Cloud security auditing: challenges and emerging approaches J Ryoo, S Rizvi, W Aiken, J Kissell IEEE Security & Privacy 12 (6), 68-74, 2013 | 96 | 2013 |
Neural network laundering: Removing black-box backdoor watermarks from deep neural networks W Aiken, H Kim, S Woo, J Ryoo Computers & Security 106, 102277, 2021 | 76 | 2021 |
A security evaluation framework for cloud security auditing S Rizvi, J Ryoo, J Kissell, W Aiken, Y Liu The Journal of Supercomputing 74, 5774-5796, 2018 | 41 | 2018 |
POSTER: DeepCRACk: Using deep learning to automatically crack audio CAPTCHAs W Aiken, H Kim Proceedings of the 2018 on Asia conference on computer and communications …, 2018 | 13 | 2018 |
POSTER: I Can't Hear This Because I Am Human: A Novel Design of Audio CAPTCHA System J Choi, T Oh, W Aiken, SS Woo, H Kim Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 11 | 2018 |
LightLock: User identification system using light intensity readings on smartphones MA Alawami, W Aiken, H Kim IEEE Sensors Journal 20 (5), 2710-2721, 2019 | 8 | 2019 |
Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin'Forks' in the Wild J Choi, W Choi, W Aiken, H Kim, JH Huh, T Kim, Y Kim, R Anderson arXiv preprint arXiv:2201.08678, 2022 | 7 | 2022 |
Bypassing the integrity checking of rights objects in OMA DRM: A case study with the MelOn music service J Choi, W Aiken, J Ryoo, H Kim Proceedings of the 10th International Conference on Ubiquitous Information …, 2016 | 7 | 2016 |
The Light Will Be with You. Always--A Novel Continuous Mobile Authentication with the Light Sensor (poster) MA Alawami, W Aiken, H Kim Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019 | 6 | 2019 |
Hey Siri–Are You There?: Jamming of Voice Commands Using the Resonance Effect (Work-in-Progress) T Oh, W Aiken, H Kim 2018 International Conference on Software Security and Assurance (ICSSA), 73-76, 2018 | 4 | 2018 |
An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks W Aiken, H Kim, J Ryoo, MB Rosson 2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-6, 2018 | 3 | 2018 |
KaaSP: keying as a service provider for small and medium enterprises using untrusted cloud services W Aiken, J Ryoo, H Kim Proceedings of the 9th International Conference on Ubiquitous Information …, 2015 | 3 | 2015 |
Measuring Improvement of F-Scores in Detection of Self-Admitted Technical Debt W Aiken, PK Mvula, P Branco, GV Jourdan, M Sabetzadeh, H Viktor arXiv preprint arXiv:2303.09617, 2023 | 2 | 2023 |
An Internet of Things (IoT) Security Assessment for Households W Aiken, J Ryoo, S Rizvi 2020 International Conference on Software Security and Assurance (ICSSA), 53-59, 2020 | 2 | 2020 |
Information Systems Security Readiness Assessment for Municipalities in Pennsylvania J Ryoo, S Rizvi, W Aiken, B Long-Yarrison | 2 | 2020 |
Ignore the Noise: Using Autoencoders against Adversarial Attacks in Reinforcement Learning (Lightning Talk) W Aiken, H Kim 2018 International Conference on Software Security and Assurance (ICSSA), 81-81, 2018 | 1 | 2018 |
Hey Siri–are you there?: Jamming of voice commands using the resonance effect T Oh, W Aiken, H Kim | 1 | |
Strategic Digitalization in Oil and Gas: A Case Study on Mixed Reality and Digital Twins W Aiken, L Carden, A Bhabhrawala, P Branco, GV Jourdan, A Berg IEEE Access, 2024 | | 2024 |
Going Haywire: False Friends in Federated Learning and How to Find Them W Aiken, P Branco, GV Jourdan Proceedings of the 2023 ACM Asia Conference on Computer and Communications …, 2023 | | 2023 |
Featured: More W Aiken, J Kissell, J Ryoo, S Rizvi | | |