Amos |
Abbott |
2136915 |
EAGER: Biometric Authentication using Noncontact Cardiovascular Signals |
Nael |
Abu-Ghazaleh |
CNS-1619322 (UCR) & CNS-1617915 (Binghamton) |
Collaborative Research: SaTC: CORE: Medium: Leakage-free Isolated Execution: Architectures and Security Models |
Khair |
Al Shamaileh |
2006662 |
Jamming Detection and Classification in OFDM-Based UAVs via Feature- and Spectrogram-tailored Machine Learning |
Laura |
Albert |
2000986 |
An Optimization Framework for Identifying Dynamic Risk Management Practices |
Aisha |
Ali-Gombe |
1850054 |
CRII: SaTC: Leveraging Userland In-Memory Objects for Cybercrime Investigations and Malware Classification |
Mary Jean |
Amon |
2053152 |
Bottom-up psychosocial interventions for interpersonal privacy preservation |
Mohd |
Anwar |
2007662 |
SaTC: CORE: Small: Tracking User Behavior, Cognitive Burdens, and the Impact of Behavioral Nudging on Security Updates by Young and Older Adults |
Erman |
Ayday |
2050410 |
Robust, Privacy- and Utility-Preserving Fingerprinting Schemes for Correlated Data |
Hamid |
Bahrami |
1956110 |
SaTC: CORE: Small: A Practical Approach to Study Security in Wireless Networks |
Kiran |
Balagani |
1814846 |
Leveraging Movement, Posture, and Anthropometric Contexts to Strengthen the Security of Mobile Biometrics |
Alexandru |
Bardas |
1850406 |
CRII: SaTC: Creating and Managing Structurally-Morphing IT Systems - Moving Targets |
Alexandru |
Bardas |
1915824 |
A Sociotechnical Metrics Framework for Network and Security Operations Centers |
France |
Belanger |
SES-2039172 |
Information Privacy Tensions and Decisions in Families during COVID-19 |
Terry |
Benzel |
1925773, 1925616, 1925564, 1925588 |
Sharing Expertise and Artifacts for Reuse through Cybersecurity Community Hub (SEARCCH) |
Julia |
Bernd |
2114229, 2114230 |
Foregrounding Bystanders as Stakeholders in Smart Home Product Design |
Vincent |
Bindschaedler |
2055123 |
SaTC: CORE: Medium: Countering Surveillanceware Using Deception-Based Generative Models and Systems Mechanisms |
Gedare |
Bloom |
2046705 |
CAREER: Foundations for Real-Time System Security |
Alexandra |
Boldyreva |
1946919 |
Provable Security Analysis of FIDO2 |
Borzoo |
Bonakdarpour |
2100989 |
SaTC: CORE: Small: Techniques for Software Model Checking of Hyperproperties |
Shaunak D. |
Bopardikar |
2134076 |
SaTC: CORE: SMALL: Data-driven Attack and Defense Modeling for Cyber-physical Systems (CPS) |
Kelly |
Caine |
1940679 |
Cryptographic Provenance for Digital Publishing |
Bogdan |
Carbunar |
2013671 |
SaTC: CORE: Small: Deconstructing and Neutralizing Search Rank Fraud |
Bogdan |
Carbunar |
2114911 |
Collaborative Research: EAGER: SaTC-EDU: Just-in-Time Artificial Intelligence-Driven Cyber Abuse Education in Social Networks |
Krishnendu |
Chakrabarty |
2011561 |
Security of FPGA-as-a-Service for Reconfigurable Systems: Securing FPGA bitstreams and Preventing IP Theft |
Krishnendu |
Chakrabarty |
2049335 |
Secure and Trustworthy Cyberphysical Microfluidic Systems |
David |
Chan-Tin |
1919004 and 1918591 |
Personalized Cybersecurity Education and Training |
Bo |
Chen |
1938130 |
EAGER: Enabling Secure Data Recovery for Mobile Devices against Malicious Attacks |
Bo |
Chen |
CNS-1928331, 1928349 |
SaTC: CORE: Small: Collaborative: Hardware-assisted Plausibly Deniable System for Mobile Devices |
Hsinchun |
Chen |
1936370 |
SaTC: CORE: Small: Cybersecurity Big Data Research for Hacker Community: A Topic and Language Modeling Approach |
Hao |
Chen |
1801751 |
SaTC: CORE: Medium: Collaborative: Towards Robust Machine Learning Systems |
Yu |
Chen |
CNS-2039342 |
EAGER: SAVED: Secure Audio and Video Data from Deepfake Attacks Leveraging Environmental Fingerprints |
Yingying |
Chen |
1820624 |
Exploiting Physical Properties in Wireless Networks for Implicit Authentication |
Yingying |
Chen |
2114220 |
Collaborative Research: SaTC: CORE: Small: Securing IoT and Edge Devices under Audio Adversarial Attacks |
Qi |
Chen |
1930041, 1929771 |
SaTC: TTP: Medium: Collaborative: Exposing and Mitigating Security/Safety Concerns of CAVs: A Holistic and Realistic Security Testing Platform for Emerging CAVs |
Adam |
Chlipala |
2130671 |
Scaling Correct-by-Construction Code Generation for Cryptography |
Christian |
Collberg |
1145913, 2040206 |
The Tigress Endpoint Protection Tool - Transition to Practice |
Alberto |
Dainotti |
1705024 |
MapKIT--Mapping Key Internet Terrain |
Melissa |
Dark |
2117073 |
ARC - Assessment Resources for Cybersecurity |
Sajal K. |
Das |
2030611, 2030624 |
TAURUS: Towards a Unified Robust and Secure Data Driven Approach for Attack Detection in Smart Living |
Sauvik |
Das |
2029519 |
Corporeal Cybersecurity: Improving End-User Security and Privacy with Physicalized Computing Interfaces |
Sauvik |
Das |
2126058 |
Privacy through Design: A Design Methodology to Promote the Creation of Privacy-Conscious Consumer AI |
Leigh Ann |
DeLyser |
2028426 |
The JROTC Impact Study:Bringing Cybersecurity Skills and Training to JROTC Cadets |
Srini |
Devadas |
2115587 |
SaTC: CORE: Medium: Provably Secure, Usable, and Performant Enclaves in Multicore Processors |
Natasha |
Devroye |
1909547 |
Arbiter PUF Faults: Impact, Testing, and Diagnosis |
Shiri |
Dori-Hacohen |
2147305 |
Fairness via AI: Bias Reduction in Medical Information |
Christopher |
Doss |
2039612, 2039613, 2039614 |
Safeguarding STEM Education and Scientific Knowledge in the age of Hyper realistic AI-Generated Data |
Salim |
El Rouayheb |
1801630 |
Secure Distributed Coded Computations for IoT: An Information Theoretic and Network Approach |
Michalis |
FALOUTSOS |
2132642 |
SOFIA: Finding and Profiling Malware Source Code in Public Archives at Scale |
Liyue |
Fan |
1949217 |
Differentially Private Obfuscation for Face and Eye Images |
Fariborz |
Farahmand |
2041788 |
Advancing Cybersecurity Education to Human-Level Artificial Intelligence |
Kassem |
Fawaz |
1942014 |
CAREER: Presentation and Mitigation of Privacy Risks for Online Users |
Lisa |
Fazio |
2122640 |
How False Beliefs Form and How to Correct Them |
Nick |
Feamster |
2041970 |
EAGER: SaTC-EDU: Training Mid-Career Security Professionals in Machine Learning and Data-Driven Cybersecurity |
Earlence |
Fernandes |
2144376 |
Security and Privacy Foundations of Internet-Scale User-Centered Automation |
Ferdinando |
Fioretto |
2133169 |
Collaborative Research: SaTC: CORE: Small: Privacy and Fairness in Critical Decision Making |
Alvis |
Fong |
2017289 |
CyberTraining: Pilot: Modular Experiential Learning for Secure, Safe, and Reliable AI (MELSSRAI) |
Christina |
Garman |
1816422 |
Bento: Bringing Network Function Virtualization to Tor |
Jean-Luc |
Gaudiot |
2026675 |
Securing Information Systems with Flexible Hardware Techniques |
Sanjay |
Goel |
1912874 |
Thwarting the Malicious Insider Evolution Process: The Theory of Strained Betrayal |
Guofei |
Gu |
1816497 |
Adversarial Learning via Modeling Interpretation |
Nikhil |
Gupta |
DGE-1931724 |
SaTC: EDU: Collaborative: An Educational Initiative on Cybersecurity in Additive Manufacturing |
Maanak |
Gupta |
2025682 |
Collaborative Research: SaTC: EDU: Artificial Intelligence Assisted Malware Analysis |
Willie |
Harrison |
1910812 |
CIF: Small: Best wiretap codes for real-world information-theoretic security |
Ting |
He |
1946022 |
SaTC: CORE: Small: Adversarial Network Reconnaissance in Software Defined Networking |
Yuan |
Hong |
CNS-2034870, 2034615 |
Collaborative Research: SaTC: CORE: Small: Privately Collecting and Analyzing V2X Data for Urban Traffic Modeling |
Tamzidul |
Hoque |
2114157, 2114165, 2114200 |
Hardware Security Education for All Through Seamless Extension of Existing Curricula |
Mitra Bokaei |
Hosseini |
2055772, 2055773 |
Collaborative Research: SaTC: CORE: Medium: Narrowing The Gap Between Privacy Expectations and Reality in Mobile Health |
Fei |
Hu |
NSF DGE-1723250 |
Captivology-Stimuli-based Learning (CAPITAL) of Big Data Security (BigSec): Towards a Science/Engineering, Career-Oriented Training |
Charles |
Hughes |
2114808 |
Improving Cybersecurity Education for Adolescents with Autism Through Automated Augmented Self-Monitoring Applications |
Stratis |
Ioannidis |
1717213 |
MaSSIF: Massively Scalable Secure Computation Infrastructure using FPGAs |
Murtuza |
Jadliwala |
1943351 |
CAREER: A Holistic Context-based Approach for Security and Privacy in the Era of Ubiquitous Sensing and Computing |
Shweta |
Jain |
CNS-2131182 |
Cultivating and Developing Research Talent to Support Research in Cyber-Security |
Ahmad |
Javaid |
1903419, 1903423 |
INteractive Animated VIsualization and PracTice basEd Cybersecurity Curriculum and Training (InviteCyber) Framework for Developing Next-gen Cyber-Aware Workforce |
Limin |
Jia |
1704542 |
Towards a Usable, Practical, and Provably Secure Browser Infrastructure |
Limin |
Jia |
2114148 |
Toward Safe, Private, and Secure Home Automation: From Formal Modeling to User Evaluation |
Naima |
Kaabouch |
2006674 |
GPS Spoofing/Mimicking Attacks on UAS: Detection Techniques Based on Machine and Deep Learning |
Apu |
Kapadia |
1814476 |
Socio-Technical Strategies for Enhancing Privacy in Photo Sharing |
Avinash |
Karanth |
CCF-1936794 |
Dynamic GARUDA: Securing Programs with Hardware Monitors Using Higher Language Abstractions |
Latifur |
Khan |
2039542 |
EAGER: SaTC AI-Cybersecurity: Secure and Privacy-Preserving Adaptive Artificial Intelligence Curriculum Development for Cyber Security |
Latifur |
Khan |
1931800 |
SATC: EDU: Curriculum Development for Secure Blockchain Technologies |
Farshad |
Khorrami |
2039615 |
NSF SATC: TTP: Small: Tracking Run-time Anomalies in Code Execution (TRACE) |
Taesoo |
Kim |
1563848 |
PRIWDEN: Universally Hardening SGX Programs via Load-Time Synthesis |
David |
Kotz |
CNS-1955805, 1955172, 1955228, 1955231 |
SPLICE: Security and Privacy in the Lifecycle of IoT for Consumer Environments |
Yingjie |
Lao |
2047384 |
CAREER: Protecting Deep Learning Systems against Hardware-Oriented Vulnerabilities |
Loukas |
Lazos |
1813401 |
SaTC: CORE: Small: Secure Cloud Storage Verification Methods |
Jaewoo |
Lee |
1943046 |
CAREER: Robust Adaptive Optimization Algorithms for Differentially Private Learning |
Qinghua |
Li |
1751255 |
Towards Automated Asset-Vulnerability Mapping for Vulnerability Management |
Zhou |
Li |
2039634 |
Multi-Level Attack and Defense Simulation Environment for Artificial Intelligence Education and Research |
Hui |
Lin |
2144513 |
PARP: Mislead Physical-Disruption Attacks by Preemptive Anti-Reconnaissance for Power Grids' Cyber-Physical Infrastructures |
Heather |
Lipford |
1814110, 1814068, 1814439 |
Leveraging community oversight to enhance collective efficacy for privacy and security |
Wenjing |
Lou |
1916902, 1916926 |
Toward Enforceable Data Usage Control in Cloud-based IoT Systems |
Aidong |
Lu |
1564039 |
Collaborative: Online Social Network Fraud and Attack Research and Identification |
Siwei |
Lyu |
2153112 |
SaTC: CORE: Small: Combating AI Synthesized Fake Media Beyond Detection |
Khalid |
Malik |
1815724, 1816019 |
Forensic Examiner: Testbed for Benchmarking Digital Audio Forensic Algorithms |
Hafiz |
Malik |
2035770 |
Linking2Source: Security of In-Vehicle Networks via Source Identification |
Madhav |
Marathe |
2041952 |
Pandemic Research for Preparedness and Resilience (PREPARE): Building a Research Community for the Next Pandemic |
Athina |
Markopoulou |
1956393, 1955227, 2103439, 1956435 |
ProperData: Protecting Personal Data Flow on the Internet |
Florence |
Martin |
2015554 |
Digital Safety Immersion for Elementary School Students |
Florence |
Martin |
2122416 |
Advancing Cybersecurity and Privacy of Educational Technologies used in K12 Schools by Supporting School Administrators, Technology Support Staff, and Teachers |
Aaron |
Massey |
1938121 |
Enabling Regulatory Compliance for Software Engineering |
Patrick |
McDaniel |
1805310 |
The Center for Trustworthy Machine Learning |
Muhammad Taqi Raza |
Mehdi |
CNS-2051621 |
Automatic Exploits Detection and Mitigation for Industrial Control System Protocols |
Hoda |
Mehrpouyan |
1846493 |
Formal TOols foR SafEty aNd Security of Industrial ControlSystems (FORENSICS) |
Jiang |
Ming |
2128703 |
SaTC: CORE: Small: A Transparent and Customizable Android Container-Based Virtualization Architecture for Dynamic Malware Analysis |
Jelena |
Mirkovic |
1815495 |
Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Servers |
Prabhat |
Mishra |
1936040 |
SaTC : CORE: Small: Trustworthy System on Chip Design using Secure On Chip Communication Architecture |
Alan |
Mislove |
CNS-1955227, 1956435, 1916020, 1916153 |
Ad Delivery Algorithms: The Hidden Arbiters of Political Messaging |
Chrystalla |
Mouza |
1821794 |
Cybersecurity Education Using Interactive Storytelling with Social Robots |
Mehran |
Mozaffari Kermani |
1801488 |
Countermeasures Against Side-Channel Attacks Targeting Hardware and Embedded System Implementations of Post-Quantum Cryptographic Algorithms |
Frank |
Mueller |
1813004 |
Timing Based Security in Real-Time Systems: T-SYS & T_Pack |
Manohar |
Murthi |
2123635, 2123618 |
Multi-Disciplinary Analyses of the Nature and Spread of Unsubstantiated Information Online |
Adwait |
Nadkarni |
1815336 |
SaTC: CORE: Small: Enabling Systematic Evaluation of the Soundness of Android Security Analysis Techniques |
Tempestt |
Neal |
2039373, 2039379 |
Toward Age-Aware Continuous Authentication on Personal Computing Devices |
Nick |
Nikiforakis |
1941617 |
CAREER: Tools and Techniques for Preserving Integrity on the Web |
Chandra |
Orrill |
2114981 |
Opening Doors for Cybersecurity & AI: An Interdisciplinary Approach to Engaging Middle School Students |
Balaji |
Palanisamy |
2020071 |
Blockchain-based Mechanisms for Timed Data Release and Timed Transactions |
Charalampos |
Papamanthou |
1652259 |
Efficient and Secure Distributed Consensus |
Yilang |
Peng |
2150716 |
Collaborative: SaTC: Core: Small: Understanding how visual features of misinformation influence credibility perceptions |
Roberto |
Perdisci |
2126641 |
Defending Against Social Engineering Attacks with In-Browser AI |
Alfredo |
Perez |
1950416, 1560214 |
REU@CSU: An REU Site in Security for Mobile Sensing and the IoT |
Hai |
Phan |
CNS-1935928, 1935923 |
SaTC: CORE: When Adversarial Learning Meets Differential Privacy: Theoretical Foundation and Applications |
Calton |
Pu |
2039653 |
Live Reality: Up-to-Date Information Quality |
Zhiyun |
Qian |
1953932, 1953933 |
SaTC: CORE: Small: Collaborative: Deep and Efficient Dynamic Analysis of Operating System Kernels |
Akond |
Rahman |
2026869 |
eSLIC: Enhanced Security Static Analysis of Configuration Scripts |
Mizanur |
Rahman |
2104999 |
Cyber Resilient Localization and Navigation for Autonomous Vehicles |
Ajita |
Rattani |
2129173 |
Probing Fairness of Ocular Biometrics Methods Across Demographic Variations |
Indrakshi |
Ray |
CNS-1715458 |
Detecting and Reconstructing Network Anomalies and Intrusions in Heavy Duty Vehicles |
Aunshul |
Rege |
2032292 |
SaTC: EDU: Educating STEM Students and Teachers about the Relevance of Social Engineering in Cyberattacks and Cybersecurity |
Yi |
Ren |
2101052 |
SaTC: Core: Small: Decentralized Attribution and Secure Training of Generative Models |
Armin |
Sarabi |
20122001 |
A Deep Learning Framework for Intelligent Active and Passive Measurements in the Age of Internet of Things |
Patrick |
Schaumont |
1931639 |
An End-to-End Analysis of EMFI Attacks on Bit-sliced Post-Quantum Implementations |
Alexander |
Schwarzmann |
2131538 |
A Robust Framework with Rigorous Semantics and Security Guarantees for Election-Day Voter Check-in |
Kent |
Seamons |
1816929 |
Usable Key Management and Forward Secrecy for Secure Email |
R |
Sekar |
1918667 |
RADAR: Real-time Advanced Detection and Attack Reconstruction |
Hossain |
Shahriar |
2100115, 2100134 |
Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware |
Micah |
Sherr |
CNS-1925497 |
Expanding Research Frontiers with a Next-Generation Anonymous Communication Experimentation (ACE) Framework |
Tao |
Shu |
2006998 |
CNS Core: Small: Enabling Privacy-Preserving Routing-on-Context in IoT |
Akbar |
Siami Namin |
1821560 |
SaTC: EDU: Improving Student Learning and Engagement in Digital Forensics through Collaborative Investigation of Cyber Security Incidents and Simulated Capture-the-Flag Exercises |
Akbar |
Siami Namin |
1564293 |
SBE: Medium: User-Centric Design of a Sonification System for Automatically Alarming Security Threats and Impact |
Yasin |
Silva |
2036127 |
BullyBlocker - Interdisciplinary Models to Identify and Understand Cyberbullying |
Linhai |
Song |
CNS-1955965 |
Rethinking Toolchain Design for Rust |
WenZhan |
Song |
2019311 |
Cyber-threat Detection and Diagnosis in Multistage Manufacturing Systems through Cyber and Physical Data Analytics |
Houbing |
Song |
1956193 |
SaTC: EDU: Collaborative: Bolstering UAV Cybersecurity Education through Curriculum Development with Hands-on Laboratory Framework |
Anna |
Squicciarini |
CNS2029976, 2029881 |
Collaborative research: SaTC: Core: Small: Privacy protection of Vehicles location in Spatial Crowdsourcing under realistic adversarial models |
Meera |
Sridhar |
1947295 |
SaTC: EDU: Enhancing Security Education in Hybrid Mobile and Internet of Things Firmware through Inclusive, Engaging, Learning Modules (E-SHIIELD) |
Tripakis |
Stavros |
1801546, 1801342, 1801399 |
Bridging the Gap Between Protocol Design and Implementation through Automated Mapping |
Kevin |
Steinmetz |
1916284 |
SaTC: Core: Small: Collaborative: Understanding Law-Enforcement Cyber Investigations |
Shreyas |
Sundaram |
CNS-1718637 |
TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems |
Ravi |
Tandon |
1715947 |
Privacy Preserving Wireless Federated Learning |
Yuzhe |
Tang |
2104532 |
Collaborative Research: SaTC: EDU: Developing Instructional Laboratories for Blockchain Security Applications |
Unal |
Tatar |
1948261 |
CRII: SaTC: Graph-based Probabilistic Cyber Risk Modeling |
Yuan |
Tian |
1943100 |
Secure Voice-Controlled Platforms |
Andrew |
Tolmach |
2048499 |
Specifying and Verifying Secure Compilation of C Code to Tagged Hardware |
Carlene |
Turner |
1956428 |
Excellence in Research - The Impact of Cybersecurity Policies on Employees' Efficiency and Performance Predictability |
Blase |
Ur |
2047827 |
CAREER: Usable, Data-Driven Transparency and Access for Consumer Privacy |
Krishna |
Venkatasubramanian |
1947022 |
SaTC: CORE: Small: Authentication Solutions for Individuals with Upper Extremity Impairment |
Boyang |
Wang |
1947913 |
Fingerprinting Encrypted Voice Traffic on Smart Speakers |
GANG |
WANG |
2055233 |
Combating Concept Drift in Security Applications with Self-Supervised Learning |
Yang |
Wang |
1652497 |
Inclusive Privacy and Security for People with Visual Impairments (PVI) |
Yang |
Wang |
2114991 |
Teaching High School Students about Cybersecurity and Artificial Intelligence Ethics |
Yang |
Wang |
2126314 |
Novel Algorithms and Tools for Empowering People Who Are Blind to Safeguard Private Visual Content |
XiaoFeng |
Wang |
1801432, 1850725, 1801652 |
SaTC: CORE: Medium: Collaborative: Understanding and Discovering Emerging Cybercrimes through Automatic Analysis of Online Text Traces |
Ting |
Wang |
1953893 |
Trustworthy Machine Learning from Untrusted Models |
Tao |
Wei |
2027069 |
SaTC:CORE: Medium: Introducing DIVOT: A Novel Architecture for Runtime Anti-Probing/Tampering on I/O Buses |
Sheng |
Wei |
1912593 |
Security of Heterogeneous CPU-FPGA Systems |
Jin |
Wei-Kocsis |
2114974 |
EAGER: SaTC-EDU: Cybersecurity Education in the Age of Artificial Intelligence: A Novel Proactive and Collaborative Learning Paradigm |
Jake |
Williams |
1850014 |
Moderating Effects of Automation on Information Transmission in Social Forums |
Shomir |
Wilson |
2105736, 2105734, 2105745 |
PrivaSeer: A Large-Scale, Longitudinal Resource to Advance Technical and Legal Understanding of Textual Privacy Information |
Shomir |
Wilson |
1914444 |
Answering People's Privacy Questions: Weaving Together User-centered Design, Natural Language Processing and Legal Considerations |
Xusheng |
Xiao |
2028748 |
DEPIMPACT: Back-Propagating System Dependency Impact for Attack Investigation |
Jiafeng |
Xie |
2020625 |
SaTC: CORE: Small: Fast Algorithm Originated Fault Detection Scheme for Ring-LWE based Cryptographic Hardware |
Aiping |
Xiong |
1915801 |
Associative Inference: Another Cognitive Driver of Misinformation Susceptibility |
Dongyan |
Xu |
CNS-1801534 |
KSplit: Automating Device Driver Isolation |
Shouhuai |
Xu |
2122631 |
A Framework for Enhancing the Resilience of Cyber Attack Classification Mechanisms |
Jun |
Xu |
2213727 |
Collaborative Research: SaTC: CORE: Medium: Rethinking Fuzzing for Security |
Dongpeng |
Xu |
1948489 |
CRII: SaTC: Simplification of Mixed Boolean-Arithmetic Obfuscated Expression |
Qiben |
Yan |
1950171 |
Interactive Attack on Smartphone Voice System Through Power Line |
Mengjia |
Yan |
2046359 |
A Quantitative Framework for Analyzing and Mitigating Microarchitectural Side Channels |
Baijian |
Yang |
1820573, 1820608 |
Cyber Human Ecosystem of Engaged Security Education (CHEESE) |
Fan |
Yao |
2019536, 2019548 |
SaTC: Small: Understanding and Taming Deterministic Model Bit Flip Attacks in Deep Neural Networks |
Danfeng (Daphne) |
Yao |
1929701 |
SaTC: TTP: Medium: Collaborative: Deployment-quality and Accessible Solutions for Cryptography Code Development |
Tuba |
Yavuz |
CNS-1942235 |
CAREER: Towards a Secure and Reliable Internet of Things through
Automated Model Extraction and Analysis |
Arkady |
Yerukhimovich |
1955620, 1955264, 1955319 |
New Approaches for Large Scale Secure Computation |
Heng |
Yin |
1719175 |
Towards Robust and Scalable Search of Binary Code and Data |
Chansu |
Yu |
2028397 |
SaTC: EDU: Transdisciplinary Cybersecurity Education for Law and Engineering Students |
Qiaoyan |
Yu |
1652474 |
CAREER: Proactive Defense Methods for Chip Integrity and Security |
Qiaoyan |
Yu |
2022279 |
SaTC: CORE: Small: Towards Securing the Hardware and Software for Approximate Computing Systems |
Shuhan |
Yuan |
2103829 |
Deep Learning for Insider Threat Detection |
Xu |
Yuan |
1948374 |
CRII: SaTC: Empowering Elastic-honeypot as Real-time Malicious Content Sniffers for Social Networks |
Yanbin |
Zhao |
1949650 |
SaTC: CORE: Medium: Hidden Rules in Neural Networks as Attacks and Adversarial Defenses |
Lina |
Zhou |
1917537 |
Implicit One-handed Mobile User Authentication by Induced Thumb Biometrics on Touch-screen Handheld Devices |
Sebastian |
Zimmeck |
2055196 |
Improving Internet Privacy with Global Privacy Control (GPC) |
Cliff |
Zou |
1915780 |
SaTC: EDU: Collaborative: Building a Low-cost and State-of-the-art IoT Security Hands-on Laboratory |