William Aiken

Orcid: 0000-0003-2421-994X

According to our database1, William Aiken authored at least 17 papers between 2014 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Measuring Improvement of F<sub>1</sub>-Scores in Detection of Self-Admitted Technical Debt.
CoRR, 2023

Measuring Improvement of F1-Scores in Detection of Self-Admitted Technical Debt.
Proceedings of the 2023 ACM/IEEE International Conference on Technical Debt (TechDebt), 2023

Going Haywire: False Friends in Federated Learning and How to Find Them.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild.
CoRR, 2022

2021
Neural network laundering: Removing black-box backdoor watermarks from deep neural networks.
Comput. Secur., 2021

2020
Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks.
CoRR, 2020

An Internet of Things (IoT) Security Assessment for Households.
Proceedings of the International Conference on Software Security and Assurance, 2020

2019
The Light Will Be with You. Always - A Novel Continuous Mobile Authentication with the Light Sensor.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

2018
A security evaluation framework for cloud security auditing.
J. Supercomput., 2018

An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Hey Siri - Are You There?: Jamming of Voice Commands Using the Resonance Effect (Work-in-Progress).
Proceedings of the International Conference on Software Security and Assurance, 2018

Ignore the Noise: Using Autoencoders against Adversarial Attacks in Reinforcement Learning (Lightning Talk).
Proceedings of the International Conference on Software Security and Assurance, 2018

POSTER: I Can't Hear This Because I Am Human: A Novel Design of Audio CAPTCHA System.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

POSTER: DeepCRACk: Using Deep Learning to Automatically CRack Audio CAPTCHAs.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2016
Bypassing the Integrity Checking of Rights Objects in OMA DRM: a Case Study with the MelOn Music Service.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

2015
KaaSP: keying as a service provider for small and medium enterprises using untrusted cloud services.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015

2014
Cloud Security Auditing: Challenges and Emerging Approaches.
IEEE Secur. Priv., 2014


  Loading...