Privacy in repair: An analysis of the privacy challenges surrounding broken digital artifacts in bangladesh SI Ahmed, S Guha, MR Rifat, FH Shezan, N Dell Proceedings of the Eighth International Conference on Information and …, 2016 | 49 | 2016 |
Vulnerability detection in recent Android apps: An empirical study FH Shezan, SF Afroze, A Iqbal 2017 International Conference on Networking, Systems and Security (NSysS), 55-63, 2017 | 36 | 2017 |
Using sonar for liveness detection to protect smart speakers against remote attackers Y Lee, Y Zhao, J Zeng, K Lee, N Zhang, FH Shezan, Y Tian, K Chen, ... Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020 | 33 | 2020 |
Read between the lines: An empirical measurement of sensitive applications of voice personal assistant systems FH Shezan, H Hu, J Wang, G Wang, Y Tian Proceedings of the Web Conference 2020, 1006-1017, 2020 | 31 | 2020 |
Verhealth: Vetting medical voice applications through policy enforcement FH Shezan, H Hu, G Wang, Y Tian Proceedings of the ACM on interactive, mobile, wearable and ubiquitous …, 2020 | 18 | 2020 |
Side channel attacks in computation offloading systems with gpu virtualization S Liu, Y Wei, J Chi, FH Shezan, Y Tian 2019 IEEE Security and Privacy Workshops (SPW), 156-161, 2019 | 13 | 2019 |
TKPERM: cross-platform permission knowledge transfer to detect overprivileged third-party applications FH Shezan, K Cheng, Z Zhang, Y Cao, Y Tian Network and Distributed Systems Security (NDSS) Symposium, 2020 | 12 | 2020 |
Breaking down the defenses: A comparative survey of attacks on large language models AG Chowdhury, MM Islam, V Kumar, FH Shezan, V Jain, A Chadha arXiv preprint arXiv:2403.04786, 2024 | 7 | 2024 |
Detecting abnormal behaviors in smart home Y Yu, C Li, MA Jonas, C Ma, FH Shezan, S Shen, P Gao, Y Tian 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems …, 2019 | 7 | 2019 |
Privacy vulnerabilities in the practices of repairing broken digital artifacts in Bangladesh S Guha, MR Rifat, FH Shezan, N Dell Information Technologies and International Development, 2017 | 7 | 2017 |
The development of low cost exercise monitoring device for paralytic SS Rahman, SS Nusaka, FH Shezan, MAR Sarkar 2015 IEEE International WIE Conference on Electrical and Computer …, 2015 | 7 | 2015 |
Side channel attacks in computation offloading systems with gpu virtualization. In 2019 IEEE Security and Privacy Workshops (SPW) S Liu, Y Wei, J Chi, FH Shezan, Y Tian San Francisco, CA, USA, 156-161, 2019 | 6 | 2019 |
Categorizing defects in infrastructure as code A Rahman, S Elder, FH Shezan, V Frost, J Stallings, LA Williams North Carolina State University. Dept. of Computer Science, 2019 | 5 | 2019 |
High Performance Approximate Computing by Adaptive Relaxed Synchronization B Islam, FH Shezan, R Shahriyar 2016 IEEE 18th International Conference on High Performance Computing and …, 2016 | 4 | 2016 |
Towards Usable Security Analysis Tools for {Trigger-Action} Programming MK McCall, E Zeng, FH Shezan, M Yang, L Bauer, A Bichhawat, C Cobb, ... Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 301-320, 2023 | 3 | 2023 |
NL2GDPR: Automatically develop GDPR compliant Android application features from natural language FH Shezan, Y Lao, M Peng, X Wang, M Sun, P Li 2022 IEEE Conference on Communications and Network Security (CNS), 1-9, 2022 | 3 | 2022 |
Perception hacking for 2D cursorjacking in virtual reality Z Su, FH Shezan, Y Tian, D Evans, S Heo Proceedings of the 1st Workshop on Novel Challenges of Safety, Security and …, 2022 | 2 | 2022 |
SAFETAP: An Efficient Incremental Analyzer for Trigger-Action Programs MK McCall, FH Shezan, A Bichhawat, C Cobb, L Jia, Y Tian, C Grace, ... Carnegie Mellon University, 2021 | 2 | 2021 |
Bugs in infrastructure as code A Rahman, S Elder, FH Shezan, V Frost, J Stallings, L Williams arXiv preprint arXiv:1809.07937, 2018 | 2 | 2018 |
ICTD 2016| Privacy in Repair: An Analysis of the Privacy Challenges Surrounding Broken Digital Artifacts in Bangladesh SI Ahmed, S Guha, MR Rifat, FH Shezan, N Dell Information Technologies & International Development 13, 14, 2017 | 2 | 2017 |