Select Publications
Preprints
, 2025, Demo: TOSense -- What Did You Just Agree to?, http://dx.doi.org/10.48550/arxiv.2508.00659
, 2025, Nosy Layers, Noisy Fixes: Tackling DRAs in Federated Learning Systems using Explainable AI, http://dx.doi.org/10.48550/arxiv.2505.10942
, 2025, SoK: Decoding the Enigma of Encrypted Network Traffic Classifiers, http://dx.doi.org/10.48550/arxiv.2503.20093
, 2025, Less is More: Simplifying Network Traffic Classification Leveraging RFCs, http://dx.doi.org/10.1145/3701716.3715492
, 2024, Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning, http://arxiv.org/abs/2410.11205v1
, 2024, Towards Detecting IoT Event Spoofing Attacks Using Time-Series Classification, http://dx.doi.org/10.48550/arxiv.2407.19662
, 2024, AuditNet: A Conversational AI-based Security Assistant [DEMO], http://arxiv.org/abs/2407.14116v1
, 2024, USAT: A Universal Speaker-Adaptive Text-to-Speech Approach, http://dx.doi.org/10.48550/arxiv.2404.18094
, 2022, PhishSim: Aiding Phishing Website Detection with a Feature-Free Tool, http://dx.doi.org/10.1109/TIFS.2022.3164212.
, 2022, FLAP: Federated Learning with Attack and Privacy Awareness, http://dx.doi.org/10.36227/techrxiv.19766023
, 2022, Fake News Quick Detection on Dynamic Heterogeneous Information Networks, http://dx.doi.org/10.48550/arxiv.2205.07039
, 2021, HaS-Net: A Heal and Select Mechanism to Securely Train DNNs against Backdoor Attacks, http://dx.doi.org/10.36227/techrxiv.16571184
, 2021, Man versus Machine: AutoML and Human Experts' Role in Phishing Detection, http://arxiv.org/abs/2108.12193v1
, 2021, DIMY: Enabling Privacy-preserving Contact Tracing, http://arxiv.org/abs/2103.05873v1
, 2021, All Infections are Not Created Equal: Time-Sensitive Prediction of Malware Generated Network Attacks, http://dx.doi.org/10.48550/arxiv.2102.01944
, 2020, HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios, http://dx.doi.org/10.48550/arxiv.2012.07474
, 2020, De-anonymisation attacks on Tor: A Survey, http://dx.doi.org/10.48550/arxiv.2009.13018
, 2020, Nephalai: Towards LPWAN C-RAN with Physical Layer Compression, http://dx.doi.org/10.48550/arxiv.2008.02599
, 2020, A Novel Emergency Light Based Smart Building Solution: Design, Implementation and Use Cases, http://dx.doi.org/10.48550/arxiv.2007.15906
, 2020, PhishZip: A New Compression-based Algorithm for Detecting Phishing Websites, http://arxiv.org/abs/2007.11955v1
, 2020, B-FERL: Blockchain based Framework for Securing Smart Vehicles, http://arxiv.org/abs/2007.10528v1
, 2020, Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud, http://dx.doi.org/10.48550/arxiv.2005.07987
, 2020, A Survey of COVID-19 Contact Tracing Apps., https://arxiv.org/abs/2006.10306
, 2019, Leveraging lightweight blockchain to establish data integrity for surveillance cameras, http://dx.doi.org/10.48550/arxiv.1912.11044
, 2019, Measurement, Characterization and Modeling of LoRa Technology in Multi-floor Buildings, http://dx.doi.org/10.48550/arxiv.1909.03900
, 2019, Risk Analysis Study of Fully Autonomous Vehicle, http://dx.doi.org/10.48550/arxiv.1905.10910
, 2018, Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems, http://dx.doi.org/10.48550/arxiv.1809.06988
, 2018, Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations, http://dx.doi.org/10.48550/arxiv.1807.02593
, 2018, B-FICA: BlockChain based Framework for Auto-insurance Claim and Adjudication, http://arxiv.org/abs/1806.06169v1
, 2018, Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions, http://dx.doi.org/10.48550/arxiv.1804.00262
, 2018, A Blockchain Based Liability Attribution Framework for Autonomous Vehicles, http://dx.doi.org/10.48550/arxiv.1802.05050
, 2017, WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks, http://dx.doi.org/10.48550/arxiv.1708.05477
, 2016, Towards Policy Enforcement Point as a Service (PEPS), http://dx.doi.org/10.48550/arxiv.1610.02526
, 2016, Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting, http://arxiv.org/abs/1603.02476v1