default search action
Yushan Siriwardhana
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c11]Rashmi Thennakoon, Arosha Wanigasundara, Sanjaya Weerasinghe, Chatura Seneviratne, Yushan Siriwardhana, Madhusanka Liyanage:
Decentralized Defense: Leveraging Blockchain against Poisoning Attacks in Federated Learning Systems. CCNC 2024: 950-955 - [c10]Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Samuel Marchal, Mika Ylianttila:
Robust Aggregation Technique Against Poisoning Attacks in Multi-Stage Federated Learning Applications. CCNC 2024: 956-962 - [c9]Madhusanka Liyanage, Pawani Porambage, Engin Zeydan, Thulitha Senavirathne, Yushan Siriwardhana, Awaneesh Kumar Yadav, Bartlomiej Siniarski:
Advancing Security for 6G Smart Networks and Services. EuCNC/6G Summit 2024: 1169-1174 - [c8]Janani Kehelwala, Yushan Siriwardhana, Tharaka Hewa, Madhusanka Liyanage, Mika Ylianttila:
Decentralized Learning for 6G Security: Open Issues and Future Directions. EuCNC/6G Summit 2024: 1175-1180 - 2022
- [c7]Rakshitha De Silva, Yushan Siriwardhana, Tharaka Samarasinghe, Madhusanka Liyanage, Mika Ylianttila:
Deployment Options of 5G Network Slicing for Smart Healthcare. CCNC 2022: 749-750 - [c6]Suwani Jayasinghe, Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Mika Ylianttila:
Federated Learning based Anomaly Detection as an Enabler for Securing Network and Service Management Automation in Beyond 5G Networks. EuCNC 2022: 345-350 - [c5]Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Mika Ylianttila:
Robust and Resilient Federated Learning for Securing Future Networks. EuCNC 2022: 351-356 - [d1]Sehan Samarakoon, Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Sang-Yoon Chang, Jinoh Kim, Jonghyun Kim, Mika Ylianttila:
5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network. IEEE DataPort, 2022 - [i2]Sehan Samarakoon, Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Sang-Yoon Chang, Jinoh Kim, Jonghyun Kim, Mika Ylianttila:
5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network. CoRR abs/2212.01298 (2022) - 2021
- [j3]Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Mika Ylianttila:
A Survey on Mobile Augmented Reality With 5G Mobile Edge Computing: Architectures, Applications, and Technical Aspects. IEEE Commun. Surv. Tutorials 23(2): 1160-1192 (2021) - [j2]Yushan Siriwardhana, Gürkan Gür, Mika Ylianttila, Madhusanka Liyanage:
The role of 5G for digital healthcare against COVID-19 pandemic: Opportunities and challenges. ICT Express 7(2): 244-252 (2021) - [c4]Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Mika Ylianttila:
Performance Analysis of Softwarized Local Mobile Networks. CCNC 2021: 1-2 - [c3]Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Mika Ylianttila:
AI and 6G Security: Opportunities and Challenges. EuCNC/6G Summit 2021: 616-621 - 2020
- [j1]Yushan Siriwardhana, Pawani Porambage, Mika Ylianttila, Madhusanka Liyanage:
Performance Analysis of Local 5G Operator Architectures for Industrial Internet. IEEE Internet Things J. 7(12): 11559-11575 (2020) - [c2]Rakshitha De Silva, Yushan Siriwardhana, Tharaka Samarasinghe, Mika Ylianttila, Madhusanka Liyanage:
Local 5G Operator Architecture for Delay Critical Telehealth Applications. 5G World Forum 2020: 257-262
2010 – 2019
- 2019
- [c1]Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Jaspreet Singh Walia, Marja Matinmikko-Blue, Mika Ylianttila:
Micro-Operator driven Local 5G Network Architecture for Industrial Internet. WCNC 2019: 1-8 - 2018
- [i1]Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Jaspreet Singh Walia, Marja Matinmikko-Blue, Mika Ylianttila:
Micro-Operator driven Local 5G Network Architecture for Industrial Internet. CoRR abs/1811.04299 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint