no code implementations • 7 Apr 2024 • David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere, Sharif Abuadbba
Honeyfiles are a type of honeypot that mimic real, sensitive documents, creating the illusion of the presence of valuable data.
1 code implementation • 12 Mar 2024 • Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil S. Kanhere
This work focuses on the systematisation of the state-of-the-art generative models for trajectories in the context of the proposed framework.
no code implementations • 6 Feb 2024 • Mohammad Majid Akhtar, Navid Shadman Bhuiyan, Rahat Masood, Muhammad Ikram, Salil S. Kanhere
To address these challenges, we propose a novel framework for social Bot detection with Self-Supervised Contrastive Learning (BotSSCL).
1 code implementation • 18 Dec 2023 • David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere
In many real-world applications, from robotics to pedestrian trajectory prediction, there is a need to predict multiple real-valued outputs to represent several potential scenarios.
no code implementations • 8 Nov 2023 • Yashothara Shanmugarasa, M. A. P. Chamikara, Hye-Young Paik, Salil S. Kanhere, Liming Zhu
In this paper, we propose a novel LDP approach (named LDP-SmartEnergy) that utilizes randomized response techniques with sliding windows to facilitate the sharing of appliance-level energy consumption data over time while not revealing individual users' appliance usage patterns.
no code implementations • 24 Aug 2023 • Mohammad Majid Akhtar, Rahat Masood, Muhammad Ikram, Salil S. Kanhere
While researchers from various disciplines have investigated different manipulation-triggering elements of OSNs (such as understanding information diffusion on OSNs or detecting automated behavior of accounts), these works have not been consolidated to present a comprehensive overview of the interconnections among these elements.
no code implementations • 18 Jul 2023 • Anahita Namvar, Chandra Thapa, Salil S. Kanhere
IoT device identification is the process of recognizing and verifying connected IoT devices to the network.
no code implementations • 30 May 2023 • Keerth Rathakumar, David Liebowitz, Christian Walder, Kristen Moore, Salil S. Kanhere
The disentangled representation is obtained by two novel mechanisms: (i) a dual branch architecture that separates image colour attributes from geometric attributes, and (ii) a new ELBO that trains the combined colour and geometry representations.
no code implementations • 25 May 2023 • Sukhpal Singh Gill, Minxian Xu, Panos Patros, Huaming Wu, Rupinder Kaur, Kamalpreet Kaur, Stephanie Fuller, Manmeet Singh, Priyansh Arora, Ajith Kumar Parlikad, Vlado Stankovski, Ajith Abraham, Soumya K. Ghosh, Hanan Lutfiyya, Salil S. Kanhere, Rami Bahsoon, Omer Rana, Schahram Dustdar, Rizos Sakellariou, Steve Uhlig, Rajkumar Buyya
ChatGPT, an AI-based chatbot, was released to provide coherent and useful replies based on analysis of large volumes of data.
no code implementations • 16 Jan 2023 • David D. Nguyen, David Leibowitz, Surya Nepal, Salil S. Kanhere
Generative models with discrete latent representations have recently demonstrated an impressive ability to learn complex high-dimensional data distributions.
no code implementations • 16 Jan 2023 • David D. Nguyen, Surya Nepal, Salil S. Kanhere
In the above example, this would form an unacceptable layout with a logo in the centre.
no code implementations • 7 Sep 2022 • Mohammad Majid Akhtar, Bibhas Sharma, Ishan Karunanayake, Rahat Masood, Muhammad Ikram, Salil S. Kanhere
Existing work neglects the presence of bots that act as a catalyst in the spread and focuses on fake news detection in 'articles shared in posts' rather than the post (textual) content.
no code implementations • 15 Aug 2022 • David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar
Deception is rapidly growing as an important tool for cyber defence, complementing existing perimeter security measures to rapidly detect breaches and data theft.
no code implementations • 21 Jun 2022 • Shuiqiao Yang, Bao Gia Doan, Paul Montague, Olivier De Vel, Tamas Abraham, Seyit Camtepe, Damith C. Ranasinghe, Salil S. Kanhere
In this paper, we disclose the TRAP attack, a Transferable GRAPh backdoor attack.
no code implementations • 14 Mar 2022 • Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere
We experimented with four different categories of documents in the Monsanto dataset and observed that BERT achieves better F2 scores by 24. 13\% to 65. 79\% for GHOST, 30. 14\% to 54. 88\% for TOXIC, 39. 22\% for CHEMI, 53. 57\% for REGUL compared to existing sensitive information detection models.
no code implementations • 23 Nov 2021 • Carlos A. Rivera A., Arash Shaghaghi, David D. Nguyen, Salil S. Kanhere
Security risk assessment and prediction are critical for organisations deploying Internet of Things (IoT) devices.
no code implementations • 14 Dec 2020 • Hassan Ali, Surya Nepal, Salil S. Kanhere, Sanjay Jha
We have witnessed the continuing arms race between backdoor attacks and the corresponding defense strategies on Deep Neural Networks (DNNs).
no code implementations • 26 Oct 2020 • Sayed Amir Hoseini, Ayub Bokani, Jahan Hassan, Shavbo Salehi, Salil S. Kanhere
Next-generation mobile networks have proposed the integration of Unmanned Aerial Vehicles (UAVs) as aerial base stations (UAV-BS) to serve ground nodes.
no code implementations • 14 Jul 2020 • May Altulyan, Lina Yao, Xianzhi Wang, Chaoran Huang, Salil S. Kanhere, Quan Z. Sheng
Recommendation represents a vital stage in developing and promoting the benefits of the Internet of Things (IoT).
1 code implementation • 24 May 2019 • Lei Bai, Lina Yao, Salil S. Kanhere, Xianzhi Wang, Quan Z. Sheng
Multi-step passenger demand forecasting is a crucial task in on-demand vehicle sharing services.
1 code implementation • 13 Jan 2018 • Ali Dorri, Salil S. Kanhere, Raja Jurdak
To allow for the removal of stored transactions, all keys would need to be stored which complicates key management and storage.
Cryptography and Security
no code implementations • 8 Dec 2017 • Ali Dorri, Salil S. Kanhere, Raja Jurdak, Praveen Gauravaram
We explore LSB in a smart home setting as a representative example for broader IoT applications.
Cryptography and Security
2 code implementations • 16 Nov 2017 • Xiang Zhang, Lina Yao, Salil S. Kanhere, Yunhao Liu, Tao Gu, Kai-Xuan Chen
The proposed approach is evaluated over 3 datasets (two local and one public).
Human-Computer Interaction
2 code implementations • 26 Sep 2017 • Xiang Zhang, Lina Yao, Quan Z. Sheng, Salil S. Kanhere, Tao Gu, Dalin Zhang
An electroencephalography (EEG) based Brain Computer Interface (BCI) enables people to communicate with the outside world by interpreting the EEG signals of their brains to interact with devices such as wheelchairs and intelligent robots.