Search Results for author: Suranga Seneviratne

Found 9 papers, 2 papers with code

Privacy-Preserving Spam Filtering using Functional Encryption

no code implementations8 Dec 2020 Sicong Wang, Naveen Karunanayake, Tham Nguyen, Suranga Seneviratne

Spam classification over encrypted emails enables the classifier to classify spam email without accessing the email, hence protects the privacy of email content.

Classification General Classification

A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps: A Case Study on Google Play Store

no code implementations2 Jun 2020 Naveen Karunanayake, Jathushan Rajasegaran, Ashanie Gunathillake, Suranga Seneviratne, Guillaume Jourjon

We show that a novel approach of combining content embeddings and style embeddings outperforms the baseline methods for image similarity such as SIFT, SURF, and various image hashing methods.

A Review of Computer Vision Methods in Network Security

no code implementations7 May 2020 Jia-Wei Zhao, Rahat Masood, Suranga Seneviratne

Network security has become an area of significant importance more than ever as highlighted by the eye-opening numbers of data breaches, attacks on critical infrastructure, and malware/ransomware/cryptojacker attacks that are reported almost every day.

Anomaly Detection Malware Detection

DeepCaps: Going Deeper with Capsule Networks

5 code implementations CVPR 2019 Jathushan Rajasegaran, Vinoj Jayasundara, Sandaru Jayasekara, Hirunima Jayasekara, Suranga Seneviratne, Ranga Rodrigo

Capsule Network is a promising concept in deep learning, yet its true potential is not fully realized thus far, providing sub-par performance on several key benchmark datasets with complex data.

TextCaps : Handwritten Character Recognition with Very Small Datasets

3 code implementations17 Apr 2019 Vinoj Jayasundara, Sandaru Jayasekara, Hirunima Jayasekara, Jathushan Rajasegaran, Suranga Seneviratne, Ranga Rodrigo

Our system is useful in character recognition for localized languages that lack much labeled training data and even in other related more general contexts such as object recognition.

Few-Shot Image Classification Image Generation

A Neural Embeddings Approach for Detecting Mobile Counterfeit Apps

no code implementations26 Apr 2018 Jathushan Rajasegaran, Suranga Seneviratne, Guillaume Jourjon

We show that further performance increases can be achieved by combining style embeddings with content embeddings.

BreathRNNet: Breathing Based Authentication on Resource-Constrained IoT Devices using RNNs

no code implementations22 Sep 2017 Jagmohan Chauhan, Suranga Seneviratne, Yining Hu, Archan Misra, Aruna Seneviratne, Youngki Lee

Increasing popularity of IoT devices makes a strong case for implementing RNN based inferences for applications such as acoustics based authentication, voice commands, and edge analytics for smart homes.

Cannot find the paper you are looking for? You can Submit a new open access paper.