Cloud security auditing: challenges and emerging approaches J Ryoo, S Rizvi, W Aiken, J Kissell
IEEE Security & Privacy 12 (6), 68-74, 2013
100 2013 Neural network laundering: Removing black-box backdoor watermarks from deep neural networks W Aiken, H Kim, S Woo, J Ryoo
Computers & Security 106, 102277, 2021
88 2021 A security evaluation framework for cloud security auditing S Rizvi, J Ryoo, J Kissell, W Aiken, Y Liu
The Journal of Supercomputing 74, 5774-5796, 2018
42 2018 POSTER: DeepCRACk: Using deep learning to automatically crack audio CAPTCHAs W Aiken, H Kim
Proceedings of the 2018 on Asia conference on computer and communications …, 2018
14 2018 POSTER: I Can't Hear This Because I Am Human: A Novel Design of Audio CAPTCHA System J Choi, T Oh, W Aiken, SS Woo, H Kim
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
11 2018 LightLock: User identification system using light intensity readings on smartphones MA Alawami, W Aiken, H Kim
IEEE Sensors Journal 20 (5), 2710-2721, 2019
9 2019 Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin'Forks' in the Wild J Choi, W Choi, W Aiken, H Kim, JH Huh, T Kim, Y Kim, R Anderson
arXiv preprint arXiv:2201.08678, 2022
7 2022 Bypassing the integrity checking of rights objects in OMA DRM: A case study with the MelOn music service J Choi, W Aiken, J Ryoo, H Kim
Proceedings of the 10th International Conference on Ubiquitous Information …, 2016
7 2016 The Light Will Be with You. Always--A Novel Continuous Mobile Authentication with the Light Sensor (poster) MA Alawami, W Aiken, H Kim
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
6 2019 Measuring Improvement of F -Scores in Detection of Self-Admitted Technical Debt W Aiken, PK Mvula, P Branco, GV Jourdan, M Sabetzadeh, H Viktor
arXiv preprint arXiv:2303.09617, 2023
5 2023 Hey Siri–Are You There?: Jamming of Voice Commands Using the Resonance Effect (Work-in-Progress) T Oh, W Aiken, H Kim
2018 International Conference on Software Security and Assurance (ICSSA), 73-76, 2018
5 2018 An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks W Aiken, H Kim, J Ryoo, MB Rosson
2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-6, 2018
3 2018 KaaSP: keying as a service provider for small and medium enterprises using untrusted cloud services W Aiken, J Ryoo, H Kim
Proceedings of the 9th International Conference on Ubiquitous Information …, 2015
3 2015 An Internet of Things (IoT) Security Assessment for Households W Aiken, J Ryoo, S Rizvi
2020 International Conference on Software Security and Assurance (ICSSA), 53-59, 2020
2 2020 Information Systems Security Readiness Assessment for Municipalities in Pennsylvania J Ryoo, S Rizvi, W Aiken, B Long-Yarrison
2 2020 Strategic Digitalization in Oil and Gas: A Case Study on Mixed Reality and Digital Twins W Aiken, L Carden, A Bhabhrawala, P Branco, GV Jourdan, A Berg
IEEE Access, 2024
1 2024 Ignore the Noise: Using Autoencoders against Adversarial Attacks in Reinforcement Learning (Lightning Talk) W Aiken, H Kim
2018 International Conference on Software Security and Assurance (ICSSA), 81-81, 2018
1 2018 Hey Siri–are you there?: Jamming of voice commands using the resonance effect T Oh, W Aiken, H Kim
1 DevilDiffusion: Embedding Hidden Noise Backdoors into Diffusion Models P Branco, GV Jourdan
2024 21st Annual International Conference on Privacy, Security and Trust (PST), 2024
2024 Going Haywire: False Friends in Federated Learning and How to Find Them W Aiken, P Branco, GV Jourdan
Proceedings of the 2023 ACM Asia Conference on Computer and Communications …, 2023
2023