Alert button
Picture for Suranga Seneviratne

Suranga Seneviratne

Alert button

Out-of-Distribution Data: An Acquaintance of Adversarial Examples -- A Survey

Add code
Bookmark button
Alert button
Apr 08, 2024
Naveen Karunanayake, Ravin Gunawardena, Suranga Seneviratne, Sanjay Chawla

Viaarxiv icon

Long-Tail Learning with Rebalanced Contrastive Loss

Add code
Bookmark button
Alert button
Dec 04, 2023
Charika De Alvis, Dishanika Denipitiyage, Suranga Seneviratne

Viaarxiv icon

ExCeL : Combined Extreme and Collective Logit Information for Enhancing Out-of-Distribution Detection

Add code
Bookmark button
Alert button
Nov 23, 2023
Naveen Karunanayake, Suranga Seneviratne, Sanjay Chawla

Figure 1 for ExCeL : Combined Extreme and Collective Logit Information for Enhancing Out-of-Distribution Detection
Figure 2 for ExCeL : Combined Extreme and Collective Logit Information for Enhancing Out-of-Distribution Detection
Figure 3 for ExCeL : Combined Extreme and Collective Logit Information for Enhancing Out-of-Distribution Detection
Figure 4 for ExCeL : Combined Extreme and Collective Logit Information for Enhancing Out-of-Distribution Detection
Viaarxiv icon

Non-Contrastive Learning-based Behavioural Biometrics for Smart IoT Devices

Add code
Bookmark button
Alert button
Oct 24, 2022
Oshan Jayawardana, Fariza Rashid, Suranga Seneviratne

Figure 1 for Non-Contrastive Learning-based Behavioural Biometrics for Smart IoT Devices
Figure 2 for Non-Contrastive Learning-based Behavioural Biometrics for Smart IoT Devices
Figure 3 for Non-Contrastive Learning-based Behavioural Biometrics for Smart IoT Devices
Figure 4 for Non-Contrastive Learning-based Behavioural Biometrics for Smart IoT Devices
Viaarxiv icon

Privacy-Preserving Spam Filtering using Functional Encryption

Add code
Bookmark button
Alert button
Dec 08, 2020
Sicong Wang, Naveen Karunanayake, Tham Nguyen, Suranga Seneviratne

Figure 1 for Privacy-Preserving Spam Filtering using Functional Encryption
Figure 2 for Privacy-Preserving Spam Filtering using Functional Encryption
Figure 3 for Privacy-Preserving Spam Filtering using Functional Encryption
Figure 4 for Privacy-Preserving Spam Filtering using Functional Encryption
Viaarxiv icon

A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps: A Case Study on Google Play Store

Add code
Bookmark button
Alert button
Jun 02, 2020
Naveen Karunanayake, Jathushan Rajasegaran, Ashanie Gunathillake, Suranga Seneviratne, Guillaume Jourjon

Figure 1 for A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps: A Case Study on Google Play Store
Figure 2 for A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps: A Case Study on Google Play Store
Figure 3 for A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps: A Case Study on Google Play Store
Figure 4 for A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps: A Case Study on Google Play Store
Viaarxiv icon

A Review of Computer Vision Methods in Network Security

Add code
Bookmark button
Alert button
May 07, 2020
Jiawei Zhao, Rahat Masood, Suranga Seneviratne

Figure 1 for A Review of Computer Vision Methods in Network Security
Figure 2 for A Review of Computer Vision Methods in Network Security
Figure 3 for A Review of Computer Vision Methods in Network Security
Figure 4 for A Review of Computer Vision Methods in Network Security
Viaarxiv icon

TimeCaps: Learning From Time Series Data with Capsule Networks

Add code
Bookmark button
Alert button
Jan 11, 2020
Hirunima Jayasekara, Vinoj Jayasundara, Jathushan Rajasegaran, Sandaru Jayasekara, Suranga Seneviratne, Ranga Rodrigo

Figure 1 for TimeCaps: Learning From Time Series Data with Capsule Networks
Figure 2 for TimeCaps: Learning From Time Series Data with Capsule Networks
Figure 3 for TimeCaps: Learning From Time Series Data with Capsule Networks
Figure 4 for TimeCaps: Learning From Time Series Data with Capsule Networks
Viaarxiv icon

Characterizing and Detecting Money Laundering Activities on the Bitcoin Network

Add code
Bookmark button
Alert button
Dec 27, 2019
Yining Hu, Suranga Seneviratne, Kanchana Thilakarathna, Kensuke Fukuda, Aruna Seneviratne

Figure 1 for Characterizing and Detecting Money Laundering Activities on the Bitcoin Network
Figure 2 for Characterizing and Detecting Money Laundering Activities on the Bitcoin Network
Figure 3 for Characterizing and Detecting Money Laundering Activities on the Bitcoin Network
Figure 4 for Characterizing and Detecting Money Laundering Activities on the Bitcoin Network
Viaarxiv icon

DeepCaps: Going Deeper with Capsule Networks

Add code
Bookmark button
Alert button
Apr 21, 2019
Jathushan Rajasegaran, Vinoj Jayasundara, Sandaru Jayasekara, Hirunima Jayasekara, Suranga Seneviratne, Ranga Rodrigo

Figure 1 for DeepCaps: Going Deeper with Capsule Networks
Figure 2 for DeepCaps: Going Deeper with Capsule Networks
Figure 3 for DeepCaps: Going Deeper with Capsule Networks
Figure 4 for DeepCaps: Going Deeper with Capsule Networks
Viaarxiv icon