Loading…
Deep learning for encrypted traffic classification and unknown data detection
Despite the widespread use of encryption techniques to provide confidentiality over Internet communications, mobile device users are still susceptible to privacy and security risks. In this paper, a novel Deep Neural Network (DNN) based on a user activity detection framework is proposed to identify...
Saved in:
Main Authors: | Omattage Madushi H. Pathmaperuma, Yogachandran Rahulamathavan, Safak Dogan, Ahmet Kondoz |
---|---|
Format: | Default Article |
Published: |
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/2134/21303849.v1 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Loading…
CNN for user activity detection using encrypted in-app mobile data
by: Omattage Madushi H. Pathmaperuma, et al.
Published: (2022)
by: Omattage Madushi H. Pathmaperuma, et al.
Published: (2022)
Loading…
In-app activity recognition from Wi-Fi encrypted traffic
by: Omattage Madushi H. Pathmaperuma, et al.
Published: (2020)
by: Omattage Madushi H. Pathmaperuma, et al.
Published: (2020)
Loading…
User mobile app encrypted activity detection
by: Omattage Madushi H. Pathmaperuma, et al.
Published: (2021)
by: Omattage Madushi H. Pathmaperuma, et al.
Published: (2021)
Loading…
User activity detection using encrypted in-app data
by: Omattage Madushi H. Pathmaperuma
Published: (2022)
by: Omattage Madushi H. Pathmaperuma
Published: (2022)
Loading…
Validating a traffic conflict prediction technique for motorways using a simulation approach
by: Nicolette Formosa, et al.
Published: (2022)
by: Nicolette Formosa, et al.
Published: (2022)
Loading…
Memory-facilitated joint-space shift adaptation in traffic forecasting
by: Ye Wei, et al.
Published: (2024)
by: Ye Wei, et al.
Published: (2024)
Loading…
Radio frequency traffic classification over WLAN
by: Joe Kornycky, et al.
Published: (2016)
by: Joe Kornycky, et al.
Published: (2016)
Loading…
User collusion avoidance scheme for privacy-preserving decentralized key-policy attribute-based encryption
by: Yogachandran Rahulamathavan, et al.
Published: (2015)
by: Yogachandran Rahulamathavan, et al.
Published: (2015)
Loading…
LiDAR-based glass detection for improved occupancy grid mapping
by: Haylat Tibebu, et al.
Published: (2021)
by: Haylat Tibebu, et al.
Published: (2021)
Loading…
Predicting real-time traffic conflicts using deep learning
by: Nicolette Formosa, et al.
Published: (2020)
by: Nicolette Formosa, et al.
Published: (2020)
Loading…
Exploring memory-facilitated graph neural networks for traffic forecasting
by: Ye Wei
Published: (2024)
by: Ye Wei
Published: (2024)
Loading…
Robust access control framework for mobile cloud computing network
by: Fei Li, et al.
Published: (2015)
by: Fei Li, et al.
Published: (2015)
Loading…
Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption
by: Yogachandran Rahulamathavan, et al.
Published: (2018)
by: Yogachandran Rahulamathavan, et al.
Published: (2018)
Loading…
Loughborough University - Network Traffic with Port Scanning Attack
by: Kostas Kyriakopoulos, et al.
Published: (2017)
by: Kostas Kyriakopoulos, et al.
Published: (2017)
Loading…
Encryption of text file using a user controlled automatically-generated key
by: Halima Shnishah, et al.
Published: (2019)
by: Halima Shnishah, et al.
Published: (2019)
Loading…
Context-aware hybrid satellite-terrestrial broadband access
by: Erhan Ekmekcioglu, et al.
Published: (2018)
by: Erhan Ekmekcioglu, et al.
Published: (2018)
Loading…
Blockchain at the edge: Performance of resource-constrained IoT networks
by: Sudip Misra, et al.
Published: (2020)
by: Sudip Misra, et al.
Published: (2020)
Loading…
IN3: A framework for in-network computation of neural networks in the programmable data plane
by: Xiaoquan Zhang, et al.
Published: (2024)
by: Xiaoquan Zhang, et al.
Published: (2024)
Loading…
Machine learning aided blockchain assisted framework for wireless networks
by: Amjad Khan, et al.
Published: (2020)
by: Amjad Khan, et al.
Published: (2020)
Loading…
Medical image encryption using chaotic map improved advanced encryption standard
by: Ranvir S. Bhogal, et al.
Published: (2018)
by: Ranvir S. Bhogal, et al.
Published: (2018)
Loading…
A survey: Security, transparency, and scalability issues of NFT’s and its marketplaces
by: Sangam Bhujel, et al.
Published: (2022)
by: Sangam Bhujel, et al.
Published: (2022)
Loading…
Novel real-time OEP phase angle feedback system for dysfunctional breathing pattern training—an acute intervention study
by: Carol ME Smyth, et al.
Published: (2021)
by: Carol ME Smyth, et al.
Published: (2021)
Loading…
Privacy-preserving multi-class support vector machine for outsourcing the data classification in cloud
by: Yogachandran Rahulamathavan, et al.
Published: (2013)
by: Yogachandran Rahulamathavan, et al.
Published: (2013)
Loading…
DNAzyme sensor for the detection of Ca<sup>2+</sup> using resistive pulse sensing
by: Imogen Heaton, et al.
Published: (2020)
by: Imogen Heaton, et al.
Published: (2020)
Loading…
Evidential classification for defending against adversarial attacks on network traffic
by: Matt Beechey, et al.
Published: (2022)
by: Matt Beechey, et al.
Published: (2022)
Loading…
A new lightweight symmetric searchable encryption scheme for string identification
by: Indranil Ghosh Ray, et al.
Published: (2018)
by: Indranil Ghosh Ray, et al.
Published: (2018)
Loading…
Scalar product lattice computation for efficient privacy-preserving systems
by: Yogachandran Rahulamathavan, et al.
Published: (2020)
by: Yogachandran Rahulamathavan, et al.
Published: (2020)
Loading…
A formal adversarial perspective: Secure and efficient electronic health records collection scheme for multi‐records datasets
by: Tehsin Kanwal, et al.
Published: (2020)
by: Tehsin Kanwal, et al.
Published: (2020)
Loading…
Different forms of responsibility in multiagent systems: Sociotechnical characteristics and requirements
by: Vahid Yazdanpanah, et al.
Published: (2021)
by: Vahid Yazdanpanah, et al.
Published: (2021)
Loading…
Group-based atrous convolution stereo matching network
by: Qijie Zou, et al.
Published: (2021)
by: Qijie Zou, et al.
Published: (2021)
Loading…
Traffic prediction based packet transmission priority technique in an infrastructure wireless network
by: Alia Asheralieva, et al.
Published: (2011)
by: Alia Asheralieva, et al.
Published: (2011)
Loading…
A new secure and lightweight searchable encryption scheme over encrypted cloud data
by: Shahzaib Tahir, et al.
Published: (2017)
by: Shahzaib Tahir, et al.
Published: (2017)
Loading…
Automatic selective encryption of DICOM images
by: Qamar Natsheh, et al.
Published: (2023)
by: Qamar Natsheh, et al.
Published: (2023)
Loading…
Illumination adaptation in a multi-wavelength opto-electronic patch sensor
by: Liangwen Yan, et al.
Published: (2020)
by: Liangwen Yan, et al.
Published: (2020)
Loading…
Few-shot learning-based network intrusion detection through an enhanced parallelized triplet network
by: Ji-Yu Tian, et al.
Published: (2022)
by: Ji-Yu Tian, et al.
Published: (2022)
Loading…
Securing DICOM images through automatic selective encryption
by: Amar Natsheh
Published: (2019)
by: Amar Natsheh
Published: (2019)
Loading…
Distributed caching in the future generation networks
by: Yining Hua
Published: (2020)
by: Yining Hua
Published: (2020)
Loading…
Charge sharing and charge loss in high-flux capable pixelated CdZnTe detectors
by: Kjell Koch-Mehrin, et al.
Published: (2021)
by: Kjell Koch-Mehrin, et al.
Published: (2021)
Loading…
A trust update mechanism based on reinforcement learning in underwater acoustic sensor networks
by: Yu He, et al.
Published: (2020)
by: Yu He, et al.
Published: (2020)
Loading…
A deep learning-based privacy-preserving model for smart healthcare in Internet of Medical Things using fog computing
by: Syed Atif Moqurrab, et al.
Published: (2022)
by: Syed Atif Moqurrab, et al.
Published: (2022)
Similar Items
-
CNN for user activity detection using encrypted in-app mobile data
by: Omattage Madushi H. Pathmaperuma, et al.
Published: (2022) -
In-app activity recognition from Wi-Fi encrypted traffic
by: Omattage Madushi H. Pathmaperuma, et al.
Published: (2020) -
User mobile app encrypted activity detection
by: Omattage Madushi H. Pathmaperuma, et al.
Published: (2021) -
User activity detection using encrypted in-app data
by: Omattage Madushi H. Pathmaperuma
Published: (2022) -
Validating a traffic conflict prediction technique for motorways using a simulation approach
by: Nicolette Formosa, et al.
Published: (2022)