Abdul Serwadda

Orcid: 0000-0002-2907-0673

According to our database1, Abdul Serwadda authored at least 39 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Stable or Shaky? The Semantics of ChatGPT's Behavior Under Repeated Queries.
Proceedings of the 18th IEEE International Conference on Semantic Computing, 2024

Unmasking the Giant: A Comprehensive Evaluation of ChatGPT's Proficiency in Coding Algorithms and Data Structures.
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024

2022
Weaponizing IoT Sensors: When Table Choice Poses a Security Vulnerability.
Proceedings of the 4th IEEE International Conference on Trust, 2022

The Proof is in the Glare: On the Privacy Risk Posed by Eyeglasses in Video Calls.
Proceedings of the IWSPA@CODASPY 2022: Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics, 2022

2021
Smartphone speech privacy concerns from side-channel attacks on facial biomechanics.
Comput. Secur., 2021

That phone charging hub knows your video playlist!
Proceedings of the 2021 IEEE SmartWorld, 2021

On Finger Stretching and Bending Dynamics as a Biometric Modality.
Proceedings of the International Conference on Smart Applications, 2021

A Wearables-Driven Attack on Examination Proctoring.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Deep Neural Exposure: You Can Run, But Not Hide Your Neural Network Architecture!
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

Modeling Follow-Unfollow Mechanism in Social Networks with Evolutionary Game.
Proceedings of the IEEE International Conference on Agents, 2021

User Perceptions of Defensive Techniques Against Keystroke Timing Attacks During Password Entry.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2020
Defensive Charging: Mitigating Power Side-Channel Attacks on Charging Smartphones.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
Wearables-Driven Freeform Handwriting Authentication.
IEEE Trans. Biom. Behav. Identity Sci., 2019

Kinetic Song Comprehension: Deciphering Personal Listening Habits via Phone Vibrations.
CoRR, 2019

Prying into Private Spaces Using Mobile Device Motion Sensors.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Gearbox Fault Diagnostics Using Deep Learning with Simulated Data.
Proceedings of the 2019 IEEE International Conference on Prognostics and Health Management, 2019

Gamification of Wearable Data Collection: A Tool for both Friend and Foe.
Proceedings of the 3rd International Conference on Compute and Data Analysis, 2019

2018
Gaming the Gamer: Adversarial Fingerprinting of Gaming Apps using Smartphone Accelerometers.
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018

Morph-a-Dope: Using Pupil Manipulation to Spoof Eye Movement Biometrics.
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018

Unsure How to Authenticate on Your VR Headset?: Come on, Use Your Head!
Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, 2018

Jekyll and Hyde: On The Double-Faced Nature of Smart-Phone Sensor Noise Injection.
Proceedings of the 2018 International Conference of the Biometrics Special Interest Group, 2018

2017
Handwriting watcher: A mechanism for smartwatch-driven handwriting authentication.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017

2016
Toward Robotic Robbery on the Touch Screen.
ACM Trans. Inf. Syst. Secur., 2016

Your substance abuse disorder is an open secret! Gleaning sensitive personal information from templates in an EEG-based authentication system.
Proceedings of the 8th IEEE International Conference on Biometrics Theory, 2016

Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns.
Proceedings of the 8th IEEE International Conference on Biometrics Theory, 2016

Wireless Sensor Networks - Security, Coverage, and Localization
Springer, ISBN: 978-3-319-46769-6, 2016

2015
When Mice devour the Elephants: A DDoS attack against size-based scheduling schemes in the internet.
Comput. Secur., 2015

fNIRS: A new modality for brain activity-based biometric authentication.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015

On humanoid robots imitating human touch gestures on the smart phone.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015

2014
Context-Aware Active Authentication Using Smartphone Accelerometer Measurements.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2014

Beware, Your Hands Reveal Your Secrets!
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings.
ACM Trans. Inf. Syst. Secur., 2013

Scan-Based Evaluation of Continuous Keystroke Authentication Systems.
IT Prof., 2013

When kids' toys breach mobile phone security.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms.
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013

2012
Transforming animals in a cyber-behavioral biometric menagerie with Frog-Boiling attacks.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

2011
Towards end-host-based identification of competing protocols against TCP in a bottleneck link.
Ann. des Télécommunications, 2011

Using global knowledge of users' typing traits to attack keystroke biometrics templates.
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011

2010
Size-based scheduling: a recipe for DDOS?
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010


  Loading...