Kassem Fawaz

Orcid: 0000-0002-4609-7691

According to our database1, Kassem Fawaz authored at least 82 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Picture is Worth 500 Labels: A Case Study of Demographic Disparities in Local Machine Learning Models for Instagram and TikTok.
CoRR, 2024

PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails.
CoRR, 2024

I see an IC: A Mixed-Methods Approach to Study Human Problem-Solving Processes in Hardware Reverse Engineering.
CoRR, 2024

Do Large Code Models Understand Programming Concepts? A Black-box Approach.
CoRR, 2024

D4: Detection of Adversarial Diffusion Deepfakes Using Disjoint Ensembles.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024

Limitations of Face Image Generation.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Human-Producible Adversarial Examples.
CoRR, 2023

Unbiased Face Synthesis With Diffusion Models: Are We There Yet?
CoRR, 2023

Exposing and Addressing Security Vulnerabilities in Browser Text Input Fields.
CoRR, 2023

SEA: Shareable and Explainable Attribution for Query-based Black-box Attacks.
CoRR, 2023

Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks.
CoRR, 2023

Unpacking Privacy Labels: A Measurement and Developer Perspective on Google's Data Safety Section.
CoRR, 2023

"I Want the Payment Process to be Cool": Understanding How Interaction Factors into Security and Privacy Perception of Authentication in Virtual Reality.
CoRR, 2023

The Overview of Privacy Labels and their Compatibility with Privacy Policies.
CoRR, 2023

Investigating Stateful Defenses Against Black-Box Adversarial Examples.
CoRR, 2023

Comparing Privacy Labels of Applications in Android and iOS.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023

Fairness Properties of Face Recognition and Obfuscation Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023

Automated Cookie Notice Analysis and Enforcement.
Proceedings of the 32nd USENIX Security Symposium, 2023

Tubes Among Us: Analog Attack on Automatic Speaker Identification.
Proceedings of the 32nd USENIX Security Symposium, 2023

"It's up to the Consumer to be Smart": Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box Attacks.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps.
Proc. Priv. Enhancing Technol., 2022

AEROKEY: Using Ambient Electromagnetic Radiation for Secure and Usable Wireless Device Authentication.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

CookieEnforcer: Automated Cookie Notice Analysis and Enforcement.
CoRR, 2022

Analyzing the Security of the Business Collaboration Platform App Model.
CoRR, 2022

Towards Adversarially Robust Deepfake Detection: An Ensemble Approach.
CoRR, 2022

An Exploration of Multicalibration Uniform Convergence Bounds.
CoRR, 2022

Pipe Overflow: Smashing Voice Authentication for Fun and Profit.
CoRR, 2022

Experimental Security Analysis of the App Model in Business Collaboration Platforms.
Proceedings of the 31st USENIX Security Symposium, 2022

Towards More Robust Keyword Spotting for Voice Assistants.
Proceedings of the 31st USENIX Security Symposium, 2022

On the Limitations of Stochastic Pre-processing Defenses.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

I Know Your Triggers: Defending Against Textual Backdoor Attacks with Benign Backdoor Augmentation.
Proceedings of the IEEE Military Communications Conference, 2022

Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems.
Proceedings of the International Conference on Machine Learning, 2022

CONFIDANT: A Privacy Controller for Social Robots.
Proceedings of the ACM/IEEE International Conference on Human-Robot Interaction, 2022

2021
The Roaming Edge and its Applications.
GetMobile Mob. Comput. Commun., 2021

Face-Off: Adversarial Face Obfuscation.
Proc. Priv. Enhancing Technol., 2021

Scale-Adv: A Joint Attack on Image-Scaling and Machine Learning Classifiers.
CoRR, 2021

Kalεido: Real-Time Privacy Control for Eye-Tracking Systems.
Proceedings of the 30th USENIX Security Symposium, 2021

PriSEC: A Privacy Settings Enforcement Controller.
Proceedings of the 30th USENIX Security Symposium, 2021

PowerCut and Obfuscator: An Exploration of the Design Space for Privacy-Preserving Interventions for Smart Speakers.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

PEDRO: Secure Pedestrian Mobility Verification in V2P Communication using Commercial Off-the-shelf Mobile Devices.
Proceedings of the CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 2021

2020
The Privacy Policy Landscape After the GDPR.
Proc. Priv. Enhancing Technol., 2020

Face-Off: Adversarial Face Obfuscation.
CoRR, 2020

Analyzing Accuracy Loss in Randomized Smoothing Defenses.
CoRR, 2020

Preech: A System for Privacy-Preserving Speech Transcription.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
Privacy Protection for Audio Sensing Against Multi-Microphone Adversaries.
Proc. Priv. Enhancing Technol., 2019

Prεεch: A System for Privacy-Preserving Speech Transcription.
CoRR, 2019

Enhancing ML Robustness Using Physical-World Constraints.
CoRR, 2019

Security and Privacy in the Internet of Things.
Computer, 2019

Invited Paper: The Applications of Machine Learning in Privacy Notice and Choice.
Proceedings of the 11th International Conference on Communication Systems & Networks, 2019

Velody: Nonlinear Vibration Challenge-Response for Resilient User Authentication.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Speed Trap Optimal Patrolling: STOP Playing Stackelberg Security Games.
Wirel. Pers. Commun., 2018

Wearable Technology brings Security to Alexa and Siri.
GetMobile Mob. Comput. Commun., 2018

Characterizing Privacy Perceptions of Voice Assistants: A Technology Probe Study.
CoRR, 2018

The Privacy Policy Landscape After the GDPR.
CoRR, 2018

Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning.
Proceedings of the 27th USENIX Security Symposium, 2018

Traversing the Quagmire that is Privacy in your Smart Home.
Proceedings of the 2018 Workshop on IoT Security and Privacy, 2018

2017
Location Privacy Protection in the Mobile Era and Beyond.
PhD thesis, 2017

Continuous Authentication for Voice Assistants.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

2016
Privacy vs. Reward in Indoor Location-Based Services.
Proc. Priv. Enhancing Technol., 2016

Protecting Privacy of BLE Device Users.
Proceedings of the 25th USENIX Security Symposium, 2016

PriBots: Conversational Privacy with Chatbots.
Proceedings of the Workshop on Security Fatigue, 2016

RT-OPEX: Flexible Scheduling for Cloud-RAN Processing.
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, 2016

2015
Replication enabled distributed cache invalidation method: replication enabled distributed cache management system for wireless mobile networks.
Wirel. Commun. Mob. Comput., 2015

PBCOV: a property-based coverage criterion.
Softw. Qual. J., 2015

LinkDroid: Reducing Unregulated Aggregation of App Usage Behaviors.
Proceedings of the 24th USENIX Security Symposium, 2015

Anatomization and Protection of Mobile Apps' Location Privacy Threats.
Proceedings of the 24th USENIX Security Symposium, 2015

2014
Location Privacy Protection for Smartphone Users.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks.
IEEE Trans. Mob. Comput., 2013

Improving vehicular safety message delivery through the implementation of a cognitive vehicular network.
Ad Hoc Networks, 2013

2012
A Proxy-Based Architecture for Dynamic Discovery and Invocation of Web Services from Mobile Devices.
IEEE Trans. Serv. Comput., 2012

A privacy-preserving cache management system for MANETs.
Proceedings of the 19th International Conference on Telecommunications, 2012

A two-layer cache replication scheme for dense mobile ad hoc networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Fuzzy cognitive Vehicular Ad hoc Networks.
Proceedings of the IEEE 7th International Conference on Wireless and Mobile Computing, 2011

Extending the DSRC's control channel using cognitive networking concepts and Fuzzy Logic.
Proceedings of the IEEE 22nd International Symposium on Personal, 2011

Data delivery guarantees in congested Vehicular ad hoc networks using cognitive networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Slow port scanning detection.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Improving reliability of safety applications in vehicle ad hoc networks through the implementation of a cognitive network.
Proceedings of the 17th International Conference on Telecommunications, 2010

2009
CRUST: Implementation of clustering and routing functions for mobile ad hoc networks using reactive tuple-spaces.
Ad Hoc Networks, 2009

Indoor Propagation Effects on ToA Bias for Joint GNSS and Terrestrial Radio Based Localization.
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009

2008
A fast HTML web page change detection approach based on hashing and reducing the number of similarity computations.
Data Knowl. Eng., 2008


  Loading...