Skip to main content

Research Repository

Advanced Search

All Outputs (8)

Cross-validation for detecting label poisoning attacks: a study on random forest algorithm. (2024)
Presentation / Conference Contribution
YASARATHNA, T.L., MUNASINGHE, L., KALUTARAGE, H. and LE-KHAC, N.-A. 2024. Cross-validation for detecting label poisoning attacks: a study on random forest algorithm. In Pitropakis, N., Katsikas, S., Furnell, S. and Markantonakis, K. (eds.) Proceedings of the 39th International Federation for Information Processing (IFIP) International conference on ICT systems security and privacy protection 2024 (IFIP SEC 2024), 12-14 June 2024, Edinburgh, UK. IFIP Advances in information and communication technology, 710. Cham: Springer [online], pages 451-464. Available from: https://doi.org/10.1007/978-3-031-65175-5_32

The widespread adoption of machine learning (ML) algorithms has revolutionized various aspects of modern life. However, their susceptibility to data poisoning attacks remains a significant concern due to their potential to compromise model integrity... Read More about Cross-validation for detecting label poisoning attacks: a study on random forest algorithm..

MADONNA: browser-based malicious domain detection through optimized neural network with feature analysis. (2024)
Presentation / Conference Contribution
SENANAYAKE, J., RAJAPAKSHA, S., YANAI, N., KOMIYA, C. and KALUTARAGE, H. 2024. MADONNA: browser-based malicious domain detection through optimized neural network with feature analysis. In Meyer, N. and Grocholewska-Czuryło, A. (eds.) Revised selected papers from the proceedings of the 38th International conference on ICT systems security and privacy protection (IFIP SEC 2023), 14-16 June 2023, Poznan, Poland. IFIP advances in information and communication technology, 679. Cham: Springer [online], pages 279-292. Available from: https://doi.org/10.1007/978-3-031-56326-3_20

The detection of malicious domains often relies on machine learning (ML), and proposals for browser-based detection of malicious domains with high throughput have been put forward in recent years. However, existing methods suffer from limited accurac... Read More about MADONNA: browser-based malicious domain detection through optimized neural network with feature analysis..

Machine learning algorithm, scaling technique and the accuracy: an application to educational data. (2024)
Presentation / Conference Contribution
WICKRAMASINGHE, I. and KALUTARAGE, H. 2024. Machine learning algorithm, scaling technique and the accuracy: an application to educational data. In Proceedings of the 12th International conference on information and education technology 2024 (ICIET 2024) 18-20 March 2024, Yamaguchi, Japan. Piscataway: IEEE [online], pages 6-12. Available from: https://doi.org/10.1109/iciet60671.2024.10542714

Machine learning (ML) applications in educational data mining have become an increasingly popular research area. Literature indicates a lack of research investigating the impact of data scaling techniques, ML algorithms, and the nature of data on the... Read More about Machine learning algorithm, scaling technique and the accuracy: an application to educational data..

FedREVAN: real-time detection of vulnerable android source code through federated neural network with XAI. (2024)
Presentation / Conference Contribution
SENANAYAKE, J., KALUTARAGE, H., PETROVSKI, A., AL-KADRI, M.O. and PIRAS, L. 2024. FedREVAN: real-time detection of vulnerable android source code through federated neural network with XAI. In Katsikas, S. et al. (eds.) Computer security: revised selected papers from the proceedings of the International workshops of the 28th European symposium on research in computer security (ESORICS 2023 International Workshops), 25-29 September 2023, The Hague, Netherlands. Lecture notes in computer science, 14399. Cham: Springer [online], part II, pages 426-441. Available from: https://doi.org/10.1007/978-3-031-54129-2_25

Adhering to security best practices during the development of Android applications is of paramount importance due to the high prevalence of apps released without proper security measures. While automated tools can be employed to address vulnerabiliti... Read More about FedREVAN: real-time detection of vulnerable android source code through federated neural network with XAI..

Computer security: revised selected papers from the proceedings of the International workshops of the 28th European symposium on research in computer security (ESORICS 2023 International Workshops). (2024)
Presentation / Conference Contribution
KATSIKAS, S. et al. (eds.) 2024. Computer security: revised selected papers from the proceedings of the International workshops of the 28th European symposium on research in computer security (ESORICS 2023 International Workshops), 25-29 September 2023, The Hague, Netherlands. Lecture notes in computer science, 14399. Cham: Springer [online], part II. Available from: https://doi.org/10.1007/978-3-031-54129-2

This is the proceedings of seven of the international workshops that were held as part of the 28th edition of the European Symposium on Research in Computer Security (ESORICS).

Enhancing security assurance in software development: AI-based vulnerable code detection with static analysis. (2024)
Presentation / Conference Contribution
RAJAPAKSHA, S., SENANAYAKE, J., KALUTARAGE, H. and AL-KADRI, M.O. 2024. Enhancing security assurance in software development: AI-based vulnerable code detection with static analysis. In Katsikas, S. et al. (eds.) Computer security: revised selected papers from the proceedings of the International workshops of the 28th European symposium on research in computer security (ESORICS 2023 International Workshops), 25-29 September 2023, The Hague, Netherlands. Lecture notes in computer science, 14399. Cham: Springer [online], part II, pages 341-356. Available from: https://doi.org/10.1007/978-3-031-54129-2_20

The presence of vulnerable source code in software applications is causing significant reliability and security issues, which can be mitigated by integrating and assuring software security principles during the early stages of the development lifecyc... Read More about Enhancing security assurance in software development: AI-based vulnerable code detection with static analysis..

Mitigating gradient inversion attacks in federated learning with frequency transformation. (2024)
Presentation / Conference Contribution
PALIHAWADANA, C., WIRATUNGA, N., KALUTARAGE, H. and WIJEKOON, A. 2024. Mitigating gradient inversion attacks in federated learning with frequency transformation. In Katsikas, S. et al. (eds.) Computer security: revised selected papers from the proceedings of the International workshops of the 28th European symposium on research in computer security (ESORICS 2023 International Workshops), 25-29 September 2023, The Hague, Netherlands. Lecture notes in computer science, 14399. Cham: Springer [online], part II, pages 750-760. Available from: https://doi.org/10.1007/978-3-031-54129-2_44

Centralised machine learning approaches have raised concerns regarding the privacy of client data. To address this issue, privacy-preserving techniques such as Federated Learning (FL) have emerged, where only updated gradients are communicated instea... Read More about Mitigating gradient inversion attacks in federated learning with frequency transformation..

CAN-MIRGU: a comprehensive CAN bus attack dataset from moving vehicles for intrusion detection system evaluation. (2024)
Presentation / Conference Contribution
RAJAPAKSHA, S., MADZUDZO, G., KALUTARAGE, H., PETROVSKI, A. and AL-KADRI, M.O. 2024. CAN-MIRGU: a comprehensive CAN bus attack dataset from moving vehicles for intrusion detection system evaluation. In Proceedings of the 2nd Vehicle security and privacy symposium 2024 (VehicleSec 2024), co-located with the 2024 Network and distributed system security symposium (NDSS 2024), 26 February - 01 March 2024, San Diego, CA, USA. San Diego, CA: NDSS [online], paper 43. Available from: https://doi.org/10.14722/vehiclesec.2024.23043

The Controller Area Network (CAN Bus) has emerged as the de facto standard for in-vehicle communication. However, the CAN bus lacks security features, such as encryption and authentication, making it vulnerable to cyberattacks. In response, the curre... Read More about CAN-MIRGU: a comprehensive CAN bus attack dataset from moving vehicles for intrusion detection system evaluation..