Picture for Aruna Seneviratne

Aruna Seneviratne

Multi-Objective Optimization for Privacy-Utility Balance in Differentially Private Federated Learning

Add code
Mar 27, 2025
Viaarxiv icon

Adaptive Clipping for Privacy-Preserving Few-Shot Learning: Enhancing Generalization with Limited Data

Add code
Mar 27, 2025
Viaarxiv icon

An Empirical Study of Code Obfuscation Practices in the Google Play Store

Add code
Feb 07, 2025
Figure 1 for An Empirical Study of Code Obfuscation Practices in the Google Play Store
Figure 2 for An Empirical Study of Code Obfuscation Practices in the Google Play Store
Figure 3 for An Empirical Study of Code Obfuscation Practices in the Google Play Store
Figure 4 for An Empirical Study of Code Obfuscation Practices in the Google Play Store
Viaarxiv icon

Entailment-Driven Privacy Policy Classification with LLMs

Add code
Sep 25, 2024
Figure 1 for Entailment-Driven Privacy Policy Classification with LLMs
Figure 2 for Entailment-Driven Privacy Policy Classification with LLMs
Figure 3 for Entailment-Driven Privacy Policy Classification with LLMs
Figure 4 for Entailment-Driven Privacy Policy Classification with LLMs
Viaarxiv icon

Smart CSI Processing for Accruate Commodity WiFi-based Humidity Sensing

Add code
Sep 12, 2024
Figure 1 for Smart CSI Processing for Accruate Commodity WiFi-based Humidity Sensing
Figure 2 for Smart CSI Processing for Accruate Commodity WiFi-based Humidity Sensing
Figure 3 for Smart CSI Processing for Accruate Commodity WiFi-based Humidity Sensing
Figure 4 for Smart CSI Processing for Accruate Commodity WiFi-based Humidity Sensing
Viaarxiv icon

Securing V2I Backscattering from Eavesdropper

Add code
Jul 22, 2024
Figure 1 for Securing V2I Backscattering from Eavesdropper
Figure 2 for Securing V2I Backscattering from Eavesdropper
Figure 3 for Securing V2I Backscattering from Eavesdropper
Figure 4 for Securing V2I Backscattering from Eavesdropper
Viaarxiv icon

Cybersecurity Challenges of Power Transformers

Add code
Feb 25, 2023
Figure 1 for Cybersecurity Challenges of Power Transformers
Figure 2 for Cybersecurity Challenges of Power Transformers
Figure 3 for Cybersecurity Challenges of Power Transformers
Figure 4 for Cybersecurity Challenges of Power Transformers
Viaarxiv icon

Intelligent Blockchain-based Edge Computing via Deep Reinforcement Learning: Solutions and Challenges

Add code
Jun 17, 2022
Figure 1 for Intelligent Blockchain-based Edge Computing via Deep Reinforcement Learning: Solutions and Challenges
Figure 2 for Intelligent Blockchain-based Edge Computing via Deep Reinforcement Learning: Solutions and Challenges
Figure 3 for Intelligent Blockchain-based Edge Computing via Deep Reinforcement Learning: Solutions and Challenges
Figure 4 for Intelligent Blockchain-based Edge Computing via Deep Reinforcement Learning: Solutions and Challenges
Viaarxiv icon

Federated Learning for Smart Healthcare: A Survey

Add code
Nov 16, 2021
Figure 1 for Federated Learning for Smart Healthcare: A Survey
Figure 2 for Federated Learning for Smart Healthcare: A Survey
Figure 3 for Federated Learning for Smart Healthcare: A Survey
Figure 4 for Federated Learning for Smart Healthcare: A Survey
Viaarxiv icon

Federated Learning for COVID-19 Detection with Generative Adversarial Networks in Edge Cloud Computing

Add code
Oct 14, 2021
Figure 1 for Federated Learning for COVID-19 Detection with Generative Adversarial Networks in Edge Cloud Computing
Figure 2 for Federated Learning for COVID-19 Detection with Generative Adversarial Networks in Edge Cloud Computing
Figure 3 for Federated Learning for COVID-19 Detection with Generative Adversarial Networks in Edge Cloud Computing
Figure 4 for Federated Learning for COVID-19 Detection with Generative Adversarial Networks in Edge Cloud Computing
Viaarxiv icon