Brent Lagesse

Orcid: 0000-0002-0996-408X

According to our database1, Brent Lagesse authored at least 39 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The Diversity-Hire Narrative in CS: Sources, Impacts, and Responses.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

"Where Am I?": Unraveling Challenges in Smart City Data Cleaning to Establish a Ground Truth Framework.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2024

2023
Computing Specializations: Perceptions of AI and Cybersecurity Among CS Students.
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 1, 2023

Keyword Extraction From Specification Documents for Planning Security Mechanisms.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

The Diversity-Hire Narrative in CS: Sources, Impacts, and Mitigation Strategies.
Proceedings of the 2023 ACM Conference on International Computing Education Research, 2023

2022
Towards Lightweight Detection of Design Patterns in Source Code.
Proceedings of the 34th International Conference on Software Engineering and Knowledge Engineering, 2022

2021
Privacy Preserving Techniques Applied to CPNI Data: Analysis and Recommendations.
CoRR, 2021

You Had to Be There: Private Video Sharing for Mobile Phones using Fully Homomorphic Encryption.
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021

2020
Detecting hidden webcams with delay-tolerant similarity of simultaneous observation.
Pervasive Mob. Comput., 2020

TrustSense: An energy efficient trust scheme for clustered wireless sensor networks.
CoRR, 2020

KeyGuard: Using Selective Encryption to Mitigate Keylogging in Third-Party IME.
CoRR, 2020

Automated Query Generation for Design Pattern Mining in Source Code.
CoRR, 2020

CAPP: A Context-Aware Proof of Presence for Crowdsensing Incentives.
Proceedings of the 2020 IEEE International Conference on Pervasive Computing and Communications Workshops, 2020

Privacy-Preserving Mobile Video Sharing using Fully Homomorphic Encryption.
Proceedings of the 2020 IEEE International Conference on Pervasive Computing and Communications Workshops, 2020

2019
Can Intelligent Hyperparameter Selection Improve Resistance to Adversarial Examples?
CoRR, 2019

Design Patterns for Compensating Controls for Securing Financial Sessions.
Proceedings of the 2019 IEEE SmartWorld, 2019

Do You See What I See?Detecting Hidden Streaming Cameras Through Similarity of Simultaneous Observation.
Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications, 2019

iService: A Cloud-Based Scheduling Service for Efficient Usage of IoT Resources.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

2018
Automated Hidden Sensor Detection in Sensor-Rich Spaces.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018

Detecting Spies in IoT Systems using Cyber-Physical Correlation.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018

Enabling Crowd Sensing for Non-Experts.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018

2017
Living Lab Bamberg: an infrastructure to explore smart city research challenges in the wild.
Künstliche Intell., 2017

Toward consumer-friendly security in smart environments.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

Limited Use Cryptographic Tokens in Securing Ephemeral Cloud Servers.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Analysis of Causative Attacks against SVMs Learning from Data Streams.
Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, 2017

2016
Special issue on "Internet of Things: Research challenges and Solutions".
Comput. Commun., 2016

Securing pervasive systems against adversarial machine learning.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

2012
Analytical evaluation of P2P reputation systems.
Int. J. Commun. Networks Distributed Syst., 2012

2011
Embracing the cloud for better cyber security.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Challenges in securing the interface between the cloud and pervasive systems.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Latency Minimizing Tasking for Information Processing Systems.
Proceedings of the Data Mining Workshops (ICDMW), 2011

2010
Privacy Challenges for Wireless Medical Devices.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

ReSCo: A middleware component for Reliable Service Composition in pervasive systems.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Augmenting trust establishment in dynamic systems with social networks.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
DTT: A Distributed Trust Toolkit for Pervasive Systems.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Trust and Security in Dynamic Systems.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

2008
A Novel Utility and Game-Theoretic Based Security Mechanism for Mobile P2P Systems.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

AREX: An Adaptive System for Secure Resource Access in Mobile P2P Systems.
Proceedings of the Proceedings P2P'08, 2008

2007
UBCA: Utility-Based Clustering Architecture for Peer-to-Peer Systems.
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007


  Loading...