Follow
Suranga Seneviratne
Title
Cited by
Cited by
Year
A survey of wearable devices and challenges
S Seneviratne, Y Hu, T Nguyen, G Lan, S Khalifa, K Thilakarathna, ...
IEEE Communications Surveys & Tutorials 19 (4), 2573-2620, 2017
4372017
Deepcaps: Going deeper with capsule networks
J Rajasegaran, V Jayasundara, S Jayasekara, H Jayasekara, ...
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2019
1742019
Predicting user traits from a snapshot of apps installed on a smartphone
S Seneviratne, A Seneviratne, P Mohapatra, A Mahanti
ACM SIGMOBILE Mobile Computing and Communications Review 18 (2), 1-8, 2014
1602014
An analysis of the privacy and security risks of android vpn permission-enabled apps
M Ikram, N Vallina-Rodriguez, S Seneviratne, MA Kaafar, V Paxson
Proceedings of the 2016 internet measurement conference, 349-364, 2016
1232016
BreathPrint: Breathing acoustics-based user authentication
J Chauhan, Y Hu, S Seneviratne, A Misra, A Seneviratne, Y Lee
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
1162017
Your installed apps reveal your gender and more!
S Seneviratne, A Seneviratne, P Mohapatra, A Mahanti
ACM SIGMOBILE Mobile Computing and Communications Review 18 (3), 55-61, 2015
1142015
Your installed apps reveal your gender and more!
S Suranga, A Seneviratne, P Mohapatra, A Mahanti
Proceedings of the ACM MobiCom workshop on Security and privacy in mobile …, 2014
114*2014
A measurement study of tracking in paid mobile applications
S Seneviratne, H Kolamunna, A Seneviratne
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015
782015
Breathing-based authentication on resource-constrained IoT devices using recurrent neural networks
J Chauhan, S Seneviratne, Y Hu, A Misra, A Seneviratne, Y Lee
Computer 51 (5), 60-67, 2018
622018
Textcaps: Handwritten character recognition with very small datasets
V Jayasundara, S Jayasekara, H Jayasekara, J Rajasegaran, ...
2019 IEEE winter conference on applications of computer vision (WACV), 254-262, 2019
542019
5G Privacy: Scenarios and Solutions
M Liyanage, J Salo, A Braeken, T Kumar, S Seneviratne, M Ylianttila
472018
Early detection of spam mobile apps
S Seneviratne, A Seneviratne, MA Kaafar, A Mahanti, P Mohapatra
Proceedings of the 24th International Conference on World Wide Web, 949-959, 2015
372015
Characterization of early smartwatch apps
J Chauhan, S Seneviratne, MA Kaafar, A Mahanti, A Seneviratne
2016 IEEE International Conference on Pervasive Computing and Communication …, 2016
352016
Characterizing and detecting money laundering activities on the bitcoin network
Y Hu, S Seneviratne, K Thilakarathna, K Fukuda, A Seneviratne
arXiv preprint arXiv:1912.12060, 2019
322019
Performance characterization of deep learning models for breathing-based authentication on resource-constrained devices
J Chauhan, J Rajasegaran, S Seneviratne, A Misra, A Seneviratne, Y Lee
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018
302018
App Miscategorization Detection: A Case Study on Google Play
D Surian, S Seneviratne, A Seneviratne, S Chawla
IEEE Transactions on Knowledge and Data Engineering, 2017
262017
Deep Content: Unveiling video streaming content from encrypted WiFi traffic
Y Li, Y Huang, R Xu, S Seneviratne, K Thilakarathna, A Cheng, D Webb, ...
2018 IEEE 17th International Symposium on Network Computing and Applications …, 2018
242018
A deep dive into location-based communities in social discovery networks
K Thilakarathna, S Seneviratne, K Gupta, MA Kaafar, A Seneviratne
Computer Communications 100, 78-90, 2017
212017
Characterizing wifi connection and its impact on mobile users: practical insights
S Seneviratne, A Seneviratne, P Mohapatra, PU Tournoux
Proceedings of the 8th ACM international workshop on Wireless network …, 2013
212013
Spam mobile apps: Characteristics, detection, and in the wild analysis
S Seneviratne, A Seneviratne, MA Kaafar, A Mahanti, P Mohapatra
ACM Transactions on the Web (TWEB) 11 (1), 1-29, 2017
192017
The system can't perform the operation now. Try again later.
Articles 1–20