Skip to main content

Research Repository

Advanced Search

All Outputs (11)

Gated recurrent unit autoencoder for fault detection in penicillin fermentation process. (2023)
Conference Proceeding
PETROVSKI, A., ARIFEEN, M. and PETROVSKI, S. 2023. Gated recurrent unit autoencoder for fault detection in penicillin fermentation process. In Kovalev, S., Kotenko, I. and Sukhanov, A. (eds.) Proceedings of the 7th Intelligent information technologies for industry international scientific conference 2023 (IITI'23), 20-25 September 2023, St. Petersburg, Russia, volume 1. Lecture notes in networks and systems (LNNS), 776. Cham: Springer [online], pages 86-95. Available from: https://doi.org/10.1007/978-3-031-43789-2_8

The penicillin fermentation process is a fed-batch system to generate industrial-scale penicillin for antibiotic production. Any fault in the fermentation tank can lead to low-quality penicillin products, which may cause a severe impact on final anti... Read More about Gated recurrent unit autoencoder for fault detection in penicillin fermentation process..

Beyond vanilla: improved autoencoder-based ensemble in-vehicle intrusion detection system. (2023)
Journal Article
RAJAPAKSHA, S., KALUTARAGE, H., AL-KADRI, M.O., PETROVSKI, A. and MADZUDZO, G. 2023. Beyond vanilla: improved autoencoder-based ensemble in-vehicle intrusion detection system. Journal of information security and applications [online], 77, article number 103570. Available from: https://doi.org/10.1016/j.jisa.2023.103570

Modern automobiles are equipped with a large number of electronic control units (ECUs) to provide safe driver assistance and comfortable services. The controller area network (CAN) provides near real-time data transmission between ECUs with adequate... Read More about Beyond vanilla: improved autoencoder-based ensemble in-vehicle intrusion detection system..

Labelled Vulnerability Dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models. (2023)
Conference Proceeding
SENANAYAKE, J., KALUTARAGE, H., AL-KADRI, M.O., PIRAS, L. and PETROVSKI, A. 2023. Labelled Vulnerability Dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models. In De Capitani di Vimercati, S. and Samarati, P. (eds.) Proceedings of the 20th International conference on security and cryptography, 10-12 July 2023, Rome, Italy, volume 1. Setúbal: SciTePress [online], pages 659-666. Available from: https://doi.org/10.5220/0012060400003555

Ensuring the security of Android applications is a vital and intricate aspect requiring careful consideration during development. Unfortunately, many apps are published without sufficient security measures, possibly due to a lack of early vulnerabili... Read More about Labelled Vulnerability Dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models..

Android code vulnerabilities early detection using AI-powered ACVED plugin. (2023)
Conference Proceeding
SENANAYAKE, J., KALUTARAGE, H., AL-KADRI, M.O., PETROVSKI, A. and PIRAS, L. 2023. Android code vulnerabilities early detection using AI-powered ACVED plugin. In Atluri, V. and Ferrara, A.L. (eds.) Data and applications security and privacy XXXVII; proceedings of the 37th annual IFIP WG (International Federation for Information Processing Working Group) 11.3 Data and applications security and privacy 2023 (DBSec 2023), 19-21 July 2023, Sophia-Antipolis, France. Lecture notes in computer science (LNCS), 13942. Cham: Springer [online], pages 339-357. Available from: https://doi.org/10.1007/978-3-031-37586-6_20

During Android application development, ensuring adequate security is a crucial and intricate aspect. However, many applications are released without adequate security measures due to the lack of vulnerability identification and code verification at... Read More about Android code vulnerabilities early detection using AI-powered ACVED plugin..

A multi-objective evolutionary approach to discover explainability trade-offs when using linear regression to effectively model the dynamic thermal behaviour of electrical machines. (2023)
Journal Article
BANDA, T.M., ZĂVOIANU, A.-C., PETROVSKI, A., WÖCKINGER, D. and BRAMERDORFER, G. 2024. A multi-objective evolutionary approach to discover explainability trade-offs when using linear regression to effectively model the dynamic thermal behaviour of electrical machines. ACM transactions on evolutionary learning and optimization [online], 4(1), article number 3. Available from: https://doi.org/10.1145/3597618

Modelling and controlling heat transfer in rotating electrical machines is very important as it enables the design of assemblies (e.g., motors) that are efficient and durable under multiple operational scenarios. To address the challenge of deriving... Read More about A multi-objective evolutionary approach to discover explainability trade-offs when using linear regression to effectively model the dynamic thermal behaviour of electrical machines..

CBANet: an end-to-end cross band 2-D attention network for hyperspectral change detection in remote sensing. (2023)
Journal Article
LI, Y., REN, J., YAN, Y., LIU, Q., MA, P., PETROVSKI, A. and SUN, H. 2023. CBANet: an end-to-end cross band 2-D attention network for hyperspectral change detection in remote sensing. IEEE transactions on geoscience and remote sensing [online], 61, 5513011. Available from: https://doi.org/10.1109/TGRS.2023.3276589

As a fundamental task in remote sensing observation of the earth, change detection using hyperspectral images (HSI) features high accuracy due to the combination of the rich spectral and spatial information, especially for identifying land-cover vari... Read More about CBANet: an end-to-end cross band 2-D attention network for hyperspectral change detection in remote sensing..

Advanced persistent threats detection based on deep learning approach. (2023)
Conference Proceeding
EKE, H.N. and PETROVSKI, A. 2023. Advanced persistent threats detection based on deep learning approach. In Proceedings of the 6th IEEE (Institute of Electrical and Electronics Engineers) International conference on Industrial cyber physical systems international conference 2023 (ICPS 2023), 8-11 May 2023, Wuhan, China. Piscataway: IEEE [online], pages 1-10. Available from: https://doi.org/10.1109/ICPS58381.2023.10128062

Advanced Persistent Threats (APTs) have been a major challenge in securing both Information Technology (IT) and Operational Technology (OT) systems. APT is a sophisticated attack that masquerade their actions to navigates around defenses, breach netw... Read More about Advanced persistent threats detection based on deep learning approach..

Bayesian optimized autoencoder for predictive maintenance of smart packaging machines. (2023)
Conference Proceeding
ARIFEEN, M. and PETROVSKI, A. 2023. Bayesian optimized autoencoder for predictive maintenance of smart packaging machines. In Proceedings of the 6th IEEE (Institute of Electrical and Electronics Engineers) International conference on Industrial cyber-physical systems 2023 (ICPS 2023), 8-11 May 2023, Wuhan, China. Piscataway: IEEE [online], 10128064. Available from: https://doi.org/10.1109/icps58381.2023.10128064

Smart packaging machines incorporate various components (blades, motors, films) to accomplish the packaging process and are involved in almost all types of the manufacturing industry. Proper maintenance and monitoring of the components over time can... Read More about Bayesian optimized autoencoder for predictive maintenance of smart packaging machines..

Ensemble common features technique for lightweight intrusion detection in industrial control system. (2023)
Conference Proceeding
OTOKWALA, U.J. and PETROVSKI, A. 2023. Ensemble common features technique for lightweight intrusion detection in industrial control system. In Proceedings of the 6th IEEE (Institute of Electrical and Electronics Engineers) International conference on Industrial cyber-physical systems 2023 (ICPS 2023), 8-11 May 2023, Wuhan, China. Piscataway: IEEE [online], 10128040. Available from: https://doi.org/10.1109/icps58381.2023.10128040

The integration of the Industrial Control System (ICS) with corporate intranets and the internet has exposed the previously isolated SCADA system to a wide range of cyber-attacks. Interestingly, the vulnerabilities in the Modbus protocol, with which... Read More about Ensemble common features technique for lightweight intrusion detection in industrial control system..

AI-based intrusion detection systems for in-vehicle networks: a survey. (2023)
Journal Article
RAJAPAKSHA, S., KALUTARAGE, H., AL-KADRI, M.O., PETROVSKI, A., MADZUDZO, G. and CHEAH, M. 2023. Al-based intrusion detection systems for in-vehicle networks: a survey. ACM computing survey [online], 55(11), article no. 237, pages 1-40. Available from: https://doi.org/10.1145/3570954

The Controller Area Network (CAN) is the most widely used in-vehicle communication protocol, which still lacks the implementation of suitable security mechanisms such as message authentication and encryption. This makes the CAN bus vulnerable to nume... Read More about AI-based intrusion detection systems for in-vehicle networks: a survey..

Android source code vulnerability detection: a systematic literature review. (2023)
Journal Article
SENANAYAKE, J., KALUTARAGE, H., AL-KADRI, M.O., PETROVSKI, A. and PIRAS, L. 2023. Android source code vulnerability detection: a systematic literature review. ACM computing surveys [online], 55(9), article 187, pages 1-37. Available from: https://doi.org/10.1145/3556974

The use of mobile devices is rising daily in this technological era. A continuous and increasing number of mobile applications are constantly offered on mobile marketplaces to fulfil the needs of smartphone users. Many Android applications do not add... Read More about Android source code vulnerability detection: a systematic literature review..