Undergraduate Research Posters |
# |
Presenters |
Title |
Award # |
1 |
Ranuli Abeysinghe |
Hash functions: Properties, an Attack, and an Application |
1652474 |
2 |
Dennis Afanasev |
Secure and Scalable Network Packet Processing Using OpenNetVM and mTCP |
1814234 |
3 |
Zaina Aljallad |
Co-Designing for Community Oversight: Helping People Make Privacy and Security Decisions Together |
|
4 |
Trevor Ammons & Trent Callahan |
Side-Channel Attack Evaluation of Post-Quantum Cryptographic Algorithms and Architectures |
1801488 |
5 |
Samantha Aziz |
Eye Movement Driven Authentication in Virtual Reality |
1250718 |
6 |
William Barnhart |
Capacity-achieving Schemes for Private Information Retrieval with Multi-user Collusion |
1704274 |
7 |
Rachel Bleiman |
The Susceptibility of Disclosing Private Security Information in College Students |
1453040 |
8 |
Elijah Bouma-Sims |
Who's Calling You? A Study of Robocalls in the Era of Modern Telephone Networks |
1849994 |
9 |
Luciano Brignone |
Hiding Instructions in a Processor |
|
10 |
Morgan Brockman |
Promoting Privacy by Design for Software Capstone Courses |
1727574, 1821782 |
11 |
Javier Campos |
Interactive Visualization based Mobiled Security Education for Next-gen Cyber Aware Workforce |
1903423 |
12 |
Baicheng Chen |
Cardiac Biometrics for Continuous and Non-contact Mobile Authentication |
1718375 |
13 |
Michael Cinkoske |
A New Connection Between Node and Edge Depth Robust Graphs |
|
14 |
Chris Crabtree |
Using Deep Learning to Bridge the Semantic Gap between Natural Language and Code: An Automated Approach to Improve Privacy Policy Misalignment Scalability |
|
15 |
Jacob Crain |
IoT Embedded System Implementation |
|
16 |
Noah Curran |
TrustZone as a Secure Tensor Processor |
1718702 |
17 |
Oliver Curry & Zachary Peterson |
Fakesbook |
1802701 |
18 |
Leander Davis |
Protecting Cyber Physical Systems Using A Game-Theoretic Approach |
1814064 |
19 |
Julie Dixon |
Blockchain-Based Framework for Securing Integrated Circuits in the Supply Chain |
|
20 |
Peter Fenteany |
Non-malleable Digital Lockers for Efficiently Sampleable Distributions |
1849904 |
21 |
Catherine Han |
The Price is (not) Right: Comparing The Privacy Behaviors of Free vs. Paid Apps |
1817248, 1564329 |
22 |
Brandon Kujawa |
Replay Attack Detection in Multimedia of Things (MoT) |
1815724 |
23 |
Christy LaPerriere |
A Participatory Design Study to Test Community Oversight for Privacy and Security |
1814068 |
24 |
Jamie Lee |
Oblivious K-Nearest Neighbors for Secure Map Applications |
|
25 |
Jun Lin |
Examination and Detection of Falsified News |
1755536 |
26 |
Christie Lincoln & Alvin Zhang |
Static Information Flow Tracking (SIFT) Analysis for Hardware Design Verification |
1718586 |
27 |
Bryan Manzi |
Physical (PHY) Layer Features for Device Authentication |
1329686 |
28 |
Grant McClearn & Sarah Morin |
A New Statistical Audit for Real Elections |
1421373 |
29 |
Jonathan Miao |
More Complete DOM XSS Detection Through Dynamic Event Generation |
1704542 |
30 |
John Mikulskis |
Snout - An Extensible IoT Pen-Testing Tool |
1409053 |
31 |
Monica Moniot |
Differentially Private Confidence Intervals |
|
32 |
Jeongbin Oh |
Understanding the performance of SGX-based computations |
1815814 |
33 |
Adam Piekarski |
T-SGX |
|
34 |
Justin Robbins |
QuaSim: An Interactive Quantum Cryptography Learning Tool |
1623380 |
35 |
EJ Seong |
Boxing Attackers In: Towards Tangible Defenses against Eavesdropping Attacks |
|
36 |
Sixiong "Shawn" Shan |
Gotta Catch 'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks |
1834523 |
37 |
Kaiyan Shi |
Differentially Private Nonparametric Hypothesis Testing |
1817245 |
38 |
John Spokes |
ActionPoint: Action-Driven App to Strengthen Parent-Teen Relationships to Understand and Identify Cyberbullying |
1719722 |
39 |
Trinity Stroud |
Developing a Deterministic Polymorphic Circuit Generator Using Boolean Logic Representation |
1811578 |
40 |
Jonathan Villanueva |
Physical Inspection for PCB Assurance |
|
41 |
Abigail Vincent |
False Data Injection Attack Model on AC based Hybrid System |
1600058 |
42 |
Haoda Wang |
LEADER (Low-Rate Denial-of-Service Attacks Defense) |
1815495 |
43 |
Xingchen Wang |
BASCPS: Behavioral Decision Making in Security Games for Protecting Multi-Defender Cyber Physical Systems |
1718637 |
44 |
Ashton Woiwood |
Characterizing and Modeling Threat Feeds for Patch Management |
1715152 |
45 |
Charlie Wolfe |
Khaleesi: Breaking The Advertising & Tracking Redirect Chains |
1715152 |
46 |
Laura Zharmukhametova |
Symbolic Execution for Simple R |
|
|
|
|
|
SaTC Principal Investigator Posters |
# |
Principal Investigator |
Title |
Award # |
1 |
Nael Abu-Ghazaleh |
Practical Hardware-assisted Always-on Malware Detection |
1619322, 1617915 |
2 |
Theodore Allen |
A Framework For Economical Cyber Security Inspection and Assurance |
1912166 |
3 |
Nabil Alshurafa |
Privacy Enhancing Framework to Advance Models of Behavior |
1915847 |
4 |
Ardalan Amiri Sani |
Securing Mobile Devices by Hardening their System Software |
1846230 |
5 |
Aydin Aysu |
Secure Instruction Set Extensions for Lattice-Based Post-Quantum Cryptosystems |
1850373 |
6 |
Kiran Balagani |
Leveraging Movement, Posture, and Anthropometric Contexts to Strengthen the Security of Mobile Biometrics |
1814846 |
7 |
Ritwik Banerjee |
Tracking Semantic Changes in Medical Information |
1834597 |
8 |
Alexandru Bardas |
Creating and Managing Structurally-Morphing IT Systems - Moving Targets |
1850406 |
9 |
Alexandru Bardas |
Early-Stage Interdisciplinary Collaboration: A Sociotechnical Metrics Framework for Network and Security Operation Centers |
1915824 |
10 |
Terry Benzel |
Sharing Expertise and Artifacts for Reuse through Cybersecurity Community Hub (SEARCCH) |
1925773 |
11 |
Jeremiah Blocki |
Data-Independent Memory Hard Functions: New Attacks and Stronger Constructions |
1755708 |
12 |
John Board |
STINGAR - Deployment of Highly Automated, Reliable, and Fast Cybersecurity Threat Response Systems |
1815691 |
13 |
Borzoo Bonakdarpour |
Formal Specification and Verification of Probabilistic Information-flow Security Policies |
1813388 |
14 |
Patrick Brandt |
Data to Knowledge: Modernizing Political Event Data for Big Data Social Science Research |
1539302 |
15 |
Laurin Buchanan |
CyberMiSTS: Curriculum to Broaden Participation in Cybersecurity for Middle School Teachers and Students |
1821757, 1821753 |
16 |
Kevin Butler |
ProXray: Protocol Model Learning and Guided Firmware Analysis |
1815883 |
17 |
L. Jean Camp |
Living in the Internet of Things |
1565375 |
18 |
Bogdan Carbunar |
An Open Mobile App Platform to Support Research on Fraudulent Reviews |
1840714 |
19 |
Steven Carr |
Visualization for Secure Coding in C |
1523017, 1522883 |
20 |
Shantanu Chakrabartty |
Dynamic Authentication based on Zero-power Quantum-Tunneling Timers |
1525476 |
21 |
Bo Chen |
Enabling Secure Data Recovery for Mobile Devices against Malicious Attacks |
1938130 |
22 |
Hao Chen |
Irregular Traffic Detection for Containerized Microservices RPC in the Real World |
1801751 |
23 |
Hsinchun Chen |
Cybersecurity Big Data Research for Hacker Community: A Topic and Language Modeling Approach |
1936370 |
24 |
Qi Alfred Chen |
Exposing and Mitigating Security/Safety Concerns of CAVs: A Holistic and Realistic Security Testing Platform for Emerging CAVs |
1929771 |
25 |
Yingying Chen |
Exploiting Physical Properties in Wireless Networks for Implicit Authenticatio |
1820624 |
26 |
Steven Chong |
psilence: An R Library for Differential Privacy |
1565387 |
27 |
Mo-Yuen Chow |
Secure Algorithms for Cyber-Physical Systems: Resilient Collaborative Distributed Energy Management System |
1505633 |
28 |
Nicolas Christin |
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform |
1814817 |
29 |
John Criswell |
Shielding Software From Privileged Side-Channel Attacks |
1652280 |
30 |
Reza Curtmola |
in-toto: Securing the Software Supply Chain |
1801430 |
31 |
Alberto Dainotti |
MapKIT: Mapping Key Internet Terrain |
1705024 |
32 |
Kapil Dandekar |
Software Defined Radio Framework for Cybersecurity and Information Assurance Education |
1723606 |
33 |
Anupam Datta |
Accountable Information Use: Privacy and Fairness in Decision-Making Systems: SoK: Differential Privacy as a Causal Property |
1704985, 1704845 |
34 |
Edmundo de Souza e Silva |
INSaNE: Improving Network Security at the Network Edge |
1740895 |
35 |
Jintai Ding |
A Cryptanalysis of LUOV using the Subfield Differential Attack (SDA) |
1814221 |
36 |
Wenliang Du |
Expanding TrustZone in Android OS & Developing SEED Labs |
1718086 |
37 |
Sara Eftekharnejad |
Anomaly detection and risk assessment in power grids under data measurement threats |
1600058 |
38 |
Salim El Rouayheb |
Secure Distributed Coded Computations for IoT: An Information Theoretic and Network Approach |
1801630 |
39 |
Dmitry Evtyushkin |
Secure Branch Predictors for High Performance |
1850365 |
40 |
Liyue Fan |
Image Obfuscation with Quantifiable Privacy |
1755884 |
41 |
Fariborz Farahmand |
Neurobiological Basis of Decision Making in Online Environments |
1358651 |
42 |
Nick Feamster |
Practical Privacy for DNS, From ODNS to DoH |
1602399 |
43 |
Yunsi Fei |
Protecting Confidentiality and Integrity of Deep Neural Networks against Side-channel and Fault Attacks |
1929300 |
44 |
Christopher Fletcher |
Data Oblivious ISA Extensions for Side Channel-Resistant and High-Performance Computing |
1816226 |
45 |
Domenic Forte |
iPROBE - An Internal Shielding Approach for Protecting against Frontside and Backside Probing Attacks |
1717392 |
46 |
Ryan Gerdes |
Secure and Resilient Vehicular Platooning |
1410000 |
47 |
Ryan Gerdes |
Enforcement of Geofencing Policies for Commercial Unmanned Aircraft Systems |
1801611 |
48 |
Jessica Fridrich |
Steganography with Two JPEGS of the Same Scene |
1561446 |
49 |
Ujjwal Guin |
Robust Design-for-Security (DFS) Architecture for Enabling Trust in Integrated Circuits (IC) Manufacturing and Test |
1755733 |
50 |
Sanjay Goel |
THE NEW SECURITY CALCULUS: Incentivizing Good User Security Behavior |
1618212 |
51 |
Sanjay Goel |
Thwarting the Malicious Insider Evolution Process: The Theory of Strained Betrayal |
1912874 |
52 |
Nikhil Gupta |
Secure and Trustworthy Computer Aided Designs for Additive Manufacturing |
1931724 |
53 |
Deniz Gurkan |
Network Design for Security using Protocol Trust Boundary Observations |
1907537 |
54 |
Yuan Hong |
Privacy Preserving Cooperation among Microgrids for Efficient Load Management on the Grid |
1745894 |
55 |
Amir Houmansadr |
MassBrowser: Fighting Internet Censorship in a Mass |
1553301 |
56 |
Stratis Ioannidis, Miriam Leeser |
MaSSIF: Massively Scalable Secure Computation Infrastructure Using FPGAs |
1717213 |
57 |
Cynthia Irvine |
Labtainers - Create a Cyber Range on a Laptop |
1438893, 1932950 |
58 |
Rashmi Jha |
Opportunities and Challenges for Resistive Random Access Memory Devices in Hardware Security and Trust |
1556301 |
59 |
Ranjit Jhala |
Data-Dependent Instruction Timing Channels |
1514435 |
60 |
Limin Jia |
Practical and Trustworthy Dependency Management |
1717022 |
61 |
Zhanpeng Jin |
Brain Hacking: Assessing Psychological and Computational Vulnerabilities in Brain-Based Biometrics |
1840790 |
62 |
Criswell John |
IskiOS: Lightweight Defense Against Kernel-Level Code-Reuse Attacks |
1618213 |
63 |
Patrick Juola |
Is "Fake" a Writing Style? Detecting Stylistic Alteration |
1814602 |
64 |
David Kaeli |
Side-Channel Analysis and Resiliency Targeting Accelerators |
1618379 |
65 |
Zbigniew Kalbarczyk |
Data-Driven Study of Attacks on Cyber-Physical Infrastructure Supporting Large Computing Systems |
1816673 |
66 |
Chris Kanich |
Enabling Long-Term Security and Privacy through Retrospective Data Management |
1801644, 1801663 |
67 |
Karen Karavanic |
System Infrastructure for SMM-based Runtime Integrity Measurement |
1528185 |
68 |
Murat Kantarcioglu |
A Data Firewall based Approach for Securing Big Data |
1111529, 1758628 |
69 |
Mahmut Karakaya |
Improving Performance of Standoff Iris Recognition Systems Using Deep Learning Frameworks |
1909276 |
70 |
Latifur Khan |
Mitigating Cyber Attacks Using Domain Adaptation |
1516425 |
71 |
Joerg Kliewer |
Secure and Private Distributed Coded Computation for Learning and Storage Applications |
1526547 |
72 |
Selcuk Kose |
The Strength of Combined Distinguishers and Combined Side-channel Attacks |
1929774 |
73 |
Yonghwi Kwon |
Secure and Comprehensive Forensic Audit Infrastructure for Transparent Heterogeneous Computing |
1850392 |
74 |
Aron Laszka |
Towards Efficient and Scalable Crowdsourced Vulnerability-Discovery using Bug-Bounty Programs |
1850510 |
75 |
Loukas Lazos |
Secure Cloud Storage Verification Methods |
1813401 |
76 |
Jun Li |
Online Social Network Fraud and Attack Research and Identification |
1564348, 1564250, 1564039 |
77 |
Qinghua Li |
Towards Automated Security Vulnerability and Patch Management for Power Grid Operations |
1751255 |
78 |
Heather Lipford |
Leveraging community oversight to enhance collective efficacy for privacy and security |
1814110, 1814068, 1814439 |
79 |
Hongbo Liu |
Security Assurance in Short Range Communication with Wireless Channel Obfuscation |
1815908 |
80 |
Vinod Lohani |
Development and Analysis of a Spiral Theory-based Cybersecurity Curriculum |
1623047 |
81 |
Wenjing Lou |
Toward Enforceable Data Usage Control in Cloud-based IoT Systems |
1916902, 1916926 |
82 |
Long Lu |
OAT: Attesting Operation Integrity of Embedded Devices |
1748334 |
83 |
Bo Luo |
Privacy Protection in Social Networks: Bridging the Gap Between User Perception and Privacy Enforcement |
1422206 |
84 |
William Mahoney |
Evaluating Performance and Security of Executable Steganography for Surreptitious Programs |
1811560, 1811578 |
85 |
Khalid Malik |
ForensicExaminer: Testbed for Benchmarking Digital Audio Forensic Algorithms |
1815724, 1816019 |
86 |
Florence Martin |
Establishing Digital Citizenship by Implementing Cyber Safety Curriculum with Middle School Students |
1723746 |
87 |
Donatello Materassi |
Wireless Hardware Analog Encryption for Secure, Ultra-Low Power Transmission of Data |
1816703 |
88 |
Nasir Memon |
DeepMasterPrints: Generating MasterPrints For Dictionary Attacks via Latent Variable Evolution |
1618750 |
89 |
Hoda Mehrpouyan |
Formal Specification and Verification of User-centric Privacy Policies for Ubiquitous Systems |
1657774 |
90 |
Hoda Mehrpouyan |
FALCON: Framework for Anomaly Detection in IndustrialControl Systems |
1846493 |
91 |
Ana Milanova |
SecureMCMR: Privacy-Preserving Computation Outsourcing for MapReduce Applications |
1814898 |
92 |
Stephen Miller |
Number theory and side-channel attacks from normalized running time distributions |
1815562 |
93 |
Tanushree Mitra |
Designing Trustworthy and Transparent Information Platforms (News Platforms) |
1915755 |
94 |
Ida Ngambeki |
An Assessment Driven Approach to Self-Directed Learning in Secure Programming (SecTutor) |
1934279, 1934269, 1934285 |
95 |
Daniela Oliveira |
API Blindspots: Why Experienced Developers Write Vulnerable Code |
1513572 |
96 |
Alina Oprea |
Intrusion Resilience in Game Theoretical APT Models |
1717634 |
97 |
Xinming Ou |
Ethnographic Study of Secure Software Development Processes in a Real Company |
1801633 |
98 |
Xinming Ou |
A Systematic Study of Comparing Traditional Machine Learning and Deep Learning for Security Vetting of Android Apps |
1717862, 1717871, 1718214 |
99 |
Laura Osburn |
Improving O&M and IT Collaboration to Keep our Buildings Smart and Secure |
1932769 |
100 |
Charalampos Papanmanthou |
Edrax: A Cryptocurrency with Stateless Transaction Validation |
|
101 |
Charalampos Papanmanthou |
Zero-Knowledge Proofs Through Composition |
|
102 |
Charalampos Papanmanthou |
SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage |
|
103 |
Abhishek Parakh |
QuaSim: An Interactive Quantum Cryptography Learning Tool |
1623380 |
104 |
Sameer Patil |
Incorporating Sociotechnical Cybersecurity Learning Within Undergraduate Capstone Courses |
1821782 |
105 |
Peter Peterson |
Enabling a New Generation of Experts by Finding and Fixing Students' Persistent Misconceptions |
1821788 |
106 |
Jim Plusquellic |
Side-channel Power Resistance for Encryption Algorithms using Dynamic Partial Reconfiguration |
1813945 |
107 |
Jules Polonetsky |
RCN: Applied Privacy Research Coordination Network: An Industry-Academic Network to Transition Promising Privacy Research to Practice |
1837413 |
108 |
Dmitry Ponomarev |
Side-Channels through Lower-Level Caches: Attacks, Defenses and Security Metrics |
1422401 |
109 |
Aravind Prakash |
Recovering High Level Constructs from C++ Binaries |
1566532 |
110 |
Yanjun Qi |
Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers |
1619098 |
111 |
Yanjun Qi |
Feature Squeezing- Detecting Adversarial Examples in Deep Neural Networks |
1619098 |
112 |
Raghav Rao |
Unauthorized Access Attempts on Information Systems: The Role of Opportunity Contexts |
1724725 |
113 |
Alexander Rasin |
End-to-End Database Storage Analysis |
1656268 |
114 |
Indrakshi Ray |
Machine Learning for Anomaly Detection in Heavy Vehicles |
1715458 |
115 |
Aunshul Rege |
Understanding Adaptive Adversarial Behavior and Decision-Making Processes in Cyberattacks |
1453040 |
116 |
Daniel Roche |
Oblivious k-Nearest Neighbors for Secure Map Applications |
1618269 |
117 |
Jennie Rogers |
VaultDB: Efficient Query Processing for Private Data Federations |
1846447 |
118 |
Norman Sadeh |
Personalized Privacy Assistants |
1513957 |
119 |
Norman Sadeh |
The Usable Privacy Policy Project |
1330596 |
120 |
Norman Sadeh |
Answering People's Privacy Questions: Weaving Together User-Centered Design, Natural Language Processing and Legal Considerations |
1914486 |
121 |
Sagar Samtani |
Identifying Emerging Threats in the Online Hacker Community for Proactive Cyber Threat Intelligence: A Diachronic Graph Convolutional Autoencoder Framework |
1850362 |
122 |
Fareena Saqib |
A Key Update Scheme for Side-Channel Attack Mitigation |
1814420 |
123 |
Anand Sarwate |
PERMIT: Privacy-Enabled Resource Management for IoT Networks |
1617849 |
124 |
Visvesh Sathe |
Computationally Enabled Robust, Low-Power True Random Number Generation |
1714496 |
125 |
Ioannis Savidis |
Parameter Obfuscation: A Novel Methodology for the Protection of Analog Intellectual Property |
1751032 |
126 |
Lori Scarlatos |
CyberMiSTS: Curriculum to Broaden Participation in Cybersecurity for Middle School Teachers and Students |
1821753 |
127 |
Patrick Schaumont |
Energy-harvested Security for the Internet of Things |
1704176 |
128 |
Patrick Schaumont |
Finding and Mitigating Side-channel Leakage in Embedded Architectures |
1931639 |
129 |
Kent Seamons |
Usable Key Management and Forward Secrecy for Secure Email |
1816929 |
130 |
Vyas Sekar |
Handling a Trillion Unfixable Flaws on Billions of Internet-of-Things |
1564009 |
131 |
Edoardo Serra |
Capacity Building: Integrating Data Science into Cybersecurity Curriculum |
1820685 |
132 |
Akbar Siami Namin |
User-Centric Design of a Sonification System for Automatically Alarming Security Threats and Impact |
1564293 |
133 |
Akbar Siami Namin |
Improving Student Learning and Engagement in Digital Forensics through Collaborative Investigation of Cyber Security Incidents and Simulated Capture-the-Flaag Exercises |
1821560 |
134 |
Yasin Silva |
BullyBlocker - Identifying Cyberbullying in Social Networking Sites |
1719722 |
135 |
Stephanie Singer |
Data Science for Election Verification |
1936809 |
136 |
Christian Skalka |
PCNC: Proof-Carrying Network Code |
1718036 |
137 |
Geoffrey Smith |
Quantifying Information Leakage in Searchable Encryption |
1749014 |
138 |
Scott Stoller |
Access Control Policy Mining and Management |
1421893 |
139 |
Cynthia Sturton |
Transys: Leveraging Common Security Properties Across Hardware Designs |
1816637 |
140 |
Berk Sunar |
Super-Human Cryptanalysis for Scalable Side-Channel Analysis |
1814406 |
141 |
Ravi Tandon |
Robust Physical Layer Security with Limited Channel Knowledge |
1715947 |
142 |
Yuzhe Tang |
Scalable Secure Computations on Intel SGX via Lazy Program Partitioning |
1815814 |
143 |
Yuzhe Tang |
Blockchain-based Fork Prevention in Securing Cloud Storage Services |
|
144 |
Himanshu Thapliyal |
Utilizing Principles of Energy Recovery Computing for Low-Energy and DPA-Resistant IoT Devices |
1845448 |
145 |
Michael Thomas |
A Cybersecurity Collectable Card Game for Children |
1623267 |
146 |
Nikos Triandopoulos |
Towards Scalable Private Collaborative Learning |
|
147 |
A. Selcuk Uluagac |
Securing Sensory Side-Channels in Cyber-Physical Systems |
1453647 |
148 |
A. Selcuk Uluagac |
Privacy-Aware Wearable-Assisted Continuous Authentication Framework |
1718116 |
149 |
Ashish Venkat |
Context-Sensitive Fencing: Securing Speculative Execution via Microcode Customization |
1850436 |
150 |
Jessica Vitak |
Mapping Privacy and Surveillance Dynamics in Emerging Mobile Ecosystems: Practices and Contexts in the Netherlands and US |
1640640 |
151 |
Roopa Vishwanathan |
Automated Proof Construction and Verification for Attribute-based Cryptography |
1800088 |
152 |
Roopa Vishwanathan |
Blockchain-enabled Payment Networks |
1800088 |
153 |
Gang Wang |
Re-examining Email Spoofing in the Context of Spear Phishing |
1750101, 1717028 |
154 |
Kuang-Ching Wang |
Towards a Traffic Analysis Resistant Internet Architecture |
1643020 |
155 |
Weichao Wang |
Developing Security Education Materials for Future Advanced Manufacturing Engineering Workforce |
1523096 |
156 |
XiaoFeng Wang |
Understanding and Discovering Emerging Cybercrimes through Automatic Analysis of Online Text Traces |
1801432 |
157 |
Xiaoyin Wang |
GUILeak: Tracing Privacy Policy Claims on User Input Data for Android Applications |
1748109 |
158 |
Nicholas Weaver |
Understanding and Illuminating Non-Public Data Flows: Evaluating Anti-Fingerprinting Privacy Enhancing Technologies |
1514509 |
159 |
Sheng Wei |
HISA: Hardware Isolation-based Secure Architecturefor CPU-FPGA Heterogenous Systems |
1912593 |
160 |
Wujie Wen |
Invisible Shield: Can Compression Harden Deep Neural Networks Universally Against Adversarial Attacks? |
1840813 |
161 |
Andrew Whinston |
Information Disclosure and Security Policy Design: A Large-Scale Randomization Experiment in Pan-Asia |
1718600 |
162 |
Pamela Wisniewski |
A Participatory Design Study to Test Community Oversight for Privacy and Security |
1814068 |
163 |
Matthew Wright |
Website Fingerprinting in Tor: An Adversarial ML Approach |
1816851, 1722743 |
164 |
Dinghao Wu |
Dynamic and Static Program Analysis for Side Channel Vulnerability Detection and Mitigation |
1652790 |
165 |
Li Xiong |
PriSTE: Protecting Spatiotemporal Event Privacy in Continuous LBS |
1618932 |
166 |
Qiben Yan |
URadio: Towards Secure Smart Home IoT Communication Using Hybrid Ultrasonic-RF Radio |
1950171 |
167 |
Zheng Yan |
Where are the Weakest Links in Cybersecurity Judgment of Elementary School Students, Middle School Students, High School Students, and School Teachers |
1649872 |
168 |
Danfeng Yao |
Deployment-quality and Accessible Solutions for Cryptography Code Development |
1929701 |
169 |
Attila A Yavuz |
CAREER: Lightweight and Fast Authentication for Internet of Things |
1652389 |
170 |
Qiaoyan Yu |
Managing Hardware Security in Three Dimensional Integrated Circuits |
1717130 |
171 |
Yanfang (Fanny) Ye |
Intelligent Malware Detection Utilizing Novel File Relation-Based Features and Resilient Techniques for Adversarial Attacks |
1946327 |
172 |
Yanfang (Fanny) Ye |
Securing Cyberspace: Gaining Deep Insights into the Online Underground Ecosystem |
1940859 |
173 |
Philip S. Yu |
Learning Dynamic and Robust Defenses Against Co-Adaptive Spammers |
1931042 |
174 |
Zizhan Zheng |
Towards Robust Moving Target Defense: A Game Theoretic and Learning Approach |
1816495 |
175 |
Huiyang Zhou |
Towards Smart and Secure Non Volatile Memory |
1717550 |
176 |
Lina Zhou |
Implicit One-handed Mobile User Authentication by Induced Thumb Biometrics on Touch-screen Handheld Devices |
1704800, 1917537 |
|
|
|
|
|
|
|
|