Select Publications

Preprints

Ali H; Nepal S; Kanhere SS; Jha S, 2024, Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning, http://arxiv.org/abs/2410.11205v1

D'Silva N; Shahi T; Husveg ØTD; Sanjeeve A; Buchholz E; Kanhere SS, 2024, Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement, http://dx.doi.org/10.48550/arxiv.2409.14645

A. CAR; Shaghaghi A; Batista G; Kanhere SS, 2024, Towards Weaknesses and Attack Patterns Prediction for IoT Devices, http://dx.doi.org/10.48550/arxiv.2408.13172

Doan BG; Nguyen DQ; Lindquist C; Montague P; Abraham T; De Vel O; Camtepe S; Kanhere SS; Abbasnejad E; Ranasinghe DC, 2024, On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World, http://dx.doi.org/10.48550/arxiv.2408.12122

Merhi J; Buchholz E; Kanhere SS, 2024, Synthetic Trajectory Generation Through Convolutional Neural Networks, http://dx.doi.org/10.48550/arxiv.2407.16938

Saini A; Shaghaghi A; Huang Z; Kanhere SS, 2024, Multi-MedChain: Multi-Party Multi-Blockchain Medical Supply Chain Management System, http://dx.doi.org/10.48550/arxiv.2407.11207

Timmer RC; Liebowitz D; Nepal S; Kanhere SS, 2024, Honeyfile Camouflage: Hiding Fake Files in Plain Sight, http://dx.doi.org/10.48550/arxiv.2405.04758

Krul E; Paik H-Y; Ruj S; Kanhere SS, 2024, SoK: Trusting Self-Sovereign Identity, http://dx.doi.org/10.48550/arxiv.2404.06729

Nguyen DD; Liebowitz D; Nepal S; Kanhere SS; Abuadbba S, 2024, Contextual Chart Generation for Cyber Deception, http://dx.doi.org/10.48550/arxiv.2404.04854

Doan BG; Nguyen DQ; Montague P; Abraham T; De Vel O; Camtepe S; Kanhere SS; Abbasnejad E; Ranasinghe DC, 2024, Bayesian Learned Models Can Detect Adversarial Malware For Free, http://dx.doi.org/10.48550/arxiv.2403.18309

Buchholz E; Abuadbba A; Wang S; Nepal S; Kanhere SS, 2024, SoK: Can Trajectory Generation Combine Privacy and Utility?, http://dx.doi.org/10.48550/arxiv.2403.07218

Akhtar MM; Bhuiyan NS; Masood R; Ikram M; Kanhere SS, 2024, BotSSCL: Social Bot Detection with Self-Supervised Contrastive Learning, http://dx.doi.org/10.48550/arxiv.2402.03740

Gill SS; Wu H; Patros P; Ottaviani C; Arora P; Pujol VC; Haunschild D; Parlikad AK; Cetinkaya O; Lutfiyya H; Stankovski V; Li R; Ding Y; Qadir J; Abraham A; Ghosh SK; Song HH; Sakellariou R; Rana O; Rodrigues JJPC; Kanhere SS; Dustdar S; Uhlig S; Ramamohanarao K; Buyya R, 2024, Modern Computing: Vision and Challenges, http://dx.doi.org/10.48550/arxiv.2401.02469

Nguyen DD; Liebowitz D; Nepal S; Kanhere SS, 2023, Multiple Hypothesis Dropout: Estimating the Parameters of Multi-Modal Output Distributions, http://dx.doi.org/10.48550/arxiv.2312.11735

Luo S; Herrera A; Quirk P; Chase M; Ranasinghe DC; Kanhere SS, 2023, Make out like a (Multi-Armed) Bandit: Improving the Odds of Fuzzer Seed Scheduling with T-Scheduler, http://dx.doi.org/10.48550/arxiv.2312.04749

Shanmugarasa Y; Chamikara MAP; Paik H-Y; Kanhere SS; Zhu L, 2023, Local Differential Privacy for Smart Meter Data Sharing, http://dx.doi.org/10.48550/arxiv.2311.04544

Bader L; Pennekamp J; Thevaraj E; Spiß M; Kanhere SS; Wehrle K, 2023, Reputation Systems for Supply Chains: The Challenge of Achieving Privacy Preservation, http://dx.doi.org/10.48550/arxiv.2311.01060

Ullah I; Hassan N; Gill SS; Suleiman B; Ahanger TA; Shah Z; Qadir J; Kanhere SS, 2023, Privacy Preserving Large Language Models: ChatGPT Case Study Based Vision and Framework, http://arxiv.org/abs/2310.12523v1

Pennekamp J; Matzutt R; Klinkmüller C; Bader L; Serror M; Wagner E; Malik S; Spiß M; Rahn J; Gürpinar T; Vlad E; Leemans SJJ; Kanhere SS; Stich V; Wehrle K, 2023, An Interdisciplinary Survey on Information Flows in Supply Chains, http://dx.doi.org/10.48550/arxiv.2401.01022

Akhtar MM; Masood R; Ikram M; Kanhere SS, 2023, False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations, http://dx.doi.org/10.48550/arxiv.2308.12497

Farrelly G; Quirk P; Kanhere SS; Camtepe S; Ranasinghe DC, 2023, SplITS: Split Input-to-State Mapping for Effective Firmware Fuzzing, http://dx.doi.org/10.48550/arxiv.2308.07860

Mukta R; Teh RC; Paik H-Y; Lu Q; Kanhere SS, 2023, VCTP: A Verifiable Credential-based Trust Propagation Protocol for Personal Issuers in Self-Sovereign Identity Platforms, http://arxiv.org/abs/2308.01539v1

Namvar A; Thapa C; Kanhere SS, 2023, Discretization-based ensemble model for robust learning in IoT, http://dx.doi.org/10.48550/arxiv.2307.08955

Rathakumar K; Liebowitz D; Walder C; Moore K; Kanhere SS, 2023, DualVAE: Controlling Colours of Generated and Real Images, http://dx.doi.org/10.48550/arxiv.2305.18769

Gill SS; Xu M; Patros P; Wu H; Kaur R; Kaur K; Fuller S; Singh M; Arora P; Parlikad AK; Stankovski V; Abraham A; Ghosh SK; Lutfiyya H; Kanhere SS; Bahsoon R; Rana O; Dustdar S; Sakellariou R; Uhlig S; Buyya R, 2023, Transformative Effects of ChatGPT on Modern Education: Emerging Era of AI Chatbots, http://dx.doi.org/10.48550/arxiv.2306.03823

Doan BG; Yang S; Montague P; De Vel O; Abraham T; Camtepe S; Kanhere SS; Abbasnejad E; Ranasinghe DC, 2023, Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness, http://dx.doi.org/10.48550/arxiv.2301.12680

Nguyen DD; Nepal S; Kanhere SS, 2023, Diverse Multimedia Layout Generation with Multi Choice Learning, http://dx.doi.org/10.48550/arxiv.2301.06629

Nguyen DD; Leibowitz D; Nepal S; Kanhere SS, 2023, Masked Vector Quantization, http://dx.doi.org/10.48550/arxiv.2301.06626

Karumba S; Kanhere SS; Jurdak R; Sethuvenkatraman S, 2022, PlexiChain: A Secure Blockchain-based Flexibility Aggregator Framework, http://dx.doi.org/10.48550/arxiv.2212.09064

Putra GD; Malik S; Dedeoglu V; Kanhere SS; Jurdak R, 2022, Trust and Reputation Management for Blockchain-enabled IoT, http://arxiv.org/abs/2212.04658v1

Buchholz E; Abuadbba A; Wang S; Nepal S; Kanhere SS, 2022, Reconstruction Attack on Differential Private Trajectory Protection Mechanisms, http://dx.doi.org/10.1145/3564625.3564628

Akhtar MM; Sharma B; Karunanayake I; Masood R; Ikram M; Kanhere SS, 2022, Machine Learning-based Automatic Annotation and Detection of COVID-19 Fake News, http://arxiv.org/abs/2209.03162v1

Wong A; Abuadbba A; Almashor M; Kanhere S, 2022, PhishClone: Measuring the Efficacy of Cloning Evasion Attacks, http://dx.doi.org/10.48550/arxiv.2209.01582

Putra GD; Dedeoglu V; Kanhere SS; Jurdak R, 2022, Towards Blockchain-based Trust and Reputation Management for Trustworthy 6G Networks, http://arxiv.org/abs/2208.07562v1

Liebowitz D; Nepal S; Moore K; Christopher CJ; Kanhere SS; Nguyen D; Timmer RC; Longland M; Rathakumar K, 2022, Deception for Cyber Defence: Challenges and Opportunities, http://dx.doi.org/10.48550/arxiv.2208.07127

Yang S; Doan BG; Montague P; De Vel O; Abraham T; Camtepe S; Ranasinghe DC; Kanhere SS, 2022, Transferable Graph Backdoor Attack, http://dx.doi.org/10.48550/arxiv.2207.00425

Wang S; Abuadbba S; Agarwal S; Moore K; Sun R; Xue M; Nepal S; Camtepe S; Kanhere S, 2022, PublicCheck: Public Integrity Verification for Services of Run-time Deep Models, http://dx.doi.org/10.48550/arxiv.2203.10902

Timmer RC; Liebowitz D; Nepal S; Kanhere S, 2022, TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing, http://dx.doi.org/10.48550/arxiv.2203.07580

Timmer RC; Liebowitz D; Nepal S; Kanhere SS, 2022, Can pre-trained Transformers be used in detecting complex sensitive sentences? -- A Monsanto case study, http://dx.doi.org/10.48550/arxiv.2203.06793

Putra GD; Kang C; Kanhere SS; Hong JW-K, 2022, DeTRM: Decentralised Trust and Reputation Management for Blockchain-based Supply Chains, http://arxiv.org/abs/2203.05769v1

Gill SS; Xu M; Ottaviani C; Patros P; Bahsoon R; Shaghaghi A; Golec M; Stankovski V; Wu H; Abraham A; Singh M; Mehta H; Ghosh SK; Baker T; Parlikad AK; Lutfiyya H; Kanhere SS; Sakellariou R; Dustdar S; Rana O; Brandic I; Uhlig S, 2022, AI for Next Generation Computing: Emerging Trends and Future Directions, http://dx.doi.org/10.48550/arxiv.2203.04159

Dorri A; Roulin C; Pal S; Baalbaki S; Jurdak R; Kanhere S, 2022, Device Identification in Blockchain-Based Internet of Things, http://dx.doi.org/10.48550/arxiv.2202.09603

Alvarez CAR; Shaghaghi A; Nguyen DD; Kanhere SS, 2021, Is this IoT Device Likely to be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines, http://dx.doi.org/10.48550/arxiv.2111.11874

Putra GD; Dedeoglu V; Pathak A; Kanhere SS; Jurdak R, 2021, Decentralised Trustworthy Collaborative Intrusion Detection System for IoT, http://dx.doi.org/10.1109/Blockchain53845.2021.00048

Conti M; Boldrini C; Kanhere SS; Mingozzi E; Pagani E; Ruiz PM; Younis M, 2021, From MANET to people-centric networking: milestones and open research challenges, http://dx.doi.org/10.48550/arxiv.2109.10159

Putra GD; Dedeoglu V; Kanhere SS; Jurdak R, 2021, Blockchain for Trust and Reputation Management in Cyber-physical Systems, http://arxiv.org/abs/2109.07721v1

Ramachandran GS; Malik S; Pal S; Dorri A; Dedeoglu V; Kanhere S; Jurdak R, 2021, Blockchain in Supply Chain: Opportunities and Design Considerations, http://dx.doi.org/10.48550/arxiv.2108.12032

Hoseini SA; Hassan J; Bokani A; Kanhere SS, 2021, In-situ MIMO-WPT Recharging of UAVs Using Intelligent Flying Energy Sources, http://dx.doi.org/10.20944/preprints202107.0545.v1

Malik S; Gupta N; Dedeoglu V; Kanhere SS; Jurdak R, 2021, TradeChain: Decoupling Traceability and Identity inBlockchain enabled Supply Chains, http://dx.doi.org/10.48550/arxiv.2105.11217

Malik S; Dedeoglu V; Kanhere S; Jurdak R, 2021, PrivChain: Provenance and Privacy Preservation in Blockchain enabled Supply Chains, http://dx.doi.org/10.48550/arxiv.2104.13964


Back to profile page