Follow
William Aiken
Title
Cited by
Cited by
Year
Cloud security auditing: challenges and emerging approaches
J Ryoo, S Rizvi, W Aiken, J Kissell
IEEE Security & Privacy 12 (6), 68-74, 2013
922013
Neural network laundering: Removing black-box backdoor watermarks from deep neural networks
W Aiken, H Kim, S Woo, J Ryoo
Computers & Security 106, 102277, 2021
722021
A security evaluation framework for cloud security auditing
S Rizvi, J Ryoo, J Kissell, W Aiken, Y Liu
The Journal of Supercomputing 74, 5774-5796, 2018
362018
POSTER: DeepCRACk: Using deep learning to automatically crack audio CAPTCHAs
W Aiken, H Kim
Proceedings of the 2018 on Asia conference on computer and communications …, 2018
122018
POSTER: I Can't Hear This Because I Am Human: A Novel Design of Audio CAPTCHA System
J Choi, T Oh, W Aiken, SS Woo, H Kim
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
102018
LightLock: User identification system using light intensity readings on smartphones
MA Alawami, W Aiken, H Kim
IEEE Sensors Journal 20 (5), 2710-2721, 2019
82019
Bypassing the integrity checking of rights objects in OMA DRM: A case study with the MelOn music service
J Choi, W Aiken, J Ryoo, H Kim
Proceedings of the 10th International Conference on Ubiquitous Information …, 2016
72016
Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin'Forks' in the Wild
J Choi, W Choi, W Aiken, H Kim, JH Huh, T Kim, Y Kim, R Anderson
arXiv preprint arXiv:2201.08678, 2022
62022
The Light Will Be with You. Always--A Novel Continuous Mobile Authentication with the Light Sensor (poster)
MA Alawami, W Aiken, H Kim
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
52019
Hey Siri–Are You There?: Jamming of Voice Commands Using the Resonance Effect (Work-in-Progress)
T Oh, W Aiken, H Kim
2018 International Conference on Software Security and Assurance (ICSSA), 73-76, 2018
42018
KaaSP: keying as a service provider for small and medium enterprises using untrusted cloud services
W Aiken, J Ryoo, H Kim
Proceedings of the 9th International Conference on Ubiquitous Information …, 2015
32015
Measuring Improvement of F-Scores in Detection of Self-Admitted Technical Debt
W Aiken, PK Mvula, P Branco, GV Jourdan, M Sabetzadeh, H Viktor
arXiv preprint arXiv:2303.09617, 2023
22023
An Internet of Things (IoT) Security Assessment for Households
W Aiken, J Ryoo, S Rizvi
2020 International Conference on Software Security and Assurance (ICSSA), 53-59, 2020
22020
An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks
W Aiken, H Kim, J Ryoo, MB Rosson
2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-6, 2018
22018
Information Systems Security Readiness Assessment for Municipalities in Pennsylvania
J Ryoo, S Rizvi, W Aiken, B Long-Yarrison
12020
Ignore the Noise: Using Autoencoders against Adversarial Attacks in Reinforcement Learning (Lightning Talk)
W Aiken, H Kim
2018 International Conference on Software Security and Assurance (ICSSA), 81-81, 2018
12018
Hey Siri–are you there?: Jamming of voice commands using the resonance effect
T Oh, W Aiken, H Kim
1
Going Haywire: False Friends in Federated Learning and How to Find Them
W Aiken, P Branco, GV Jourdan
Proceedings of the 2023 ACM Asia Conference on Computer and Communications …, 2023
2023
Featured: More
W Aiken, J Kissell, J Ryoo, S Rizvi
Cloud Security Auditing
J Ryoo, S Rizvi, W Aiken, J Kissell
The system can't perform the operation now. Try again later.
Articles 1–20