Skip to main content

Research Repository

Advanced Search

Outputs (1087)

MADONNA: browser-based malicious domain detection through optimized neural network with feature analysis. (2024)
Conference Proceeding
SENANAYAKE, J., RAJAPAKSHA, S., YANAI, N., KOMIYA, C. and KALUTARAGE, H. 2024. MADONNA: browser-based malicious domain detection through optimized neural network with feature analysis. In Meyer, N. and Grocholewska-Czuryło, A. (eds.) Revised selected papers from the proceedings of the 38th International conference on ICT systems security and privacy protection (IFIP SEC 2023), 14-16 June 2023, Poznan, Poland. IFIP advances in information and communication technology, 679. Cham: Springer [online], pages 279-292. Available from: https://doi.org/10.1007/978-3-031-56326-3_20

The detection of malicious domains often relies on machine learning (ML), and proposals for browser-based detection of malicious domains with high throughput have been put forward in recent years. However, existing methods suffer from limited accurac... Read More about MADONNA: browser-based malicious domain detection through optimized neural network with feature analysis..

CIA security for internet of vehicles and blockchain-AI integration. (2024)
Journal Article
HAI, T., AKSOY, M., IWENDI, C., IBEKE, E. and MOHAN, S. 2024. CIA security for internet of vehicles and blockchain-AI integration. Journal of grid computing [online], 22(2), article number 43. Available from: https://doi.org/10.1007/s10723-024-09757-3

The lack of data security and the hazardous nature of the Internet of Vehicles (IoV), in the absence of networking settings, have prevented the openness and self-organization of the vehicle networks of IoV cars. The lapses originating in the areas of... Read More about CIA security for internet of vehicles and blockchain-AI integration..

FedREVAN: real-time detection of vulnerable android source code through federated neural network with XAI. (2024)
Conference Proceeding
SENANAYAKE, J., KALUTARAGE, H., PETROVSKI, A., AL-KADRI, M.O. and PIRAS, L. 2024. FedREVAN: real-time detection of vulnerable android source code through federated neural network with XAI. In Katsikas, S. et al. (eds.) Computer security: revised selected papers from the proceedings of the International workshops of the 28th European symposium on research in computer security (ESORICS 2023 International Workshops), 25-29 September 2023, The Hague, Netherlands. Lecture notes in computer science, 14399. Cham: Springer [online], part II, pages 426-441. Available from: https://doi.org/10.1007/978-3-031-54129-2_25

Adhering to security best practices during the development of Android applications is of paramount importance due to the high prevalence of apps released without proper security measures. While automated tools can be employed to address vulnerabiliti... Read More about FedREVAN: real-time detection of vulnerable android source code through federated neural network with XAI..

Enhancing security assurance in software development: AI-based vulnerable code detection with static analysis. (2024)
Conference Proceeding
RAJAPAKSHA, S., SENANAYAKE, J., KALUTARAGE, H. and AL-KADRI, M.O. 2024. Enhancing security assurance in software development: AI-based vulnerable code detection with static analysis. In Katsikas, S. et al. (eds.) Computer security: revised selected papers from the proceedings of the International workshops of the 28th European symposium on research in computer security (ESORICS 2023 International Workshops), 25-29 September 2023, The Hague, Netherlands. Lecture notes in computer science, 14399. Cham: Springer [online], part II, pages 341-356. Available from: https://doi.org/10.1007/978-3-031-54129-2_20

The presence of vulnerable source code in software applications is causing significant reliability and security issues, which can be mitigated by integrating and assuring software security principles during the early stages of the development lifecyc... Read More about Enhancing security assurance in software development: AI-based vulnerable code detection with static analysis..

Defendroid: real-time Android code vulnerability detection via blockchain federated neural network with XAI. (2024)
Journal Article
SENANAYAKE, J., KALUTARAGE, H., PETROVSKI, A., PIRAS, L. and AL-KADRI, M.O. 2024. Defendroid: real-time Android code vulnerability detection via blockchain federated neural network with XAI. Journal of information security and applications [online], 82, article number 103741. Available from: https://doi.org/10.1016/j.jisa.2024.103741

Ensuring strict adherence to security during the phases of Android app development is essential, primarily due to the prevalent issue of apps being released without adequate security measures in place. While a few automated tools are employed to redu... Read More about Defendroid: real-time Android code vulnerability detection via blockchain federated neural network with XAI..

Generalisation challenges in deep learning models for medical imagery: insights from external validation of COVID-19 classifiers. (2024)
Journal Article
HAYNES, S.C., JOHNSTON, P. and ELYAN, E. 2024. Generalisation challenges in deep learning models for medical imagery: insights from external validation of COVID-19 classifiers. Multimedia tools and applications [online], Latest Articles. Available from: https://doi.org/10.1007/s11042-024-18543-y

The generalisability of deep neural network classifiers is emerging as one of the most important challenges of our time. The recent COVID-19 pandemic led to a surge of deep learning publications that proposed novel models for the detection of COVID-1... Read More about Generalisation challenges in deep learning models for medical imagery: insights from external validation of COVID-19 classifiers..

Steps towards a philosophy of computing education. [Discussion paper]. (2024)
Conference Proceeding
MCDERMOTT, R., DANIELS, M. and FREZZA, S.T. 2024. Steps towards a philosophy of computer education. [Discussion paper]. In Mühling, A. and Jormanainen, I. (eds.) Proceedings of the 23rd Koli calling international conference on computing education research 2023, 13-18 November 2024, Koli, Finland. New York: ACM [online], article 20. Available from: https://doi.org/10.1145/3631802.3631817

Is it meaningful to talk about the philosophy of computing education? What is its subject matter and methods? Is it different from, or a subfield of, the philosophy of science education or the philosophy of technology education or the philosophy of e... Read More about Steps towards a philosophy of computing education. [Discussion paper]..

Two-layer ensemble of deep learning models for medical image segmentation. [Article] (2024)
Journal Article
DANG, T., NGUYEN, T.T., MCCALL, J., ELYAN, E. and MORENO-GARCÍA, C.F. 2024. Two-layer ensemble of deep learning models for medical image segmentation. Cognitive computation [online], In Press. Available from: https://doi.org/10.1007/s12559-024-10257-5

One of the most important areas in medical image analysis is segmentation, in which raw image data is partitioned into structured and meaningful regions to gain further insights. By using Deep Neural Networks (DNN), AI-based automated segmentation al... Read More about Two-layer ensemble of deep learning models for medical image segmentation. [Article].

Detection-driven exposure-correction network for nighttime drone-view object detection. (2024)
Journal Article
XI, Y., JIA, W., MIAO, Q., FENG, J., REN, J. and LUO, H. 2024. Detection-driven exposure-correction network for nighttime drone-view object detection. IEEE transactions on geoscience and remote sensing [online], 62, article number 5605014. Available from: https://doi.org/10.1109/TGRS.2024.3351134

Drone-view object detection (DroneDet) models typically suffer a significant performance drop when applied to nighttime scenes. Existing solutions attempt to employ an exposure-adjustment module to reveal objects hidden in dark regions before detecti... Read More about Detection-driven exposure-correction network for nighttime drone-view object detection..

Feature aggregation and region-aware learning for detection of splicing forgery. (2024)
Journal Article
XU, Y., ZHENG, J., REN, J. and FANG, A. 2024. Feature aggregation and region-aware learning for detection of splicing forgery. IEEE signal processing letters [online], 31, pages 696-700. Available from: https://doi.org/10.1109/LSP.2023.3348689

Detection of image splicing forgery become an increasingly difficult task due to the scale variations of the forged areas and the covered traces of manipulation from post-processing techniques. Most existing methods fail to jointly multi-scale local... Read More about Feature aggregation and region-aware learning for detection of splicing forgery..