Cloud security auditing: challenges and emerging approaches J Ryoo, S Rizvi, W Aiken, J Kissell
IEEE Security & Privacy 12 (6), 68-74, 2013
92 2013 Neural network laundering: Removing black-box backdoor watermarks from deep neural networks W Aiken, H Kim, S Woo, J Ryoo
Computers & Security 106, 102277, 2021
72 2021 A security evaluation framework for cloud security auditing S Rizvi, J Ryoo, J Kissell, W Aiken, Y Liu
The Journal of Supercomputing 74, 5774-5796, 2018
36 2018 POSTER: DeepCRACk: Using deep learning to automatically crack audio CAPTCHAs W Aiken, H Kim
Proceedings of the 2018 on Asia conference on computer and communications …, 2018
12 2018 POSTER: I Can't Hear This Because I Am Human: A Novel Design of Audio CAPTCHA System J Choi, T Oh, W Aiken, SS Woo, H Kim
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
10 2018 LightLock: User identification system using light intensity readings on smartphones MA Alawami, W Aiken, H Kim
IEEE Sensors Journal 20 (5), 2710-2721, 2019
8 2019 Bypassing the integrity checking of rights objects in OMA DRM: A case study with the MelOn music service J Choi, W Aiken, J Ryoo, H Kim
Proceedings of the 10th International Conference on Ubiquitous Information …, 2016
7 2016 Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin'Forks' in the Wild J Choi, W Choi, W Aiken, H Kim, JH Huh, T Kim, Y Kim, R Anderson
arXiv preprint arXiv:2201.08678, 2022
6 2022 The Light Will Be with You. Always--A Novel Continuous Mobile Authentication with the Light Sensor (poster) MA Alawami, W Aiken, H Kim
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
5 2019 Hey Siri–Are You There?: Jamming of Voice Commands Using the Resonance Effect (Work-in-Progress) T Oh, W Aiken, H Kim
2018 International Conference on Software Security and Assurance (ICSSA), 73-76, 2018
4 2018 KaaSP: keying as a service provider for small and medium enterprises using untrusted cloud services W Aiken, J Ryoo, H Kim
Proceedings of the 9th International Conference on Ubiquitous Information …, 2015
3 2015 Measuring Improvement of F -Scores in Detection of Self-Admitted Technical Debt W Aiken, PK Mvula, P Branco, GV Jourdan, M Sabetzadeh, H Viktor
arXiv preprint arXiv:2303.09617, 2023
2 2023 An Internet of Things (IoT) Security Assessment for Households W Aiken, J Ryoo, S Rizvi
2020 International Conference on Software Security and Assurance (ICSSA), 53-59, 2020
2 2020 An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks W Aiken, H Kim, J Ryoo, MB Rosson
2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-6, 2018
2 2018 Information Systems Security Readiness Assessment for Municipalities in Pennsylvania J Ryoo, S Rizvi, W Aiken, B Long-Yarrison
1 2020 Ignore the Noise: Using Autoencoders against Adversarial Attacks in Reinforcement Learning (Lightning Talk) W Aiken, H Kim
2018 International Conference on Software Security and Assurance (ICSSA), 81-81, 2018
1 2018 Hey Siri–are you there?: Jamming of voice commands using the resonance effect T Oh, W Aiken, H Kim
1 Going Haywire: False Friends in Federated Learning and How to Find Them W Aiken, P Branco, GV Jourdan
Proceedings of the 2023 ACM Asia Conference on Computer and Communications …, 2023
2023 Featured: More W Aiken, J Kissell, J Ryoo, S Rizvi
Cloud Security Auditing J Ryoo, S Rizvi, W Aiken, J Kissell