks

    Authors: Jathushan Rajasegaran, Vinoj Jayasundara, Sandaru Jayasekara, Hirunima Jayasekara, Suranga Seneviratne, Ranga Rodrigo

    Abstract: Capsule Network is a promising concept in deep learning, yet its true potential is not fully realized thus far, providing sub-par performance on several key benchmark datasets with complex data. Drawing intuition from the success achieved by Convolutional Neural Networks (CNNs) by going deeper, we introduce DeepCaps1, a deep capsule network architecture which uses a novel 3D convolution based dyna… ▽ More

    Submitted 21 April, 2019; originally announced April 2019.

  35. TextCaps : Handwritten Character Recognition with Very Small Datasets

    Authors: Vinoj Jayasundara, Sandaru Jayasekara, Hirunima Jayasekara, Jathushan Rajasegaran, Suranga Seneviratne, Ranga Rodrigo

    Abstract: Many localized languages struggle to reap the benefits of recent advancements in character recognition systems due to the lack of substantial amount of labeled training data. This is due to the difficulty in generating large amounts of labeled data for such languages and inability of deep learning techniques to properly learn from small number of training samples. We solve this problem by introduc… ▽ More

    Submitted 17 April, 2019; originally announced April 2019.

    Journal ref: In 2019 IEEE Winter Conference on Applications of Computer Vision (WACV) (pp. 254-262). IEEE 2019

  36. arXiv:1804.09882  [pdf, other

    cs.CR cs.LG cs.NE

    A Neural Embeddings Approach for Detecting Mobile Counterfeit Apps

    Authors: Jathushan Rajasegaran, Suranga Seneviratne, Guillaume Jourjon

    Abstract: Counterfeit apps impersonate existing popular apps in attempts to misguide users to install them for various reasons such as collecting personal information, spreading malware, or simply to increase their advertisement revenue. Many counterfeits can be identified once installed, however even a tech-savvy user may struggle to detect them before installation as app icons and descriptions can be quit… ▽ More

    Submitted 25 April, 2018; originally announced April 2018.

  37. arXiv:1709.07626  [pdf, other

    cs.CR cs.LG cs.NE

    BreathRNNet: Breathing Based Authentication on Resource-Constrained IoT Devices using RNNs

    Authors: Jagmohan Chauhan, Suranga Seneviratne, Yining Hu, Archan Misra, Aruna Seneviratne, Youngki Lee

    Abstract: Recurrent neural networks (RNNs) have shown promising results in audio and speech processing applications due to their strong capabilities in modelling sequential data. In many applications, RNNs tend to outperform conventional models based on GMM/UBMs and i-vectors. Increasing popularity of IoT devices makes a strong case for implementing RNN based inferences for applications such as acoustics ba… ▽ More

    Submitted 22 September, 2017; originally announced September 2017.

  38. arXiv:1307.2380  [pdf

    cs.DC

    A Taxonomy of Performance Prediction Systems in the Parallel and Distributed Computing Grids

    Authors: Sena Seneviratne, David C. Levy, Rajkumar Buyya

    Abstract: As Grids are loosely-coupled congregations of geographically distributed heterogeneous resources, the efficient utilization of the resources requires the support of a sound Performance Prediction System (PPS). The performance prediction of grid resources is helpful for both Resource Management Systems and grid users to make optimized resource usage decisions. There have been many PPS projects that… ▽ More

    Submitted 12 July, 2013; v1 submitted 9 July, 2013; originally announced July 2013.

    Comments: 35 pages,4 figures,2 tables