Search Results for author: Salil S. Kanhere

Found 24 papers, 6 papers with code

Contextual Chart Generation for Cyber Deception

no code implementations7 Apr 2024 David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere, Sharif Abuadbba

Honeyfiles are a type of honeypot that mimic real, sensitive documents, creating the illusion of the presence of valuable data.

Data Interaction Image Generation +1

SoK: Can Trajectory Generation Combine Privacy and Utility?

1 code implementation12 Mar 2024 Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil S. Kanhere

This work focuses on the systematisation of the state-of-the-art generative models for trajectories in the context of the proposed framework.

Privacy Preserving

BotSSCL: Social Bot Detection with Self-Supervised Contrastive Learning

no code implementations6 Feb 2024 Mohammad Majid Akhtar, Navid Shadman Bhuiyan, Rahat Masood, Muhammad Ikram, Salil S. Kanhere

To address these challenges, we propose a novel framework for social Bot detection with Self-Supervised Contrastive Learning (BotSSCL).

Contrastive Learning

Multiple Hypothesis Dropout: Estimating the Parameters of Multi-Modal Output Distributions

1 code implementation18 Dec 2023 David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere

In many real-world applications, from robotics to pedestrian trajectory prediction, there is a need to predict multiple real-valued outputs to represent several potential scenarios.

Multiple-choice Pedestrian Trajectory Prediction +1

Local Differential Privacy for Smart Meter Data Sharing

no code implementations8 Nov 2023 Yashothara Shanmugarasa, M. A. P. Chamikara, Hye-Young Paik, Salil S. Kanhere, Liming Zhu

In this paper, we propose a novel LDP approach (named LDP-SmartEnergy) that utilizes randomized response techniques with sliding windows to facilitate the sharing of appliance-level energy consumption data over time while not revealing individual users' appliance usage patterns.

energy management Management

False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations

no code implementations24 Aug 2023 Mohammad Majid Akhtar, Rahat Masood, Muhammad Ikram, Salil S. Kanhere

While researchers from various disciplines have investigated different manipulation-triggering elements of OSNs (such as understanding information diffusion on OSNs or detecting automated behavior of accounts), these works have not been consolidated to present a comprehensive overview of the interconnections among these elements.

Discretization-based ensemble model for robust learning in IoT

no code implementations18 Jul 2023 Anahita Namvar, Chandra Thapa, Salil S. Kanhere

IoT device identification is the process of recognizing and verifying connected IoT devices to the network.

Management

DualVAE: Controlling Colours of Generated and Real Images

no code implementations30 May 2023 Keerth Rathakumar, David Liebowitz, Christian Walder, Kristen Moore, Salil S. Kanhere

The disentangled representation is obtained by two novel mechanisms: (i) a dual branch architecture that separates image colour attributes from geometric attributes, and (ii) a new ELBO that trains the combined colour and geometry representations.

Image Generation

Masked Vector Quantization

no code implementations16 Jan 2023 David D. Nguyen, David Leibowitz, Surya Nepal, Salil S. Kanhere

Generative models with discrete latent representations have recently demonstrated an impressive ability to learn complex high-dimensional data distributions.

Quantization

Diverse Multimedia Layout Generation with Multi Choice Learning

no code implementations16 Jan 2023 David D. Nguyen, Surya Nepal, Salil S. Kanhere

In the above example, this would form an unacceptable layout with a logo in the centre.

Machine Learning-based Automatic Annotation and Detection of COVID-19 Fake News

no code implementations7 Sep 2022 Mohammad Majid Akhtar, Bibhas Sharma, Ishan Karunanayake, Rahat Masood, Muhammad Ikram, Salil S. Kanhere

Existing work neglects the presence of bots that act as a catalyst in the spread and focuses on fake news detection in 'articles shared in posts' rather than the post (textual) content.

Fake News Detection Misinformation

Deception for Cyber Defence: Challenges and Opportunities

no code implementations15 Aug 2022 David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar

Deception is rapidly growing as an important tool for cyber defence, complementing existing perimeter security measures to rapidly detect breaches and data theft.

Can pre-trained Transformers be used in detecting complex sensitive sentences? -- A Monsanto case study

no code implementations14 Mar 2022 Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere

We experimented with four different categories of documents in the Monsanto dataset and observed that BERT achieves better F2 scores by 24. 13\% to 65. 79\% for GHOST, 30. 14\% to 54. 88\% for TOXIC, 39. 22\% for CHEMI, 53. 57\% for REGUL compared to existing sensitive information detection models.

HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios

no code implementations14 Dec 2020 Hassan Ali, Surya Nepal, Salil S. Kanhere, Sanjay Jha

We have witnessed the continuing arms race between backdoor attacks and the corresponding defense strategies on Deep Neural Networks (DNNs).

Backdoor Attack

Energy and Service-priority aware Trajectory Design for UAV-BSs using Double Q-Learning

no code implementations26 Oct 2020 Sayed Amir Hoseini, Ayub Bokani, Jahan Hassan, Shavbo Salehi, Salil S. Kanhere

Next-generation mobile networks have proposed the integration of Unmanned Aerial Vehicles (UAVs) as aerial base stations (UAV-BS) to serve ground nodes.

Q-Learning

Recommender Systems for the Internet of Things: A Survey

no code implementations14 Jul 2020 May Altulyan, Lina Yao, Xianzhi Wang, Chaoran Huang, Salil S. Kanhere, Quan Z. Sheng

Recommendation represents a vital stage in developing and promoting the benefits of the Internet of Things (IoT).

Recommendation Systems

MOF-BC: A Memory Optimized and Flexible BlockChain for Large Scale Networks

1 code implementation13 Jan 2018 Ali Dorri, Salil S. Kanhere, Raja Jurdak

To allow for the removal of stored transactions, all keys would need to be stored which complicates key management and storage.

Cryptography and Security

LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy

no code implementations8 Dec 2017 Ali Dorri, Salil S. Kanhere, Raja Jurdak, Praveen Gauravaram

We explore LSB in a smart home setting as a representative example for broader IoT applications.

Cryptography and Security

MindID: Person Identification from Brain Waves through Attention-based Recurrent Neural Network

2 code implementations16 Nov 2017 Xiang Zhang, Lina Yao, Salil S. Kanhere, Yunhao Liu, Tao Gu, Kai-Xuan Chen

The proposed approach is evaluated over 3 datasets (two local and one public).

Human-Computer Interaction

Converting Your Thoughts to Texts: Enabling Brain Typing via Deep Feature Learning of EEG Signals

2 code implementations26 Sep 2017 Xiang Zhang, Lina Yao, Quan Z. Sheng, Salil S. Kanhere, Tao Gu, Dalin Zhang

An electroencephalography (EEG) based Brain Computer Interface (BCI) enables people to communicate with the outside world by interpreting the EEG signals of their brains to interact with devices such as wheelchairs and intelligent robots.

EEG General Classification +1

Cannot find the paper you are looking for? You can Submit a new open access paper.