See No Evil: Phishing for Permissions with False Transparency

See No Evil: Phishing for Permissions with False Transparency.
G├╝liz Seray Tuncay, Jingyu Qian. and Carl A. Gunter.
USENIX Security Symposium, August, 2020.

Last updated on Saturday, May 22, 2021, 4:03 pm

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition.
Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, Carl A. Gunter.
USENIX Security, Baltimore, MD, 2018.

Last updated on Saturday, May 22, 2021, 6:25 pm

CoDrive: Improving Automobile Positioning via Collaborative Driving

CoDrive: Improving Automobile Positioning via Collaborative Driving,
Soteris Demetriou, Puneet Jain, Kyu-Han Kim.
IEEE International Conference on Computer Communications (INFOCOM 18′), Honolulu, HI, April 2018.

Last updated on Sunday, June 3, 2018, 7:47 pm

Ghost Installer in the Shadow: Security Analysis of App Installation on Android

Ghost Installer in the Shadow: Security Analysis of App Installation on Android
Yeonjoon Lee, Tongxin Li, Nan Zhang; Soteris Demetriou, Mingming Zha, XiaoFeng Wang, Kai Chen; Xiaoyong Zhou; Xinhui Han, Michael Grace
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 17′), Denver, CO, June 2017.

Last updated on Tuesday, January 2, 2018, 9:27 am

GB-PANDAS: Throughput and heavy-traffic optimality analysis for affinity scheduling

GB-PANDAS: Throughput and heavy-traffic optimality analysis for affinity scheduling,
Ali Yekkehkhany, Avesta Hojjati, Mohammad H Hajiesmaili.
The 35th International Symposium on Computer Performance, Modeling, Measurements and Evaluation (IFIP 2017), Columbus, NY, November 2017.

Last updated on Friday, December 29, 2017, 1:05 pm

CamForensics: Understanding Visual Privacy Leaks in the Wild

CamForensics: Understanding Visual Privacy Leaks in the Wild,
Animesh Srivastava, Puneet Jain, Soteris Demetriou, Landon Cox, Kyu-Han Kim.
ACM Embedded Networked Sensor Systems (SenSys ’17), November 2017.


Last updated on Sunday, May 23, 2021, 9:13 am

VISUALIZATION AND DIFFERENTIAL PRIVACY

Visualization and Differential Privacy,
Hyun Bin Lee.
Master of Science Thesis, University of Illinois at Urbana-Champaign, July 2017.

Last updated on Sunday, August 6, 2017, 2:36 pm

Side-Channel Attacks on Shared Search Indexes

Side-Channel Attacks on Shared Search Indexes
Liang Wang, Paul Grubbs, Jiahui Lu, Vincent Bindschaedler, David Cash, and Thomas Ristenpart
In IEEE Security & Privacy (Oakland) 2017.

Last updated on Tuesday, January 2, 2018, 9:38 am

Leakage-Abuse Attacks against Order-Revealing Encryption

Leakage-Abuse Attacks against Order-Revealing Encryption
Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, and Thomas Ristenpart
In IEEE Security & Privacy (Oakland) 2017.

Last updated on Tuesday, January 2, 2018, 9:35 am

LSTM AND EXTENDED DEAD RECKONING AUTOMOBILE ROUTE PREDICTION USING SMARTPHONE SENSORS

LSTM and Extended Dead Reckoning Automobile Route Prediction Using Smartphone Sensors,
Ryan Freedman,
Master of Science Thesis, University of Illinois at Urbana-Champaign, May 2017.

Last updated on Sunday, August 6, 2017, 2:32 pm