Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Abdul Serwadda
@inproceedings{DBLP:conf/icaart/ArefinAAIS24, author = {Sayed Erfan Arefin and Tasnia Heya Ashrafi and Hasan Al{-}Qudah and Ynes Ineza and Abdul Serwadda}, editor = {Ana Paula Rocha and Luc Steels and H. Jaap van den Herik}, title = {Unmasking the Giant: {A} Comprehensive Evaluation of ChatGPT's Proficiency in Coding Algorithms and Data Structures}, booktitle = {Proceedings of the 16th International Conference on Agents and Artificial Intelligence, {ICAART} 2024, Volume 1, Rome, Italy, February 24-26, 2024}, pages = {412--419}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012467100003636}, doi = {10.5220/0012467100003636}, timestamp = {Thu, 04 Apr 2024 15:53:04 +0200}, biburl = {https://dblp.org/rec/conf/icaart/ArefinAAIS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/semco/AshrafiIAUS24, author = {Tasnia Heya Ashrafi and Ynes Ineza and Sayed Erfan Arefin and Godsgift Uzor and Abdul Serwadda}, title = {Stable or Shaky? The Semantics of ChatGPT's Behavior Under Repeated Queries}, booktitle = {18th {IEEE} International Conference on Semantic Computing, {ICSC} 2024, Laguna Hills, CA, USA, February 5-7, 2024}, pages = {110--116}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICSC59802.2024.00023}, doi = {10.1109/ICSC59802.2024.00023}, timestamp = {Wed, 27 Mar 2024 21:31:51 +0100}, biburl = {https://dblp.org/rec/conf/semco/AshrafiIAUS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-05360, author = {Sayed Erfan Arefin and Tasnia Heya Ashrafi and Hasan Al{-}Qudah and Ynes Ineza and Abdul Serwadda}, title = {Unmasking the giant: {A} comprehensive evaluation of ChatGPT's proficiency in coding algorithms and data structures}, journal = {CoRR}, volume = {abs/2307.05360}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.05360}, doi = {10.48550/ARXIV.2307.05360}, eprinttype = {arXiv}, eprint = {2307.05360}, timestamp = {Mon, 24 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-05360.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/WasswaS22, author = {Hassan Wasswa and Abdul Serwadda}, editor = {Andrew H. Sung and Rakesh M. Verma and Roland H. C. Yap}, title = {The Proof is in the Glare: On the Privacy Risk Posed by Eyeglasses in Video Calls}, booktitle = {IWSPA@CODASPY 2022: Proceedings of the 2022 {ACM} on International Workshop on Security and Privacy Analytics, Baltimore, MD, USA, April 27, 2022}, pages = {46--54}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3510548.3519378}, doi = {10.1145/3510548.3519378}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/WasswaS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/CasqueiroAASW22, author = {Gustavo Casqueiro and Sayed Erfan Arefin and Tasnia Heya Ashrafi and Abdul Serwadda and Hassan Wasswa}, title = {Weaponizing IoT Sensors: When Table Choice Poses a Security Vulnerability}, booktitle = {4th {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, {TPS-ISA} 2022, Atlanta, GA, USA, December 14-17, 2022}, pages = {160--167}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/TPS-ISA56441.2022.00029}, doi = {10.1109/TPS-ISA56441.2022.00029}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tpsisa/CasqueiroAASW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-08217, author = {Tasnia Heya Ashrafi and Abdul Serwadda and Isaac Griswold{-}Steiner and Richard Matovu}, title = {A Wearables-Driven Attack on Examination Proctoring}, journal = {CoRR}, volume = {abs/2203.08217}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.08217}, doi = {10.48550/ARXIV.2203.08217}, eprinttype = {arXiv}, eprint = {2203.08217}, timestamp = {Mon, 28 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-08217.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Griswold-Steiner21, author = {Isaac Griswold{-}Steiner and Zachary LeFevre and Abdul Serwadda}, title = {Smartphone speech privacy concerns from side-channel attacks on facial biomechanics}, journal = {Comput. Secur.}, volume = {100}, pages = {102110}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102110}, doi = {10.1016/J.COSE.2020.102110}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Griswold-Steiner21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/Griswold-Steiner21, author = {Isaac Griswold{-}Steiner and N'godjigui Junior Diarrassouba and Shreyesh Arangath and Abdul Serwadda}, editor = {Yoshifumi Kitamura and Aaron Quigley and Katherine Isbister and Takeo Igarashi}, title = {User Perceptions of Defensive Techniques Against Keystroke Timing Attacks During Password Entry}, booktitle = {{CHI} '21: {CHI} Conference on Human Factors in Computing Systems, Virtual Event / Yokohama Japan, May 8-13, 2021, Extended Abstracts}, pages = {244:1--244:6}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3411763.3451667}, doi = {10.1145/3411763.3451667}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/Griswold-Steiner21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica2/0001HSH21, author = {Jundong Chen and Md. Shafaeat Hossain and Abdul Serwadda and Fei Han}, title = {Modeling Follow-Unfollow Mechanism in Social Networks with Evolutionary Game}, booktitle = {{IEEE} International Conference on Agents, {ICA} 2021, Kyoto, Japan, December 13-15, 2021}, pages = {37--40}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICA54137.2021.00013}, doi = {10.1109/ICA54137.2021.00013}, timestamp = {Fri, 24 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ica2/0001HSH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ArefinS21, author = {Sayed Erfan Arefin and Abdul Serwadda}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {Deep Neural Exposure: You Can Run, But Not Hide Your Neural Network Architecture!}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {75--80}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3460415}, doi = {10.1145/3437880.3460415}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ArefinS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/AshrafiSGM21, author = {Tasnia Heya Ashrafi and Abdul Serwadda and Isaac Griswold{-}Steiner and Richard Matovu}, title = {A Wearables-Driven Attack on Examination Proctoring}, booktitle = {18th International Conference on Privacy, Security and Trust, {PST} 2021, Auckland, New Zealand, December 13-15, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/PST52912.2021.9647760}, doi = {10.1109/PST52912.2021.9647760}, timestamp = {Tue, 28 Dec 2021 14:39:32 +0100}, biburl = {https://dblp.org/rec/conf/pst/AshrafiSGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartnets/AcharyaS21, author = {Sraddhanjali Acharya and Abdul Serwadda}, title = {On Finger Stretching and Bending Dynamics as a Biometric Modality}, booktitle = {International Conference on Smart Applications, Communications and Networking, SmartNets 2021, Glasgow, United Kingdom, September 22-24, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SmartNets50376.2021.9555429}, doi = {10.1109/SMARTNETS50376.2021.9555429}, timestamp = {Thu, 14 Oct 2021 16:38:35 +0200}, biburl = {https://dblp.org/rec/conf/smartnets/AcharyaS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/AcharyaSB21, author = {Sraddhanjali Acharya and Abdul Serwadda and Argenis V. Bilbao}, title = {That phone charging hub knows your video playlist!}, booktitle = {2021 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing, Advanced {\&} Trusted Computing, Scalable Computing {\&} Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI), Atlanta, GA, USA, October 18-21, 2021}, pages = {160--169}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SWC50871.2021.00031}, doi = {10.1109/SWC50871.2021.00031}, timestamp = {Fri, 03 Dec 2021 17:36:57 +0100}, biburl = {https://dblp.org/rec/conf/uic/AcharyaSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/MatovuSBG20, author = {Richard Matovu and Abdul Serwadda and Argenis V. Bilbao and Isaac Griswold{-}Steiner}, editor = {Vassil Roussev and Bhavani Thuraisingham and Barbara Carminati and Murat Kantarcioglu}, title = {Defensive Charging: Mitigating Power Side-Channel Attacks on Charging Smartphones}, booktitle = {{CODASPY} '20: Tenth {ACM} Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March 16-18, 2020}, pages = {179--190}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3374664.3375732}, doi = {10.1145/3374664.3375732}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/MatovuSBG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbbis/Griswold-Steiner19, author = {Isaac Griswold{-}Steiner and Richard Matovu and Abdul Serwadda}, title = {Wearables-Driven Freeform Handwriting Authentication}, journal = {{IEEE} Trans. Biom. Behav. Identity Sci.}, volume = {1}, number = {3}, pages = {152--164}, year = {2019}, url = {https://doi.org/10.1109/TBIOM.2019.2912401}, doi = {10.1109/TBIOM.2019.2912401}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbbis/Griswold-Steiner19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccda/AcharyaMSG19, author = {Sraddhanjali Acharya and Richard Matovu and Abdul Serwadda and Isaac Griswold{-}Steiner}, title = {Gamification of Wearable Data Collection: {A} Tool for both Friend and Foe}, booktitle = {Proceedings of the 3rd International Conference on Compute and Data Analysis, {ICCDA} 2019, Kahului, HI, USA, March 14-17, 2019}, pages = {68--77}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3314545.3314572}, doi = {10.1145/3314545.3314572}, timestamp = {Wed, 03 Jun 2020 19:14:31 +0200}, biburl = {https://dblp.org/rec/conf/iccda/AcharyaMSG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icphm/GecgelEDSAN19, author = {Ozhan Gecgel and Stephen Ekwaro{-}Osire and Jo{\~{a}}o Paulo Dias and Abdul Serwadda and Fisseha M. Alemayehu and Abraham Nispel}, title = {Gearbox Fault Diagnostics Using Deep Learning with Simulated Data}, booktitle = {2019 {IEEE} International Conference on Prognostics and Health Management, {ICPHM} 2019, San Francisco, CA, USA, June 17-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICPHM.2019.8819423}, doi = {10.1109/ICPHM.2019.8819423}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icphm/GecgelEDSAN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/FykeGS19, author = {Zakery Fyke and Isaac Griswold{-}Steiner and Abdul Serwadda}, title = {Prying into Private Spaces Using Mobile Device Motion Sensors}, booktitle = {17th International Conference on Privacy, Security and Trust, {PST} 2019, Fredericton, NB, Canada, August 26-28, 2019}, pages = {1--10}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/PST47121.2019.8949056}, doi = {10.1109/PST47121.2019.8949056}, timestamp = {Mon, 13 Jan 2020 18:37:30 +0100}, biburl = {https://dblp.org/rec/conf/pst/FykeGS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-09123, author = {Richard Matovu and Isaac Griswold{-}Steiner and Abdul Serwadda}, title = {Kinetic Song Comprehension: Deciphering Personal Listening Habits via Phone Vibrations}, journal = {CoRR}, volume = {abs/1909.09123}, year = {2019}, url = {http://arxiv.org/abs/1909.09123}, eprinttype = {arXiv}, eprint = {1909.09123}, timestamp = {Tue, 24 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-09123.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biosig/MatovuSIG18, author = {Richard Matovu and Abdul Serwadda and David Irakiza and Isaac Griswold{-}Steiner}, editor = {Arslan Br{\"{o}}mme and Christoph Busch and Antitza Dantcheva and Christian Rathgeb and Andreas Uhl}, title = {Jekyll and Hyde: On The Double-Faced Nature of Smart-Phone Sensor Noise Injection}, booktitle = {2018 International Conference of the Biometrics Special Interest Group, {BIOSIG} 2018, Darmstadt, Germany, September 26-28, 2018}, series = {{LNI}}, volume = {{P-282}}, pages = {1--6}, publisher = {{GI} / {IEEE}}, year = {2018}, url = {https://doi.org/10.23919/BIOSIG.2018.8553043}, doi = {10.23919/BIOSIG.2018.8553043}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/biosig/MatovuSIG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/MustafaMSM18, author = {Tahrima Mustafa and Richard Matovu and Abdul Serwadda and Nicholas Muirhead}, editor = {Rakesh M. Verma and Murat Kantarcioglu}, title = {Unsure How to Authenticate on Your {VR} Headset?: Come on, Use Your Head!}, booktitle = {Proceedings of the Fourth {ACM} International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018}, pages = {23--30}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3180445.3180450}, doi = {10.1145/3180445.3180450}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/MustafaMSM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uemcom/MatovuS18, author = {Richard Matovu and Abdul Serwadda}, editor = {Satyajit Chakrabarti and Himadri Nath Saha}, title = {Gaming the Gamer: Adversarial Fingerprinting of Gaming Apps using Smartphone Accelerometers}, booktitle = {9th {IEEE} Annual Ubiquitous Computing, Electronics {\&} Mobile Communication Conference, {UEMCON} 2018, New York City, NY, USA, November 8-10, 2018}, pages = {489--496}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/UEMCON.2018.8796715}, doi = {10.1109/UEMCON.2018.8796715}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/uemcom/MatovuS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uemcom/Griswold-Steiner18, author = {Isaac Griswold{-}Steiner and Zakery Fyke and Mushfique Ahmed and Abdul Serwadda}, editor = {Satyajit Chakrabarti and Himadri Nath Saha}, title = {Morph-a-Dope: Using Pupil Manipulation to Spoof Eye Movement Biometrics}, booktitle = {9th {IEEE} Annual Ubiquitous Computing, Electronics {\&} Mobile Communication Conference, {UEMCON} 2018, New York City, NY, USA, November 8-10, 2018}, pages = {543--552}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/UEMCON.2018.8796625}, doi = {10.1109/UEMCON.2018.8796625}, timestamp = {Mon, 26 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uemcom/Griswold-Steiner18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/Griswold-Steiner17, author = {Isaac Griswold{-}Steiner and Richard Matovu and Abdul Serwadda}, title = {Handwriting watcher: {A} mechanism for smartwatch-driven handwriting authentication}, booktitle = {2017 {IEEE} International Joint Conference on Biometrics, {IJCB} 2017, Denver, CO, USA, October 1-4, 2017}, pages = {216--224}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/BTAS.2017.8272701}, doi = {10.1109/BTAS.2017.8272701}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/icb/Griswold-Steiner17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/SelmicPS16, author = {Rastko R. Selmic and Vir V. Phoha and Abdul Serwadda}, title = {Wireless Sensor Networks - Security, Coverage, and Localization}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46769-6}, doi = {10.1007/978-3-319-46769-6}, isbn = {978-3-319-46767-2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/SelmicPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SerwaddaPWKS16, author = {Abdul Serwadda and Vir V. Phoha and Zibo Wang and Rajesh Kumar and Diksha Shukla}, title = {Toward Robotic Robbery on the Touch Screen}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {4}, pages = {14:1--14:25}, year = {2016}, url = {https://doi.org/10.1145/2898353}, doi = {10.1145/2898353}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/SerwaddaPWKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/btas/KumarPS16, author = {Rajesh Kumar and Vir V. Phoha and Abdul Serwadda}, title = {Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns}, booktitle = {8th {IEEE} International Conference on Biometrics Theory, Applications and Systems, {BTAS} 2016, Niagara Falls, NY, USA, September 6-9, 2016}, pages = {1--8}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/BTAS.2016.7791164}, doi = {10.1109/BTAS.2016.7791164}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/btas/KumarPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/btas/MatovuS16, author = {Richard Matovu and Abdul Serwadda}, title = {Your substance abuse disorder is an open secret! Gleaning sensitive personal information from templates in an EEG-based authentication system}, booktitle = {8th {IEEE} International Conference on Biometrics Theory, Applications and Systems, {BTAS} 2016, Niagara Falls, NY, USA, September 6-9, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/BTAS.2016.7791210}, doi = {10.1109/BTAS.2016.7791210}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/btas/MatovuS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SerwaddaP15, author = {Abdul Serwadda and Vir V. Phoha}, title = {When Mice devour the Elephants: {A} DDoS attack against size-based scheduling schemes in the internet}, journal = {Comput. Secur.}, volume = {53}, pages = {31--43}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.04.014}, doi = {10.1016/J.COSE.2015.04.014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SerwaddaP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/btas/PoudelSP15, author = {Sujit Poudel and Abdul Serwadda and Vir V. Phoha}, title = {On humanoid robots imitating human touch gestures on the smart phone}, booktitle = {{IEEE} 7th International Conference on Biometrics Theory, Applications and Systems, {BTAS} 2015, Arlington, VA, USA, September 8-11, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/BTAS.2015.7358781}, doi = {10.1109/BTAS.2015.7358781}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/btas/PoudelSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/btas/SerwaddaPPHBBC15, author = {Abdul Serwadda and Vir V. Phoha and Sujit Poudel and Leanne M. Hirshfield and Danushka Bandara and Sarah E. Bratt and Mark R. Costa}, title = {fNIRS: {A} new modality for brain activity-based biometric authentication}, booktitle = {{IEEE} 7th International Conference on Biometrics Theory, Applications and Systems, {BTAS} 2015, Arlington, VA, USA, September 8-11, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/BTAS.2015.7358763}, doi = {10.1109/BTAS.2015.7358763}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/btas/SerwaddaPPHBBC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShuklaKSP14, author = {Diksha Shukla and Rajesh Kumar and Abdul Serwadda and Vir V. Phoha}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Beware, Your Hands Reveal Your Secrets!}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {904--917}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660360}, doi = {10.1145/2660267.2660360}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ShuklaKSP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/PrimoPKS14, author = {Abena Primo and Vir V. Phoha and Rajesh Kumar and Abdul Serwadda}, title = {Context-Aware Active Authentication Using Smartphone Accelerometer Measurements}, booktitle = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} Workshops 2014, Columbus, OH, USA, June 23-28, 2014}, pages = {98--105}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CVPRW.2014.20}, doi = {10.1109/CVPRW.2014.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/PrimoPKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/SerwaddaWKGPGBRPB13, author = {Abdul Serwadda and Zibo Wang and Patrick Koch and Sathya Govindarajan and Raviteja Pokala and Adam Goodkind and David Guy Brizan and Andrew Rosenberg and Vir V. Phoha and Kiran S. Balagani}, title = {Scan-Based Evaluation of Continuous Keystroke Authentication Systems}, journal = {{IT} Prof.}, volume = {15}, number = {4}, pages = {20--23}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.51}, doi = {10.1109/MITP.2013.51}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itpro/SerwaddaWKGPGBRPB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SerwaddaP13, author = {Abdul Serwadda and Vir V. Phoha}, title = {Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {2}, pages = {8}, year = {2013}, url = {https://doi.org/10.1145/2516951.2516960}, doi = {10.1145/2516951.2516960}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/SerwaddaP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/btas/SerwaddaPW13, author = {Abdul Serwadda and Vir V. Phoha and Zibo Wang}, title = {Which verifiers work?: {A} benchmark evaluation of touch-based authentication algorithms}, booktitle = {{IEEE} Sixth International Conference on Biometrics: Theory, Applications and Systems, {BTAS} 2013, Arlington, VA, USA, September 29 - October 2, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/BTAS.2013.6712758}, doi = {10.1109/BTAS.2013.6712758}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/btas/SerwaddaPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SerwaddaP13, author = {Abdul Serwadda and Vir V. Phoha}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {When kids' toys breach mobile phone security}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {599--610}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516659}, doi = {10.1145/2508859.2516659}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SerwaddaP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/btas/WangSBP12, author = {Zibo Wang and Abdul Serwadda and Kiran S. Balagani and Vir V. Phoha}, title = {Transforming animals in a cyber-behavioral biometric menagerie with Frog-Boiling attacks}, booktitle = {{IEEE} Fifth International Conference on Biometrics: Theory, Applications and Systems, {BTAS} 2012, Arlington, VA, USA, September 23-27, 2012}, pages = {289--296}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/BTAS.2012.6374591}, doi = {10.1109/BTAS.2012.6374591}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/btas/WangSBP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/RaiS11, author = {Idris A. Rai and Abdul Serwadda}, title = {Towards end-host-based identification of competing protocols against {TCP} in a bottleneck link}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {66}, number = {1-2}, pages = {59--77}, year = {2011}, url = {https://doi.org/10.1007/s12243-010-0204-0}, doi = {10.1007/S12243-010-0204-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/RaiS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/SerwaddaPK11, author = {Abdul Serwadda and Vir V. Phoha and Ankunda R. Kiremire}, editor = {Chad Heitzenrater and Scott Craver and Jana Dittmann}, title = {Using global knowledge of users' typing traits to attack keystroke biometrics templates}, booktitle = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia and security, MM{\&}Sec '11, Buffalo, New York, USA, September 29-30, 2011}, pages = {51--60}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2037252.2037263}, doi = {10.1145/2037252.2037263}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/SerwaddaPK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SerwaddaPR10, author = {Abdul Serwadda and Vir V. Phoha and Idris A. Rai}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Size-based scheduling: a recipe for DDOS?}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {729--731}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866412}, doi = {10.1145/1866307.1866412}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SerwaddaPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.