Research outputs
Selected research outputs
- A Classification-Based Algorithm to Detect Forged Embedded Machines in IoT Environments (Journal article - 2019)
- A Novel ML-Based Symbol Detection Pipeline for Molecular Communication (Journal article - 2023)
- Molecular-based Nano-Communication Network: a Ring Topology Nano-bots for In-Vivo Drug Delivery Systems (Journal article - 2019)
- Detection and analysis of the Chameleon WiFi access point virus (Journal article - 2013)
2025
AlignAD-VAE: A Variational Autoencoder with MMD-Based Dataset Alignment for Network Anomaly Detection
Saka, S., Selis, V., & Marshall, A. (2025). AlignAD-VAE: A Variational Autoencoder with MMD-Based Dataset Alignment for Network Anomaly Detection. In 2025 IEEE 24th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 861-867). IEEE. doi:10.1109/trustcom66490.2025.00100
TrustIoT: Building Trust in Human-Thing Interactions for Healthcare Systems Using Machine Learning
Al-Ansari, A., D’Août, K., & Selis, V. (2025). TrustIoT: Building Trust in Human-Thing Interactions for Healthcare Systems Using Machine Learning. In 2025 IEEE 24th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 3164-3170). IEEE. doi:10.1109/trustcom66490.2025.00378
2024
Fully Automatic Karyotyping via Deep Convolutional Neural Networks
Wang, C., Yu, L., Su, J., Shen, J., Selis, V., Yang, C., & Ma, F. (2024). Fully Automatic Karyotyping via Deep Convolutional Neural Networks. IEEE ACCESS, 12, 46081-46092. doi:10.1109/ACCESS.2024.3380829
2023
Down Syndrome detection with Swin Transformer architecture
Wang, C., Yu, L., Su, J., Mahy, T., Selis, V., Yang, C., & Ma, F. (2023). Down Syndrome detection with Swin Transformer architecture. BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 86. doi:10.1016/j.bspc.2023.105199
Gamification Approaches for Improving Engagement and Learning in Small and Large Engineering Classes
McIntosh, D., Al-Nuaimy, W., Ataby, A. A., Sandall, I., Selis, V., & Allen, S. (2023). Gamification Approaches for Improving Engagement and Learning in Small and Large Engineering Classes. International Journal of Information and Education Technology, 13(9), 1328-1337. doi:10.18178/ijiet.2023.13.9.1935
A Novel ML-Based Symbol Detection Pipeline for Molecular Communication
Selis, V., McGuiness, D. T., & Marshall, A. (2023). A Novel ML-Based Symbol Detection Pipeline for Molecular Communication. IEEE TRANSACTIONS ON MOLECULAR BIOLOGICAL AND MULTI-SCALE COMMUNICATIONS, 9(2), 207-216. doi:10.1109/TMBMC.2023.3278532
A Novel ML-Based Symbol Detection Pipeline for Molecular Communication.
Selis, V., McGuiness, D. T., & Marshall, A. (2023). A Novel ML-Based Symbol Detection Pipeline for Molecular Communication.. IEEE Trans. Mol. Biol. Multi Scale Commun., 9, 207-216.
A Joint Traffic Flow Estimation and Prediction Approach for Urban Networks
Jiang, R., Wang, S., Zhang, Y., & Selis, V. (2023). A Joint Traffic Flow Estimation and Prediction Approach for Urban Networks. In 2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops) (pp. 9-14). IEEE. doi:10.1109/percomworkshops56833.2023.10150266
Enhancing asynchronous remote teaching during the COVID-19 pandemic
Sedghi, N., McIntosh, D., Ataby, A. A., Selis, V., Al-Nuaimy, W., & Thomason, S. (2023). Enhancing asynchronous remote teaching during the COVID-19 pandemic. Developing Academic Practice, 2023(Special), 39-47. doi:10.3828/dap.2023.3
Generating Synthetic Tabular Data for DDoS Detection Using Generative Models
Saka, S., Al-Ataby, A., & Selis, V. (2024). Generating Synthetic Tabular Data for DDoS Detection Using Generative Models. In 2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023 (pp. 1436-1442). doi:10.1109/TrustCom60117.2023.00196
2022
The Effect of Human Body Shadowing in ZigBee Radio Frequency Fingerprinting Identification
Alhajri, R., Marshall, A., Shen, G., López-Benítez, M., Selis, V., & Zhang, J. (2022). The Effect of Human Body Shadowing in ZigBee Radio Frequency Fingerprinting Identification. In 2022 International Conference on Artificial Intelligence of Things (ICAIoT) (pp. 1-6). IEEE. doi:10.1109/icaiot57170.2022.10121819
2021
Intelligent Autonomous User Discovery and Link Maintenance for mmWave and TeraHertz Devices with Directional Antennas
Khan, Z., Lehtomaki, J. J., Selis, V., Ahmadi, H., & Marshall, A. (2021). Intelligent Autonomous User Discovery and Link Maintenance for mmWave and TeraHertz Devices with Directional Antennas. IEEE Transactions on Cognitive Communications and Networking, 1. doi:10.1109/tccn.2021.3071142
2019
Nano-machine to Nano-machine Molecular Communications for Drug Delivery Systems
Selis, V., McGuiness, D. T., & Marshall, A. (2019). Nano-machine to Nano-machine Molecular Communications for Drug Delivery Systems. In PROCEEDINGS OF THE 6TH ACM INTERNATIONAL CONFERENCE ON NANOSCALE COMPUTING AND COMMUNICATION. doi:10.1145/3345312.3345471
A Classification-Based Algorithm to Detect Forged Embedded Machines in IoT Environments
Selis, V., & Marshall, A. (2019). A Classification-Based Algorithm to Detect Forged Embedded Machines in IoT Environments. IEEE Systems Journal, 13(1), 389-399. doi:10.1109/JSYST.2018.2827700
Molecular-based Nano-Communication Network: a Ring Topology Nano-bots for In-Vivo Drug Delivery Systems
McGuiness, D., Selis, V., & Marshall, A. (2019). Molecular-based Nano-Communication Network: a Ring Topology Nano-bots for In-Vivo Drug Delivery Systems. IEEE Access. doi:10.1109/ACCESS.2019.2892816
2018
Cooperative estimation of primary traffic under imperfect spectrum sensing and byzantine attacks
Al-Tahmeesschi, A., Lopez-Benitez, M., Selis, V., Patel, D., & Umebayashi, K. (2018). Cooperative estimation of primary traffic under imperfect spectrum sensing and byzantine attacks. IEEE Access. doi:10.1109/ACCESS.2018.2876223
2017
A Fake Timing Attack Against Behavioural Tests Used in Embedded IoT M2M Communications
Selis, V., & Marshall, A. (2017). A Fake Timing Attack Against Behavioural Tests Used in Embedded IoT M2M Communications. In 2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET). Retrieved from https://www.webofscience.com/
Establishing trusted Machine-to-Machine communications in the Internet of Things through the use of behavioural tests
Selis, V. (2017, October 30). Establishing trusted Machine-to-Machine communications in the Internet of Things through the use of behavioural tests.
2015
MEDA: A Machine Emulation Detection Algorithm
Selis, V., & Marshall, A. (2015). MEDA: A Machine Emulation Detection Algorithm. In 2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4 (pp. 228-235). Retrieved from https://www.webofscience.com/
2013
Development of Device Identity using WiFi Layer 2 Management Frames for Combating Rogue APs
Milliken, J., Selis, V., Yap, K. M., & Marshall, A. (2013). Development of Device Identity using WiFi Layer 2 Management Frames for Combating Rogue APs. In PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013) (pp. 488-493). Retrieved from https://www.webofscience.com/
Detection and analysis of the Chameleon WiFi access point virus
Milliken, J., Selis, V., & Marshall, A. (2013). Detection and analysis of the Chameleon WiFi access point virus. EURASIP Journal on Information Security, 2013(1). doi:10.1186/1687-417x-2013-2
Impact of Metric Selection on Wireless DeAuthentication DoS Attack Performance
Milliken, J., Selis, V., Yap, K. M., & Marshall, A. (2013). Impact of Metric Selection on Wireless DeAuthentication DoS Attack Performance. IEEE WIRELESS COMMUNICATIONS LETTERS, 2(5), 571-574. doi:10.1109/WCL.2013.072513.130428
2012
The effect of probe interval estimation on attack detection performance of a WLAN independent intrusion detection system
Milliken, J., Yap, K. M., Marshall, A., & Selis, V. (2012). The effect of probe interval estimation on attack detection performance of a WLAN independent intrusion detection system. In IET International Conference on Wireless Communications and Applications (ICWCA 2012) (pp. 101). Institution of Engineering and Technology. doi:10.1049/cp.2012.2110