Search Results - "Fawaz, Kassem"
-
1
Security and Privacy in the Internet of Things
Published in Computer (Long Beach, Calif.) (01-04-2019)“…Although the Internet of Things (IoT) computing paradigm is promising new applications, it introduces unprecedented security and privacy threats to individuals…”
Get full text
Journal Article -
2
D4: Detection of Adversarial Diffusion Deepfakes Using Disjoint Ensembles
Published in 2024 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) (03-01-2024)“…Detecting diffusion-generated deepfake images remains an open problem. Current detection methods fail against an adversary who adds imperceptible adversarial…”
Get full text
Conference Proceeding -
3
"It's up to the Consumer to be Smart": Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit
Published in 2023 IEEE Symposium on Security and Privacy (SP) (01-05-2023)“…Smart home technologies offer many benefits to users. Yet, they also carry complex security and privacy implications that users often struggle to assess and…”
Get full text
Conference Proceeding -
4
Speed Trap Optimal Patrolling: STOP Playing Stackelberg Security Games
Published in Wireless personal communications (01-02-2018)“…During 2015, 35,092 people died in motor vehicle crashes on the U.S. roadways, an increase from 32,744 in 2014. The 7.2% increase is the largest percentage…”
Get full text
Journal Article -
5
I Know Your Triggers: Defending Against Textual Backdoor Attacks with Benign Backdoor Augmentation
Published in MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) (28-11-2022)“…A backdoor attack seeks to introduce a backdoor into a machine learning model during training. A backdoored model performs normally on regular inputs but…”
Get full text
Conference Proceeding -
6
Tubes among us: Analog attack on automatic speaker identification
Published in The Journal of the Acoustical Society of America (01-03-2024)“…Recent years have seen a surge in the popularity of acoustics-enabled personal devices powered by machine learning. Yet, machine learning has proven to be…”
Get full text
Journal Article -
7
Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box Attacks
Published 26-09-2023“…Recent work has proposed stateful defense models (SDMs) as a compelling strategy to defend against a black-box attacker who only has query access to the model,…”
Get full text
Journal Article -
8
SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks
Published 16-12-2022“…Voice assistants are deployed widely and provide useful functionality. However, recent work has shown that commercial systems like Amazon Alexa and Google Home…”
Get full text
Journal Article -
9
Exploring the Interplay Between Interaction Experience and Security Perception of Payment Authentication in Virtual Reality
Published in 2024 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW) (16-03-2024)“…Users embrace the rapid development of virtual reality (VR) technology for everyday settings. These settings include payment, which makes user authentication…”
Get full text
Conference Proceeding -
10
I see an IC: A Mixed-Methods Approach to Study Human Problem-Solving Processes in Hardware Reverse Engineering
Published 23-02-2024“…Trust in digital systems depends on secure hardware, often assured through Hardware Reverse Engineering (HRE). This work develops methods for investigating…”
Get full text
Journal Article -
11
Activate the interior design and furniture system to achieve safe housing from earthquakes
Published in Majallat al-turāth wa-al-taṣmīm (01-08-2024)“…Based on the importance of achieving a safe environment at home from the dangers of earthquakes, which in turn occur suddenly, so, the house had to be equipped…”
Get full text
Journal Article -
12
The effect of activating the maximum use of modern technologies in the interactive kitchen to provide spatial space in house
Published in Majallat al-turāth wa-al-taṣmīm (01-08-2024)“…The smart technologies of the digital revolution have penetrated all different fields of life. As a reflection of that, "smart architecture" appeared on the…”
Get full text
Journal Article -
13
Invited Paper: The Applications of Machine Learning in Privacy Notice and Choice
Published in 2019 11th International Conference on Communication Systems & Networks (COMSNETS) (01-01-2019)“…For more than two decades since the rise of the World Wide Web, the "Notice and Choice" framework has been the governing practice for the disclosure of online…”
Get full text
Conference Proceeding -
14
A Picture is Worth 500 Labels: A Case Study of Demographic Disparities in Local Machine Learning Models for Instagram and TikTok
Published in 2024 IEEE Symposium on Security and Privacy (SP) (19-05-2024)“…Mobile apps have embraced user privacy by moving their data processing to the user's smartphone. Advanced machine learning (ML) models, such as vision models,…”
Get full text
Conference Proceeding -
15
A fast HTML web page change detection approach based on hashing and reducing the number of similarity computations
Published in Data & knowledge engineering (01-08-2008)“…This paper describes a fast HTML web page detection approach that saves computation time by limiting the similarity computations between two versions of a web…”
Get full text
Journal Article -
16
PBCOV: a property-based coverage criterion
Published in Software quality journal (01-03-2015)“…Coverage criteria aim at satisfying test requirements and compute metrics values that quantify the adequacy of test suites at revealing defects in programs…”
Get full text
Journal Article -
17
Improving vehicular safety message delivery through the implementation of a cognitive vehicular network
Published in Ad hoc networks (01-11-2013)“…The Wireless Access in Vehicular Environments (WAVE) protocol stack has been recently defined to enable vehicular communication on the Dedicated Short Range…”
Get full text
Journal Article -
18
Reliable Heading Tracking for Pedestrian Road Crossing Prediction Using Commodity Devices
Published 08-10-2024“…Pedestrian heading tracking enables applications in pedestrian navigation, traffic safety, and accessibility. Previous works, using inertial sensor fusion or…”
Get full text
Journal Article -
19
A proxy-based architecture for dynamic discovery and invocation of web services from mobile devices
Published in IEEE transactions on services computing (01-01-2012)“…Mobile devices are getting more pervasive, and it is becoming increasingly necessary to integrate web services into applications that run on these devices. We…”
Get full text
Journal Article -
20
CRUST: Implementation of clustering and routing functions for mobile ad hoc networks using reactive tuple-spaces
Published in Ad hoc networks (01-08-2009)“…This work builds on the LIME (Linda in mobile environment) tuple space framework to implement a system that offers clustering and routing capabilities for…”
Get full text
Journal Article