关注
William Aiken
William Aiken
在 uottawa.ca 的电子邮件经过验证
标题
引用次数
引用次数
年份
Cloud security auditing: challenges and emerging approaches
J Ryoo, S Rizvi, W Aiken, J Kissell
IEEE Security & Privacy 12 (6), 68-74, 2013
962013
Neural network laundering: Removing black-box backdoor watermarks from deep neural networks
W Aiken, H Kim, S Woo, J Ryoo
Computers & Security 106, 102277, 2021
762021
A security evaluation framework for cloud security auditing
S Rizvi, J Ryoo, J Kissell, W Aiken, Y Liu
The Journal of Supercomputing 74, 5774-5796, 2018
412018
POSTER: DeepCRACk: Using deep learning to automatically crack audio CAPTCHAs
W Aiken, H Kim
Proceedings of the 2018 on Asia conference on computer and communications …, 2018
132018
POSTER: I Can't Hear This Because I Am Human: A Novel Design of Audio CAPTCHA System
J Choi, T Oh, W Aiken, SS Woo, H Kim
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
112018
LightLock: User identification system using light intensity readings on smartphones
MA Alawami, W Aiken, H Kim
IEEE Sensors Journal 20 (5), 2710-2721, 2019
82019
Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin'Forks' in the Wild
J Choi, W Choi, W Aiken, H Kim, JH Huh, T Kim, Y Kim, R Anderson
arXiv preprint arXiv:2201.08678, 2022
72022
Bypassing the integrity checking of rights objects in OMA DRM: A case study with the MelOn music service
J Choi, W Aiken, J Ryoo, H Kim
Proceedings of the 10th International Conference on Ubiquitous Information …, 2016
72016
The Light Will Be with You. Always--A Novel Continuous Mobile Authentication with the Light Sensor (poster)
MA Alawami, W Aiken, H Kim
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
62019
Hey Siri–Are You There?: Jamming of Voice Commands Using the Resonance Effect (Work-in-Progress)
T Oh, W Aiken, H Kim
2018 International Conference on Software Security and Assurance (ICSSA), 73-76, 2018
42018
An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks
W Aiken, H Kim, J Ryoo, MB Rosson
2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-6, 2018
32018
KaaSP: keying as a service provider for small and medium enterprises using untrusted cloud services
W Aiken, J Ryoo, H Kim
Proceedings of the 9th International Conference on Ubiquitous Information …, 2015
32015
Measuring Improvement of F-Scores in Detection of Self-Admitted Technical Debt
W Aiken, PK Mvula, P Branco, GV Jourdan, M Sabetzadeh, H Viktor
arXiv preprint arXiv:2303.09617, 2023
22023
An Internet of Things (IoT) Security Assessment for Households
W Aiken, J Ryoo, S Rizvi
2020 International Conference on Software Security and Assurance (ICSSA), 53-59, 2020
22020
Information Systems Security Readiness Assessment for Municipalities in Pennsylvania
J Ryoo, S Rizvi, W Aiken, B Long-Yarrison
22020
Ignore the Noise: Using Autoencoders against Adversarial Attacks in Reinforcement Learning (Lightning Talk)
W Aiken, H Kim
2018 International Conference on Software Security and Assurance (ICSSA), 81-81, 2018
12018
Hey Siri–are you there?: Jamming of voice commands using the resonance effect
T Oh, W Aiken, H Kim
1
Strategic Digitalization in Oil and Gas: A Case Study on Mixed Reality and Digital Twins
W Aiken, L Carden, A Bhabhrawala, P Branco, GV Jourdan, A Berg
IEEE Access, 2024
2024
Going Haywire: False Friends in Federated Learning and How to Find Them
W Aiken, P Branco, GV Jourdan
Proceedings of the 2023 ACM Asia Conference on Computer and Communications …, 2023
2023
Featured: More
W Aiken, J Kissell, J Ryoo, S Rizvi
系统目前无法执行此操作,请稍后再试。
文章 1–20