Matthew Wright

Orcid: 0000-0002-8489-6347

Affiliations:
  • Rochester Institute of Technology, NY, USA
  • University of Texas at Arlington, Department of Computer Science and Engineering (former)
  • University of Massachusetts Amherst, Department of Computer Science (former)


According to our database1, Matthew Wright authored at least 109 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Dungeons & Deepfakes: Using scenario-based role-play to study journalists' behavior towards using AI-based verification tools for video content.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

A First Look into Targeted Clickbait and its Countermeasures: The Power of Storytelling.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

ESPRESSO: Advanced End-to-End Flow Correlation Attacks on Tor.
Proceedings of the 8th Asia-Pacific Workshop on Networking, 2024

2023
SoK: A Critical Evaluation of Efficient Website Fingerprinting Defenses.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
On improving the memorability of system-assigned recognition-based passwords.
Behav. Inf. Technol., 2022

Evaluating Robustness of Sequence-based Deepfake Detector Models by Adversarial Perturbation.
Proceedings of the WDC@AsiaCCS '22: Proceedings of the 1st Workshop on Security Implications of Deepfakes and Cheapfakes, 2022

DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

On the Limitations of Continual Learning for Malware Classification.
Proceedings of the Conference on Lifelong Learning Agents, 2022

2021
Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks With Adversarial Traces.
IEEE Trans. Inf. Forensics Secur., 2021

GANDaLF: GAN for Data-Limited Fingerprinting.
Proc. Priv. Enhancing Technol., 2021

A look into user privacy andthird-party applications in Facebook.
Inf. Comput. Secur., 2021

A first look into users' perceptions of facial recognition in the physical world.
Comput. Secur., 2021

What a SHAME: Smart Assistant Voice Command Fingerprinting Utilizing Deep Learning.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021

LociMotion: Towards Learning a Strong Authentication Secret in a Single Session.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

Gradient Frequency Modulation for Visually Explaining Video Understanding Models.
Proceedings of the 32nd British Machine Vision Conference 2021, 2021

2020
Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks.
Proc. Priv. Enhancing Technol., 2020

Recurrent Convolutional Structures for Audio Spoof and Video Deepfake Detection.
IEEE J. Sel. Top. Signal Process., 2020

Detecting Adversarial Patches with Class Conditional Reconstruction Networks.
CoRR, 2020

Weaponizing Unicodes with Deep Learning -Identifying Homoglyphs with Weakly Labeled Data.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Leveraging edges and optical flow on faces for deepfake detection.
Proceedings of the 2020 IEEE International Joint Conference on Biometrics, 2020

They Might NOT Be Giants Crafting Black-Box Adversarial Examples Using Particle Swarm Optimization.
Proceedings of the Computer Security - ESORICS 2020, 2020

A Forensically Sound Method of Identifying Downloaders and Uploaders in Freenet.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Modified relay selection and circuit selection for faster Tor.
IET Commun., 2019

They Might NOT Be Giants: Crafting Black-Box Adversarial Examples with Fewer Queries Using Particle Swarm Optimization.
CoRR, 2019

Adv-DWF: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces.
CoRR, 2019

Poster: Towards Robust Open-World Detection of Deepfakes.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Poster: Understanding User's Decision to Interact with Potential Phishing Posts on Facebook using a Vignette Study.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Poster: Video Fingerprinting in Tor.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Poster: Evaluating Security Metrics for Website Fingerprinting.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Guard Sets in Tor using AS Relationships.
Proc. Priv. Enhancing Technol., 2018

Towards Predicting Efficient and Anonymous Tor Circuits.
Proceedings of the 27th USENIX Security Symposium, 2018

Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Adversarial Traces for Website Fingerprinting Defense.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Exploring the Potential of GeoPass: A Geographic Location-Password Scheme.
Interact. Comput., 2017

Forming Guard Sets using AS Relationships.
CoRR, 2017

The Evaluation of Circuit Selection Methods on Tor.
CoRR, 2017

Distributed Detection of Sensor Worms Using Sequential Analysis and Remote Software Attestations.
IEEE Access, 2017

Statistical Detection of Downloaders in Freenet.
Proceedings of the 3rd International Workshop on Privacy Engineering co-located with 38th IEEE Symposium on Security and Privacy, 2017

Learning System-assigned Passwords: A Preliminary Study on the People with Learning Disabilities.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

LiLAC: Lightweight Low-Latency Anonymous Chat.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

2016
DeNASA: Destination-Naive AS-Awareness in Anonymous Communications.
Proc. Priv. Enhancing Technol., 2016

iPersea: Towards improving the Sybil-resilience of social DHT.
J. Netw. Comput. Appl., 2016

Leveraging autobiographical memory for two-factor online authentication.
Inf. Comput. Secur., 2016

Split-Pipeline Model for Worm Propagation over IoT.
Proceedings of the 6th International Conference on the Internet of Things, 2016

Toward an Efficient Website Fingerprinting Defense.
Proceedings of the Computer Security - ESORICS 2016, 2016

POSTER: Phishing Website Detection with a Multiphase Framework to Find Visual Similarity.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
WTF-PAD: Toward an Efficient Website Fingerprinting Defense for Tor.
CoRR, 2015

The Impact of Cues and User Interaction on the Memorability of System-Assigned Recognition-Based Graphical Passwords.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Leveraging Real-Life Facts to Make Random Passwords More Memorable.
Proceedings of the Computer Security - ESORICS 2015, 2015

Towards Making Random Passwords Memorable: Leveraging Users' Cognitive Ability Through Multiple Cues.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

Exploiting Temporal Dynamics in Sybil Defenses.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
ReDS: A Framework for Reputation-Enhanced DHTs.
IEEE Trans. Parallel Distributed Syst., 2014

Using data mules to preserve source location privacy in Wireless Sensor Networks.
Pervasive Mob. Comput., 2014

Hierarchy of users' web passwords: Perceptions, practices and susceptibilities.
Int. J. Hum. Comput. Stud., 2014

Fast and energy-efficient technique for jammed region mapping in wireless sensor networks.
CoRR, 2014

iPersea : The Improved Persea with Sybil Detection Mechanism.
CoRR, 2014

A Comprehensive Study of the GeoPass User Authentication Scheme.
CoRR, 2014

Q-A: Towards the Solution of Usability-Security Tension in User Authentication.
CoRR, 2014

Mobile Application Security.
Computer, 2014

Applying Psychometrics to Measure User Comfort when Constructing a Strong Password.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Dovetail: Stronger Anonymity in Next-Generation Internet Routing.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

Design and evaluation of persea, a sybil-resistant DHT.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Mitigating jamming attacks in wireless broadcast systems.
Wirel. Networks, 2013

Mimic: An active covert channel that evades regularity-based detection.
Comput. Networks, 2013

Pisces: Anonymous Communication Using Social Networks.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

A study of user password strategy for multiple accounts.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Persea: a sybil-resistant social DHT.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Passwords and interfaces: towards creating stronger passwords by using mobile phone handsets.
Proceedings of the SPSM'13, 2013

2012
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper.
IEEE Trans. Mob. Comput., 2012

ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing.
IEEE Trans. Dependable Secur. Comput., 2012

SDA-2H: Understanding the Value of Background Cover Against Statistical Disclosure.
J. Networks, 2012

Distributed detection of mobile malicious node attacks in wireless sensor networks.
Ad Hoc Networks, 2012

CRISP: collusion-resistant incentive-compatible routing and forwarding in opportunistic networks.
Proceedings of the 15th ACM International Conference on Modeling, 2012

Fast jamming detection in sensor networks.
Proceedings of IEEE International Conference on Communications, 2012

2011
Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing.
IEEE Trans. Mob. Comput., 2011

EnPassant: anonymous routing for disruption-tolerant networks with applications in assistive environments.
Secur. Commun. Networks, 2011

Empirical tests of anonymous voice over IP.
J. Netw. Comput. Appl., 2011

Economic incentives for protecting digital rights online.
Electron. Commer. Res. Appl., 2011

#h00t: Censorship Resistant Microblogging
CoRR, 2011

An analysis of the statistical disclosure attack and receiver-bound cover.
Comput. Secur., 2011

Liquid: A detection-resistant covert timing channel based on IPD shaping.
Comput. Networks, 2011

Poster: shaping network topology for privacy and performance.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
The Dynamics of Salsa: A Robust Structured P2P System.
Netw. Protoc. Algorithms, 2010

Evading stepping-stone detection under the cloak of streaming media with SNEAK.
Comput. Networks, 2010

ReSCo: A middleware component for Reliable Service Composition in pervasive systems.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

The Reverse Statistical Disclosure Attack.
Proceedings of the Information Hiding - 12th International Conference, 2010

Selective Cross Correlation in Passive Timing Analysis Attacks against Low-Latency Mixes.
Proceedings of the Global Communications Conference, 2010

ReDS: reputation for directory services in P2P systems.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Towards modeling the behavior of physical intruders in a region monitored by a wireless sensor network.
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, 2010

ReDS: reputation for directory services in P2P systems.
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, 2010

2009
Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks.
Ad Hoc Networks, 2009

ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Sensor Networks Using Sequential Analysis.
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009

PEON: privacy-enhanced opportunistic networks with applications in assistive environments.
Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, 2009

DTT: A Distributed Trust Toolkit for Pervasive Systems.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

2008
Passive-Logging Attacks Against Anonymous Communications Systems.
ACM Trans. Inf. Syst. Secur., 2008

Studying Timing Analysis on the Internet with SubRosa.
Proceedings of the Privacy Enhancing Technologies, 2008

AREX: An Adaptive System for Secure Resource Access in Mobile P2P Systems.
Proceedings of the Proceedings P2P'08, 2008

2007
Location Privacy in Sensor Networks Against a Global Eavesdropper.
Proceedings of the IEEE International Conference on Network Protocols, 2007

Countering Statistical Disclosure with Receiver-Bound Cover Traffic.
Proceedings of the Computer Security, 2007

2006
Salsa: a structured approach to large-scale anonymity.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2005
Building Reliable Mix Networks with Fair Exchange.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
The predecessor attack: An analysis of a threat to anonymous communications systems.
ACM Trans. Inf. Syst. Secur., 2004

Timing Attacks in Low-Latency Mix Systems (Extended Abstract).
Proceedings of the Financial Cryptography, 2004

Analysis of an incentives-based secrets protection system.
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004

2003
Defending Anonymous Communications Against Passive Logging Attack.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

2002
An Analysis of the Degradation of Anonymous Protocols.
Proceedings of the Network and Distributed System Security Symposium, 2002


  Loading...