Search Results - "Fawaz, Kassem"

Refine Results
  1. 1

    Security and Privacy in the Internet of Things by Fawaz, Kassem, Shin, Kang G.

    Published in Computer (Long Beach, Calif.) (01-04-2019)
    “…Although the Internet of Things (IoT) computing paradigm is promising new applications, it introduces unprecedented security and privacy threats to individuals…”
    Get full text
    Journal Article
  2. 2

    D4: Detection of Adversarial Diffusion Deepfakes Using Disjoint Ensembles by Hooda, Ashish, Mangaokar, Neal, Feng, Ryan, Fawaz, Kassem, Jha, Somesh, Prakash, Atul

    “…Detecting diffusion-generated deepfake images remains an open problem. Current detection methods fail against an adversary who adds imperceptible adversarial…”
    Get full text
    Conference Proceeding
  3. 3

    "It's up to the Consumer to be Smart": Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit by Li, Jingjie, Sun, Kaiwen, Huff, Brittany Skye, Bierley, Anna Marie, Kim, Younghyun, Schaub, Florian, Fawaz, Kassem

    “…Smart home technologies offer many benefits to users. Yet, they also carry complex security and privacy implications that users often struggle to assess and…”
    Get full text
    Conference Proceeding
  4. 4

    Speed Trap Optimal Patrolling: STOP Playing Stackelberg Security Games by Naja, Rola, Mouawad, Nadia, Ghandour, Ali J., Fawaz, Kassem

    Published in Wireless personal communications (01-02-2018)
    “…During 2015, 35,092 people died in motor vehicle crashes on the U.S. roadways, an increase from 32,744 in 2014. The 7.2% increase is the largest percentage…”
    Get full text
    Journal Article
  5. 5

    I Know Your Triggers: Defending Against Textual Backdoor Attacks with Benign Backdoor Augmentation by Gao, Yue, Stokes, Jack W., Prasad, Manoj Ajith, Marshall, Andrew T., Fawaz, Kassem, Kiciman, Emre

    “…A backdoor attack seeks to introduce a backdoor into a machine learning model during training. A backdoored model performs normally on regular inputs but…”
    Get full text
    Conference Proceeding
  6. 6

    Tubes among us: Analog attack on automatic speaker identification by Fawaz, Kassem, Ahmed, Shimaa

    “…Recent years have seen a surge in the popularity of acoustics-enabled personal devices powered by machine learning. Yet, machine learning has proven to be…”
    Get full text
    Journal Article
  7. 7

    Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box Attacks by Feng, Ryan, Hooda, Ashish, Mangaokar, Neal, Fawaz, Kassem, Jha, Somesh, Prakash, Atul

    Published 26-09-2023
    “…Recent work has proposed stateful defense models (SDMs) as a compelling strategy to defend against a black-box attacker who only has query access to the model,…”
    Get full text
    Journal Article
  8. 8

    SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks by Hooda, Ashish, Wallace, Matthew, Jhunjhunwalla, Kushal, Fernandes, Earlence, Fawaz, Kassem

    Published 16-12-2022
    “…Voice assistants are deployed widely and provide useful functionality. However, recent work has shown that commercial systems like Amazon Alexa and Google Home…”
    Get full text
    Journal Article
  9. 9
  10. 10

    I see an IC: A Mixed-Methods Approach to Study Human Problem-Solving Processes in Hardware Reverse Engineering by Walendy, René, Weber, Markus, Li, Jingjie, Becker, Steffen, Wiesen, Carina, Elson, Malte, Kim, Younghyun, Fawaz, Kassem, Rummel, Nikol, Paar, Christof

    Published 23-02-2024
    “…Trust in digital systems depends on secure hardware, often assured through Hardware Reverse Engineering (HRE). This work develops methods for investigating…”
    Get full text
    Journal Article
  11. 11

    Activate the interior design and furniture system to achieve safe housing from earthquakes by Dr. Radwa Fathy Fawaz Kassem

    Published in Majallat al-turāth wa-al-taṣmīm (01-08-2024)
    “…Based on the importance of achieving a safe environment at home from the dangers of earthquakes, which in turn occur suddenly, so, the house had to be equipped…”
    Get full text
    Journal Article
  12. 12

    The effect of activating the maximum use of modern technologies in the interactive kitchen to provide spatial space in house by Dr. Radwa Fathy Fawaz Kassem

    Published in Majallat al-turāth wa-al-taṣmīm (01-08-2024)
    “…The smart technologies of the digital revolution have penetrated all different fields of life. As a reflection of that, "smart architecture" appeared on the…”
    Get full text
    Journal Article
  13. 13

    Invited Paper: The Applications of Machine Learning in Privacy Notice and Choice by Fawaz, Kassem, Linden, Thomas, Harkous, Hamza

    “…For more than two decades since the rise of the World Wide Web, the "Notice and Choice" framework has been the governing practice for the disclosure of online…”
    Get full text
    Conference Proceeding
  14. 14

    A Picture is Worth 500 Labels: A Case Study of Demographic Disparities in Local Machine Learning Models for Instagram and TikTok by West, Jack, Thiemt, Lea, Ahmed, Shimaa, Bartig, Maggie, Fawaz, Kassem, Banerjee, Suman

    “…Mobile apps have embraced user privacy by moving their data processing to the user's smartphone. Advanced machine learning (ML) models, such as vision models,…”
    Get full text
    Conference Proceeding
  15. 15

    A fast HTML web page change detection approach based on hashing and reducing the number of similarity computations by Artail, Hassan, Fawaz, Kassem

    Published in Data & knowledge engineering (01-08-2008)
    “…This paper describes a fast HTML web page detection approach that saves computation time by limiting the similarity computations between two versions of a web…”
    Get full text
    Journal Article
  16. 16

    PBCOV: a property-based coverage criterion by Fawaz, Kassem, Zaraket, Fadi, Masri, Wes, Harkous, Hamza

    Published in Software quality journal (01-03-2015)
    “…Coverage criteria aim at satisfying test requirements and compute metrics values that quantify the adequacy of test suites at revealing defects in programs…”
    Get full text
    Journal Article
  17. 17

    Improving vehicular safety message delivery through the implementation of a cognitive vehicular network by Ghandour, Ali J., Fawaz, Kassem, Artail, Hassan, Di Felice, Marco, Bononi, Luciano

    Published in Ad hoc networks (01-11-2013)
    “…The Wireless Access in Vehicular Environments (WAVE) protocol stack has been recently defined to enable vehicular communication on the Dedicated Short Range…”
    Get full text
    Journal Article
  18. 18

    Reliable Heading Tracking for Pedestrian Road Crossing Prediction Using Commodity Devices by Yang, Yucheng, Li, Jingjie, Fawaz, Kassem

    Published 08-10-2024
    “…Pedestrian heading tracking enables applications in pedestrian navigation, traffic safety, and accessibility. Previous works, using inertial sensor fusion or…”
    Get full text
    Journal Article
  19. 19

    A proxy-based architecture for dynamic discovery and invocation of web services from mobile devices by Artail, H., Fawaz, K., Ghandour, A.

    Published in IEEE transactions on services computing (01-01-2012)
    “…Mobile devices are getting more pervasive, and it is becoming increasingly necessary to integrate web services into applications that run on these devices. We…”
    Get full text
    Journal Article
  20. 20

    CRUST: Implementation of clustering and routing functions for mobile ad hoc networks using reactive tuple-spaces by Artail, Hassan, Antoun, Rula, Fawaz, Kassem

    Published in Ad hoc networks (01-08-2009)
    “…This work builds on the LIME (Linda in mobile environment) tuple space framework to implement a system that offers clustering and routing capabilities for…”
    Get full text
    Journal Article