Search Results for author: Suranga Seneviratne

Found 14 papers, 4 papers with code

DeepCaps: Going Deeper with Capsule Networks

5 code implementations CVPR 2019 Jathushan Rajasegaran, Vinoj Jayasundara, Sandaru Jayasekara, Hirunima Jayasekara, Suranga Seneviratne, Ranga Rodrigo

Capsule Network is a promising concept in deep learning, yet its true potential is not fully realized thus far, providing sub-par performance on several key benchmark datasets with complex data.

TextCaps : Handwritten Character Recognition with Very Small Datasets

3 code implementations17 Apr 2019 Vinoj Jayasundara, Sandaru Jayasekara, Hirunima Jayasekara, Jathushan Rajasegaran, Suranga Seneviratne, Ranga Rodrigo

Our system is useful in character recognition for localized languages that lack much labeled training data and even in other related more general contexts such as object recognition.

Few-Shot Image Classification Image Generation

Robust open-set classification for encrypted traffic fingerprinting

1 code implementation Elsevier Computer Networks Journal 2023 Thilini Dahanayaka, Yasod Ginige, Yi Huang, Guillaume Jourjon, Suranga Seneviratne

First, we show that a well-regularized deep learning model improves the open-set classification and then we propose a novel open-set classification method with three variants that perform consistently over multiple datasets.

Classification open-set classification +1

A Neural Embeddings Approach for Detecting Mobile Counterfeit Apps

no code implementations26 Apr 2018 Jathushan Rajasegaran, Suranga Seneviratne, Guillaume Jourjon

We show that further performance increases can be achieved by combining style embeddings with content embeddings.

BreathRNNet: Breathing Based Authentication on Resource-Constrained IoT Devices using RNNs

no code implementations22 Sep 2017 Jagmohan Chauhan, Suranga Seneviratne, Yining Hu, Archan Misra, Aruna Seneviratne, Youngki Lee

Increasing popularity of IoT devices makes a strong case for implementing RNN based inferences for applications such as acoustics based authentication, voice commands, and edge analytics for smart homes.

A Review of Computer Vision Methods in Network Security

no code implementations7 May 2020 Jia-Wei Zhao, Rahat Masood, Suranga Seneviratne

Network security has become an area of significant importance more than ever as highlighted by the eye-opening numbers of data breaches, attacks on critical infrastructure, and malware/ransomware/cryptojacker attacks that are reported almost every day.

Anomaly Detection Malware Detection

A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps: A Case Study on Google Play Store

no code implementations2 Jun 2020 Naveen Karunanayake, Jathushan Rajasegaran, Ashanie Gunathillake, Suranga Seneviratne, Guillaume Jourjon

We show that a novel approach of combining content embeddings and style embeddings outperforms the baseline methods for image similarity such as SIFT, SURF, and various image hashing methods.

Privacy-Preserving Spam Filtering using Functional Encryption

no code implementations8 Dec 2020 Sicong Wang, Naveen Karunanayake, Tham Nguyen, Suranga Seneviratne

Spam classification over encrypted emails enables the classifier to classify spam email without accessing the email, hence protects the privacy of email content.

Classification General Classification +1

Non-Contrastive Learning-based Behavioural Biometrics for Smart IoT Devices

no code implementations24 Oct 2022 Oshan Jayawardana, Fariza Rashid, Suranga Seneviratne

Behaviour biometrics are being explored as a viable alternative to overcome the limitations of traditional authentication methods such as passwords and static biometrics.

Contrastive Learning Data Augmentation +2

ExCeL : Combined Extreme and Collective Logit Information for Enhancing Out-of-Distribution Detection

no code implementations23 Nov 2023 Naveen Karunanayake, Suranga Seneviratne, Sanjay Chawla

Deep learning models often exhibit overconfidence in predicting out-of-distribution (OOD) data, underscoring the crucial role of OOD detection in ensuring reliability in predictions.

Out-of-Distribution Detection

Long-Tail Learning with Rebalanced Contrastive Loss

no code implementations4 Dec 2023 Charika De Alvis, Dishanika Denipitiyage, Suranga Seneviratne

We further demonstrate that the performance of RCL as a standalone loss also achieves state-of-the-art level accuracy.

Contrastive Learning Long-tail Learning

Out-of-Distribution Data: An Acquaintance of Adversarial Examples -- A Survey

no code implementations8 Apr 2024 Naveen Karunanayake, Ravin Gunawardena, Suranga Seneviratne, Sanjay Chawla

Finally, we highlight the limitations of the existing work and propose promising research directions that explore adversarial and OOD inputs within a unified framework.

Adversarial Robustness Anomaly Detection +1

Cannot find the paper you are looking for? You can Submit a new open access paper.