Kasun De Zoysa

Kasun De Zoysa
University of Colombo · University of Colombo School of Computing (UCSC)

PhD

About

80
Publications
33,177
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
578
Citations
Citations since 2016
43 Research Items
471 Citations
2016201720182019202020212022020406080100120
2016201720182019202020212022020406080100120
2016201720182019202020212022020406080100120
2016201720182019202020212022020406080100120
Introduction
Research Interest: Digital Forensic, Security in Decentralize Web, Cryptocurrency, Security in Sensor Network, Human Elephant Conflict, Visible Light Communication

Publications

Publications (80)
Conference Paper
Full-text available
Dengue and Zika are two arboviral viruses that affect a significant portion of the world population. Each year, al- most 400 million dengue infections happen. Due to severe dengue fever, around half a million people each year are in need of hospitalization and about 36.000 people die. Dengue spreads rapidly in densely populated urban areas. The pri...
Preprint
People often utilise online media (e.g., Facebook, Reddit) as a platform to express their psychological distress and seek support. State-of-the-art NLP techniques demonstrate strong potential to automatically detect mental health issues from text. Research suggests that mental health issues are reflected in emotions (e.g., sadness) indicated in a p...
Article
Full-text available
Zoologists visually recognise each Asian elephant (Elephas maximus), mainly based on their ear patterns. Towards automating this process, the existing methods on African elephants are less instrumental for Asian elephants, because the nick patterns are rare. This paper presents a cascade of Convolutional Neural Networks for uniquely detecting Asian...
Preprint
Full-text available
Ability to effectively investigate indicators of compromise and associated network resources involved in cyber attacks is paramount not only to identify affected network resources but also to detect related malicious resources. Today, most of the cyber threat intelligence platforms are reactive in that they can identify attack resources only after...
Article
Full-text available
Customer credential verification is an ongoing activity at financial institutions. Know Your Customer is one such periodic verification activity. Often, organizations store the collected customer credentials on centralized storage platforms (e.g., cloud storage and central servers) which could result in major privacy breaches. In addition, when a c...
Preprint
Full-text available
Hundreds of thousands of malicious domains are created everyday. These malicious domains are hosted on a wide variety of network infrastructures. Traditionally, attackers utilize bullet proof hosting services (e.g. MaxiDed, Cyber Bunker) to take advantage of relatively lenient policies on what content they can host. However, these IP ranges are inc...
Article
Full-text available
The spread of the COVID-19 virus continues to increase fatality rates and exhaust the capacity of healthcare providers. Efforts to prevent transmission of the virus among humans remains a high priority. The current efforts to quarantine involve social distancing, monitoring and tracking the infected patients. However, the spread of the virus is too...
Chapter
Full-text available
Banks provide interactive money withdrawal/payment facilities, such as ATM, debit and credit card systems. With these systems, customers could withdraw money and make payments without visiting a bank. However, traditional ATM, debit and credit card systems inherit several weaknesses such as limited ATM facilities in rural areas, the high initial co...
Preprint
Full-text available
Setaria digitata is a Wolbachia -free filarial parasite that causes cerebrospinal nematodiasis in non-permissive hosts such as goats, sheep and horses leading to substantial economic losses in animal husbandry. Due to its similarity to Wuchereria bancrofti , primary causing agent of human lymphatic filariasis (HLF), S. digitata can be used as a mod...
Article
Full-text available
AutoML or Automated Machine Learning is a set of tools to reduce or eliminate the necessary skills of a data scientist to build machine learning or deep learning models. Those tools are able to automatically discover the machine learning models and pipelines for the given dataset within very low interaction of the user. This concept was derived bec...
Chapter
Full-text available
The COVID-19 pandemic in 2020 has resulted in increased fatality rates across the world and has stretched the resources in healthcare facilities. There have been several proposed efforts to contain the spread of the virus among humans. Some of these efforts involve appropriate social distancing in public places, monitoring and tracking temperature...
Chapter
Full-text available
Existing blockchain smart contract platforms are designed as monolithic architectures. Even though there are multiple smart contracts with fully independent business logic, they run on a single monolithic container. This dependence on a monolithic container can be a performance bottleneck during the processing of a large number of transactions. To...
Article
Full-text available
Internet of Things (IoT) platforms have been deployed in several domains to enhance efficiency of business process and improve productivity. Most IoT platforms comprise of heterogeneous software and hardware components which can potentially introduce security and privacy challenges. Blockchain technology has been proposed as one of the solutions to...
Article
Full-text available
Blockchain-based decentralized infrastructure has been adapted in various industries to handle the sensitive data in a privacy-preserving manner without trusting third parties. However, integrating state-of-the-art blockchain platforms with the scalable, enterprise-level applications result in several challenges. Current blockchain platforms do not...
Conference Paper
Multipath Transmission Control Protocol (MPTCP) is an extension to Transmission Control Protocol (TCP) proposed by the Internet Engineering Task Force (IETF). The intention of MPTCP was to use multiple network interfaces in a single network connection simultaneously. Researches have identified that there are a considerable amount of security threat...
Article
Full-text available
Existing blockchain smart contract platforms are designed as monolithic architectures. Even though there are multiple smart contracts with fully independent business logic, they run on a single monolithic container. This dependence on a monolithic container can be a performance bottleneck during the processing of a large number of transactions. To...
Chapter
Full-text available
Blockchain is a form of a distributed storage system that stores a chronological sequence of transactions in a tamper-evident manner. Due to the decentralized trust ecosystem in blockchain, various industries have adopted blockchain to build their applications. This paper presents a novel approach to building a blockchain-based document archive sto...
Chapter
Full-text available
Smart contract is a programming interface to interact with the underlying blockchain storage models. It is a database abstraction layer for blockchain. Existing smart contract platforms follow the imperative style programming model since states are shared. As a result, there is no concurrency control mechanism when executing transactions, resulting...
Conference Paper
Full-text available
Since the reconstruction process of Wi-Fi Tomographic imaging is an ill-posed inverse problem and due to the unstable nature of the measurements, converting the signal strength measurements into a two dimensional image is computationally expensive. Therefore this research is intended to propose a human-interference model based on the probabilistic...
Conference Paper
Full-text available
Dengue is one of the deadly and fast spreading diseases in Sri Lanka. The female Aedes mosquito is the dengue vector and these mosquitoes breed in clear and non-flowing water. The Public Health Inspectors (PHIs) are tasked with detecting and eliminating such water collection areas. However, they face the problem of detecting potential breeding site...
Conference Paper
Full-text available
Radio Tomographic Imaging (RTI) enables device free localization of physical objects by using signal attenuation in wireless networks. In this paper, we explore how existing RTI methods can be used in WiFi networks to do tomographic imaging. Moreover we analyze and evaluate the properties that affect the accuracy of WiFi tomographic imaging process...
Conference Paper
Full-text available
The human-elephant conflict is causing significant damages to the life of human and elephants in Sri Lanka. Minimizing encounters between humans and elephants is hence crucial in alleviating the human-elephant conflict. We have earlier introduced Eloc, a cost-effective localization system that is based on infrasonic emissions from wild elephants. O...
Conference Paper
Full-text available
Visible Light Communication (VLC) is a blooming research area which uses visible light spectrum as the communication channel. Exponential growth of Light Emitting Diodes (LEDs) deployment as a light source is encouraged to use for communication purposes as well. With the introduction of VLC, LED can be used for communication while providing the pri...
Conference Paper
Full-text available
Public Health Inspectors (PHIs) in Sri Lanka are facing a problem of identifying certain mosquito breeding sites since they cannot easily reach places such as roof gutters, overhead water tanks, inaccessible rooftops and cement materials which are capable of retaining water. The goal of a such inspection of suspected sites is to reduce the number o...
Conference Paper
Full-text available
A significant number of human and elephant lives have been lost due to the human-elephant conflict in Sri Lanka. To save lives of humans and elephants, it is therefore important to minimize encounters between them. In this paper, we present Eloc, a system that detects the presence of elephants using their infrasonic emissions near human habitats an...
Conference Paper
Full-text available
The human-elephant conflict is affecting the day-today life of villagers and farmers of rural Sri Lanka. To protect humans from elephants, reliable mechanisms to identify the presence of wild elephants around human habitats are necessary. In this work, we present the design and preliminary results of our elephant localization system that is based o...
Conference Paper
Full-text available
Electric fences protect human habitats from elephant attacks in rural Sri Lanka. Maintaining such fences and in particular detecting breakages is tedious and expensive. In this paper we design a low-cost system to detect breakages in fences. We use low-power, low-cost sensor nodes deployed along the fence wires to detect the breakages. The nodes ar...
Conference Paper
Safety in a travel is a very important factor we consider in our day today life because we live in a very dynamic and a busy lifestyle. As a result the tendency of making failures in critical moments could create a fatal mistake and it could lead even to lose lives. To ensure maximum safety nowadays the researches and design engineers put their max...
Conference Paper
Full-text available
Application of agent based system is very important in fast moving world with modern technologies in order to deliver maximum productivity using minimum resources. In the railway domain, this will account for reducing unnecessary train traffic on rail network and reduces operational overhead. This research paper discusses how this technology has be...
Conference Paper
Full-text available
The continuing human-elephant conflict in Sri Lanka has resulted in loss of human as well as elephant lives. Detecting and localizing elephants is an essential component of any viable solution to this problem. Currently, we conduct feasibility tests on using low cost sensors to detect elephants from a long distance, leveraging the infra-sounds emit...
Technical Report
Full-text available
This project, provides a strong conceptual foundation which has a distributed key establishment and atomic behaviour in the group, to protect music files from illegal sharing occur due to most of cryptographic cracks that are currently exists, and produces a smart mobile application. This basically improves the encryption procedure, establishing a...
Article
The human elephant conflict in Sri Lanka has been a cause of major concern over the past decade. Frequent clashes between wild elephants and villagers have resulted in severe damage to property, as well as loss of lives for both humans and elephants. Competition for space is the primary reason for conflict between humans and elephants. Elephants th...
Article
The human-elephant conflict is one of the most severe natural problems in Sri Lanka. There are rich farmlands near the elephant habitats and elephants raid these farms in search of food. This has been the main cause for nearly 70 human deaths and over 200 elephant deaths that have been recorded each year in the recent past. To manage the problem, t...
Conference Paper
Full-text available
The excellent maneuverability and the availability of a large number of sensors including good quality video cameras make quadcopters attractive for surveillance systems. Most video surveillance systems need a real-time high quality video stream from the cameras on the quadcopter to the base station which requires a stable and reliable radio link....
Research
Full-text available
Abstract The traditional tendering process is a manual bidding system which involves the principal advertising or issuing a request for tenders, various suppliers then make offers, one of which is then accepted by the principal, forming a contract between the supplier and the principal. Electronic tender (eTender) management is the continuous usage...
Conference Paper
Full-text available
We propose a novel rule-based model to incorporate contextual information and effect of negation that enhances the performance of sentiment classification performed using bag-of-words models. We employed morphological analysis in feature extraction to ensure feature vector contains only opinionated words in a textual review. Also it reduces the dim...
Conference Paper
With the development of the technology, people have tend to figure out methods which are not only capable in hiding a message, but also capable of hiding the existence of a message. Steganography was introduced as a result of such research work. The current study is conducted in order to hide a video in a visual file. We suggest changing the LSB (L...
Conference Paper
With the development of web technology, researchers had started using blog data in many research aspects and twitter messages is one of them. However, these data are un-organized and thus, it should be organized before gather the information. Classification is one way of organizing the twitter messages. SVM and Naive Bayes classifiers are the most...
Conference Paper
Full-text available
Privacy of sensor data should be considered since it is evidence for the behaviour and life style of the sensor owners. Some people attempt to store their data in the third party servers like the Cloud Computers. This is unsafe for the reason that user does not know whether third parties access their valuable data. Storing sensor data will be an es...