Ajaya Neupane

Orcid: 0009-0004-7766-4726

According to our database1, Ajaya Neupane authored at least 22 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Machine learning based fileless malware traffic classification using image visualization.
Cybersecur., December, 2023

Users Really Do Respond To Smishing.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

2022
BigEye: Detection and Summarization of Key Global Events From Distributed Crowdsensed Data.
IEEE Internet Things J., 2022

2021
Side Channel Attacks on GPUs.
IEEE Trans. Dependable Secur. Comput., 2021

Beyond the CPU: Side-Channel Attacks on GPUs.
IEEE Des. Test, 2021

2019
Brain Hemorrhage: When Brainwaves Leak Sensitive Medical Conditions and Personal Information.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

The Crux of Voice (In)Security: A Brain Study of Speaker Legitimacy Detection.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

CATCHA: When Cats Track Your Movements Online.
Proceedings of the Information Security Practice and Experience, 2019

Edge-Assisted Detection and Summarization of Key Global Events from Distributed Crowd-Sensed Data.
Proceedings of the IEEE International Conference on Cloud Engineering, 2019

2018
Adversarial Perturbations Against Real-Time Video Classification Systems.
CoRR, 2018

Learning Tensor-Based Representations from Brain-Computer Interface Data for Cybersecurity.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2018

Rendered Insecure: GPU Side Channel Attacks are Practical.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

IAC: On the Feasibility of Utilizing Neural Signals for Access Control.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

Do Social Disorders Facilitate Social Engineering?: A Case Study of Autism and Phishing Attacks.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Neural Underpinnings of Website Legitimacy and Familiarity Detection: An fNIRS Study.
Proceedings of the 26th International Conference on World Wide Web, 2017

PEEP: Passively Eavesdropping Private Input via Brainwave Signals.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
Neural Markers of Cybersecurity: An fMRI Study of Phishing and Malware Warnings.
IEEE Trans. Inf. Forensics Secur., 2016

Task-Dependent Changes in Frontal-Parietal Activation and Connectivity During Visual Search.
Brain Connect., 2016

2015
A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware Warnings.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Neural Signatures of User-Centered Security: An fMRI Study of Phishing, and Malware Warnings.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014


  Loading...