A survey of wearable devices and challenges S Seneviratne, Y Hu, T Nguyen, G Lan, S Khalifa, K Thilakarathna, ... IEEE Communications Surveys & Tutorials 19 (4), 2573-2620, 2017 | 736 | 2017 |
Deepcaps: Going deeper with capsule networks J Rajasegaran, V Jayasundara, S Jayasekara, H Jayasekara, ... Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2019 | 247 | 2019 |
BreathPrint: Breathing acoustics-based user authentication J Chauhan, Y Hu, S Seneviratne, A Misra, A Seneviratne, Y Lee Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017 | 201 | 2017 |
An analysis of the privacy and security risks of android vpn permission-enabled apps M Ikram, N Vallina-Rodriguez, S Seneviratne, MA Kaafar, V Paxson Proceedings of the 2016 internet measurement conference, 349-364, 2016 | 182 | 2016 |
Predicting user traits from a snapshot of apps installed on a smartphone S Seneviratne, A Seneviratne, P Mohapatra, A Mahanti ACM SIGMOBILE Mobile Computing and Communications Review 18 (2), 1-8, 2014 | 173 | 2014 |
Your installed apps reveal your gender and more! S Suranga, A Seneviratne, P Mohapatra, A Mahanti Proceedings of the ACM MobiCom workshop on Security and privacy in mobile …, 2014 | 130* | 2014 |
A measurement study of tracking in paid mobile applications S Seneviratne, H Kolamunna, A Seneviratne Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015 | 98 | 2015 |
Textcaps: Handwritten character recognition with very small datasets V Jayasundara, S Jayasekara, H Jayasekara, J Rajasegaran, ... 2019 IEEE winter conference on applications of computer vision (WACV), 254-262, 2019 | 91 | 2019 |
Breathing-based authentication on resource-constrained IoT devices using recurrent neural networks J Chauhan, S Seneviratne, Y Hu, A Misra, A Seneviratne, Y Lee Computer 51 (5), 60-67, 2018 | 91 | 2018 |
Characterizing and detecting money laundering activities on the bitcoin network Y Hu, S Seneviratne, K Thilakarathna, K Fukuda, A Seneviratne arXiv preprint arXiv:1912.12060, 2019 | 71 | 2019 |
5G Privacy: Scenarios and Solutions M Liyanage, J Salo, A Braeken, T Kumar, S Seneviratne, M Ylianttila | 70 | 2018 |
Performance characterization of deep learning models for breathing-based authentication on resource-constrained devices J Chauhan, J Rajasegaran, S Seneviratne, A Misra, A Seneviratne, Y Lee Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018 | 54 | 2018 |
Deep content: Unveiling video streaming content from encrypted wifi traffic Y Li, Y Huang, R Xu, S Seneviratne, K Thilakarathna, A Cheng, D Webb, ... 2018 ieee 17th international symposium on network computing and applications …, 2018 | 51 | 2018 |
A review of computer vision methods in network security J Zhao, R Masood, S Seneviratne IEEE Communications Surveys & Tutorials 23 (3), 1838-1878, 2021 | 44 | 2021 |
Early detection of spam mobile apps S Seneviratne, A Seneviratne, MA Kaafar, A Mahanti, P Mohapatra Proceedings of the 24th International Conference on World Wide Web, 949-959, 2015 | 41 | 2015 |
Characterization of early smartwatch apps J Chauhan, S Seneviratne, MA Kaafar, A Mahanti, A Seneviratne 2016 IEEE International Conference on Pervasive Computing and Communication …, 2016 | 39 | 2016 |
Droneprint: Acoustic signatures for open-set drone detection and identification with online data H Kolamunna, T Dahanayaka, J Li, S Seneviratne, K Thilakaratne, ... Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2021 | 35 | 2021 |
App Miscategorization Detection: A Case Study on Google Play D Surian, S Seneviratne, A Seneviratne, S Chawla IEEE Transactions on Knowledge and Data Engineering, 2017 | 33 | 2017 |
Characterizing wifi connection and its impact on mobile users: practical insights S Seneviratne, A Seneviratne, P Mohapatra, PU Tournoux Proceedings of the 8th ACM international workshop on Wireless network …, 2013 | 28 | 2013 |
SSIDs in the wild: Extracting semantic information from WiFi SSIDs S Seneviratne, F Jiang, M Cunche, A Seneviratne 2015 IEEE 40th conference on local computer networks (LCN), 494-497, 2015 | 24 | 2015 |