Follow
Suranga Seneviratne
Title
Cited by
Cited by
Year
A survey of wearable devices and challenges
S Seneviratne, Y Hu, T Nguyen, G Lan, S Khalifa, K Thilakarathna, ...
IEEE Communications Surveys & Tutorials 19 (4), 2573-2620, 2017
7362017
Deepcaps: Going deeper with capsule networks
J Rajasegaran, V Jayasundara, S Jayasekara, H Jayasekara, ...
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2019
2472019
BreathPrint: Breathing acoustics-based user authentication
J Chauhan, Y Hu, S Seneviratne, A Misra, A Seneviratne, Y Lee
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
2012017
An analysis of the privacy and security risks of android vpn permission-enabled apps
M Ikram, N Vallina-Rodriguez, S Seneviratne, MA Kaafar, V Paxson
Proceedings of the 2016 internet measurement conference, 349-364, 2016
1822016
Predicting user traits from a snapshot of apps installed on a smartphone
S Seneviratne, A Seneviratne, P Mohapatra, A Mahanti
ACM SIGMOBILE Mobile Computing and Communications Review 18 (2), 1-8, 2014
1732014
Your installed apps reveal your gender and more!
S Suranga, A Seneviratne, P Mohapatra, A Mahanti
Proceedings of the ACM MobiCom workshop on Security and privacy in mobile …, 2014
130*2014
A measurement study of tracking in paid mobile applications
S Seneviratne, H Kolamunna, A Seneviratne
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015
982015
Textcaps: Handwritten character recognition with very small datasets
V Jayasundara, S Jayasekara, H Jayasekara, J Rajasegaran, ...
2019 IEEE winter conference on applications of computer vision (WACV), 254-262, 2019
912019
Breathing-based authentication on resource-constrained IoT devices using recurrent neural networks
J Chauhan, S Seneviratne, Y Hu, A Misra, A Seneviratne, Y Lee
Computer 51 (5), 60-67, 2018
912018
Characterizing and detecting money laundering activities on the bitcoin network
Y Hu, S Seneviratne, K Thilakarathna, K Fukuda, A Seneviratne
arXiv preprint arXiv:1912.12060, 2019
712019
5G Privacy: Scenarios and Solutions
M Liyanage, J Salo, A Braeken, T Kumar, S Seneviratne, M Ylianttila
702018
Performance characterization of deep learning models for breathing-based authentication on resource-constrained devices
J Chauhan, J Rajasegaran, S Seneviratne, A Misra, A Seneviratne, Y Lee
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018
542018
Deep content: Unveiling video streaming content from encrypted wifi traffic
Y Li, Y Huang, R Xu, S Seneviratne, K Thilakarathna, A Cheng, D Webb, ...
2018 ieee 17th international symposium on network computing and applications …, 2018
512018
A review of computer vision methods in network security
J Zhao, R Masood, S Seneviratne
IEEE Communications Surveys & Tutorials 23 (3), 1838-1878, 2021
442021
Early detection of spam mobile apps
S Seneviratne, A Seneviratne, MA Kaafar, A Mahanti, P Mohapatra
Proceedings of the 24th International Conference on World Wide Web, 949-959, 2015
412015
Characterization of early smartwatch apps
J Chauhan, S Seneviratne, MA Kaafar, A Mahanti, A Seneviratne
2016 IEEE International Conference on Pervasive Computing and Communication …, 2016
392016
Droneprint: Acoustic signatures for open-set drone detection and identification with online data
H Kolamunna, T Dahanayaka, J Li, S Seneviratne, K Thilakaratne, ...
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2021
352021
App Miscategorization Detection: A Case Study on Google Play
D Surian, S Seneviratne, A Seneviratne, S Chawla
IEEE Transactions on Knowledge and Data Engineering, 2017
332017
Characterizing wifi connection and its impact on mobile users: practical insights
S Seneviratne, A Seneviratne, P Mohapatra, PU Tournoux
Proceedings of the 8th ACM international workshop on Wireless network …, 2013
282013
SSIDs in the wild: Extracting semantic information from WiFi SSIDs
S Seneviratne, F Jiang, M Cunche, A Seneviratne
2015 IEEE 40th conference on local computer networks (LCN), 494-497, 2015
242015
The system can't perform the operation now. Try again later.
Articles 1–20