Damith Chinthana Ranasinghe

Orcid: 0000-0002-2008-9255

According to our database1, Damith Chinthana Ranasinghe authored at least 125 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ConservationBots: Autonomous aerial robot for fast robust wildlife tracking in complex terrains.
J. Field Robotics, March, 2024

Bayesian Learned Models Can Detect Adversarial Malware For Free.
CoRR, 2024

Distributed Multi-Object Tracking Under Limited Field of View Heterogeneous Sensors with Density Clustering.
CoRR, 2024

2023
Wisecr: Secure Simultaneous Code Dissemination to Many Batteryless Computational RFID Devices.
IEEE Trans. Dependable Secur. Comput., 2023

NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions.
IEEE Trans. Dependable Secur. Comput., 2023

Make out like a (Multi-Armed) Bandit: Improving the Odds of Fuzzer Seed Scheduling with T-Scheduler.
CoRR, 2023

Icicle: A Re-designed Emulator for Grey-Box Firmware Fuzzing.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Joint Estimation of Vessel Parameter-Motion and Sea State.
Proceedings of the 26th International Conference on Information Fusion, 2023

SplITS: Split Input-to-State Mapping for Effective Firmware Fuzzing.
Proceedings of the Computer Security - ESORICS 2023, 2023

Ember-IO: Effective Firmware Fuzzing with Model-Free Memory Mapped IO.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions.
Dataset, June, 2022

TnT Attacks! Universal Naturalistic Adversarial Patches Against Deep Neural Network Systems.
IEEE Trans. Inf. Forensics Secur., 2022

Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks.
IEEE Trans. Dependable Secur. Comput., 2022

TREVERSE: TRial-and-Error Lightweight Secure ReVERSE Authentication With Simulatable PUFs.
IEEE Trans. Dependable Secur. Comput., 2022

The Megopolis resampler: Memory coalesced resampling on GPUs.
Digit. Signal Process., 2022

Multi-Objective Multi-Agent Planning for Discovering and Tracking Unknown and Varying Number of Mobile Objects.
CoRR, 2022

Transferable Graph Backdoor Attack.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Leaving Your Things Unattended is No Joke! Memory Bus Snooping and Open Debug Interface Exploits.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

RamBoAttack: A Robust and Query Efficient Deep Neural Network Decision Exploit.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Bayesian Learning with Information Gain Provably Bounds Risk for a Robust Adversarial Defense.
Proceedings of the International Conference on Machine Learning, 2022

Query Efficient Decision Based Sparse Attacks Against Black-Box Deep Learning Models.
Proceedings of the Tenth International Conference on Learning Representations, 2022

2021
Distributed Multi-Object Tracking Under Limited Field of View Sensors.
IEEE Trans. Signal Process., 2021

SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices.
IEEE Trans. Dependable Secur. Comput., 2021

Attend and Discriminate: Beyond the State-of-the-Art for Human Activity Recognition Using Wearable Sensors.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

RamBoAttack: A Robust Query Efficient Deep Neural Network Decision Exploit.
CoRR, 2021

Guided-GAN: Adversarial Representation Learning for Activity Recognition with Wearables.
CoRR, 2021

Wisecr: Secure Simultaneous Code Disseminationto Many Batteryless Computational RFID Devices.
CoRR, 2021

ReaDmE: Read-Rate Based Dynamic Execution Scheduling for Intermittent RF-Powered Devices.
Proceedings of the IEEE International Conference on RFID, 2021

An Empirical Assessment of Global COVID-19 Contact Tracing Applications.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2021

2020
Vetting Security and Privacy of Global COVID-19 Contact Tracing Applications.
CoRR, 2020

VenueTrace: a privacy-by-design COVID-19 digital contact tracing solution: poster abstract.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020

An Automated Assessment of Android Clipboards.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Towards deep clustering of human activities from wearables.
Proceedings of the ISWC '20: 2020 ACM International Symposium on Wearable Computers, 2020

LAVAPilot: Lightweight UAV Trajectory Planner with Situational Awareness for Embedded Autonomy to Track and Locate Radio-tags.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2020

Computationally Efficient Methods for Estimating Unknown Input Forces on Structural Systems.
Proceedings of the IEEE 23rd International Conference on Information Fusion, 2020

Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

Multi-Objective Multi-Agent Planning for Jointly Discovering and Tracking Mobile Objects.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Online UAV Path Planning for Joint Detection and Tracking of Multiple Radio-Tagged Objects.
IEEE Trans. Signal Process., 2019

An Adaptive Markov Random Field for Structured Compressive Sensing.
IEEE Trans. Image Process., 2019

Lightweight (Reverse) Fuzzy Extractor With Multiple Reference PUF Responses.
IEEE Trans. Inf. Forensics Secur., 2019

Nano-Intrinsic True Random Number Generation: A Device to Data Study.
IEEE Trans. Circuits Syst. I Regul. Pap., 2019

One-step adaptive markov random field for structured compressive sensing.
Signal Process., 2019

TrackerBots: Autonomous unmanned aerial vehicle for real-time localization and tracking of multiple radio-tagged animals.
J. Field Robotics, 2019

Multi-Objective Multi-Agent Planning for Jointly Discovering and Tracking Mobile Object.
CoRR, 2019

DeepCleanse: Input Sanitization Framework Against Trojan Attacks on Deep Neural Network Systems.
CoRR, 2019

Hash Functions and Benchmarks for Resource Constrained Passive Devices: A Preliminary Study.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Building Secure SRAM PUF Key Generators on Resource Constrained Devices.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Super Low Resolution RF Powered Accelerometers for Alerting on Hospitalized Patient Bed Exits.
Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications, 2019

SparseSense: Human Activity Recognition from Highly Sparse Sensor Data-streams Using Set-based Neural Networks.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Designing batteryless wearables for hospitalized older people.
Proceedings of the 23rd International Symposium on Wearable Computers, ISWC 2019, London, 2019

STRIP: a defence against trojan attacks on deep neural networks.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices.
Dataset, July, 2018

A Physical Unclonable Function With Redox-Based Nanoionic Resistive Memory.
IEEE Trans. Inf. Forensics Secur., 2018

PUF-FSM: A Controlled Strong PUF.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018

Efficient dense labelling of human activity sequences from wearables using fully convolutional networks.
Pattern Recognit., 2018

Efficient Erasable PUFs from Programmable Logic and Memristors.
IACR Cryptol. ePrint Arch., 2018

TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs.
CoRR, 2018

Lightweight (Reverse) Fuzzy Extractor with Multiple Referenced PUF Responses.
CoRR, 2018

Autonomous UAV sensor system for searching and locating VHF radio-tagged wildlife.
Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems, SenSys 2018, 2018

Field Deployable Real-Time Indoor Spatial Tracking System for Human Behavior Observations.
Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems, SenSys 2018, 2018

Deep Auto-Set: A Deep Auto-Encoder-Set Network for Activity Recognition Using Wearables.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

bTracked: Highly Accurate Field Deployable Real-Time Indoor Spatial Tracking for Human Behavior Observations.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

2017
Sequence Learning with Passive RFID Sensors for Real-Time Bed-Egress Recognition in Older People.
IEEE J. Biomed. Health Informatics, 2017

Recognition of falls using dense sensing in an ambient assisted living environment.
Pervasive Mob. Comput., 2017

A hierarchical model for recognizing alarming states in a batteryless sensor alarm intervention for preventing falls in older people.
Pervasive Mob. Comput., 2017

Real-time fluid intake gesture recognition based on batteryless UHF RFID technology.
Pervasive Mob. Comput., 2017

RFID Light Bulb: Enabling Ubiquitous Deployment of Interactive RFID Systems.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

Real-Time Localization and Tracking of Multiple Radio-Tagged Animals with an Autonomous Aerial Vehicle System.
CoRR, 2017

Efficient Dense Labeling of Human Activity Sequences from Wearables using Fully Convolutional Networks.
CoRR, 2017

Nano-Intrinsic True Random Number Generation.
CoRR, 2017

PUF-FSM: A Controlled Strong PUF.
CoRR, 2017

Exploiting PUF Models for Error Free Response Generation.
CoRR, 2017

Detecting Recycled Commodity SoCs: Exploiting Aging-Induced SRAM PUF Unreliability.
CoRR, 2017

R<sup>3</sup>PUF: A Highly Reliable Memristive Device based Reconfigurable PUF.
CoRR, 2017

Modeling Attack Resilient Reconfigurable Latent Obfuscation Technique for PUF based Lightweight Authentication.
CoRR, 2017

USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs.
Proceedings of the 26th USENIX Security Symposium, 2017

A fully integrable hybrid power management unit for passive UHF RFID.
Proceedings of the 2017 IEEE International Conference on RFID, 2017

A PUF sensor: Securing physical measurements.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

2016
Activity recognition with healthy older people using a batteryless wearable sensor.
Dataset, December, 2016

Effectiveness of a Batteryless and Wireless Wearable Sensor System for Identifying Bed and Chair Exits in Healthy Older People.
Sensors, 2016

Read operation performance of large selectorless cross-point array with self-rectifying memristive device.
Integr., 2016

Learning from Imbalanced Multiclass Sequential Data Streams Using Dynamically Weighted Conditional Random Fields.
CoRR, 2016

Emerging Physical Unclonable Functions With Nanotechnology.
IEEE Access, 2016

Towards unobtrusive real-time fluid intake monitoring using passive UHF RFID.
Proceedings of the 2016 IEEE International Conference on RFID, 2016

HoTAAL: Home of social things meet ambient assisted living.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

RF energy harvester with peak power conversion efficiency tracking.
Proceedings of the 2016 IEEE Asia Pacific Conference on Circuits and Systems, 2016

2015
Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher.
IACR Cryptol. ePrint Arch., 2015

Exploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs.
IACR Cryptol. ePrint Arch., 2015

A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs.
IACR Cryptol. ePrint Arch., 2015

Secure Goods Supply Chain and Key Exchange with Virtual Proof of Reality.
IACR Cryptol. ePrint Arch., 2015

Future Large-Scale Memristive Device Crossbar Arrays: Limits Imposed by Sneak-Path Currents on Read Operations.
CoRR, 2015

Investigating sensor data retrieval schemes for multi-sensor passive RFID tags.
Proceedings of the 2015 IEEE International Conference on RFID, 2015

A novel hybrid powered RFID sensor tag.
Proceedings of the 2015 IEEE International Conference on RFID, 2015

Recognising Activities in Real Time Using Body Worn Passive Sensors With Sparse Data Streams: To Interpolate or Not To Interpolate?
Proceedings of the 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2015

What if Your Floor Could Tell Someone You Fell? A Device Free Fall Detection Method.
Proceedings of the Artificial Intelligence in Medicine, 2015

mrPUF: A Novel Memristive Device Based Physical Unclonable Function.
Proceedings of the Applied Cryptography and Network Security, 2015

Why Don't More ICT Students Do PhDs?
Proceedings of the 17th Australasian Computing Education Conference, 2015

2014
WINDWare: Supporting ubiquitous computing with passive sensor enabled RFID.
Proceedings of the IEEE International Conference on RFID, 2014

A highly accurate and scalable approach for addressing location uncertainty in asset tracking applications.
Proceedings of the IEEE International Conference on RFID, 2014

Watchdog: a novel, accurate and reliable method for addressing wandering-off using passive RFID tags.
Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, 2014

2013
mrPUF: A Memristive Device based Physical Unclonable Function
CoRR, 2013

A Novel Approach for Addressing Wandering Off Elderly Using Low Cost Passive RFID Tags.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

Evaluation of Wearable Sensor Tag Data Segmentation Approaches for Real Time Activity Classification in Elderly.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

A Highly Accurate Method for Managing Missing Reads in RFID Enabled Asset Tracking.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

Automated activity recognition and monitoring of elderly using wireless sensors: Research challenges.
Proceedings of the 5th IEEE International Workshop on Advances in Sensors and Interfaces, 2013

Wireless sensing platform for remote monitoring and control of wine fermentation.
Proceedings of the 2013 IEEE Eighth International Conference on Intelligent Sensors, 2013

A novel hybrid approach for wireless powering of biomedical implants.
Proceedings of the 2013 IEEE Eighth International Conference on Intelligent Sensors, 2013

2012
Adding sense to the Internet of Things - An architecture framework for Smart Object systems.
Pers. Ubiquitous Comput., 2012

A Framework for Distributed Managing Uncertain Data in RFID Traceability Networks.
Proceedings of the Web Information Systems Engineering - WISE 2012, 2012

Framework for preventing falls in acute hospitals using passive sensor enabled radio frequency identification technology.
Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2012

Towards falls prevention: A wearable wireless and battery-less sensing and automatic identification tag for real time monitoring of human movements.
Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2012

PeerTrack: a platform for tracking and tracing objects in large-scale traceability networks.
Proceedings of the 15th International Conference on Extending Database Technology, 2012

2011
Enabling through life product-instance management: Solutions and challenges.
J. Netw. Comput. Appl., 2011

Taxonomy, technology and applications of smart objects.
Inf. Syst. Frontiers, 2011

Will Intelligent Assets Take Off? Toward Self-Serving Aircraft.
IEEE Intell. Syst., 2011

RFID enabled traceability networks: a survey.
Distributed Parallel Databases, 2011

Facilitating Efficient Object Tracking in Large-Scale Traceability Networks.
Comput. J., 2011

P2P Object Tracking in the Internet of Things.
Proceedings of the International Conference on Parallel Processing, 2011

Tracing Moving Objects in Internet-Based RFID Networks.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
Stenog-Shell Framework for Anonymous File Exchange.
J. Ubiquitous Syst. Pervasive Networks, 2010

Enabling Scalable RFID Traceability Networks.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

A Condition Monitoring Platform Using COTS Wireless Sensor Networks: Lessons and Experience.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2007
Methodology for Development and Objective Comparison of Architectures for Networked RFID.
Proceedings of the Dynamics in Logistics, First International Conference, 2007


  Loading...