Neeraj Suri
Lancaster University
H-index: 40
Europe-United Kingdom
Top articles of Neeraj Suri
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Security challenges when space merges with cyberspace | Space Policy | Vijay Varadharajan Neeraj Suri | 2024/2/1 |
UNICAD: A Unified Approach for Attack Detection, Noise Reduction and Novel Class Identification | Proceedings of the International Joint Conference on Neural Networks (IJCNN) | Alvaro Lopez Pellcier Kittipos Giatgong Yi Li Neeraj Suri Plamen Angelov | 2024 |
Privacy-preserving decentralized federated learning over time-varying communication graph | ACM Transactions on Privacy and Security | Yang Lu Zhengxin Yu Neeraj Suri | 2023/6/26 |
Replication: 20 Years of Inferring Interdomain Routing Policies | Savvas Kastanakis Vasileios Giotsas Ioana Livadariu Neeraj Suri | 2023/10/24 | |
Domain generalization and feature fusion for cross-domain imperceptible adversarial attack detection | Yi Li Plamen Angelov Neeraj Suri | 2023/6/18 | |
Federated Meta Learning for Visual Navigation in GPS-denied Urban Airspace | Burak Yuksek Zhengxin Yu Neeraj Suri Gokhan Inalhan | 2023 | |
Cloud Security Requirement Based Threat Analysis | Ahmed Taha Alexander Lawall Neeraj Suri | 2023/2/20 | |
RAFL: A Robust and Adaptive Federated Meta-Learning Framework Against Adversaries | Zhengxin Yu Yang Lu Neeraj Suri | 2023/9/25 | |
Error Propagation Analysis for Multithreaded Programs: An Empirical Approach | arXiv preprint arXiv:2312.16791 | Stefan Winter Abraham Chan Habib Saissi Karthik Pattabiraman Neeraj Suri | 2023/12/28 |
Specifying Autonomous System Behaviour | arXiv preprint arXiv:2302.10087 | Andrew Sogokon Burak Yuksek Gokhan Inalhan Neeraj Suri | 2023/2/20 |
Compilation as a Defense: Enhancing DL Model Attack Robustness via Tensor Optimization | Stefan Trawicki William Hackett Lewis Birch Neeraj Suri Peter Garraghan | 2023/9 | |
An Empirical Study of Reflection Attacks Using NetFlow Data | Cybersecurity | Edward Chuah Neeraj Suri | 2023/12/26 |
Model Leeching: An Extraction Attack Targeting LLMs | Lewis Birch William Hackett Stefan Trawicki Neeraj Suri Peter Garraghan | 2023/9/19 | |
Fuzzy Detectors Against Adversarial Attacks | Yi Li Plamen Angelov Neeraj Suri | 2023/12/5 | |
SlowCoach: Mutating Code to Simulate Performance Bugs | Yiqun Chen Oliver Schwahn Roberto Natella Matthew Bradbury Neeraj Suri | 2022/10/31 | |
Ppfm: An adaptive and hierarchical peer-to-peer federated meta-learning framework | Zhengxin Yu Yang Lu Plamen Angelov Neeraj Suri | 2022/12/14 | |
Understanding the confounding factors of inter-domain routing modeling | Savvas Kastanakis Vasileios Giotsas Neeraj Suri | 2022/10/25 | |
Similarity-based deep neural network to detect imperceptible adversarial attacks | Eduardo Soares Plamen Angelov Neeraj Suri | 2022/12/4 | |
Threatpro: Multi-layer threat analysis in the cloud | arXiv preprint arXiv:2209.14795 | Salman Manzoor Antonios Gouglidis Matthew Bradbury Neeraj Suri | 2022/9/29 |
Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud | Salman Manzoor Antonios Gouglidis Matthew Bradbury Neeraj Suri | 2022/11/7 |