Faysal Hossain Shezan

According to our database1, Faysal Hossain Shezan authored at least 16 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Breaking Down the Defenses: A Comparative Survey of Attacks on Large Language Models.
CoRR, 2024

2023
SenRev: Measurement of Personal Information Disclosure in Online Health Communities.
Proc. Priv. Enhancing Technol., July, 2023

Towards Usable Security Analysis Tools for Trigger-Action Programming.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

CHKPLUG: Checking GDPR Compliance of WordPress Plugins via Cross-language Code Property Graph.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

2020
VerHealth: Vetting Medical Voice Applications through Policy Enforcement.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

Using Sonar for Liveness Detection to Protect Smart Speakers against Remote Attackers.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applications.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
Side Channel Attacks in Computation Offloading Systems with GPU Virtualization.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Detecting Abnormal Behaviors in Smart Home.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems Workshops, 2019

2018
Categorizing Defects in Infrastructure as Code.
CoRR, 2018

2017
Vulnerability detection in recent Android apps: An empirical study.
Proceedings of the International Conference on Networking, Systems and Security, 2017

Poster: HeartFit: An Intuitive Smartphone Application for Well-being of Hypertensive Patients.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

2016
Privacy in Repair: An Analysis of the Privacy Challenges Surrounding Broken Digital Artifacts in Bangladesh.
Proceedings of the Eighth International Conference on Information and Communication Technologies and Development, 2016

High Performance Approximate Computing by Adaptive Relaxed Synchronization.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016


  Loading...