Publications
Selected publications
- A Classification-Based Algorithm to Detect Forged Embedded Machines in IoT Environments (Journal article - 2019)
- A Novel ML-Based Symbol Detection Pipeline for Molecular Communication (Journal article - 2023)
- Molecular-based Nano-Communication Network: a Ring Topology Nano-bots for In-Vivo Drug Delivery Systems (Journal article - 2019)
- Detection and analysis of the Chameleon WiFi access point virus (Journal article - 2013)
2024
Fully Automatic Karyotyping via Deep Convolutional Neural Networks
Wang, C., Yu, L., Su, J., Shen, J., Selis, V., Yang, C., & Ma, F. (2024). Fully Automatic Karyotyping via Deep Convolutional Neural Networks. IEEE Access, 12, 46081-46092. doi:10.1109/access.2024.3380829
2023
Generating Synthetic Tabular Data for DDoS Detection Using Generative Models
Saka, S., Al-Ataby, A., & Selis, V. (2023). Generating Synthetic Tabular Data for DDoS Detection Using Generative Models. In 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 1436-1442). IEEE. doi:10.1109/trustcom60117.2023.00196
Down Syndrome detection with Swin Transformer architecture
Wang, C., Yu, L., Su, J., Mahy, T., Selis, V., Yang, C., & Ma, F. (2023). Down Syndrome detection with Swin Transformer architecture. BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 86. doi:10.1016/j.bspc.2023.105199
Gamification Approaches for Improving Engagement and Learning in Small and Large Engineering Classes
McIntosh, D., Al-Nuaimy, W., Ataby, A. A., Sandall, I., Selis, V., & Allen, S. (n.d.). Gamification Approaches for Improving Engagement and Learning in Small and Large Engineering Classes. International Journal of Information and Education Technology, 13(9), 1328-1337. doi:10.18178/ijiet.2023.13.9.1935
A Novel ML-Based Symbol Detection Pipeline for Molecular Communication
Selis, V., McGuiness, D. T., & Marshall, A. (2023). A Novel ML-Based Symbol Detection Pipeline for Molecular Communication. IEEE TRANSACTIONS ON MOLECULAR BIOLOGICAL AND MULTI-SCALE COMMUNICATIONS, 9(2), 207-216. doi:10.1109/TMBMC.2023.3278532
A Joint Traffic Flow Estimation and Prediction Approach for Urban Networks
Jiang, R., Wang, S., Zhang, Y., & Selis, V. (2023). A Joint Traffic Flow Estimation and Prediction Approach for Urban Networks. In 2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops) (pp. 9-14). IEEE. doi:10.1109/percomworkshops56833.2023.10150266
Enhancing asynchronous remote teaching during the COVID-19 pandemic
Sedghi, N., McIntosh, D., Ataby, A. A., Selis, V., Al-Nuaimy, W., & Thomason, S. (2023). Enhancing asynchronous remote teaching during the COVID-19 pandemic. Developing Academic Practice, 2023(Special), 39-47. doi:10.3828/dap.2023.3
2022
The Effect of Human Body Shadowing in ZigBee Radio Frequency Fingerprinting Identification
Alhajri, R., Marshall, A., Shen, G., López-Benítez, M., Selis, V., & Zhang, J. (2022). The Effect of Human Body Shadowing in ZigBee Radio Frequency Fingerprinting Identification. In 2022 International Conference on Artificial Intelligence of Things (ICAIoT) (pp. 1-6). IEEE. doi:10.1109/icaiot57170.2022.10121819
2021
Intelligent Autonomous User Discovery and Link Maintenance for mmWave and TeraHertz Devices with Directional Antennas
Khan, Z., Lehtomaki, J. J., Selis, V., Ahmadi, H., & Marshall, A. (2021). Intelligent Autonomous User Discovery and Link Maintenance for mmWave and TeraHertz Devices with Directional Antennas. IEEE Transactions on Cognitive Communications and Networking, 1. doi:10.1109/tccn.2021.3071142
2019
Nano-machine to Nano-machine Molecular Communications for Drug Delivery Systems
Selis, V., McGuiness, D. T., & Marshall, A. (2019). Nano-machine to Nano-machine Molecular Communications for Drug Delivery Systems. In PROCEEDINGS OF THE 6TH ACM INTERNATIONAL CONFERENCE ON NANOSCALE COMPUTING AND COMMUNICATION. doi:10.1145/3345312.3345471
A Classification-Based Algorithm to Detect Forged Embedded Machines in IoT Environments
Selis, V., & Marshall, A. (2019). A Classification-Based Algorithm to Detect Forged Embedded Machines in IoT Environments. IEEE Systems Journal, 13(1), 389-399. doi:10.1109/JSYST.2018.2827700
Molecular-based Nano-Communication Network: a Ring Topology Nano-bots for In-Vivo Drug Delivery Systems
McGuiness, D., Selis, V., & Marshall, A. (n.d.). Molecular-based Nano-Communication Network: a Ring Topology Nano-bots for In-Vivo Drug Delivery Systems. IEEE Access. doi:10.1109/ACCESS.2019.2892816
2018
Cooperative estimation of primary traffic under imperfect spectrum sensing and byzantine attacks
Al-Tahmeesschi, A., Lopez-Benitez, M., Selis, V., Patel, D., & Umebayashi, K. (n.d.). Cooperative estimation of primary traffic under imperfect spectrum sensing and byzantine attacks. IEEE Access. doi:10.1109/ACCESS.2018.2876223
2017
A Fake Timing Attack Against Behavioural Tests Used in Embedded IoT M2M Communications
Selis, V., & Marshall, A. (2017). A Fake Timing Attack Against Behavioural Tests Used in Embedded IoT M2M Communications. In 2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET). Retrieved from https://www.webofscience.com/
Establishing trusted Machine-to-Machine communications in the Internet of Things through the use of behavioural tests
Selis, V. (2017, October 30). Establishing trusted Machine-to-Machine communications in the Internet of Things through the use of behavioural tests.
2015
MEDA: A Machine Emulation Detection Algorithm
Selis, V., & Marshall, A. (2015). MEDA: A Machine Emulation Detection Algorithm. In 2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4 (pp. 228-235). Retrieved from https://www.webofscience.com/
2013
Development of Device Identity using WiFi Layer 2 Management Frames for Combating Rogue APs
Milliken, J., Selis, V., Yap, K. M., & Marshall, A. (2013). Development of Device Identity using WiFi Layer 2 Management Frames for Combating Rogue APs. In PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013) (pp. 488-493). Retrieved from https://www.webofscience.com/
Detection and analysis of the Chameleon WiFi access point virus
Milliken, J., Selis, V., & Marshall, A. (2013). Detection and analysis of the Chameleon WiFi access point virus. EURASIP Journal on Information Security, 2013(1). doi:10.1186/1687-417x-2013-2
Impact of Metric Selection on Wireless DeAuthentication DoS Attack Performance
Milliken, J., Selis, V., Yap, K. M., & Marshall, A. (2013). Impact of Metric Selection on Wireless DeAuthentication DoS Attack Performance. IEEE WIRELESS COMMUNICATIONS LETTERS, 2(5), 571-574. doi:10.1109/WCL.2013.072513.130428
2012
The effect of probe interval estimation on attack detection performance of a WLAN independent intrusion detection system
Milliken, J., Yap, K. M., Marshall, A., & Selis, V. (2012). The effect of probe interval estimation on attack detection performance of a WLAN independent intrusion detection system. In IET International Conference on Wireless Communications and Applications (ICWCA 2012) (pp. 101). Institution of Engineering and Technology. doi:10.1049/cp.2012.2110