George T. Amariucai

Orcid: 0000-0003-4471-6425

Affiliations:
  • Kansas State University, USA


According to our database1, George T. Amariucai authored at least 57 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Economics of Privacy and Utility: Investment Strategies.
IEEE Trans. Inf. Forensics Secur., 2024

Improving behavior based authentication against adversarial attack using XAI.
CoRR, 2024

2023
Measures of Information Leakage for Incomplete Statistical Information: Application to a Binary Privacy Mechanism.
ACM Trans. Priv. Secur., November, 2023

ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications.
IEEE Trans. Dependable Secur. Comput., 2023

Hypersparse Traffic Matrix Construction using GraphBLAS on a DPU.
CoRR, 2023

A Comprehensive and Reliable Feature Attribution Method: Double-sided Remove and Reconstruct (DoRaR).
CoRR, 2023

Preventing Stealthy Attacks on Power Electronics Dominated Grids.
IEEE Access, 2023

Reinforcement Learning Approach to Generate Zero-Dynamics Attacks on Control Systems Without State Space Models.
Proceedings of the Computer Security - ESORICS 2023, 2023

Variations and Extensions of Information Leakage Metrics with Applications to Privacy Problems with Imperfect Statistical Information.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

2022
Neural Fuzzy Extractors: A Secure Way to Use Artificial Neural Networks for Biometric User Authentication.
Proc. Priv. Enhancing Technol., 2022

Uncertainty-Autoencoder-Based Privacy and Utility Preserving Data Type Conscious Transformation.
Proceedings of the International Joint Conference on Neural Networks, 2022

Heuristic Gradient Optimization Approach to Controlling Susceptibility to Manipulation in Online Social Networks.
Proceedings of the Computational Data and Social Networks - 11th International Conference, 2022

Artificial Intelligence Meets Kinesthetic Intelligence: Mouse-based User Authentication based on Hybrid Human-Machine Learning.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Review of the Security of Backward-Compatible Automotive Inter-ECU Communication.
IEEE Access, 2021

A Practical Approach to Navigating the Tradeoff Between Privacy and Precise Utility.
Proceedings of the ICC 2021, 2021

Information Leakage Metrics for Adversaries with Incomplete Information: Binary Privacy Mechanism.
Proceedings of the ICC 2021, 2021

2020
Implicit Crowdsourcing for Identifying Abusive Behavior in Online Social Networks.
CoRR, 2020

Neural Fuzzy Extractors: A Secure Way to Use Artificial Neural Networks for Biometric User Authentication.
CoRR, 2020

A Practical Approach to Navigating the Tradeoff Between Privacy and Precise Utility.
CoRR, 2020

An Information Diffusion Approach to Rumor Propagation and Identification on Twitter.
CoRR, 2020

MAUSPAD: Mouse-based Authentication Using Segmentation-based, Progress-Adjusted DTW.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Neutralizing manipulation of critical data by enforcing data-instruction dependency.
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, 2020

MIDMod-OSN: A Microscopic-Level Information Diffusion Model for Online Social Networks.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

RUMBA-Mouse: Rapid User Mouse-Behavior Authentication Using a CNN-RNN Approach.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

An Implicit Crowdsourcing Approach to Rumor Identification in Online Social Networks.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2020

2019
On the Secret Key Capacity of Sibling Hidden Markov Models.
IEEE Trans. Inf. Forensics Secur., 2019

An Extended Survey on Vehicle Security.
CoRR, 2019

2018
An Algebraic Quality-Time-Advantage-Based Key Establishment Protocol.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

HQuad: Statistics of Hamiltonian Cycles in Wireless Rechargeable Sensor Networks.
Proceedings of the 25th International Conference on Telecommunications, 2018

2017
Delegation of Computation with Verification Outsourcing: Curious Verifiers.
IEEE Trans. Parallel Distributed Syst., 2017

Successive synthesis of latent Gaussian trees.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Asymptotic converse bound for secret key capacity in hidden Markov model.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

The impact of discharge inversion effect on learning SRAM power-up statistics.
Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, 2017

2016
Secret Common Randomness From Routing Metadata in Ad Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2016

Extractable Common Randomness From Gaussian Trees: Topological and Algebraic Perspectives.
IEEE Trans. Inf. Forensics Secur., 2016

Layered Synthesis of Latent Gaussian Trees.
CoRR, 2016

Synthesis of Gaussian trees with correlation sign ambiguity: An information theoretic approach.
Proceedings of the 54th Annual Allerton Conference on Communication, 2016

2015
KERMAN: A Key Establishment Algorithm based on Harvesting Randomness in MANETs.
CoRR, 2015

Classifying Unrooted Gaussian Trees under Privacy Constraints.
CoRR, 2015

Evaluation of security robustness against information leakage in Gaussian polytree graphical models.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Efficient Link Cuts in Online Social Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Topological and Algebraic Properties for Classifying Unrooted Gaussian Trees under Privacy Constraints.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Block Programs: Improving Efficiency of Verifiable Computation for Circuits with Repeated Substructures.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Delegation of Computation with Verification Outsourcing Using GENI Infrastructure.
Proceedings of the 2014 Third GENI Research and Educational Experiment Workshop, 2014

Verifiable Computation with Reduced Informational Costs and Computational Costs.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
A lightweight argument system with efficient verifier.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Feedback-Based Collaborative Secrecy Encoding Over Binary Symmetric Channels.
IEEE Trans. Inf. Theory, 2012

Half-Duplex Active Eavesdropping in Fast-Fading Channels: A Block-Markov Wyner Secrecy Encoding Scheme.
IEEE Trans. Inf. Theory, 2012

2011
An Automatic, Time-Based, Secure Pairing Protocol for Passive RFID.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011

2010
Active eavesdropping in fast fading channels: A Block-Markov Wyner secrecy encoding scheme.
Proceedings of the IEEE International Symposium on Information Theory, 2010

2009
Mixed anti-jamming strategies in fixed-rate wireless systems over fast fading channels.
Proceedings of the IEEE International Symposium on Information Theory, 2009

2008
Jamming games in fast-fading wireless channels.
Int. J. Auton. Adapt. Commun. Syst., 2008

Jamming in Fixed-Rate Wireless Systems with Power Constraints - Part I: Fast Fading Channels
CoRR, 2008

Jamming in Fixed-Rate Wireless Systems with Power Constraints - Part II: Parallel Slow Fading Channels
CoRR, 2008

Secrecy rates of binary wiretapper channels using feedback schemes.
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008

2007
Gaussian Jamming in Block-Fading Channels under Long Term Power Constraints.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Minimax and Maxmin Solutions to Gaussian Jamming in Block-Fading Channels under Long Term Power Constraints.
Proceedings of the 41st Annual Conference on Information Sciences and Systems, 2007


  Loading...