• Advanced passive operating system fingerprinting using machine learning and deep learning 

      Hagos, Desta Haileselassie; Løland, Martin V.; Yazidi, Anis; Kure, Øivind; Engelstad, Paal E. (International Conference on Computer Communications and Networks (ICCCN); 2020 29th International Conference on Computer Communications and Networks (ICCCN), Journal article; Peer reviewed, 2020-09-30)
      Securing and managing large, complex enterprise network infrastructure requires capturing and analyzing network traffic traces in real-time. An accurate passive Operating System (OS) fingerprinting plays a critical role ...
    • Anomaly Detection in Cellular IoT with Machine Learning 

      Santos, Bernardo; Khan, Imran Qayyrm; Dzogovic, Bruno; Feng, Boning; Do, Thuan Van; Jacot, Niels; Do, van Thanh (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;Volume 401, Conference object, 2021-01-01)
      The number of Internet of Things (IoT) devices used in eldercare are increasing day by day and bringing big security challenges especially for health care organizations, IoT service providers and most seriously for the ...
    • Artificial intelligence in dry eye disease 

      Storås, Andrea Marheim; Strumke, Inga; Riegler, Michael Alexander; Grauslund, Jakob; Hammer, Hugo Lewi; Yazidi, Anis; Halvorsen, Pål; Gundersen, Kjell Gunnar; Utheim, Tor Paaske; Jackson, Catherine Joan (The ocular surface;Volume 23, January 2022, Peer reviewed; Journal article, 2021-12-01)
      Dry eye disease (DED) has a prevalence of between 5 and 50%, depending on the diagnostic criteria used and population under study. However, it remains one of the most underdiagnosed and undertreated conditions in ophthalmology. ...
    • Artificial intelligence in the fertility clinic: status, pitfalls and possibilities 

      Riegler, Michael Alexander; Stensen, Mette Haug; Witczak, Oliwia; Andersen, Jorunn Marie; Hicks, Steven; Hammer, Hugo Lewi; Delbarre, Erwan; Halvorsen, Pål; Yazidi, Anis; Holst, Nicolai; Haugen, Trine B. (Human Reproduction;Volume 36, Issue 9, Peer reviewed; Journal article, 2021-07-29)
      In recent years, the amount of data produced in the field of assisted reproduction technology [ART] has increased exponentially. The diversity of data is large, ranging from videos to tabular data. At the same time, ...
    • Automatic Detection of Hateful Comments in Online Discussion 

      Hammer, Hugo Lewi (Peer reviewed; Journal article, 2016)
      Making violent threats towards minorities like immigrants or homosexuals is increasingly common on the Internet. We present a method to automatically detect threats of violence using machine learn- ing. A material of ...
    • Automatic detection of hateful comments in online discussion 

      Hammer, Hugo Lewi (Journal article; Peer reviewed, 2017)
      Making violent threats towards minorities like immigrants or homosexuals is increasingly common on the Internet. We present a method to automatically detect threats of violence using machine learning. A material of 24,840 ...
    • Automatic security classification by machine learning for cross-domain information exchange 

      Hammer, Hugo Lewi; Kongsgård, Kyrre Wahl; Yazidi, Anis; Bai, Aleksander; Nordbotten, Nils Agne; Engelstad, Paal E. (MILCOM IEEE Military Communications Conference;, Journal article; Peer reviewed, 2015)
      Cross-domain information exchange is necessary to obtain information superiority in the military domain, and should be based on assigning appropriate security labels to the information objects. Most of the data found ...
    • Autonomous configuration of network parameters in operating systems using evolutionary algorithms 

      Gembala, Bartosz Gembala; Yazidi, Anis; Haugerud, Hårek; Nichele, Stefano (Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems;, Chapter; Peer reviewed, 2018)
      By default, the Linux network stack is not configured for highspeed large file transfer. The reason behind this is to save memory resources. It is possible to tune the Linux network stack by increasing the network buffers ...
    • Cross-Subject emotion recognition from EEG using Convolutional Neural Networks 

      Zhong, Xiaolong; Yin, Zhong; Zhang, Jianhua (Chinese Control Conference (CCC);2020 39th Chinese Control Conference (CCC), Peer reviewed; Journal article, 2020-09-09)
      Using electroencephalogram (EEG) signals for emotion detection has aroused widespread research concern. However, across subjects emotional recognition has become an insurmountable gap which researchers cannot step across ...
    • Deep Learning for Classifying Physical Activities from Accelerometer Data 

      Nunavath, Vimala; Johansen, Sahand; Johannessen, Tommy Sandtorv; Jiao, Lei; Hansen, Bjørge Hermann; Stølevik, Sveinung Berntsen; Goodwin, Morten (Sensors;Volume 21 / Issue 16, Peer reviewed; Journal article, 2021-08-18)
      Physical inactivity increases the risk of many adverse health conditions, including the world’s major non-communicable diseases, such as coronary heart disease, type 2 diabetes, and breast and colon cancers, shortening ...
    • DeepFake electrocardiograms using generative adversarial networks are the beginning of the end for privacy issues in medicine 

      Thambawita, Vajira; Isaksen, Jonas L.; Hicks, Steven A.; Ghouse, Jonas; Ahlberg, Gustav; Linneberg, Allan; Grarup, Niels; Ellervik, Christina; Olesen, Morten Salling; Hansen, Torben; Graff, Claus; Holstein-Rathlou, Niels-Henrik; Strümke, Inga; Hammer, Hugo L.; Maleckar, Mary M.; Halvorsen, Pål; Riegler, Michael A.; Kanters, Jørgen K. (Scientific Reports;11, Article number: 21896 (2021), Peer reviewed; Journal article, 2021-11-09)
      Recent global developments underscore the prominent role big data have in modern medical science. But privacy issues constitute a prevalent problem for collecting and sharing data between researchers. However, synthetic ...
    • Detection of DNS tunneling in mobile networks using machine learning 

      Do, Van Thuan; Engelstad, Paal E.; Feng, Boning; Do, van Thanh (Lecture Notes in Electrical Engineering;Information Science and Applications 2017, Volume 424, Journal article; Peer reviewed, 2017)
      Lately, costly and threatening DNS tunnels on the mobile networks bypassing the mobile operator’s Policy and Charging Enforcement Function (PCEF), has shown the vulnerability of the mobile networks caused by the Domain ...
    • Emotion recognition using multi-modal data and machine learning techniques: A tutorial and review 

      Zhang, Jianhua; Yin, Zhong; Chen, Peng; Nichele, Stefano (Information Fusion;Volume 59, July 2020, Peer reviewed; Journal article, 2020-01-31)
      In recent years, the rapid advances in machine learning (ML) and information fusion has made it possible to endow machines/computers with the ability of emotion understanding, recognition, and analysis. Emotion recognition ...
    • Evading a Machine Learning-based Intrusion Detection System through Adversarial Perturbations 

      Fladby, Torgeir; Haugerud, Hårek; Nichele, Stefano; Begnum, Kyrre; Yazidi, Anis (RACS: Research in Applied Computation Symposium; RACS '20: International Conference on Research in Adaptive and Convergent Systems, Chapter; Peer reviewed; Conference proceeding, 2020-10)
      Machine-learning based Intrusion Detection and Prevention Systems provide significant value to organizations because they can efficiently detect previously unseen variations of known threats, new threats related to known ...
    • Explaining deep neural networks for knowledge discovery in electrocardiogram analysis 

      Hicks, Steven; Isaksen, Jonas L; Thambawita, Vajira L B; Ghouse, Jonas; Ahlberg, Gustav; Linneberg, Allan; Grarup, Niels; Strumke, Inga; Ellervik, Christina; Olesen, Morten Salling; Hansen, Torben; Graff, Claus; Holstein-Rathlou, Niels-Henrik; Halvorsen, Pål; Maleckar, Mary Margot Catherine; Riegler, Michael; Kanters, Jørgen K (Scientific Reports;11, Article number: 10949 (2021), Peer reviewed; Journal article, 2021-05-26)
      Deep learning-based tools may annotate and interpret medical data more quickly, consistently, and accurately than medical doctors. However, as medical doctors are ultimately responsible for clinical decision-making, any ...
    • File System Support for Privacy-Preserving Analysis and Forensics in Low-Bandwidth Edge Environments 

      Ovesen, Aril Bernhard; Nordmo, Tor-Arne Schmidt; Johansen, Håvard D.; Riegler, Michael Alexander; Halvorsen, Pål; Johansen, Dag (Information;Volume 12, Issue 10, Peer reviewed; Journal article, 2021-10-18)
      In this paper, we present initial results from our distributed edge systems research in the domain of sustainable harvesting of common good resources in the Arctic Ocean. Specifically, we are developing a digital platform ...
    • General TCP state inference model from passive measurements using machine learning techniques 

      Hagos, Desta Haileselassie; Engelstad, Paal E.; Yazidi, Anis; Kure, Øivind (IEEE Access;VOLUME 6, 2018, Journal article; Peer reviewed, 2018-05-04)
      Many applications in the Internet use the reliable end-to-end Transmission Control Protocol (TCP) as a transport protocol due to practical considerations. There are many different TCP variants widely in use, and each ...
    • HYPERAKTIV: An Activity Dataset from Patients with Attention-Deficit/Hyperactivity Disorder (ADHD) 

      Hicks, Steven; Stautland, Andrea; Fasmer, Ole Bernt; Førland, Wenche; Hammer, Hugo Lewi; Halvorsen, Pål; Mjeldheim, Kristin; Ødegaard, Ketil Joachim; Osnes, Berge; Syrstad, Vigdis Elin Giæver; Riegler, Michael; Jakobsen, Petter (MMSys: ACM Multimedia Systems;MMSys '21: Proceedings of the 12th ACM Multimedia Systems Conference, Conference object, 2021-09-22)
      Machine learning research within healthcare frequently lacks the public data needed to be fully reproducible and comparable. Datasets are often restricted due to privacy concerns and legal requirementsthat come with ...
    • Improving Cellular IoT Security with Identity Federation and Anomaly Detection 

      Santos, Bernardo; Dzogovic, Bruno; Feng, Boning; Jacot, Niels; Do, Thuan Van; Do, van Thanh (International Conference on Computers, Communications, and Systems (ICCCS);2020 5th International Conference on Computer and Communication Systems (ICCCS), Conference object, 2020-06-16)
      As we notice the increasing adoption of Cellular IoT solutions (smart-home, e-health, among others), there are still some security aspects that can be improved as these devices can suffer various types of attacks that can ...
    • Improving Phishing Detection with the Grey Wolf Optimizer 

      Naser Jaber, Aws; Fritsch, Lothar; Haugerud, Hårek (International Conference on Electronics, Information, and Communication (ICEIC);2022 International Conference on Electronics, Information, and Communication (ICEIC), Conference object, 2022-04-11)
      With the recent epidemic of COVID-19-themed scam and phishing, the efficient automated detection of such attacks is crucial. Although many anti-phishing solutions, such as lists and similarity and heuristic-based approaches ...