Academic Papers

Publications

Journal articles

[8] Janne Alatalo, Tuomo Sipola, and Mika Rantonen. “Improved difference images for change detection classifiers in SAR imagery using deep learning.” In: IEEE Transactions on Geoscience and Remote Sensing 61, (2023), 5218714, pp. 1–14. [PDF] [arXiv]

[7] Tuomo Sipola, Tero Kokkonen, Markku Puura, Kalle-Eemeli Riuttanen, Kari Pitkäniemi, Elina Juutilainen, and Teemu Kontio. “Digital twin of food supply chain for cyber exercises.” In: Applied Sciences 13.12 (2023), 7138. [PDF]

[6] Antti Juvonen, Tuomo Sipola, and Timo Hämäläinen. “Online anomaly detection using dimensionality reduction techniques for HTTP log analysis.” In: Computer Networks 91 (2015), pp. 46–56. [PDF]

[5] Tuomo Sipola, Tapani Ristaniemi, and Amir Averbuch. “Gear classification and fault detection using a diffusion map framework.” In: Pattern Recognition Letters 53 (2015), pp. 53–61. [PDF]

[4] Fengyu Cong, Tuomas Puoliväli, Vinoo Alluri, Tuomo Sipola, Iballa Burunat, Petri Toiviainen, Asoke K. Nandi, Elvira Brattico, and Tapani Ristaniemi. “Key issues in decomposing fMRI during naturalistic and continuous music experience with independent component analysis.” In: Journal of Neuroscience Methods 223 (2014), pp. 74–84. [PDF]

[3] Paavo Nieminen, Ilkka Pölönen, and Tuomo Sipola. “Research literature clustering using diffusion maps.” In: Journal of Informetrics 7.4 (2013), pp. 874–886. [PDF]

[2] Tuomo Sipola, Antti Juvonen, and Joel Lehtonen. “Dimensionality reduction framework for detecting anomalies from network logs.” Engineering Intelligent Systems 20.1 (2012), pp. 87–97. [PDF]

[1] Fengyu Cong, Tuomo Sipola, Tiina Huttunen-Scott, Xiaonan Xu, Tapani Ristaniemi, and Heikki Lyytinen. “Hilbert-Huang versus Morlet wavelet transformation on mismatch negativity of children in uninterrupted sound paradigm.” Nonlinear Biomedical Physics 3.1 (2009). [PDF]

Conference papers

[23] Ummar Ahmed, Tuomo Sipola, and Jari Hautamäki. “Cyber protection applications of quantum computing: A review”. In: Proceedings of the 23rd European Conference on Cyber Warfare and Security (ECCWS 2024). Ed. by Martti Lehto and Mika Karjalainen. Vol. 23. 1. Reading, United Kingdom: Academic Conferences International Limited, 2024, pp. 10–17. [PDF] [arXiv]

[22] Emils Bagirovs, Grigory Provodin, Tuomo Sipola, and Jari Hautamäki. “Applications of post-quantum cryptography”. In: Proceedings of the 23rd European Conference on Cyber Warfare and Security (ECCWS 2024). Ed. by Martti Lehto and Mika Karjalainen. Vol. 23. 1. Reading, United Kingdom: Academic Conferences International Limited, 2024, pp. 49–57. [PDF] [arXiv]

[21] Thien Nguyen, Tuomo Sipola, and Jari Hautamäki. “Machine learning applications of quantum computing: A review”. In: Proceedings of the 23rd European Conference on Cyber Warfare and Security (ECCWS 2024). Ed. by Martti Lehto and Mika Karjalainen. Vol. 23. 1. Reading, United Kingdom: Academic Conferences International Limited, 2024, pp. 322–330. [PDF] [arXiv]

[20] Mays Al-Azzawi, Dung Doan, Tuomo Sipola, Jari Hautamäki and Tero Kokkonen. “Artificial intelligence cyberattacks in red teaming: A scoping review.” In: Good Practices and New Perspectives in Information Systems and Technologies. WorldCIST 2024. Ed. by Álvaro Rocha, Hojjat Adeli, Gintautas Dzemyda, Fernando Moreira, and Aneta Poniszewska-Marańda. Vol. 1. Lecture Notes in Networks and Systems 985. Cham, Switzerland: Springer, 2024, pp. 129–138. [PDF]

[19] Jari Hautamäki, Tero Kokkonen, and Tuomo Sipola. “Cyber security information sharing during a large scale real life cyber security exercise”. In: Good Practices and New Perspectives in Information Systems and Technologies. WorldCIST 2024. Ed. by Álvaro Rocha, Hojjat Adeli, Gintautas Dzemyda, Fernando Moreira, and Aneta Poniszewska-Marańda. Vol. 3. Lecture Notes in Networks and Systems 987. Cham, Switzerland: Springer, 2024, pp. 45–55. [PDF]

[18] Janne Alatalo, Tuomo Sipola, and Tero Kokkonen. “Food supply chain cyber threats: A scoping review.” In: Information Systems and Technologies. WorldCIST 2023. Ed. by Álvaro Rocha, Hojjat Adeli, Gintautas Dzemyda, Fernando Moreira, and Valentina Colla. Vol. 3. Lecture Notes in Networks and Systems 801. Cham, Switzerland: Springer, 2024, pp. 94–104. [PDF]

[17] Jani Päijänen, Jarno Salonen, Anni Karinsalo, Tuomo Sipola, and Tero Kokkonen. “Participants prefer technical hands-on cyber exercises instead of organisational and societal ones.” In: Proceedings of the 22nd European Conference on Cyber Warfare and Security (ECCWS 2023). Ed. by Antonios Andreatos and Christos Douligeris. Vol. 22. 1. Reading, United Kingdom: Academic Conferences International Limited, 2023, pp. 349–357. [PDF]

[16] Tero Kokkonen, Jani Päijänen, and Tuomo Sipola. “Multi-national cyber security exercise, case Flagship-2.” In: Proceeding of the 14th International Conference on Education Technology and Computers (ICETC 2022), October 28–30, 2022, Barcelona, Spain. New York, USA: ACM, 2023, pp. 292–298. [PDF]

[15] Joonatan Ovaska, Karo Saharinen, and Tuomo Sipola. “Analysing Finnish cybersecurity thesis topics using taxonomic frameworks.” In: Proceedings of the 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). Calabria, Italy: IEEE, 2022, pp. 1–8. [PDF]

[14] Janne Alatalo, Joni Korpihalkola, Tuomo Sipola, and Tero Kokkonen. “Chromatic and spatial analysis of one-pixel attacks against an image classifier.” In: Networked Systems: 10th International Conference, NETYS 2022, Virtual Event, May 17–19, 2022, Proceedings. Ed. by Mohammed-Amine Koulali and Mira Mezini. Lecture Notes in Computer Science 13464. Cham, Switzerland: Springer, 2022, pp. 303–316. [PDF] [arXiv]

[13] Tuomo Sipola, Janne Alatalo, Tero Kokkonen, and Mika Rantonen. “Artificial intelligence in the IoT era: A review of edge AI hardware and software.” In: Proceedings of the 31st Conference of Open Innovations Association FRUCT. Ed. by Sergey Balandin and Tatiana Shatalova. Vol. 1. Helsinki, Finland: FRUCT Oy & IEEE, April 2022, pp. 320–331. [PDF] [PDF at FRUCT]

[12] Janne Alatalo, Tuomo Sipola, and Tero Kokkonen. “Detecting one-pixel attacks using variational autoencoders.” In: Information Systems and Technologies. WorldCIST 2022. Ed. by Álvaro Rocha, Hojjat Adeli, Gintautas Dzemyda, and Fernando Moreira. Vol. 1. Lecture Notes in Networks and Systems 468. Cham, Switzerland: Springer, 2022, pp. 611–623. [PDF]

[11] Joni Korpihalkola, Tuomo Sipola, Samir Puuska, and Tero Kokkonen. “One-pixel attack deceives computer-assisted diagnosis of cancer.” In: Proceedings of the 4th International Conference on Signal Processing and Machine Learning (SPML 2021), 18–20 August 2021, Beijing, China. New York, USA: ACM, 2021, pp. 100–106. [PDF] [arXiv]

[10] Jani Päijänen, Karo Saharinen, Jarno Salonen, Tuomo Sipola, Jan Vykopal, and Tero Kokkonen. “Cyber range: Preparing for crisis or something just for technical people?” In: Proceedings of the 20th European Conference on Cyber Warfare and Security (ECCWS 2021). Ed. by Thaddeus Eze, Lee Speakman, and Cyril Onwubiko. Reading, United Kingdom: Academic Conferences International Limited, June 2021, pp. 322–330. [PDF]

[9] Joni Korpihalkola, Tuomo Sipola, and Tero Kokkonen. “Color-optimized one-pixel attack against digital pathology images.” In: Proceedings of the 29th IEEE Conference of Open Innovations Association FRUCT. Ed. by Sergey Balandin, Yevgeni Koucheryavy, and Tatiana Tyutina. Vol. 1. Tampere, Finland: FRUCT Oy & IEEE, May 2021, pp. 206–213. [PDF] [PDF at FRUCT]

[8] Tuomo Sipola and Tero Kokkonen. “One-pixel attacks against medical imaging: a conceptual framework.” In: Trends and Applications in Information Systems and Technologies. WorldCIST 2021. Ed. by Álvaro Rocha, Hojjat Adeli, Gintautas Dzemyda, Fernando Moreira, and Ana Maria Ramalho Correia. Vol. 1. Advances in Intelligent Systems and Computing 1365. Cham, Switzerland: Springer, 2021, pp. 197–203. [PDF]

[7] Tuomo Sipola, Samir Puuska, and Tero Kokkonen. “Model fooling attacks against medical imaging: a short survey.” In: Information & Security: An International Journal (DIGILIENCE 2020: Governance, Human Factors, Cyber Awareness) 46.2 (2020), pp. 215–224. [PDF]

[6] Tuomo Sipola, Fengyu Cong, Tapani Ristaniemi, Vinoo Alluri, Petri Toiviainen, Elvira Brattico, and Asoke K. Nandi. “Diffusion map for clustering fMRI spatial maps extracted by independent component analysis.” In: Machine Learning for Signal Processing (MLSP), 2013 IEEE International Workshop on. Southampton, United Kingdom: IEEE, Sept. 2013. [PDF] [arXiv]

[5] Antti Juvonen and Tuomo Sipola. “Combining conjunctive rule extraction with diffusion maps for network intrusion detection.” In: The Eighteenth IEEE Symposium on Computers and Communications (ISCC 2013). Split, Croatia, July 2013, pp. 411–416. [PDF]

[4] Yaniv Shmueli, Tuomo Sipola, Gil Shabat, and Amir Averbuch. “Using affinity perturbations to detect web traffic anomalies.” In: Proceedings of the 10th International Conference on Sampling Theory and Applications (SampTA). Bremen, Germany: EURASIP, July 2013, pp. 444–447. [PDF]

[3] Antti Juvonen and Tuomo Sipola. “Adaptive framework for network traffic classification using dimensionality reduction and clustering.” In: Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2012 4th International Congress on. St. Petersburg, Russia: IEEE, Oct. 2012, pp. 274–279. [PDF]

[2] Tuomo Sipola, Antti Juvonen, and Joel Lehtonen. “Anomaly detection from network logs using diffusion maps.” In: Engineering Applications of Neural Networks. Ed. by Lazaros Iliadis and Chrisina Jayne. Vol. 363. IFIP Advances in Information and Communication Technology. Heidelberg: Springer, 2011, pp. 172–181. [PDF]

[1] Fengyu Cong, Tuomo Sipola, Xiaonan Xu, Tiina Huttunen-Scott, Heikki Lyytinen, and Tapani Ristaniemi. “Concatenated trial based Hilbert-Huang transformation on event-related potentials.” In: Proc. International Joint Conference on Neural Networks 2010 (IEEE World Congress on Computational Intelligence). 2010, pp. 1379–1383.

In collections

[3] Tero Kokkonen, Tuomo Sipola, Jani Päijänen, and Juha Piispanen. 2023. “Cyber range technical federation: Case Flagship 1 exercise.” In: Collaborative Approaches for Cyber Security in Cyber-Physical Systems. Ed. by Theo Dimitrakos, Javier Lopez, and Fabio Martinelli. Advanced Sciences and Technologies for Security Applications. Cham, Switzerland: Springer, pp. 1–13.

[2] Tuomo Sipola, Tero Kokkonen and Mika Karjalainen. “Model fooling threats against medical imaging.” In: Artificial Intelligence and Cybersecurity. Theory and Applications. Ed. by Tuomo Sipola, Tero Kokkonen, and Mika Karjalainen. Cham, Switzerland: Springer, 2022, pp. 291–301. [PDF]

[1] Tuomo Sipola. “Knowledge discovery from network logs.” In: Cyber Security: Analytics, Technology and Automation. Ed. by Martti Lehto and Pekka Neittaanmäki. Vol. 78. Intelligent Systems, Control and Automation: Science and Engineering. Berlin, Heidelberg: Springer, 2015. Chap. 12, pp. 195–203. [PDF at JYX]

Technical reports, abstracts and preprints

[7] Tuomo Sipola, Tero Kokkonen, Markku Puura, Kalle-Eemeli Riuttanen, Kari Pitkäniemi, Elina Juutilainen, and Teemu Kontio. 2023. “Digital Twin of Food Supply Chain.” In: Automaatiopäivät 2023, Automation Days 2023, Extended Abstracts. Ed. by Seppo Sierla and David Hästbacka. Extended abstract. Helsinki, Finland: Suomen Automaatioseura ry (SAS) – Finnish Society of Automation (FSA), pp. 58–59. ISBN: 978-952-5183-62-7.

[6] Teemu Niskanen, Tuomo Sipola, and Olli Väänänen. Latest Trends in Artificial Intelligence Technology: A Scoping Review. arXiv:2305.04532 [cs.LG]. 2023. [arXiv]

[5] Karo Saharinen, Tuomo Sipola, and Tero Kokkonen. 2022. “Cybersecurity education in universities of applied sciences.” In: Development Needs in Cybersecurity Education: Final report of the project. Ed. by Martti Lehto. Informaatioteknologian tiedekunnan julkaisuja 96. Translation. (Original work published in 2022). Jyväskylä: University of Jyväskylä, pp. 59–75. ISBN: 978-951-39-9469-3. [PDF at JYX]

[4] Karo Saharinen, Tuomo Sipola, and Tero Kokkonen. 2022. “Kyberturvallisuuden opetus ammattikorkeakouluissa.” In: Kyberturvallisuuden koulutusohjelman muutostarpeiden tutkimus – hankkeen loppuraportti. Ed. by Martti Lehto. Informaatioteknologian tiedekunnan julkaisuja 93. Jyväskylä: Jyväskylän yliopisto, pp. 56–72. ISBN: 978-951-39-9336-8. [PDF at JYX]

[3] Tuomas Puoliväli, Tuomo Sipola, Anja Thiede, Marina Kliuchko, Brigitte Bogert, Petri Toiviainen, Asoke K Nandi, Lauri Parkkonen, Elvira Brattico, Tapani Ristaniemi, and Tiina Parviainen. Musicianship can be decoded from magnetic resonance images. bioRxiv. 2021. [PDF]

[2] Antti Juvonen and Tuomo Sipola. Anomaly detection framework using rule extraction for efficient intrusion detection. arXiv:1410.7709 [cs.LG]. 2014. [PDF] [arXiv]

[1] Tuomo Sipola, Tapani Ristaniemi, and Amir Averbuch. Gear classification and fault detection using a diffusion map framework. Reports of the Department of Mathematical Information Technology Series B. Scientific Computing, No. B 6/2013, University of Jyväskylä. 2013. [PDF]

Edited books

[2] Tuomo Sipola, Janne Alatalo, Monika Wolfmayr, and Tero Kokkonen, eds. 2024. Artificial Intelligence for Security. Enhancing Protection in a Changing World. Cham, Switzerland: Springer. ISBN: 978-3-031-57451-1.

[1] Tuomo Sipola, Tero Kokkonen, and Mika Karjalainen, eds. 2023. Artificial Intelligence and Cybersecurity. Theory and Applications. Cham, Switzerland: Springer. ISBN: 978-3-031-15029-6.

Theses

[3] Master’s thesis Eeppinen vertaus runoelmassa Ilias Latina about epic similes in the Latin poem Ilias Latina. 2020. [PDF]

[2] Doctoral dissertation Knowledge discovery using diffusion maps about analysis of high-dimensional datasets. 2013. [PDF]

[1] Master’s thesis Applying Hilbert-Huang Transform to Mismatch Negativity about advanced EEG signal processing. 2009. [PDF]

Index | Last changed 2024-09-09