Select Publications

Book Chapters

Doan BG; Nguyen DQ; Montague P; Abraham T; De Vel O; Camtepe S; Kanhere SS; Abbasnejad E; Ranasinghe DC, 2024, 'Bayesian Learned Models Can Detect Adversarial Malware for Free', in , pp. 45 - 65, http://dx.doi.org/10.1007/978-3-031-70879-4_3

Journal articles

Gao Y; Kim Y; Doan BG; Zhang Z; Zhang G; Nepal S; Ranasinghe DC; Kim H, 2022, 'Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks', IEEE Transactions on Dependable and Secure Computing, 19, pp. 2349 - 2364, http://dx.doi.org/10.1109/TDSC.2021.3055844

Doan BG; Xue M; Ma S; Abbasnejad E; C. Ranasinghe D, 2022, 'TnT Attacks! Universal Naturalistic Adversarial Patches Against Deep Neural Network Systems', IEEE Transactions on Information Forensics and Security, 17, pp. 3816 - 3830, http://dx.doi.org/10.1109/tifs.2022.3198857

Conference Papers

Doan BG; Shamsi A; Guo XY; Mohammadi A; Alinejad-Rokny H; Sejdinovic D; Teney D; Ranasinghe DC; Abbasnejad E, 2025, 'Bayesian Low-Rank Learning (Bella): A Practical Approach to Bayesian Neural Networks', in Proceedings of the Aaai Conference on Artificial Intelligence, pp. 16298 - 16307, http://dx.doi.org/10.1609/aaai.v39i15.33790

Doan BG; Nguyen DQ; Lindquist C; Montague P; Abraham T; De Vel O; Camtepe S; Kanhere SS; Abbasnejad E; Ranasinghe DC, 2024, 'On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World', in Proceedings Annual Computer Security Applications Conference Acsac, pp. 940 - 956, http://dx.doi.org/10.1109/ACSAC63791.2024.00079

Doan BG; Yang S; Montague P; De Vel O; Abraham T; Camtepe S; Kanhere SS; Abbasnejad E; Ranasinghe DC, 2023, 'Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness', in Proceedings of the 37th Aaai Conference on Artificial Intelligence Aaai 2023, pp. 14783 - 14791, http://dx.doi.org/10.1609/aaai.v37i12.26727

Yang S; Doan BG; Montague P; De Vel O; Abraham T; Camtepe S; Ranasinghe DC; Kanhere SS, 2022, 'Transferable Graph Backdoor Attack', in ACM International Conference Proceeding Series, pp. 321 - 332, http://dx.doi.org/10.1145/3545948.3545976

Doan BG; Abbasnejad E; Ranasinghe DC, 2020, 'Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems', in Annual Computer Security Applications Conference, ACM, pp. 897 - 912, presented at ACSAC '20: Annual Computer Security Applications Conference, http://dx.doi.org/10.1145/3427228.3427264

Preprints

Doan BG; Shamsi A; Guo X-Y; Mohammadi A; Alinejad-Rokny H; Sejdinovic D; Teney D; Ranasinghe DC; Abbasnejad E, 2025, Bayesian Low-Rank LeArning (Bella): A Practical Approach to Bayesian Neural Networks, http://dx.doi.org/10.48550/arxiv.2407.20891

Doan BG; Nguyen DQ; Lindquist C; Montague P; Abraham T; De Vel O; Camtepe S; Kanhere SS; Abbasnejad E; Ranasinghe DC, 2024, On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World, http://dx.doi.org/10.48550/arxiv.2408.12122

Doan BG; Nguyen DQ; Montague P; Abraham T; De Vel O; Camtepe S; Kanhere SS; Abbasnejad E; Ranasinghe DC, 2024, Bayesian Learned Models Can Detect Adversarial Malware For Free, http://dx.doi.org/10.48550/arxiv.2403.18309

Doan BG; Abbasnejad E; Shi JQ; Ranasinghe DC, 2023, Bayesian Learning with Information Gain Provably Bounds Risk for a Robust Adversarial Defense, http://dx.doi.org/10.48550/arxiv.2212.02003

Doan BG; Yang S; Montague P; De Vel O; Abraham T; Camtepe S; Kanhere SS; Abbasnejad E; Ranasinghe DC, 2023, Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness, http://dx.doi.org/10.48550/arxiv.2301.12680

Doan BG; Xue M; Ma S; Abbasnejad E; Ranasinghe DC, 2022, TnT Attacks! Universal Naturalistic Adversarial Patches Against Deep Neural Network Systems, http://dx.doi.org/10.48550/arxiv.2111.09999

Yang S; Doan BG; Montague P; De Vel O; Abraham T; Camtepe S; Ranasinghe DC; Kanhere SS, 2022, Transferable Graph Backdoor Attack, http://dx.doi.org/10.48550/arxiv.2207.00425

Doan BG; Abbasnejad E; Ranasinghe DC, 2020, Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems, http://dx.doi.org/10.48550/arxiv.1908.03369

Gao Y; Doan BG; Zhang Z; Ma S; Zhang J; Fu A; Nepal S; Kim H, 2020, Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review, http://dx.doi.org/10.48550/arxiv.2007.10760

Gao Y; Kim Y; Doan BG; Zhang Z; Zhang G; Nepal S; Ranasinghe DC; Kim H, 2019, Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks, http://dx.doi.org/10.48550/arxiv.1911.10312


Back to profile page