Skip to main content

Showing 1–12 of 12 results for author: Kostas, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.08088  [pdf, ps, other

    cs.NI cs.AI cs.CR cs.LG cs.RO

    Graph-Based Floor Separation Using Node Embeddings and Clustering of WiFi Trajectories

    Authors: Rabia Yasa Kostas, Kahraman Kostas

    Abstract: Indoor positioning systems (IPSs) are increasingly vital for location-based services in complex multi-storey environments. This study proposes a novel graph-based approach for floor separation using Wi-Fi fingerprint trajectories, addressing the challenge of vertical localization in indoor settings. We construct a graph where nodes represent Wi-Fi fingerprints, and edges are weighted by signal sim… ▽ More

    Submitted 12 May, 2025; originally announced May 2025.

  2. arXiv:2411.14441  [pdf, other

    cs.CR cs.AI cs.NI

    GeMID: Generalizable Models for IoT Device Identification

    Authors: Kahraman Kostas, Rabia Yasa Kostas, Mike Just, Michael A. Lones

    Abstract: With the proliferation of Internet of Things (IoT) devices, ensuring their security has become paramount. Device identification (DI), which distinguishes IoT devices based on their traffic patterns, plays a crucial role in both differentiating devices and identifying vulnerable ones, closing a serious security gap. However, existing approaches to DI that build machine learning models often overloo… ▽ More

    Submitted 5 November, 2024; originally announced November 2024.

    Comments: 8 pages main (9 figures, 2 tables), 19 pages Supplementary Material, 27 pages total

  3. arXiv:2407.07611  [pdf, other

    cs.LG cs.CE

    Physics-Informed Geometric Operators to Support Surrogate, Dimension Reduction and Generative Models for Engineering Design

    Authors: Shahroz Khan, Zahid Masood, Muhammad Usama, Konstantinos Kostas, Panagiotis Kaklis, Wei, Chen

    Abstract: In this work, we propose a set of physics-informed geometric operators (GOs) to enrich the geometric data provided for training surrogate/discriminative models, dimension reduction, and generative models, typically employed for performance prediction, dimension reduction, and creating data-driven parameterisations, respectively. However, as both the input and output streams of these models consist… ▽ More

    Submitted 10 July, 2024; originally announced July 2024.

  4. arXiv:2406.07578  [pdf, other

    cs.CR cs.AI cs.NI

    Individual Packet Features are a Risk to Model Generalisation in ML-Based Intrusion Detection

    Authors: Kahraman Kostas, Mike Just, Michael A. Lones

    Abstract: Machine learning is increasingly used for intrusion detection in IoT networks. This paper explores the effectiveness of using individual packet features (IPF), which are attributes extracted from a single network packet, such as timing, size, and source-destination information. Through literature review and experiments, we identify the limitations of IPF, showing they can produce misleadingly high… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

    Comments: 7 pages, 7 figures, 3 tables

  5. arXiv:2402.08540  [pdf, other

    cs.LG

    Generative VS non-Generative Models in Engineering Shape Optimization

    Authors: Muhammad Usama, Zahid Masood, Shahroz Khan, Konstantinos Kostas, Panagiotis Kaklis

    Abstract: In this work, we perform a systematic comparison of the effectiveness and efficiency of generative and non-generative models in constructing design spaces for novel and efficient design exploration and shape optimization. We apply these models in the case of airfoil/hydrofoil design and conduct the comparison on the resulting design spaces. A conventional Generative Adversarial Network (GAN) and a… ▽ More

    Submitted 13 February, 2024; originally announced February 2024.

  6. arXiv:2401.01343  [pdf, other

    cs.CR cs.AI cs.LG cs.NI

    IoTGeM: Generalizable Models for Behaviour-Based IoT Attack Detection

    Authors: Kahraman Kostas, Mike Just, Michael A. Lones

    Abstract: Previous research on behaviour-based attack detection on networks of IoT devices has resulted in machine learning models whose ability to adapt to unseen data is limited, and often not demonstrated. In this paper we present an approach for modelling IoT network attacks that focuses on generalizability, yet also leads to better detection and performance. First, we present an improved rolling window… ▽ More

    Submitted 17 October, 2023; originally announced January 2024.

    Comments: 25 pages (13 main, 12 supplementary appendix), 20 figures, 14 tables

  7. arXiv:2307.08679  [pdf, other

    cs.NI cs.CR

    Externally validating the IoTDevID device identification methodology using the CIC IoT 2022 Dataset

    Authors: Kahraman Kostas, Mike Just, Michael A. Lones

    Abstract: In the era of rapid IoT device proliferation, recognizing, diagnosing, and securing these devices are crucial tasks. The IoTDevID method (IEEE Internet of Things 2022) proposes a machine learning approach for device identification using network packet features. In this article we present a validation study of the IoTDevID method by testing core components, namely its feature set and its aggregatio… ▽ More

    Submitted 3 July, 2023; originally announced July 2023.

    Comments: 20 pages, 7 figures, 7 tables

  8. ShipHullGAN: A generic parametric modeller for ship hull design using deep convolutional generative model

    Authors: Shahroz Khan, Kosa Goucher-Lambert, Konstantinos Kostas, Panagiotis Kaklis

    Abstract: In this work, we introduce ShipHullGAN, a generic parametric modeller built using deep convolutional generative adversarial networks (GANs) for the versatile representation and generation of ship hulls. At a high level, the new model intends to address the current conservatism in the parametric ship design paradigm, where parametric modellers can only handle a particular ship type. We trained Ship… ▽ More

    Submitted 29 April, 2023; originally announced May 2023.

    Journal ref: Volume 411, 1 June 2023, 116051

  9. arXiv:2304.13905  [pdf, other

    cs.CR cs.AI cs.LG

    LSTM based IoT Device Identification

    Authors: Kahraman Kostas

    Abstract: While the use of the Internet of Things is becoming more and more popular, many security vulnerabilities are emerging with the large number of devices being introduced to the market. In this environment, IoT device identification methods provide a preventive security measure as an important factor in identifying these devices and detecting the vulnerabilities they suffer from. In this study, we pr… ▽ More

    Submitted 26 April, 2023; originally announced April 2023.

  10. arXiv:2304.13894  [pdf, other

    cs.CR cs.AI

    CNN based IoT Device Identification

    Authors: Kahraman Kostas

    Abstract: While the use of the Internet of Things is becoming more and more popular, many security vulnerabilities are emerging with the large number of devices being introduced to the market. In this environment, IoT device identification methods provide a preventive security measure as an important factor in identifying these devices and detecting the vulnerabilities they suffer from. In this study, we pr… ▽ More

    Submitted 26 April, 2023; originally announced April 2023.

  11. WiFi Based Distance Estimation Using Supervised Machine Learning

    Authors: Kahraman Kostas, Rabia Yasa Kostas, Francisco Zampella, Firas Alsehly

    Abstract: In recent years WiFi became the primary source of information to locate a person or device indoor. Collecting RSSI values as reference measurements with known positions, known as WiFi fingerprinting, is commonly used in various positioning methods and algorithms that appear in literature. However, measuring the spatial distance between given set of WiFi fingerprints is heavily affected by the sele… ▽ More

    Submitted 15 August, 2022; originally announced August 2022.

    Comments: 8 pages, 9 figures, 5 table. Accepted by 2022 International Conference on Indoor Positioning and Indoor Navigation (IPIN), 5 - 7 Sep. 2022, Beijing, China

  12. IoTDevID: A Behavior-Based Device Identification Method for the IoT

    Authors: Kahraman Kostas, Mike Just, Michael A. Lones

    Abstract: Device identification is one way to secure a network of IoT devices, whereby devices identified as suspicious can subsequently be isolated from a network. In this study, we present a machine learning-based method, IoTDevID, that recognizes devices through characteristics of their network packets. As a result of using a rigorous feature analysis and selection process, our study offers a generalizab… ▽ More

    Submitted 18 July, 2022; v1 submitted 17 February, 2021; originally announced February 2021.

    Comments: 8 pages, 5 figures, 8 table. Accepted by IEEE Internet of Things Journal