Search Results - "Cheng, Adriel"
-
1
Frontlines and Crossroads: The Impact of COVID-19 on the Motivations of Medical Students from Selected Philippine Medical Schools in Pursuing Their Medical Studies
Published in International journal of medical students (19-12-2023)“…BACKGROUND: The onset of the COVID-19 pandemic made changes to the Philippine medical education system to transfer to an online setting, which meant the loss…”
Get full text
Journal Article -
2
PAC-GAN: Packet Generation of Network Traffic using Generative Adversarial Networks
Published in 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) (01-10-2019)“…Generative adversarial networks (GANs) have proven extremely successful in creating artificial yet highly realistic media data such as images, text, audio and…”
Get full text
Conference Proceeding -
3
Calibrated reconstruction based adversarial autoencoder model for novelty detection
Published in Pattern recognition letters (01-05-2023)“…•Propose a unified model framework for location agnostic outlier detection.•Integrate implicit/explicit confidence calibration into a reconstruction based…”
Get full text
Journal Article -
4
From traffic classes to content: A hierarchical approach for encrypted traffic classification
Published in Computer networks (Amsterdam, Netherlands : 1999) (20-07-2022)“…The vast majority of Internet traffic is now end-to-end encrypted, and while encryption provides user privacy and security, it has made network surveillance an…”
Get full text
Journal Article -
5
Task adaptive siamese neural networks for open-set recognition of encrypted network traffic with bidirectional dropout
Published in Pattern recognition letters (01-07-2022)“…•Create highly distinguishable similarity scores by a bidirectional dropout method.•Handle task adaptive open-set recognition by a non-parametric Bayesian…”
Get full text
Journal Article -
6
Exploiting graph compression techniques for coding and monitoring of networks
Published in 2014 IEEE International Conference on Communications (ICC) (01-06-2014)“…In order to monitor large enterprise networks, network monitoring data is often gathered from a wide range of sensor locations across the network. However,…”
Get full text
Conference Proceeding -
7
Characterising Network-Connected Devices Using Affiliation Graphs
Published in NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium (01-04-2020)“…Device management in large networks is of growing importance to network administrators and security analysts alike. The composition of devices on a network can…”
Get full text
Conference Proceeding -
8
Detecting Data Exfiltration Using Seeds Based Graph Clustering
Published in 2022 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) (18-12-2022)“…Identifying devices of interest within Internet Protocol (IP) networks is essential for Cyber security and network management. However, the large variety and…”
Get full text
Conference Proceeding -
9
Markov modelling and parameterisation of genetic evolutionary test generations
Published in Journal of global optimization (01-12-2011)“…Genetic evolutionary algorithms are effective and optimal test generation methods. However, the methods to select the algorithm parameters are often ad hoc,…”
Get full text
Journal Article -
10
Deep Content: Unveiling Video Streaming Content from Encrypted WiFi Traffic
Published in 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA) (01-11-2018)“…The proliferation of smart devices has led to an exponential growth in digital media consumption, especially mobile video for content marketing. The vast…”
Get full text
Conference Proceeding -
11
Algebraic Adversarial Attacks on Integrated Gradients
Published 23-07-2024“…Adversarial attacks on explainability models have drastic consequences when explanations are used to understand the reasoning of neural networks in safety…”
Get full text
Journal Article -
12
Probabilistic Lipschitzness and the Stable Rank for Comparing Explanation Models
Published 29-02-2024“…Explainability models are now prevalent within machine learning to address the black-box nature of neural networks. The question now is which explainability…”
Get full text
Journal Article -
13
Distilling command and control network intrusions from network flow metadata using temporal PageRank
Published in 2016 26th International Telecommunication Networks and Applications Conference (ITNAC) (01-12-2016)“…Malicious network intrusions which exfiltrate data from computer networks are extremely damaging for organisations and governments worldwide. Combating these…”
Get full text
Conference Proceeding -
14
A Testbed for Automating and Analysing Mobile Devices and their Applications
Published 15-09-2023“…The need for improved network situational awareness has been highlighted by the growing complexity and severity of cyber-attacks. Mobile phones pose a…”
Get full text
Journal Article -
15
Clustering Network-Connected Devices Using Affiliation Graphs
Published in 2021 International Conference on Machine Learning and Cybernetics (ICMLC) (04-12-2021)“…Device management in large networks is of growing importance to network administrators and security analysts alike. The com-position of devices on a network…”
Get full text
Conference Proceeding -
16
Operating System Classification: A Minimalist Approach
Published in 2020 International Conference on Machine Learning and Cybernetics (ICMLC) (02-12-2020)“…Operating system (OS) classification is of growing importance to network administrators and cybersecurity analysts alike. The composition of OSs on a network…”
Get full text
Conference Proceeding -
17
Coverage measurement for software application level verification using symbolic trajectory evaluation techniques
Published in Proceedings. DELTA 2004. Second IEEE International Workshop on Electronic Design, Test and Applications (2004)“…Design verification of a systems-on-a-chip is a bottleneck for hardware design projects. A new solution is a design verification methodology that applies…”
Get full text
Conference Proceeding -
18
Detecting Botnet Victims Through Graph-Based Machine Learning
Published in 2021 International Conference on Machine Learning and Cybernetics (ICMLC) (04-12-2021)“…Botnets are one of the most devastating cybersecurity threats to modern organisations. A botnet is a distributed network of compromised devices that is…”
Get full text
Conference Proceeding -
19
A Testbed for Automating and Analysing Mobile Devices and Their Applications
Published in 2023 International Conference on Machine Learning and Cybernetics (ICMLC) (09-07-2023)“…The need for improved network situational awareness has been highlighted by the growing complexity and severity of cyber-attacks. Mobile phones pose a…”
Get full text
Conference Proceeding -
20
A software test program generator for verifying system-on-chips
Published in Tenth IEEE International High-Level Design Validation and Test Workshop, 2005 (2005)“…Design verification is crucial for successful systems-on-chips (SoCs). However, validating and proving the correctness of SoCs is often a bottleneck in the…”
Get full text
Conference Proceeding