Adaptive fingerprinting: Website fingerprinting over few encrypted traffic C Wang, J Dani, X Li, X Jia, B Wang Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021 | 36 | 2021 |
Tripletpower: Deep-learning side-channel attacks over few traces C Wang, J Dani, S Reilly, A Brownfield, B Wang, JM Emmert 2023 IEEE International Symposium on Hardware Oriented Security and Trust …, 2023 | 6 | 2023 |
HiddenText: Cross-trace website fingerprinting over encrypted traffic J Dani, B Wang 2021 IEEE 22nd International Conference on Information Reuse and Integration …, 2021 | 4 | 2021 |
Advtraffic: Obfuscating encrypted traffic with adversarial examples H Liu, J Dani, H Yu, W Sun, B Wang 2022 IEEE/ACM 30th International Symposium on Quality of Service (IWQoS), 1-10, 2022 | 2 | 2022 |
When AI Defeats Password Deception! A Deep Learning Framework to Distinguish Passwords and Honeywords J Dani, B McCulloh, N Saxena arXiv preprint arXiv:2407.16964, 2024 | | 2024 |
Is On-Device AI Broken and Exploitable? Assessing the Trust and Ethics in Small Language Models K Nakka, J Dani, N Saxena arXiv preprint arXiv:2406.05364, 2024 | | 2024 |
Breaking Indistinguishability with Transfer Learning: A First Look at SPECK32/64 Lightweight Block Ciphers J Dani, K Nakka, N Saxena arXiv preprint arXiv:2405.19683, 2024 | | 2024 |
Detecting plant phenotypes from 3D point cloud data J Dani Texas A&M University-Corpus Christi, 2019 | | 2019 |
2021 IEEE 22nd International Conference on Information Reuse and Integration for Data Science (IRI)| 978-1-6654-3875-9/21/$31.00© 2021 IEEE| DOI: 10.1109/IRI51335. 2021.00070 HA Abbas, Z Ailsworth, SA Ajila, K Akkaya, R Alsabet, A Alshaikh, ... | | |