Seguir
William Aiken
William Aiken
Dirección de correo verificada de uottawa.ca
Título
Citado por
Citado por
Año
Cloud security auditing: challenges and emerging approaches
J Ryoo, S Rizvi, W Aiken, J Kissell
IEEE Security & Privacy 12 (6), 68-74, 2013
1002013
Neural network laundering: Removing black-box backdoor watermarks from deep neural networks
W Aiken, H Kim, S Woo, J Ryoo
Computers & Security 106, 102277, 2021
882021
A security evaluation framework for cloud security auditing
S Rizvi, J Ryoo, J Kissell, W Aiken, Y Liu
The Journal of Supercomputing 74, 5774-5796, 2018
422018
POSTER: DeepCRACk: Using deep learning to automatically crack audio CAPTCHAs
W Aiken, H Kim
Proceedings of the 2018 on Asia conference on computer and communications …, 2018
142018
POSTER: I Can't Hear This Because I Am Human: A Novel Design of Audio CAPTCHA System
J Choi, T Oh, W Aiken, SS Woo, H Kim
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
112018
LightLock: User identification system using light intensity readings on smartphones
MA Alawami, W Aiken, H Kim
IEEE Sensors Journal 20 (5), 2710-2721, 2019
92019
Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin'Forks' in the Wild
J Choi, W Choi, W Aiken, H Kim, JH Huh, T Kim, Y Kim, R Anderson
arXiv preprint arXiv:2201.08678, 2022
72022
Bypassing the integrity checking of rights objects in OMA DRM: A case study with the MelOn music service
J Choi, W Aiken, J Ryoo, H Kim
Proceedings of the 10th International Conference on Ubiquitous Information …, 2016
72016
The Light Will Be with You. Always--A Novel Continuous Mobile Authentication with the Light Sensor (poster)
MA Alawami, W Aiken, H Kim
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
62019
Measuring Improvement of F-Scores in Detection of Self-Admitted Technical Debt
W Aiken, PK Mvula, P Branco, GV Jourdan, M Sabetzadeh, H Viktor
arXiv preprint arXiv:2303.09617, 2023
52023
Hey Siri–Are You There?: Jamming of Voice Commands Using the Resonance Effect (Work-in-Progress)
T Oh, W Aiken, H Kim
2018 International Conference on Software Security and Assurance (ICSSA), 73-76, 2018
52018
An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks
W Aiken, H Kim, J Ryoo, MB Rosson
2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-6, 2018
32018
KaaSP: keying as a service provider for small and medium enterprises using untrusted cloud services
W Aiken, J Ryoo, H Kim
Proceedings of the 9th International Conference on Ubiquitous Information …, 2015
32015
An Internet of Things (IoT) Security Assessment for Households
W Aiken, J Ryoo, S Rizvi
2020 International Conference on Software Security and Assurance (ICSSA), 53-59, 2020
22020
Information Systems Security Readiness Assessment for Municipalities in Pennsylvania
J Ryoo, S Rizvi, W Aiken, B Long-Yarrison
22020
Strategic Digitalization in Oil and Gas: A Case Study on Mixed Reality and Digital Twins
W Aiken, L Carden, A Bhabhrawala, P Branco, GV Jourdan, A Berg
IEEE Access, 2024
12024
Ignore the Noise: Using Autoencoders against Adversarial Attacks in Reinforcement Learning (Lightning Talk)
W Aiken, H Kim
2018 International Conference on Software Security and Assurance (ICSSA), 81-81, 2018
12018
Hey Siri–are you there?: Jamming of voice commands using the resonance effect
T Oh, W Aiken, H Kim
1
DevilDiffusion: Embedding Hidden Noise Backdoors into Diffusion Models
P Branco, GV Jourdan
2024 21st Annual International Conference on Privacy, Security and Trust (PST), 2024
2024
Going Haywire: False Friends in Federated Learning and How to Find Them
W Aiken, P Branco, GV Jourdan
Proceedings of the 2023 ACM Asia Conference on Computer and Communications …, 2023
2023
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20