M.A.P. Chamikara

M.A.P. Chamikara
The Commonwealth Scientific and Industrial Research Organisation | CSIRO · Data61

PhD, MPhil, BSc (Special)

About

71
Publications
98,537
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,057
Citations
Citations since 2017
38 Research Items
1034 Citations
2017201820192020202120222023050100150200250300
2017201820192020202120222023050100150200250300
2017201820192020202120222023050100150200250300
2017201820192020202120222023050100150200250300
Introduction
A researcher at RMIT University, Melbourne Australia and at Data61, CSIRO, Melbourne Australia. Also, working as a Lecturer at the Department of Statistics and Computer Science, Faculty of Science, University of Peradeniya. Current Research interests include Information Privacy, Data Science, and Big Data.
Additional affiliations
January 2017 - January 2021
RMIT University
Position
  • Research Assistant
Description
  • Information Security
January 2014 - present
University of Peradeniya
Position
  • Lecturer
September 2011 - January 2014
Postgraduate Institute of Science, University of Peradeniya
Position
  • Research Assistant
Education
January 2011 - July 2015
University of Peradeniya
Field of study
  • Computer Scince
July 2006 - July 2010
University of Peradeniya
Field of study
  • Computer Science

Publications

Publications (71)
Preprint
Full-text available
Tabular data sharing serves as a common method for data exchange. However, sharing sensitive information without adequate privacy protection can compromise individual privacy. Thus, ensuring privacy-preserving data sharing is crucial. Differential privacy (DP) is regarded as the gold standard in data privacy. Despite this, current DP methods tend t...
Preprint
Full-text available
Generative AI (e.g., Generative Adversarial Networks - GANs) has become increasingly popular in recent years. However, Generative AI introduces significant concerns regarding the protection of Intellectual Property Rights (IPR) (resp. model accountability) pertaining to images (resp. toxic images) and models (resp. poisoned models) generated. In th...
Article
We propose a hierarchical blockchain-based platform for ensuring the integrity of smart city Internet-of-Things (IoT) data and blockchain interoperability in this paper. The well-defined structural hierarchy of managing organizations in a smart city face several data management issues. The integration of emerging technologies, such as (IoT), has in...
Chapter
Advanced adversarial attacks such as membership inference and model memorization can make federated learning (FL) vulnerable and potentially leak sensitive private data. Local differentially private (LDP) approaches are gaining more popularity due to stronger privacy notions and native support for data distribution compared to other differentially...
Article
Federated learning (FL) and split learning (SL) are two popular distributed machine learning approaches. Both follow a model-to-data scenario; clients train and test machine learning models without sharing raw data. SL provides better model privacy than FL due to the machine learning model architecture split between clients and the server. Moreover...
Preprint
Full-text available
Biometric data, such as face images, are often associated with sensitive information (e.g medical, financial, personal government records). Hence, a data breach in a system storing such information can have devastating consequences. Deep learning is widely utilized for face recognition (FR); however, such models are vulnerable to backdoor attacks e...
Preprint
Full-text available
Federated learning (FL) is a collaborative learning approach that has gained much attention due to its inherent privacy preservation capabilities. However, advanced adversarial attacks such as membership inference and model memorization can still make FL vulnerable and potentially leak sensitive private data. Literature shows a few attempts to alle...
Article
Full-text available
Passwords are regarded as the most common authentication mechanism used by Web-based services, despite large-scale attacks and data breaches regularly exploiting password-associated vulnerabilities. We investigate the trends behind password formulation in an exploratory study to postulate that social identity and language play a major role in users...
Conference Paper
Full-text available
Different assessment models exist to measure a coun-try's cyber security maturity levels. These levels serve as a benchmark for indicating how well prepared a nation is against a cyber security attack and how resilient it would be in recovering from such an attack. However, results from these maturity assessments are either too general, overly comp...
Chapter
In the distributed collaborative machine learning (DCML) paradigm, federated learning (FL) recently attracted much attention due to its applications in health, finance, and the latest innovations such as industry 4.0 and smart vehicles. FL provides privacy-by-design. It trains a machine learning model collaboratively over several distributed client...
Article
It is a well-known fact that there are often side effects to the long-term use of certain medications. These side effects can vary from mild dizziness to, at its most serious, death. The main factors that cause these side effects are the chemical composition, the mode of treatment, and the dose. The dynamics that govern the reaction of a drug heavi...
Article
Personally identifiable information (PII) can find its way into cyberspace through various channels, and many potential sources can leak such information. Data sharing (e.g. cross-agency data sharing) for machine learning and analytics is one of the important components in data science. However, due to privacy concerns, data should be enforced with...
Article
The advancements in positioning technologies have led to the emergence of various location-based services, resulting in a drastic increase in location-based data generation, producing big-data. Location data are often linked with user privacy, as they can reveal sensitive information such as the places visited by a person. Moreover, most location-b...
Article
Edge computing and distributed machine learning have advanced to a level that can revolutionize a particular organization. Distributed devices such as the Internet of Things (IoT) often produce a large amount of data, eventually resulting in big data that can be vital in uncovering hidden patterns, and other insights in numerous fields such as heal...
Preprint
Full-text available
In the distributed collaborative machine learning (DCML) paradigm, federated learning (FL) recently attracted much attention due to its applications in health, finance, and the latest innovations such as industry 4.0 and smart vehicles. FL provides privacy-by-design. It trains a machine learning model collaboratively over several distributed client...
Conference Paper
Full-text available
This study intends to identify the most prevalent sources of child malnutrition in the estate sector/plantation sector in Sri Lanka. It seeks to examine the relevance of what has been identified as ‘socio-economic determinants’ of child malnutrition in national-level surveys.
Chapter
Full-text available
In the distributed collaborative machine learning (DCML) paradigm, federated learning (FL) recently attracted much attention due to its applications in health, finance, and the latest innovations such as industry 4.0 and smart vehicles. FL provides privacy-by-design. It trains a machine learning model collaboratively over several distributed client...
Preprint
Full-text available
Personally identifiable information (PII) can find its way into cyberspace through various channels, and many potential sources can leak such information. To preserve user privacy, researchers have devised different privacy-preserving approaches; however, the usability of these methods, in terms of practical use, needs careful analysis due to the h...
Article
Full-text available
Facial recognition technologies are implemented in many areas, including but not limited to, citizen surveillance, crime control, activity monitoring, and facial expression evaluation. However, processing biometric information is a resource-intensive task that often involves third-party servers, which can be accessed by adversaries with malicious i...
Preprint
Full-text available
Facial recognition technologies have become popular and implemented in many areas, including but not limited to, citizen surveillance, crime control, activity monitoring, and facial expression evaluation. However, processing biometric information is a resource-intensive task that often involves third-party servers, which can be accessed by adversar...
Preprint
Full-text available
Federated learning (FL) and split learning (SL) are two recent distributed machine learning (ML) approaches that have gained attention due to their inherent privacy-preserving capabilities. Both approaches follow a model-to-data scenario, in that an ML model is sent to clients for network training and testing. However, FL and SL show contrasting st...
Preprint
Full-text available
Edge computing and distributed machine learning have advanced to a level that can revolutionize a particular organization. Distributed devices such as the Internet of Things (IoT) often produce a large amount of data, eventually resulting in big data that can be vital in uncovering hidden patterns, and other insights in numerous fields such as heal...
Article
Industrial internet of things (IIoT) is revolutionizing many leading industries such as energy, agriculture, mining, transportation, and healthcare. IIoT is a major driving force for Industry 4.0, which heavily utilizes machine learning (ML) to capitalize on the massive interconnection and large volumes of IIoT data. However, ML models that are tra...
Article
Full-text available
This paper proposes a new line clipping algorithm against a convex polygon with 𝑂(𝑁) time complexity. The line segment is pruned against each extended edge of the polygon as the first step of the proposed algorithm. Then, the pruning process gives accurate outcomes for completely inside and partially inside line segments only. The algorithm was dev...
Conference Paper
Full-text available
National culture and cybersecurity maturity (CM) both play defining roles in the identity and security of a nation. This study examines the relationship that these two constructs play in determining whether certain cultural dimensions of a nation leads to riskier cybersecurity behaviours. Based on the confirmed affirmation of the relationship betwe...
Article
The internet of things (IoT) is transforming major industries including but not limited to healthcare, agriculture, finance, energy, and transportation. IoT platforms are continually improving with innovations such as the amalgamation of software-defined networks (SDN) and network function virtualization (NFV) in the edge-cloud interplay. Deep lear...
Preprint
Full-text available
Deep learning (DL) is a promising area of machine learning which is becoming popular due to its remarkable accuracy when trained with a massive amount of data. Often, these datasets are highly sensitive crowd-sourced data such as medical data, financial data, or image data, and the DL models trained on these data tend to leak privacy. We propose a...
Preprint
Full-text available
A vast amount of valuable data is produced and is becoming available for analysis as a result of advancements in smart cyber-physical systems. The data comes from various sources, such as healthcare, smart homes, smart vehicles, and often includes private, potentially sensitive information that needs appropriate sanitization before being released f...
Conference Paper
Full-text available
In this paper, we present a novel architecture of blockchain-based tamper-proof electronic health record (EHR) management system. Recording electronic health data in cloud-based storage systems always pose a threat to information security. Intruders can delete or tamper EHR of patients, giving benefits to insurance companies or hiding medical malpr...
Article
Full-text available
A vast amount of valuable data is produced and is becoming available for analysis as a result of advancements in smart cyber-physical systems. The data comes from various sources, such as healthcare, smart homes, smart vehicles, and often includes private, potentially sensitive information that needs appropriate sanitization before being released f...
Preprint
Full-text available
Computing technologies pervade physical spaces and human lives, and produce a vast amount of data that is available for analysis. However, there is a growing concern that potentially sensitive data may become public if the collected data are not appropriately sanitized before being released for investigation. Although there are more than a few priv...
Article
Full-text available
Computing technologies pervade physical spaces and human lives, and produce a vast amount of data that is available for analysis. However, there is a growing concern that potentially sensitive data may become public if the collected data are not appropriately sanitized before being released for investigation. Although there are more than a few priv...
Article
Full-text available
The widespread use of the Internet of Things (IoT) has raised many concerns, including the protection of private information. Existing privacy preservation methods cannot provide a good balance between data utility and privacy, and also have problems with efficiency and scalability. This paper proposes an efficient data stream perturbation method (...
Conference Paper
Vacuum cleaners play a key role in making the human lives easier. But the existing vacuum cleaning systems show low efficiency and less accuracy. This paper discusses the possibility of using an integrated system of vacuum cleaners which can work in a synchronous manner to increase the efficiency of the process. The proposed method investigates the...
Article
Full-text available
It is a well-known fact that some criminals follow perpetual methods of operations known as modi operandi. Modus operandi is a commonly used term to describe the habits in committing crimes. These modi operandi are used in relating criminals to crimes for which the suspects have not yet been recognized. This paper presents the design, implementatio...
Thesis
Full-text available
Increasing trend of grave crimes in a society indicates that the security agencies have to shoulder the burden of criminals in larger numbers than the past. A considerable number of criminals have already been convicted and imprisoned, and some of them have been released after completing their imprisonment and are under supervision. The advancement...
Article
Full-text available
It is a well-known fact that some criminals follow perpetual methods of operations, known as modus operandi (MO) which is commonly used to describe the habits in committing something especially in the context of criminal investigations. These modus operandi are then used in relating criminals to other crimes where the suspect has not yet been recog...
Article
Full-text available
It is a well-known fact that some criminals follow perpetual methods of operations, known as modus operandi (MO) which is commonly used to describe the habits in committing something especially in the context of criminal investigations. These modus operandi are then used in relating criminals to other crimes where the suspect has not yet been recog...
Article
Full-text available
The manual crime recording and investigation systems in police stations all around the world are generating piles of crime documents which make storage and retrieval of reliable crime information extremely difficult as well as inefficient. Furthermore, investigators of central authorities have to manually search through these documents and communic...
Article
Full-text available
The manual crime recording and investigation systems in police stations all around the world are generating piles of crime documents which make storage and retrieval of reliable crime information extremely difficult as well as inefficient. Furthermore, investigators of central authorities have to manually search through these documents and communic...
Article
Full-text available
Understanding community structure helps to interpret the role of actors in a social network. Actor has close ties to actors within a community than actors outside of its community. Community structure reveals important information such as central members in communities and bridges members who connect communities. Clustering algorithms like hierarch...
Article
Full-text available
Character recognition techniques for printed documents are widely used for English language. However, the systems that are implemented to recognize Asian languages struggle to increase the accuracy of recognition. Among other Asian languages (such as Arabic, Tamil, Chinese), Sinhala characters are unique, mainly because they are round in shape. Thi...
Article
Full-text available
Noise removal from images is an important activity for successful processing of images. The main objective of this research work is to investigate the applicability of soft computing techniques and statistical techniques for noise filtering. This paper presents a novel method for noise filtering in images using a fuzzy based statistical method. Thi...
Conference Paper
Full-text available
This paper presents a statistical analysis in the sociological perspective for the grave crime occurrences from the year 2005 to 2011 in Sri Lanka. Graphical interpretations of the datasets showed some significant occurrences of five major grave crime types which can be listed as House Breaking (HB), Hurt by Knife (HK), Robbery (RB), Theft (TH), Ch...
Article
Full-text available
Identifying patterns in Sinhala characters is a very difficult task because the similarities between the Sinhala characters lie in a very mild extent. Printed documents and hand written character recognition play a major role in many areas like security, defence, business and so forth. However, identifying hand written Sinhala characters is difficu...
Conference Paper
Full-text available
Fuzzy set theory has become a fashionable theory used in many branches of real life such as dynamics systems, biological phenomena etc. The concepts of fuzzy numbers, arithmetic operations and necessary calculus of fuzzy functions for developing of fuzzy analysis were first introduced and investigated by Zadeh. For the development of calculus fo...
Conference Paper
Full-text available
Construction of block designs is an important part of design theory. Literature shows that there are several ways of constructing block designs with parameters(𝑣, 𝑘, 𝜆). Further, the correspondence between Hadamard matrices and block designs is well known. One can obtain a (𝑣, 𝑘, 𝜆)−design from Hadamard matrices and vice versa. These designs hav...
Conference Paper
Full-text available
This paper discusses the socio-economical challenges faced by the war widows in Sri Lanka in the context of post-war development scenario, from a social perspective.
Article
Full-text available
Article
Full-text available
This research introduces a new set of 32 in-equivalent Hadamard matrices of order 404 of Goethals Seidel type. To apply the Goethals Seidel method, four Turyn type sequences of lengths 34 are found by a computer search. These sequences are used to construct base sequences of lengths 67 and are used to generate a set of four T-sequences of length 10...
Article
Full-text available
Mobile communications has become one of the fastest growing sectors in the world today. With the technological advancement, mobile communication has subjected to many upgrades such as 2G, 3G, 4G. The question of “Does a customer get the expected capabilities from it?” is not answered yet. Even though, the subscribers of all operators pay almo...
Article
Full-text available
The Hadamard conjecture is that Hadamard matrices exist for all orders 1,2,4t where t≥1 is an integer. The most compatible way of constructing Hadamard matrices is to use the Kronecker product whenever there exist a Hadamard matrix of order t above. Otherwise, the most convenient way to develop a Hadamard matrix is to use certain sequences of zeros...
Conference Paper
Full-text available
The Hadamard conjecture is the statement that Hadamard matrices exist for all orders where is an integer.The most compatible way of constructing Hadamard matrices is to use the Kronecker product whenever there exists a Hadamard matrix of order above. Otherwise, the most convenient way to develop a Hadamard matrix is to use certain sequences of...
Article
Full-text available
This paper presents an algorithm for efficient detection of the nearest police station for a specific position(coordinates). The algorithm is based on Geographic Information System (GIS), Geographic Positioning Systems (GPS) and the J48 classification algorithm. In other words, the proposed algorithm is an effective integration of these three. The...
Article
Full-text available
Literature shows that there are several ways of generating Latin squares, but there is not enough implementation about Super-symmetric Latin squares. This paper proposes a mathematical algorithm to construct Super-symmetric Latin squares of order 2 ୬ by substituting blocks of order 2 n which has the basic properties of a recursive algorithm. The pr...
Conference Paper
Full-text available
It is observed that law enforcement authorities all around the world lack a good and efficient crime analysis system facilitated by the new advancement of information technology. The globalization and increasing complexity of crime patterns have made the analysis of crime date even difficult. Sri Lanka's police too have been dealing with these diff...
Conference Paper
Full-text available
Information technology (IT) has become one of the most innovative subjects in human life today. IT is applied to almost all the fields making it more independent from the ethic of use. Mobile services have become one of the leading areas where IT is thoroughly used. With the application of IT, mobile network providers has been capable of upgrading...
Article
Full-text available
This paper proposes an algorithm which can be used to construct strongly regular graphs from Hadamard matrices.A graph is strongly regular if there are integers and such that every two adjacent vertices have common neighbours and every two non adjacent vertices have common neighbors. Proposed method is mainly based on basic matrix manipulations. If...
Article
Full-text available
The Walsh-Hadamard transform (WHT) is an orthogonal transformation that decomposes a signal into a set of orthogonal, rectangular waveforms called Walsh functions. The transformation has no multipliers and is real because the amplitude of Walsh (or Hadamard) functions has only two values, +1 or -1.Therefore WHT can be used in many different applica...