Select Publications
Preprints
2024, Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning, http://arxiv.org/abs/2410.11205v1
,2024, Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement, http://dx.doi.org/10.48550/arxiv.2409.14645
,2024, Towards Weaknesses and Attack Patterns Prediction for IoT Devices, http://dx.doi.org/10.48550/arxiv.2408.13172
,2024, On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World, http://dx.doi.org/10.48550/arxiv.2408.12122
,2024, Synthetic Trajectory Generation Through Convolutional Neural Networks, http://dx.doi.org/10.48550/arxiv.2407.16938
,2024, Multi-MedChain: Multi-Party Multi-Blockchain Medical Supply Chain Management System, http://dx.doi.org/10.48550/arxiv.2407.11207
,2024, Honeyfile Camouflage: Hiding Fake Files in Plain Sight, http://dx.doi.org/10.48550/arxiv.2405.04758
,2024, SoK: Trusting Self-Sovereign Identity, http://dx.doi.org/10.48550/arxiv.2404.06729
,2024, Contextual Chart Generation for Cyber Deception, http://dx.doi.org/10.48550/arxiv.2404.04854
,2024, Bayesian Learned Models Can Detect Adversarial Malware For Free, http://dx.doi.org/10.48550/arxiv.2403.18309
,2024, SoK: Can Trajectory Generation Combine Privacy and Utility?, http://dx.doi.org/10.48550/arxiv.2403.07218
,2024, BotSSCL: Social Bot Detection with Self-Supervised Contrastive Learning, http://dx.doi.org/10.48550/arxiv.2402.03740
,2024, Modern Computing: Vision and Challenges, http://dx.doi.org/10.48550/arxiv.2401.02469
,2023, Multiple Hypothesis Dropout: Estimating the Parameters of Multi-Modal Output Distributions, http://dx.doi.org/10.48550/arxiv.2312.11735
,2023, Make out like a (Multi-Armed) Bandit: Improving the Odds of Fuzzer Seed Scheduling with T-Scheduler, http://dx.doi.org/10.48550/arxiv.2312.04749
,2023, Local Differential Privacy for Smart Meter Data Sharing, http://dx.doi.org/10.48550/arxiv.2311.04544
,2023, Reputation Systems for Supply Chains: The Challenge of Achieving Privacy Preservation, http://dx.doi.org/10.48550/arxiv.2311.01060
,2023, Privacy Preserving Large Language Models: ChatGPT Case Study Based Vision and Framework, http://arxiv.org/abs/2310.12523v1
,2023, An Interdisciplinary Survey on Information Flows in Supply Chains, http://dx.doi.org/10.48550/arxiv.2401.01022
,2023, False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations, http://dx.doi.org/10.48550/arxiv.2308.12497
,2023, SplITS: Split Input-to-State Mapping for Effective Firmware Fuzzing, http://dx.doi.org/10.48550/arxiv.2308.07860
,2023, VCTP: A Verifiable Credential-based Trust Propagation Protocol for Personal Issuers in Self-Sovereign Identity Platforms, http://arxiv.org/abs/2308.01539v1
,2023, Discretization-based ensemble model for robust learning in IoT, http://dx.doi.org/10.48550/arxiv.2307.08955
,2023, DualVAE: Controlling Colours of Generated and Real Images, http://dx.doi.org/10.48550/arxiv.2305.18769
,2023, Transformative Effects of ChatGPT on Modern Education: Emerging Era of AI Chatbots, http://dx.doi.org/10.48550/arxiv.2306.03823
,2023, Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness, http://dx.doi.org/10.48550/arxiv.2301.12680
,2023, Diverse Multimedia Layout Generation with Multi Choice Learning, http://dx.doi.org/10.48550/arxiv.2301.06629
,2023, Masked Vector Quantization, http://dx.doi.org/10.48550/arxiv.2301.06626
,2022, PlexiChain: A Secure Blockchain-based Flexibility Aggregator Framework, http://dx.doi.org/10.48550/arxiv.2212.09064
,2022, Trust and Reputation Management for Blockchain-enabled IoT, http://arxiv.org/abs/2212.04658v1
,2022, Reconstruction Attack on Differential Private Trajectory Protection Mechanisms, http://dx.doi.org/10.1145/3564625.3564628
,2022, Machine Learning-based Automatic Annotation and Detection of COVID-19 Fake News, http://arxiv.org/abs/2209.03162v1
,2022, PhishClone: Measuring the Efficacy of Cloning Evasion Attacks, http://dx.doi.org/10.48550/arxiv.2209.01582
,2022, Towards Blockchain-based Trust and Reputation Management for Trustworthy 6G Networks, http://arxiv.org/abs/2208.07562v1
,2022, Deception for Cyber Defence: Challenges and Opportunities, http://dx.doi.org/10.48550/arxiv.2208.07127
,2022, Transferable Graph Backdoor Attack, http://dx.doi.org/10.48550/arxiv.2207.00425
,2022, PublicCheck: Public Integrity Verification for Services of Run-time Deep Models, http://dx.doi.org/10.48550/arxiv.2203.10902
,2022, TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing, http://dx.doi.org/10.48550/arxiv.2203.07580
,2022, Can pre-trained Transformers be used in detecting complex sensitive sentences? -- A Monsanto case study, http://dx.doi.org/10.48550/arxiv.2203.06793
,2022, DeTRM: Decentralised Trust and Reputation Management for Blockchain-based Supply Chains, http://arxiv.org/abs/2203.05769v1
,2022, AI for Next Generation Computing: Emerging Trends and Future Directions, http://dx.doi.org/10.48550/arxiv.2203.04159
,2022, Device Identification in Blockchain-Based Internet of Things, http://dx.doi.org/10.48550/arxiv.2202.09603
,2021, Is this IoT Device Likely to be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines, http://dx.doi.org/10.48550/arxiv.2111.11874
,2021, Decentralised Trustworthy Collaborative Intrusion Detection System for IoT, http://dx.doi.org/10.1109/Blockchain53845.2021.00048
,2021, From MANET to people-centric networking: milestones and open research challenges, http://dx.doi.org/10.48550/arxiv.2109.10159
,2021, Blockchain for Trust and Reputation Management in Cyber-physical Systems, http://arxiv.org/abs/2109.07721v1
,2021, Blockchain in Supply Chain: Opportunities and Design Considerations, http://dx.doi.org/10.48550/arxiv.2108.12032
,2021, In-situ MIMO-WPT Recharging of UAVs Using Intelligent Flying Energy Sources, http://dx.doi.org/10.20944/preprints202107.0545.v1
,2021, TradeChain: Decoupling Traceability and Identity inBlockchain enabled Supply Chains, http://dx.doi.org/10.48550/arxiv.2105.11217
,2021, PrivChain: Provenance and Privacy Preservation in Blockchain enabled Supply Chains, http://dx.doi.org/10.48550/arxiv.2104.13964
,