Search Results - "Cheng, Adriel"

Refine Results
  1. 1

    Frontlines and Crossroads: The Impact of COVID-19 on the Motivations of Medical Students from Selected Philippine Medical Schools in Pursuing Their Medical Studies by Cheng, Adriel Agunod, Andan, Ysabelle Bianca, Go, Kristine, Luces, Yeoj, Peralta, Jeanne, Sumang, Jeremy, Dayrit, Manuel M.

    Published in International journal of medical students (19-12-2023)
    “…BACKGROUND: The onset of the COVID-19 pandemic made changes to the Philippine medical education system to transfer to an online setting, which meant the loss…”
    Get full text
    Journal Article
  2. 2

    PAC-GAN: Packet Generation of Network Traffic using Generative Adversarial Networks by Cheng, Adriel

    “…Generative adversarial networks (GANs) have proven extremely successful in creating artificial yet highly realistic media data such as images, text, audio and…”
    Get full text
    Conference Proceeding
  3. 3

    Calibrated reconstruction based adversarial autoencoder model for novelty detection by Huang, Yi, Li, Ying, Jourjon, Guillaume, Seneviratne, Suranga, Thilakarathna, Kanchana, Cheng, Adriel, Webb, Darren, Xu, Richard Yi Da

    Published in Pattern recognition letters (01-05-2023)
    “…•Propose a unified model framework for location agnostic outlier detection.•Integrate implicit/explicit confidence calibration into a reconstruction based…”
    Get full text
    Journal Article
  4. 4

    From traffic classes to content: A hierarchical approach for encrypted traffic classification by Li, Ying, Huang, Yi, Seneviratne, Suranga, Thilakarathna, Kanchana, Cheng, Adriel, Jourjon, Guillaume, Webb, Darren, Smith, David B., Xu, Richard Yi Da

    “…The vast majority of Internet traffic is now end-to-end encrypted, and while encryption provides user privacy and security, it has made network surveillance an…”
    Get full text
    Journal Article
  5. 5

    Task adaptive siamese neural networks for open-set recognition of encrypted network traffic with bidirectional dropout by Huang, Yi, Li, Ying, Heyes, Timothy, Jourjon, Guillaume, Cheng, Adriel, Seneviratne, Suranga, Thilakarathna, Kanchana, Webb, Darren, Xu, Richard Yi Da

    Published in Pattern recognition letters (01-07-2022)
    “…•Create highly distinguishable similarity scores by a bidirectional dropout method.•Handle task adaptive open-set recognition by a non-parametric Bayesian…”
    Get full text
    Journal Article
  6. 6

    Exploiting graph compression techniques for coding and monitoring of networks by Cheng, Adriel, Dickinson, Peter

    “…In order to monitor large enterprise networks, network monitoring data is often gathered from a wide range of sensor locations across the network. However,…”
    Get full text
    Conference Proceeding
  7. 7

    Characterising Network-Connected Devices Using Affiliation Graphs by Millar, Kyle, Cheng, Adriel, Chew, Hong Gunn, Lim, Cheng-Chew

    “…Device management in large networks is of growing importance to network administrators and security analysts alike. The composition of devices on a network can…”
    Get full text
    Conference Proceeding
  8. 8

    Detecting Data Exfiltration Using Seeds Based Graph Clustering by Cheng, Adriel, Millar, Kyle

    “…Identifying devices of interest within Internet Protocol (IP) networks is essential for Cyber security and network management. However, the large variety and…”
    Get full text
    Conference Proceeding
  9. 9

    Markov modelling and parameterisation of genetic evolutionary test generations by Cheng, Adriel, Lim, Cheng-Chew

    Published in Journal of global optimization (01-12-2011)
    “…Genetic evolutionary algorithms are effective and optimal test generation methods. However, the methods to select the algorithm parameters are often ad hoc,…”
    Get full text
    Journal Article
  10. 10

    Deep Content: Unveiling Video Streaming Content from Encrypted WiFi Traffic by Li, Ying, Huang, Yi, Xu, Richard, Seneviratne, Suranga, Thilakarathna, Kanchana, Cheng, Adriel, Webb, Darren, Jourjon, Guillaume

    “…The proliferation of smart devices has led to an exponential growth in digital media consumption, especially mobile video for content marketing. The vast…”
    Get full text
    Conference Proceeding
  11. 11

    Algebraic Adversarial Attacks on Integrated Gradients by Simpson, Lachlan, Costanza, Federico, Millar, Kyle, Cheng, Adriel, Lim, Cheng-Chew, Chew, Hong Gunn

    Published 23-07-2024
    “…Adversarial attacks on explainability models have drastic consequences when explanations are used to understand the reasoning of neural networks in safety…”
    Get full text
    Journal Article
  12. 12

    Probabilistic Lipschitzness and the Stable Rank for Comparing Explanation Models by Simpson, Lachlan, Millar, Kyle, Cheng, Adriel, Lim, Cheng-Chew, Chew, Hong Gunn

    Published 29-02-2024
    “…Explainability models are now prevalent within machine learning to address the black-box nature of neural networks. The question now is which explainability…”
    Get full text
    Journal Article
  13. 13

    Distilling command and control network intrusions from network flow metadata using temporal PageRank by Singh, Latchman, Cheng, Adriel

    “…Malicious network intrusions which exfiltrate data from computer networks are extremely damaging for organisations and governments worldwide. Combating these…”
    Get full text
    Conference Proceeding
  14. 14

    A Testbed for Automating and Analysing Mobile Devices and their Applications by Simpson, Lachlan, Millar, Kyle, Cheng, Adriel, Chew, Hong Gunn, Lim, Cheng-Chew

    Published 15-09-2023
    “…The need for improved network situational awareness has been highlighted by the growing complexity and severity of cyber-attacks. Mobile phones pose a…”
    Get full text
    Journal Article
  15. 15

    Clustering Network-Connected Devices Using Affiliation Graphs by Millar, Kyle, Cheng, Adriel, Chew, Hong Gunn, Lim, Cheng-Chew

    “…Device management in large networks is of growing importance to network administrators and security analysts alike. The com-position of devices on a network…”
    Get full text
    Conference Proceeding
  16. 16

    Operating System Classification: A Minimalist Approach by MILLAR, KYLE, CHENG, ADRIEL, CHEW, HONG GUNN, LIM, CHENG-CHEW

    “…Operating system (OS) classification is of growing importance to network administrators and cybersecurity analysts alike. The composition of OSs on a network…”
    Get full text
    Conference Proceeding
  17. 17

    Coverage measurement for software application level verification using symbolic trajectory evaluation techniques by Adriel Cheng, Parashkevov, A., Cheng-Chew Lim

    “…Design verification of a systems-on-a-chip is a bottleneck for hardware design projects. A new solution is a design verification methodology that applies…”
    Get full text
    Conference Proceeding
  18. 18

    Detecting Botnet Victims Through Graph-Based Machine Learning by Millar, Kyle, Simpson, Lachlan, Cheng, Adriel, Chew, Hong Gunn, Lim, Cheng-Chew

    “…Botnets are one of the most devastating cybersecurity threats to modern organisations. A botnet is a distributed network of compromised devices that is…”
    Get full text
    Conference Proceeding
  19. 19

    A Testbed for Automating and Analysing Mobile Devices and Their Applications by Simpson, Lachlan, Millar, Kyle, Cheng, Adriel, Chew, Hong Gunn, Lim, Cheng-Chew

    “…The need for improved network situational awareness has been highlighted by the growing complexity and severity of cyber-attacks. Mobile phones pose a…”
    Get full text
    Conference Proceeding
  20. 20

    A software test program generator for verifying system-on-chips by Cheng, A., Cheng-Chew Lim, Parashkevov, A.

    “…Design verification is crucial for successful systems-on-chips (SoCs). However, validating and proving the correctness of SoCs is often a bottleneck in the…”
    Get full text
    Conference Proceeding