Skip to main content

Showing 1–37 of 37 results for author: Seneviratne, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2503.22749  [pdf, other

    cs.LG cs.AI

    Adaptive Clipping for Privacy-Preserving Few-Shot Learning: Enhancing Generalization with Limited Data

    Authors: Kanishka Ranaweera, Dinh C. Nguyen, Pubudu N. Pathirana, David Smith, Ming Ding, Thierry Rakotoarivelo, Aruna Seneviratne

    Abstract: In the era of data-driven machine-learning applications, privacy concerns and the scarcity of labeled data have become paramount challenges. These challenges are particularly pronounced in the domain of few-shot learning, where the ability to learn from limited labeled data is crucial. Privacy-preserving few-shot learning algorithms have emerged as a promising solution to address such pronounced c… ▽ More

    Submitted 27 March, 2025; originally announced March 2025.

  2. arXiv:2503.21159  [pdf, other

    cs.LG cs.AI

    Multi-Objective Optimization for Privacy-Utility Balance in Differentially Private Federated Learning

    Authors: Kanishka Ranaweera, David Smith, Pubudu N. Pathirana, Ming Ding, Thierry Rakotoarivelo, Aruna Seneviratne

    Abstract: Federated learning (FL) enables collaborative model training across distributed clients without sharing raw data, making it a promising approach for privacy-preserving machine learning. However, ensuring differential privacy (DP) in FL presents challenges due to the trade-off between model utility and privacy protection. Clipping gradients before aggregation is a common strategy to limit privacy l… ▽ More

    Submitted 27 March, 2025; originally announced March 2025.

  3. arXiv:2503.21154  [pdf, other

    cs.LG cs.AI

    Federated Learning with Differential Privacy: An Utility-Enhanced Approach

    Authors: Kanishka Ranaweera, Dinh C. Nguyen, Pubudu N. Pathirana, David Smith, Ming Ding, Thierry Rakotoarivelo, Aruna Seneviratne

    Abstract: Federated learning has emerged as an attractive approach to protect data privacy by eliminating the need for sharing clients' data while reducing communication costs compared with centralized machine learning algorithms. However, recent studies have shown that federated learning alone does not guarantee privacy, as private data may still be inferred from the uploaded parameters to the central serv… ▽ More

    Submitted 27 March, 2025; originally announced March 2025.

  4. arXiv:2503.18043  [pdf, other

    cs.CR cs.IR

    BERTDetect: A Neural Topic Modelling Approach for Android Malware Detection

    Authors: Nishavi Ranaweera, Jiarui Xu, Suranga Seneviratne, Aruna Seneviratne

    Abstract: Web access today occurs predominantly through mobile devices, with Android representing a significant share of the mobile device market. This widespread usage makes Android a prime target for malicious attacks. Despite efforts to combat malicious attacks through tools like Google Play Protect and antivirus software, new and evolved malware continues to infiltrate Android devices. Source code analy… ▽ More

    Submitted 23 March, 2025; originally announced March 2025.

  5. arXiv:2502.15739  [pdf, other

    cs.LG cs.CV cs.MM

    Detecting Content Rating Violations in Android Applications: A Vision-Language Approach

    Authors: D. Denipitiyage, B. Silva, S. Seneviratne, A. Seneviratne, S. Chawla

    Abstract: Despite regulatory efforts to establish reliable content-rating guidelines for mobile apps, the process of assigning content ratings in the Google Play Store remains self-regulated by the app developers. There is no straightforward method of verifying developer-assigned content ratings manually due to the overwhelming scale or automatically due to the challenging problem of interpreting textual an… ▽ More

    Submitted 7 February, 2025; originally announced February 2025.

    Comments: 11 pages, 8 figures

  6. arXiv:2502.04636  [pdf, other

    cs.CR cs.AI cs.SE

    An Empirical Study of Code Obfuscation Practices in the Google Play Store

    Authors: Akila Niroshan, Suranga Seneviratne, Aruna Seneviratne

    Abstract: The Android ecosystem is vulnerable to issues such as app repackaging, counterfeiting, and piracy, threatening both developers and users. To mitigate these risks, developers often employ code obfuscation techniques. However, while effective in protecting legitimate applications, obfuscation also hinders security investigations as it is often exploited for malicious purposes. As such, it is importa… ▽ More

    Submitted 6 February, 2025; originally announced February 2025.

    Comments: 13 pages, 8 figures

  7. arXiv:2409.16621  [pdf, other

    cs.AI

    Entailment-Driven Privacy Policy Classification with LLMs

    Authors: Bhanuka Silva, Dishanika Denipitiyage, Suranga Seneviratne, Anirban Mahanti, Aruna Seneviratne

    Abstract: While many online services provide privacy policies for end users to read and understand what personal data are being collected, these documents are often lengthy and complicated. As a result, the vast majority of users do not read them at all, leading to data collection under uninformed consent. Several attempts have been made to make privacy policies more user friendly by summarising them, provi… ▽ More

    Submitted 25 September, 2024; originally announced September 2024.

    Comments: 8 pages, 4 figures, 3 tables

  8. arXiv:2409.15067  [pdf, other

    cs.LG cs.CR

    SHFL: Secure Hierarchical Federated Learning Framework for Edge Networks

    Authors: Omid Tavallaie, Kanchana Thilakarathna, Suranga Seneviratne, Aruna Seneviratne, Albert Y. Zomaya

    Abstract: Federated Learning (FL) is a distributed machine learning paradigm designed for privacy-sensitive applications that run on resource-constrained devices with non-Identically and Independently Distributed (IID) data. Traditional FL frameworks adopt the client-server model with a single-level aggregation (AGR) process, where the server builds the global model by aggregating all trained local models r… ▽ More

    Submitted 23 September, 2024; originally announced September 2024.

  9. arXiv:2407.14565  [pdf, other

    cs.SE cs.AI cs.CV

    Detecting and Characterising Mobile App Metamorphosis in Google Play Store

    Authors: D. Denipitiyage, B. Silva, K. Gunathilaka, S. Seneviratne, A. Mahanti, A. Seneviratne, S. Chawla

    Abstract: App markets have evolved into highly competitive and dynamic environments for developers. While the traditional app life cycle involves incremental updates for feature enhancements and issue resolution, some apps deviate from this norm by undergoing significant transformations in their use cases or market positioning. We define this previously unstudied phenomenon as 'app metamorphosis'. In this p… ▽ More

    Submitted 18 July, 2024; originally announced July 2024.

    Comments: 15 pages, 14 figures

  10. arXiv:2303.01838  [pdf, other

    cs.CR

    Usability of Privacy Controls in Top Health Websites

    Authors: Ravin Gunawardena, Yuemeng Yin, Yi Huang, Rahat Masood, Suranga Seneviratne, Imran Razzak, Nguyen Tran, Aruna Seneviratne

    Abstract: With the increasing awareness and concerns around privacy, many service providers offer their users various privacy controls. Through these controls, users gain greater authority over the collection, utilisation, and dissemination of their personal information by the services. However, these controls may be buried deep within menus or settings, making them difficult for a user to access. Additiona… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

  11. arXiv:2302.13161  [pdf, other

    cs.CR cs.LG eess.SY

    Cybersecurity Challenges of Power Transformers

    Authors: Hossein Rahimpour, Joe Tusek, Alsharif Abuadbba, Aruna Seneviratne, Toan Phung, Ahmed Musleh, Boyu Liu

    Abstract: The rise of cyber threats on critical infrastructure and its potential for devastating consequences, has significantly increased. The dependency of new power grid technology on information, data analytic and communication systems make the entire electricity network vulnerable to cyber threats. Power transformers play a critical role within the power grid and are now commonly enhanced through facto… ▽ More

    Submitted 25 March, 2023; v1 submitted 25 February, 2023; originally announced February 2023.

    Comments: 11 pages

  12. arXiv:2206.09009  [pdf, other

    cs.CR eess.SP

    Intelligent Blockchain-based Edge Computing via Deep Reinforcement Learning: Solutions and Challenges

    Authors: Dinh C. Nguyen, Van-Dinh Nguyen, Ming Ding, Symeon Chatzinotas, Pubudu N. Pathirana, Aruna Seneviratne, Octavia Dobre, Albert Y. Zomaya

    Abstract: The convergence of mobile edge computing (MEC) and blockchain is transforming the current computing services in wireless Internet-of-Things networks, by enabling task offloading with security enhancement based on blockchain mining. Yet the existing approaches for these enabling technologies are isolated, providing only tailored solutions for specific services and scenarios. To fill this gap, we pr… ▽ More

    Submitted 17 June, 2022; originally announced June 2022.

    Comments: Accepted at IEEE Network Magazine, 8 pages. arXiv admin note: substantial text overlap with arXiv:2109.14263

  13. arXiv:2111.08834  [pdf, other

    cs.LG eess.SP

    Federated Learning for Smart Healthcare: A Survey

    Authors: Dinh C. Nguyen, Quoc-Viet Pham, Pubudu N. Pathirana, Ming Ding, Aruna Seneviratne, Zihuai Lin, Octavia A. Dobre, Won-Joo Hwang

    Abstract: Recent advances in communication technologies and Internet-of-Medical-Things have transformed smart healthcare enabled by artificial intelligence (AI). Traditionally, AI techniques require centralized data collection and processing that may be infeasible in realistic healthcare scenarios due to the high scalability of modern healthcare networks and growing data privacy concerns. Federated Learning… ▽ More

    Submitted 16 November, 2021; originally announced November 2021.

    Comments: Accepted at ACM Computing Surveys, 35 pages

  14. Federated Learning for COVID-19 Detection with Generative Adversarial Networks in Edge Cloud Computing

    Authors: Dinh C. Nguyen, Ming Ding, Pubudu N. Pathirana, Aruna Seneviratne, Albert Y. Zomaya

    Abstract: COVID-19 has spread rapidly across the globe and become a deadly pandemic. Recently, many artificial intelligence-based approaches have been used for COVID-19 detection, but they often require public data sharing with cloud datacentres and thus remain privacy concerns. This paper proposes a new federated learning scheme, called FedGAN, to generate realistic COVID-19 images for facilitating privacy… ▽ More

    Submitted 13 October, 2021; originally announced October 2021.

    Comments: Accepted at IEEE Internet of Things Journal, 14 pages

  15. Blockchain and AI-based Solutions to Combat Coronavirus (COVID-19)-like Epidemics: A Survey

    Authors: Dinh C. Nguyen, Ming Ding, Pubudu N. Pathirana, Aruna Seneviratne

    Abstract: The beginning of 2020 has seen the emergence of coronavirus outbreak caused by a novel virus called SARS-CoV-2. The sudden explosion and uncontrolled worldwide spread of COVID-19 show the limitations of existing healthcare systems in timely handling public health emergencies. In such contexts, innovative technologies such as blockchain and Artificial Intelligence (AI) have emerged as promising sol… ▽ More

    Submitted 28 June, 2021; originally announced June 2021.

    Comments: Accepted at IEEE Access Journal, 24 pages

  16. arXiv:2105.14659  [pdf, other

    cs.LG eess.SP

    Federated Learning for Industrial Internet of Things in Future Industries

    Authors: Dinh C. Nguyen, Ming Ding, Pubudu N. Pathirana, Aruna Seneviratne, Jun Li, Dusit Niyato, H. Vincent Poor

    Abstract: The Industrial Internet of Things (IIoT) offers promising opportunities to transform the operation of industrial systems and becomes a key enabler for future industries. Recently, artificial intelligence (AI) has been widely utilized for realizing intelligent IIoT applications where AI techniques require centralized data collection and processing. However, this is not always feasible in realistic… ▽ More

    Submitted 30 May, 2021; originally announced May 2021.

    Comments: Accepted at IEEE Wireless Communications Magazine

  17. arXiv:2104.01776  [pdf, other

    cs.CR eess.SP

    Federated Learning Meets Blockchain in Edge Computing: Opportunities and Challenges

    Authors: Dinh C. Nguyen, Ming Ding, Quoc-Viet Pham, Pubudu N. Pathirana, Long Bao Le, Aruna Seneviratne, Jun Li, Dusit Niyato, H. Vincent Poor

    Abstract: Mobile edge computing (MEC) has been envisioned as a promising paradigm to handle the massive volume of data generated from ubiquitous mobile devices for enabling intelligent services with the help of artificial intelligence (AI). Traditionally, AI techniques often require centralized data collection and training in a single entity, e.g., an MEC server, which is now becoming a weak point due to da… ▽ More

    Submitted 5 April, 2021; originally announced April 2021.

    Comments: Accepted at the IEEE Internet of Things Journal, 19 pages

  18. arXiv:2103.10186  [pdf, other

    cs.CR eess.SP

    A Cooperative Architecture of Data Offloading and Sharing for Smart Healthcare with Blockchain

    Authors: Dinh C. Nguyen, Pubudu N. Pathirana, Ming Ding, Aruna Seneviratne

    Abstract: The healthcare industry has witnessed significant transformations in e-health services where Electronic Health Records (EHRs) are transferred to mobile edge clouds to facilitate healthcare. Many edge cloud-based system designs have been proposed, but some technical challenges still remain, such as low quality of services (QoS), data privacy and system security due to centralized healthcare archite… ▽ More

    Submitted 30 March, 2021; v1 submitted 18 March, 2021; originally announced March 2021.

    Comments: Accepted in the IEEE International Conference on Blockchain and Cryptocurrency (IEEE ICBC 2021)

  19. A Survey of COVID-19 Contact Tracing Apps

    Authors: Nadeem Ahmed, Regio A. Michelin, Wanli Xue, Sushmita Ruj, Robert Malaney, Salil S. Kanhere, Aruna Seneviratne, Wen Hu, Helge Janicke, Sanjay Jha

    Abstract: The recent outbreak of COVID-19 has taken the world by surprise, forcing lockdowns and straining public health care systems. COVID-19 is known to be a highly infectious virus, and infected individuals do not initially exhibit symptoms, while some remain asymptomatic. Thus, a non-negligible fraction of the population can, at any given time, be a hidden source of transmissions. In response, many gov… ▽ More

    Submitted 26 July, 2020; v1 submitted 18 June, 2020; originally announced June 2020.

    Comments: Paper has been accepted for publication in IEEE Access. Currently available on IEEE ACCESS early access (see DOI)

  20. arXiv:2005.07987  [pdf, other

    cs.CR

    Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud

    Authors: Zainab Abaid, Arash Shaghaghi, Ravin Gunawardena, Suranga Seneviratne, Aruna Seneviratne, Sanjay Jha

    Abstract: Secure and privacy-preserving management of Personal Health Records (PHRs) has proved to be a major challenge in modern healthcare. Current solutions generally do not offer patients a choice in where the data is actually stored and also rely on at least one fully trusted element that patients must also trust with their data. In this work, we present the Health Access Broker (HAB), a patient-contro… ▽ More

    Submitted 16 May, 2020; originally announced May 2020.

    Comments: Copy of the paper accepted at 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS)

  21. arXiv:2004.08029  [pdf, other

    cs.CV cs.CR cs.HC

    Conservative Plane Releasing for Spatial Privacy Protection in Mixed Reality

    Authors: Jaybie A. de Guzman, Kanchana Thilakarathna, Aruna Seneviratne

    Abstract: Augmented reality (AR) or mixed reality (MR) platforms require spatial understanding to detect objects or surfaces, often including their structural (i.e. spatial geometry) and photometric (e.g. color, and texture) attributes, to allow applications to place virtual or synthetic objects seemingly "anchored" on to real world objects; in some cases, even allowing interactions between the physical and… ▽ More

    Submitted 16 April, 2020; originally announced April 2020.

    Comments: 15 pages

  22. Enabling AI in Future Wireless Networks: A Data Life Cycle Perspective

    Authors: Dinh C. Nguyen, Peng Cheng, Ming Ding, David Lopez-Perez, Pubudu N. Pathirana, Jun Li, Aruna Seneviratne, Yonghui Li, H. Vincent Poor

    Abstract: Recent years have seen rapid deployment of mobile computing and Internet of Things (IoT) networks, which can be mostly attributed to the increasing communication and sensing capabilities of wireless systems. Big data analysis, pervasive computing, and eventually artificial intelligence (AI) are envisaged to be deployed on top of the IoT and create a new world featured by data-driven AI. In this co… ▽ More

    Submitted 27 April, 2021; v1 submitted 24 February, 2020; originally announced March 2020.

    Comments: Accepted at the IEEE Communications Surveys & Tutorials, 42 pages

  23. arXiv:2001.08165  [pdf, other

    cs.NI eess.SP

    Blockchain as a Service for Multi-Access Edge Computing: A Deep Reinforcement Learning Approach

    Authors: Dinh C Nguyen, Pubudu N Pathirana, Ming Ding, Aruna Seneviratne

    Abstract: Recently, blockchain has gained momentum in the academic community thanks to its decentralization, immutability, transparency and security. As an emerging paradigm, Multi-access Edge Computing (MEC) has been widely used to provide computation and storage resources to mobile user equipments (UE) at the edge of the network for improving the performance of mobile applications. In this paper, we propo… ▽ More

    Submitted 15 December, 2019; originally announced January 2020.

    Comments: 9 pages

  24. arXiv:1912.12060  [pdf, other

    cs.SI cs.CR cs.LG

    Characterizing and Detecting Money Laundering Activities on the Bitcoin Network

    Authors: Yining Hu, Suranga Seneviratne, Kanchana Thilakarathna, Kensuke Fukuda, Aruna Seneviratne

    Abstract: Bitcoin is by far the most popular crypto-currency solution enabling peer-to-peer payments. Despite some studies highlighting the network does not provide full anonymity, it is still being heavily used for a wide variety of dubious financial activities such as money laundering, ponzi schemes, and ransom-ware payments. In this paper, we explore the landscape of potential money laundering activities… ▽ More

    Submitted 27 December, 2019; originally announced December 2019.

  25. arXiv:1912.11044  [pdf, other

    cs.CR

    Leveraging lightweight blockchain to establish data integrity for surveillance cameras

    Authors: Regio A. Michelin, Nadeem Ahmed, Salil S. Kanhere, Aruna Seneviratne, Sanjay Jha

    Abstract: The video footage produced by the surveillance cameras is an important evidence to support criminal investigations. Video evidence can be sourced from public (trusted) as well as private (untrusted) surveillance systems. This raises the issue of establishing integrity and auditability for information provided by the untrusted video sources. In this paper, we focus on a airport ecosystem, where mul… ▽ More

    Submitted 5 May, 2020; v1 submitted 22 December, 2019; originally announced December 2019.

  26. arXiv:1912.05062  [pdf, other

    cs.NI cs.IT eess.SP

    Blockchain for 5G and Beyond Networks: A State of the Art Survey

    Authors: Dinh C Nguyen, Pubudu N Pathirana, Ming Ding, Aruna Seneviratne

    Abstract: The fifth generation (5G) wireless networks are on the way to be deployed around the world. The 5G technologies target to support diverse vertical applications by connecting heterogeneous devices and machines with drastic improvements in terms of high quality of service, increased network capacity and enhanced system throughput. Despite all these advantages that 5G will bring about, there are stil… ▽ More

    Submitted 10 December, 2019; originally announced December 2019.

    Comments: 45 pages, submitted to IEEE Communications Surveys & Tutorials for possible publication

  27. Integration of Blockchain and Cloud of Things: Architecture, Applications and Challenges

    Authors: Dinh C Nguyen, Pubudu N Pathirana, Ming Ding, Aruna Seneviratne

    Abstract: The blockchain technology is taking the world by storm. Blockchain with its decentralized, transparent and secure nature has emerged as a disruptive technology for the next generation of numerous industrial applications. One of them is Cloud of Things enabled by the combination of cloud computing and Internet of Things. In this context, blockchain provides innovative solutions to address challenge… ▽ More

    Submitted 28 August, 2020; v1 submitted 23 August, 2019; originally announced August 2019.

    Comments: Accepted by IEEE Communications Surveys & Tutorials, 29 pages

  28. H2B: Heartbeat-based Secret Key Generation Using Piezo Vibration Sensors

    Authors: Qi Lin, Weitao Xu, Jun Liu, Abdelwahed Khamis, Wen Hu, Mahbub Hassan, Aruna Seneviratne

    Abstract: We present Heartbeats-2-Bits (H2B), which is a system for securely pairing wearable devices by generating a shared secret key from the skin vibrations caused by heartbeat. This work is motivated by potential power saving opportunity arising from the fact that heartbeat intervals can be detected energy-efficiently using inexpensive and power-efficient piezo sensors, which obviates the need to emplo… ▽ More

    Submitted 19 February, 2019; originally announced April 2019.

  29. arXiv:1810.04699  [pdf, other

    cs.CY

    Blockchain-based Smart Contracts - Applications and Challenges

    Authors: Yining Hu, Madhusanka Liyanage, Ahsan Mansoor, Kanchana Thilakarathna, Guillaume Jourjon, Aruna Seneviratne

    Abstract: A blockchain-based smart contract or a "smart contract" for short, is a computer program intended to digitally facilitate the negotiation or contractual terms directly between users when certain conditions are met. With the advance in blockchain technology, smart contracts are being used to serve a wide range of purposes ranging from self-managed identities on public blockchains to automating busi… ▽ More

    Submitted 8 June, 2019; v1 submitted 26 September, 2018; originally announced October 2018.

  30. arXiv:1804.00739  [pdf, other

    cs.NI

    Virtualized Application Function Chaining: Maximizing the Wearable System Lifetime

    Authors: Harini Kolamunna, Kanchana Thilakarathna, Aruna Seneviratne

    Abstract: The number of smart devices wear and carry by users is growing rapidly which is driven by innovative new smart wearables and interesting service o erings. This has led to applications that utilize multiple devices around the body to provide immersive environments such as mixed reality. These applications rely on a number of di erent types of functions such as sensing, communication and various typ… ▽ More

    Submitted 2 April, 2018; originally announced April 2018.

  31. arXiv:1802.05797  [pdf, other

    cs.CR cs.CY cs.HC

    Security and Privacy Approaches in Mixed Reality: A Literature Survey

    Authors: Jaybie A. de Guzman, Kanchana Thilakarathna, Aruna Seneviratne

    Abstract: Mixed reality (MR) technology development is now gaining momentum due to advances in computer vision, sensor fusion, and realistic display technologies. With most of the research and development focused on delivering the promise of MR, there is only barely a few working on the privacy and security implications of this technology. This survey paper aims to put in to light these risks, and to look i… ▽ More

    Submitted 10 June, 2020; v1 submitted 15 February, 2018; originally announced February 2018.

    Comments: 41 pages, 11 figures, 2 tables (3 tables at the appendix); updated references in page 14

    Journal ref: ACM Comput. Surv. 52, 6, Article 110 (October 2019), 37 pages

  32. arXiv:1801.10295  [pdf, other

    cs.CY cs.CR

    A Delay-Tolerant Payment Scheme Based on the Ethereum Blockchain

    Authors: Yining Hu, Ahsan Manzoor, Parinya Ekparinya, Madhusanka Liyanage, Kanchana Thilakarathna, Guillaume Jourjon, Aruna Seneviratne, Mika E Ylianttila

    Abstract: Banking as an essential service can be hard to access in remote, rural regions where the network connectivity is intermittent. Although micro-banking has been made possible by SMS or USSD messages in some places, their security flaws and session-based nature prevent them from a wider adoption. Global level cryptocurrencies enable low-cost, secure and pervasive money transferring among distributed… ▽ More

    Submitted 30 January, 2018; originally announced January 2018.

  33. arXiv:1711.08495  [pdf, other

    cs.OS cs.NI

    Seamless Resources Sharing in Wearable Networks by Application Function Virtualization

    Authors: Harini Kolamunna, Kanchana Thilakarathna, Diego Perino, Dwight Makaroff, Aruna Seneviratne

    Abstract: The prevalence of smart wearable devices is increasing exponentially and we are witnessing a wide variety of fascinating new services that leverage the capabilities of these wearables. Wearables are truly changing the way mobile computing is deployed and mobile applications are being developed. It is possible to leverage the capabilities such as connectivity, processing, and sensing of wearable de… ▽ More

    Submitted 14 November, 2017; originally announced November 2017.

  34. arXiv:1709.07626  [pdf, other

    cs.CR cs.LG cs.NE

    BreathRNNet: Breathing Based Authentication on Resource-Constrained IoT Devices using RNNs

    Authors: Jagmohan Chauhan, Suranga Seneviratne, Yining Hu, Archan Misra, Aruna Seneviratne, Youngki Lee

    Abstract: Recurrent neural networks (RNNs) have shown promising results in audio and speech processing applications due to their strong capabilities in modelling sequential data. In many applications, RNNs tend to outperform conventional models based on GMM/UBMs and i-vectors. Increasing popularity of IoT devices makes a strong case for implementing RNN based inferences for applications such as acoustics ba… ▽ More

    Submitted 22 September, 2017; originally announced September 2017.

  35. arXiv:1708.04078  [pdf, other

    cs.NI cs.DC cs.MM

    uStash: a Novel Mobile Content Delivery System for Improving User QoE in Public Transport

    Authors: Fang-Zhou Jiang, Kanchana Thilakarathna, Sirine Mrabet, Mohamed Ali Kaafar, Aruna Seneviratne

    Abstract: Mobile data traffic is growing exponentially and it is even more challenging to distribute content efficiently while users are "on the move" such as in public transport.The use of mobile devices for accessing content (e.g. videos) while commuting are both expensive and unreliable, although it is becoming common practice worldwide. Leveraging on the spatial and temporal correlation of content popul… ▽ More

    Submitted 14 August, 2017; originally announced August 2017.

    Comments: 14 Pages

  36. arXiv:1608.04180  [pdf, other

    cs.CR

    Are wearable devices ready for HTTPS? Measuring the cost of secure communication protocols on wearable devices

    Authors: Harini Kolamunna, Jagmohan Chauhan, Yining Hu, Kanchana Thilakarathna, Diego Perino, Dwight Makaroff, Aruna Seneviratne

    Abstract: The majority of available wearable devices require communication with Internet servers for data analysis and storage, and rely on a paired smartphone to enable secure communication. However, wearable devices are mostly equipped with WiFi network interfaces, enabling direct communication with the Internet. Secure communication protocols should then run on these wearables itself, yet it is not clear… ▽ More

    Submitted 12 December, 2016; v1 submitted 15 August, 2016; originally announced August 2016.

    ACM Class: C.4; C.2.2; C.2.0

  37. arXiv:cs/0607137  [pdf

    cs.NI

    Multicasting with selective delivery: A SafetyNet for vertical handoffs

    Authors: Henrik Petander, Eranga Perera, Aruna Seneviratne

    Abstract: In future mobility support will require handling roaming in heterogeneous access networks. In order to enable seamless roaming it is necessary to minimize the impact of the vertical handoffs. Localized mobility management schemes such as FMIPv6 and HMIPv6 do not provide sufficient handoff performance, since they have been designed for horizontal handoffs. In this paper, we propose the SafetyNet… ▽ More

    Submitted 28 July, 2006; originally announced July 2006.

    Comments: 20 pages