BibTeX records: Abdul Serwadda

download as .bib file

@inproceedings{DBLP:conf/icaart/ArefinAAIS24,
  author       = {Sayed Erfan Arefin and
                  Tasnia Heya Ashrafi and
                  Hasan Al{-}Qudah and
                  Ynes Ineza and
                  Abdul Serwadda},
  editor       = {Ana Paula Rocha and
                  Luc Steels and
                  H. Jaap van den Herik},
  title        = {Unmasking the Giant: {A} Comprehensive Evaluation of ChatGPT's Proficiency
                  in Coding Algorithms and Data Structures},
  booktitle    = {Proceedings of the 16th International Conference on Agents and Artificial
                  Intelligence, {ICAART} 2024, Volume 1, Rome, Italy, February 24-26,
                  2024},
  pages        = {412--419},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012467100003636},
  doi          = {10.5220/0012467100003636},
  timestamp    = {Thu, 04 Apr 2024 15:53:04 +0200},
  biburl       = {https://dblp.org/rec/conf/icaart/ArefinAAIS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/semco/AshrafiIAUS24,
  author       = {Tasnia Heya Ashrafi and
                  Ynes Ineza and
                  Sayed Erfan Arefin and
                  Godsgift Uzor and
                  Abdul Serwadda},
  title        = {Stable or Shaky? The Semantics of ChatGPT's Behavior Under Repeated
                  Queries},
  booktitle    = {18th {IEEE} International Conference on Semantic Computing, {ICSC}
                  2024, Laguna Hills, CA, USA, February 5-7, 2024},
  pages        = {110--116},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICSC59802.2024.00023},
  doi          = {10.1109/ICSC59802.2024.00023},
  timestamp    = {Wed, 27 Mar 2024 21:31:51 +0100},
  biburl       = {https://dblp.org/rec/conf/semco/AshrafiIAUS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-05360,
  author       = {Sayed Erfan Arefin and
                  Tasnia Heya Ashrafi and
                  Hasan Al{-}Qudah and
                  Ynes Ineza and
                  Abdul Serwadda},
  title        = {Unmasking the giant: {A} comprehensive evaluation of ChatGPT's proficiency
                  in coding algorithms and data structures},
  journal      = {CoRR},
  volume       = {abs/2307.05360},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.05360},
  doi          = {10.48550/ARXIV.2307.05360},
  eprinttype    = {arXiv},
  eprint       = {2307.05360},
  timestamp    = {Mon, 24 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-05360.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/WasswaS22,
  author       = {Hassan Wasswa and
                  Abdul Serwadda},
  editor       = {Andrew H. Sung and
                  Rakesh M. Verma and
                  Roland H. C. Yap},
  title        = {The Proof is in the Glare: On the Privacy Risk Posed by Eyeglasses
                  in Video Calls},
  booktitle    = {IWSPA@CODASPY 2022: Proceedings of the 2022 {ACM} on International
                  Workshop on Security and Privacy Analytics, Baltimore, MD, USA, April
                  27, 2022},
  pages        = {46--54},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3510548.3519378},
  doi          = {10.1145/3510548.3519378},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/WasswaS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/CasqueiroAASW22,
  author       = {Gustavo Casqueiro and
                  Sayed Erfan Arefin and
                  Tasnia Heya Ashrafi and
                  Abdul Serwadda and
                  Hassan Wasswa},
  title        = {Weaponizing IoT Sensors: When Table Choice Poses a Security Vulnerability},
  booktitle    = {4th {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems, and Applications, {TPS-ISA} 2022, Atlanta,
                  GA, USA, December 14-17, 2022},
  pages        = {160--167},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/TPS-ISA56441.2022.00029},
  doi          = {10.1109/TPS-ISA56441.2022.00029},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tpsisa/CasqueiroAASW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-08217,
  author       = {Tasnia Heya Ashrafi and
                  Abdul Serwadda and
                  Isaac Griswold{-}Steiner and
                  Richard Matovu},
  title        = {A Wearables-Driven Attack on Examination Proctoring},
  journal      = {CoRR},
  volume       = {abs/2203.08217},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.08217},
  doi          = {10.48550/ARXIV.2203.08217},
  eprinttype    = {arXiv},
  eprint       = {2203.08217},
  timestamp    = {Mon, 28 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-08217.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Griswold-Steiner21,
  author       = {Isaac Griswold{-}Steiner and
                  Zachary LeFevre and
                  Abdul Serwadda},
  title        = {Smartphone speech privacy concerns from side-channel attacks on facial
                  biomechanics},
  journal      = {Comput. Secur.},
  volume       = {100},
  pages        = {102110},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102110},
  doi          = {10.1016/J.COSE.2020.102110},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Griswold-Steiner21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/Griswold-Steiner21,
  author       = {Isaac Griswold{-}Steiner and
                  N'godjigui Junior Diarrassouba and
                  Shreyesh Arangath and
                  Abdul Serwadda},
  editor       = {Yoshifumi Kitamura and
                  Aaron Quigley and
                  Katherine Isbister and
                  Takeo Igarashi},
  title        = {User Perceptions of Defensive Techniques Against Keystroke Timing
                  Attacks During Password Entry},
  booktitle    = {{CHI} '21: {CHI} Conference on Human Factors in Computing Systems,
                  Virtual Event / Yokohama Japan, May 8-13, 2021, Extended Abstracts},
  pages        = {244:1--244:6},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3411763.3451667},
  doi          = {10.1145/3411763.3451667},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/Griswold-Steiner21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica2/0001HSH21,
  author       = {Jundong Chen and
                  Md. Shafaeat Hossain and
                  Abdul Serwadda and
                  Fei Han},
  title        = {Modeling Follow-Unfollow Mechanism in Social Networks with Evolutionary
                  Game},
  booktitle    = {{IEEE} International Conference on Agents, {ICA} 2021, Kyoto, Japan,
                  December 13-15, 2021},
  pages        = {37--40},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICA54137.2021.00013},
  doi          = {10.1109/ICA54137.2021.00013},
  timestamp    = {Fri, 24 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ica2/0001HSH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ArefinS21,
  author       = {Sayed Erfan Arefin and
                  Abdul Serwadda},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {Deep Neural Exposure: You Can Run, But Not Hide Your Neural Network
                  Architecture!},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {75--80},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3460415},
  doi          = {10.1145/3437880.3460415},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ArefinS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/AshrafiSGM21,
  author       = {Tasnia Heya Ashrafi and
                  Abdul Serwadda and
                  Isaac Griswold{-}Steiner and
                  Richard Matovu},
  title        = {A Wearables-Driven Attack on Examination Proctoring},
  booktitle    = {18th International Conference on Privacy, Security and Trust, {PST}
                  2021, Auckland, New Zealand, December 13-15, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/PST52912.2021.9647760},
  doi          = {10.1109/PST52912.2021.9647760},
  timestamp    = {Tue, 28 Dec 2021 14:39:32 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/AshrafiSGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartnets/AcharyaS21,
  author       = {Sraddhanjali Acharya and
                  Abdul Serwadda},
  title        = {On Finger Stretching and Bending Dynamics as a Biometric Modality},
  booktitle    = {International Conference on Smart Applications, Communications and
                  Networking, SmartNets 2021, Glasgow, United Kingdom, September 22-24,
                  2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SmartNets50376.2021.9555429},
  doi          = {10.1109/SMARTNETS50376.2021.9555429},
  timestamp    = {Thu, 14 Oct 2021 16:38:35 +0200},
  biburl       = {https://dblp.org/rec/conf/smartnets/AcharyaS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/AcharyaSB21,
  author       = {Sraddhanjali Acharya and
                  Abdul Serwadda and
                  Argenis V. Bilbao},
  title        = {That phone charging hub knows your video playlist!},
  booktitle    = {2021 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing,
                  Advanced {\&} Trusted Computing, Scalable Computing {\&} Communications,
                  Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI),
                  Atlanta, GA, USA, October 18-21, 2021},
  pages        = {160--169},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SWC50871.2021.00031},
  doi          = {10.1109/SWC50871.2021.00031},
  timestamp    = {Fri, 03 Dec 2021 17:36:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/AcharyaSB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MatovuSBG20,
  author       = {Richard Matovu and
                  Abdul Serwadda and
                  Argenis V. Bilbao and
                  Isaac Griswold{-}Steiner},
  editor       = {Vassil Roussev and
                  Bhavani Thuraisingham and
                  Barbara Carminati and
                  Murat Kantarcioglu},
  title        = {Defensive Charging: Mitigating Power Side-Channel Attacks on Charging
                  Smartphones},
  booktitle    = {{CODASPY} '20: Tenth {ACM} Conference on Data and Application Security
                  and Privacy, New Orleans, LA, USA, March 16-18, 2020},
  pages        = {179--190},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3374664.3375732},
  doi          = {10.1145/3374664.3375732},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/MatovuSBG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbbis/Griswold-Steiner19,
  author       = {Isaac Griswold{-}Steiner and
                  Richard Matovu and
                  Abdul Serwadda},
  title        = {Wearables-Driven Freeform Handwriting Authentication},
  journal      = {{IEEE} Trans. Biom. Behav. Identity Sci.},
  volume       = {1},
  number       = {3},
  pages        = {152--164},
  year         = {2019},
  url          = {https://doi.org/10.1109/TBIOM.2019.2912401},
  doi          = {10.1109/TBIOM.2019.2912401},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tbbis/Griswold-Steiner19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccda/AcharyaMSG19,
  author       = {Sraddhanjali Acharya and
                  Richard Matovu and
                  Abdul Serwadda and
                  Isaac Griswold{-}Steiner},
  title        = {Gamification of Wearable Data Collection: {A} Tool for both Friend
                  and Foe},
  booktitle    = {Proceedings of the 3rd International Conference on Compute and Data
                  Analysis, {ICCDA} 2019, Kahului, HI, USA, March 14-17, 2019},
  pages        = {68--77},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3314545.3314572},
  doi          = {10.1145/3314545.3314572},
  timestamp    = {Wed, 03 Jun 2020 19:14:31 +0200},
  biburl       = {https://dblp.org/rec/conf/iccda/AcharyaMSG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icphm/GecgelEDSAN19,
  author       = {Ozhan Gecgel and
                  Stephen Ekwaro{-}Osire and
                  Jo{\~{a}}o Paulo Dias and
                  Abdul Serwadda and
                  Fisseha M. Alemayehu and
                  Abraham Nispel},
  title        = {Gearbox Fault Diagnostics Using Deep Learning with Simulated Data},
  booktitle    = {2019 {IEEE} International Conference on Prognostics and Health Management,
                  {ICPHM} 2019, San Francisco, CA, USA, June 17-20, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICPHM.2019.8819423},
  doi          = {10.1109/ICPHM.2019.8819423},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icphm/GecgelEDSAN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/FykeGS19,
  author       = {Zakery Fyke and
                  Isaac Griswold{-}Steiner and
                  Abdul Serwadda},
  title        = {Prying into Private Spaces Using Mobile Device Motion Sensors},
  booktitle    = {17th International Conference on Privacy, Security and Trust, {PST}
                  2019, Fredericton, NB, Canada, August 26-28, 2019},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/PST47121.2019.8949056},
  doi          = {10.1109/PST47121.2019.8949056},
  timestamp    = {Mon, 13 Jan 2020 18:37:30 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/FykeGS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-09123,
  author       = {Richard Matovu and
                  Isaac Griswold{-}Steiner and
                  Abdul Serwadda},
  title        = {Kinetic Song Comprehension: Deciphering Personal Listening Habits
                  via Phone Vibrations},
  journal      = {CoRR},
  volume       = {abs/1909.09123},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.09123},
  eprinttype    = {arXiv},
  eprint       = {1909.09123},
  timestamp    = {Tue, 24 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-09123.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biosig/MatovuSIG18,
  author       = {Richard Matovu and
                  Abdul Serwadda and
                  David Irakiza and
                  Isaac Griswold{-}Steiner},
  editor       = {Arslan Br{\"{o}}mme and
                  Christoph Busch and
                  Antitza Dantcheva and
                  Christian Rathgeb and
                  Andreas Uhl},
  title        = {Jekyll and Hyde: On The Double-Faced Nature of Smart-Phone Sensor
                  Noise Injection},
  booktitle    = {2018 International Conference of the Biometrics Special Interest Group,
                  {BIOSIG} 2018, Darmstadt, Germany, September 26-28, 2018},
  series       = {{LNI}},
  volume       = {{P-282}},
  pages        = {1--6},
  publisher    = {{GI} / {IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/BIOSIG.2018.8553043},
  doi          = {10.23919/BIOSIG.2018.8553043},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/biosig/MatovuSIG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MustafaMSM18,
  author       = {Tahrima Mustafa and
                  Richard Matovu and
                  Abdul Serwadda and
                  Nicholas Muirhead},
  editor       = {Rakesh M. Verma and
                  Murat Kantarcioglu},
  title        = {Unsure How to Authenticate on Your {VR} Headset?: Come on, Use Your
                  Head!},
  booktitle    = {Proceedings of the Fourth {ACM} International Workshop on Security
                  and Privacy Analytics, IWSPA@CODASPY 2018, Tempe, AZ, USA, March 19-21,
                  2018},
  pages        = {23--30},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3180445.3180450},
  doi          = {10.1145/3180445.3180450},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/MustafaMSM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uemcom/MatovuS18,
  author       = {Richard Matovu and
                  Abdul Serwadda},
  editor       = {Satyajit Chakrabarti and
                  Himadri Nath Saha},
  title        = {Gaming the Gamer: Adversarial Fingerprinting of Gaming Apps using
                  Smartphone Accelerometers},
  booktitle    = {9th {IEEE} Annual Ubiquitous Computing, Electronics {\&} Mobile
                  Communication Conference, {UEMCON} 2018, New York City, NY, USA, November
                  8-10, 2018},
  pages        = {489--496},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/UEMCON.2018.8796715},
  doi          = {10.1109/UEMCON.2018.8796715},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/uemcom/MatovuS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uemcom/Griswold-Steiner18,
  author       = {Isaac Griswold{-}Steiner and
                  Zakery Fyke and
                  Mushfique Ahmed and
                  Abdul Serwadda},
  editor       = {Satyajit Chakrabarti and
                  Himadri Nath Saha},
  title        = {Morph-a-Dope: Using Pupil Manipulation to Spoof Eye Movement Biometrics},
  booktitle    = {9th {IEEE} Annual Ubiquitous Computing, Electronics {\&} Mobile
                  Communication Conference, {UEMCON} 2018, New York City, NY, USA, November
                  8-10, 2018},
  pages        = {543--552},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/UEMCON.2018.8796625},
  doi          = {10.1109/UEMCON.2018.8796625},
  timestamp    = {Mon, 26 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uemcom/Griswold-Steiner18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/Griswold-Steiner17,
  author       = {Isaac Griswold{-}Steiner and
                  Richard Matovu and
                  Abdul Serwadda},
  title        = {Handwriting watcher: {A} mechanism for smartwatch-driven handwriting
                  authentication},
  booktitle    = {2017 {IEEE} International Joint Conference on Biometrics, {IJCB} 2017,
                  Denver, CO, USA, October 1-4, 2017},
  pages        = {216--224},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/BTAS.2017.8272701},
  doi          = {10.1109/BTAS.2017.8272701},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/icb/Griswold-Steiner17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/SelmicPS16,
  author       = {Rastko R. Selmic and
                  Vir V. Phoha and
                  Abdul Serwadda},
  title        = {Wireless Sensor Networks - Security, Coverage, and Localization},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46769-6},
  doi          = {10.1007/978-3-319-46769-6},
  isbn         = {978-3-319-46767-2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/SelmicPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SerwaddaPWKS16,
  author       = {Abdul Serwadda and
                  Vir V. Phoha and
                  Zibo Wang and
                  Rajesh Kumar and
                  Diksha Shukla},
  title        = {Toward Robotic Robbery on the Touch Screen},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {14:1--14:25},
  year         = {2016},
  url          = {https://doi.org/10.1145/2898353},
  doi          = {10.1145/2898353},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/SerwaddaPWKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/btas/KumarPS16,
  author       = {Rajesh Kumar and
                  Vir V. Phoha and
                  Abdul Serwadda},
  title        = {Continuous authentication of smartphone users by fusing typing, swiping,
                  and phone movement patterns},
  booktitle    = {8th {IEEE} International Conference on Biometrics Theory, Applications
                  and Systems, {BTAS} 2016, Niagara Falls, NY, USA, September 6-9, 2016},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/BTAS.2016.7791164},
  doi          = {10.1109/BTAS.2016.7791164},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/btas/KumarPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/btas/MatovuS16,
  author       = {Richard Matovu and
                  Abdul Serwadda},
  title        = {Your substance abuse disorder is an open secret! Gleaning sensitive
                  personal information from templates in an EEG-based authentication
                  system},
  booktitle    = {8th {IEEE} International Conference on Biometrics Theory, Applications
                  and Systems, {BTAS} 2016, Niagara Falls, NY, USA, September 6-9, 2016},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/BTAS.2016.7791210},
  doi          = {10.1109/BTAS.2016.7791210},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/btas/MatovuS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SerwaddaP15,
  author       = {Abdul Serwadda and
                  Vir V. Phoha},
  title        = {When Mice devour the Elephants: {A} DDoS attack against size-based
                  scheduling schemes in the internet},
  journal      = {Comput. Secur.},
  volume       = {53},
  pages        = {31--43},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.04.014},
  doi          = {10.1016/J.COSE.2015.04.014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SerwaddaP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/btas/PoudelSP15,
  author       = {Sujit Poudel and
                  Abdul Serwadda and
                  Vir V. Phoha},
  title        = {On humanoid robots imitating human touch gestures on the smart phone},
  booktitle    = {{IEEE} 7th International Conference on Biometrics Theory, Applications
                  and Systems, {BTAS} 2015, Arlington, VA, USA, September 8-11, 2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/BTAS.2015.7358781},
  doi          = {10.1109/BTAS.2015.7358781},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/btas/PoudelSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/btas/SerwaddaPPHBBC15,
  author       = {Abdul Serwadda and
                  Vir V. Phoha and
                  Sujit Poudel and
                  Leanne M. Hirshfield and
                  Danushka Bandara and
                  Sarah E. Bratt and
                  Mark R. Costa},
  title        = {fNIRS: {A} new modality for brain activity-based biometric authentication},
  booktitle    = {{IEEE} 7th International Conference on Biometrics Theory, Applications
                  and Systems, {BTAS} 2015, Arlington, VA, USA, September 8-11, 2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/BTAS.2015.7358763},
  doi          = {10.1109/BTAS.2015.7358763},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/btas/SerwaddaPPHBBC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShuklaKSP14,
  author       = {Diksha Shukla and
                  Rajesh Kumar and
                  Abdul Serwadda and
                  Vir V. Phoha},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Beware, Your Hands Reveal Your Secrets!},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {904--917},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660360},
  doi          = {10.1145/2660267.2660360},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ShuklaKSP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/PrimoPKS14,
  author       = {Abena Primo and
                  Vir V. Phoha and
                  Rajesh Kumar and
                  Abdul Serwadda},
  title        = {Context-Aware Active Authentication Using Smartphone Accelerometer
                  Measurements},
  booktitle    = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR}
                  Workshops 2014, Columbus, OH, USA, June 23-28, 2014},
  pages        = {98--105},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CVPRW.2014.20},
  doi          = {10.1109/CVPRW.2014.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cvpr/PrimoPKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/SerwaddaWKGPGBRPB13,
  author       = {Abdul Serwadda and
                  Zibo Wang and
                  Patrick Koch and
                  Sathya Govindarajan and
                  Raviteja Pokala and
                  Adam Goodkind and
                  David Guy Brizan and
                  Andrew Rosenberg and
                  Vir V. Phoha and
                  Kiran S. Balagani},
  title        = {Scan-Based Evaluation of Continuous Keystroke Authentication Systems},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {4},
  pages        = {20--23},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.51},
  doi          = {10.1109/MITP.2013.51},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itpro/SerwaddaWKGPGBRPB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SerwaddaP13,
  author       = {Abdul Serwadda and
                  Vir V. Phoha},
  title        = {Examining a Large Keystroke Biometrics Dataset for Statistical-Attack
                  Openings},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {8},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516951.2516960},
  doi          = {10.1145/2516951.2516960},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/SerwaddaP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/btas/SerwaddaPW13,
  author       = {Abdul Serwadda and
                  Vir V. Phoha and
                  Zibo Wang},
  title        = {Which verifiers work?: {A} benchmark evaluation of touch-based authentication
                  algorithms},
  booktitle    = {{IEEE} Sixth International Conference on Biometrics: Theory, Applications
                  and Systems, {BTAS} 2013, Arlington, VA, USA, September 29 - October
                  2, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/BTAS.2013.6712758},
  doi          = {10.1109/BTAS.2013.6712758},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/btas/SerwaddaPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SerwaddaP13,
  author       = {Abdul Serwadda and
                  Vir V. Phoha},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {When kids' toys breach mobile phone security},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {599--610},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516659},
  doi          = {10.1145/2508859.2516659},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SerwaddaP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/btas/WangSBP12,
  author       = {Zibo Wang and
                  Abdul Serwadda and
                  Kiran S. Balagani and
                  Vir V. Phoha},
  title        = {Transforming animals in a cyber-behavioral biometric menagerie with
                  Frog-Boiling attacks},
  booktitle    = {{IEEE} Fifth International Conference on Biometrics: Theory, Applications
                  and Systems, {BTAS} 2012, Arlington, VA, USA, September 23-27, 2012},
  pages        = {289--296},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/BTAS.2012.6374591},
  doi          = {10.1109/BTAS.2012.6374591},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/btas/WangSBP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/RaiS11,
  author       = {Idris A. Rai and
                  Abdul Serwadda},
  title        = {Towards end-host-based identification of competing protocols against
                  {TCP} in a bottleneck link},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {66},
  number       = {1-2},
  pages        = {59--77},
  year         = {2011},
  url          = {https://doi.org/10.1007/s12243-010-0204-0},
  doi          = {10.1007/S12243-010-0204-0},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/RaiS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/SerwaddaPK11,
  author       = {Abdul Serwadda and
                  Vir V. Phoha and
                  Ankunda R. Kiremire},
  editor       = {Chad Heitzenrater and
                  Scott Craver and
                  Jana Dittmann},
  title        = {Using global knowledge of users' typing traits to attack keystroke
                  biometrics templates},
  booktitle    = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia
                  and security, MM{\&}Sec '11, Buffalo, New York, USA, September
                  29-30, 2011},
  pages        = {51--60},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2037252.2037263},
  doi          = {10.1145/2037252.2037263},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/SerwaddaPK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SerwaddaPR10,
  author       = {Abdul Serwadda and
                  Vir V. Phoha and
                  Idris A. Rai},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Size-based scheduling: a recipe for DDOS?},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {729--731},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866412},
  doi          = {10.1145/1866307.1866412},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SerwaddaPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics