Skip to main content

Showing 1–4 of 4 results for author: Karunanayake, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.05219  [pdf, other

    cs.LG

    Out-of-Distribution Data: An Acquaintance of Adversarial Examples -- A Survey

    Authors: Naveen Karunanayake, Ravin Gunawardena, Suranga Seneviratne, Sanjay Chawla

    Abstract: Deep neural networks (DNNs) deployed in real-world applications can encounter out-of-distribution (OOD) data and adversarial examples. These represent distinct forms of distributional shifts that can significantly impact DNNs' reliability and robustness. Traditionally, research has addressed OOD detection and adversarial robustness as separate challenges. This survey focuses on the intersection of… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

  2. arXiv:2311.14754  [pdf, other

    cs.LG

    ExCeL : Combined Extreme and Collective Logit Information for Enhancing Out-of-Distribution Detection

    Authors: Naveen Karunanayake, Suranga Seneviratne, Sanjay Chawla

    Abstract: Deep learning models often exhibit overconfidence in predicting out-of-distribution (OOD) data, underscoring the crucial role of OOD detection in ensuring reliability in predictions. Among various OOD detection approaches, post-hoc detectors have gained significant popularity, primarily due to their ease of use and implementation. However, the effectiveness of most post-hoc OOD detectors has been… ▽ More

    Submitted 23 November, 2023; originally announced November 2023.

  3. arXiv:2012.04163  [pdf, other

    cs.CR cs.NE

    Privacy-Preserving Spam Filtering using Functional Encryption

    Authors: Sicong Wang, Naveen Karunanayake, Tham Nguyen, Suranga Seneviratne

    Abstract: Traditional spam classification requires the end-user to reveal the content of its received email to the spam classifier which violates the privacy. Spam classification over encrypted emails enables the classifier to classify spam email without accessing the email, hence protects the privacy of email content. In this paper, we construct a spam classification framework that enables the classificati… ▽ More

    Submitted 7 December, 2020; originally announced December 2020.

  4. arXiv:2006.02231  [pdf, other

    cs.CR cs.CV cs.NE

    A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps: A Case Study on Google Play Store

    Authors: Naveen Karunanayake, Jathushan Rajasegaran, Ashanie Gunathillake, Suranga Seneviratne, Guillaume Jourjon

    Abstract: Counterfeit apps impersonate existing popular apps in attempts to misguide users to install them for various reasons such as collecting personal information or spreading malware. Many counterfeits can be identified once installed, however even a tech-savvy user may struggle to detect them before installation. To this end, this paper proposes to leverage the recent advances in deep learning methods… ▽ More

    Submitted 2 June, 2020; originally announced June 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:1804.09882