Amos | Abbott | 2136915 | EAGER: Biometric Authentication using Noncontact Cardiovascular Signals |
Nael | Abu-Ghazaleh | CNS-1619322 (UCR) & CNS-1617915 (Binghamton) | Collaborative Research: SaTC: CORE: Medium: Leakage-free Isolated Execution: Architectures and Security Models |
Khair | Al Shamaileh | 2006662 | Jamming Detection and Classification in OFDM-Based UAVs via Feature- and Spectrogram-tailored Machine Learning |
Laura | Albert | 2000986 | An Optimization Framework for Identifying Dynamic Risk Management Practices |
Aisha | Ali-Gombe | 1850054 | CRII: SaTC: Leveraging Userland In-Memory Objects for Cybercrime Investigations and Malware Classification |
Mary Jean | Amon | 2053152 | Bottom-up psychosocial interventions for interpersonal privacy preservation |
Mohd | Anwar | 2007662 | SaTC: CORE: Small: Tracking User Behavior, Cognitive Burdens, and the Impact of Behavioral Nudging on Security Updates by Young and Older Adults |
Erman | Ayday | 2050410 | Robust, Privacy- and Utility-Preserving Fingerprinting Schemes for Correlated Data |
Hamid | Bahrami | 1956110 | SaTC: CORE: Small: A Practical Approach to Study Security in Wireless Networks |
Kiran | Balagani | 1814846 | Leveraging Movement, Posture, and Anthropometric Contexts to Strengthen the Security of Mobile Biometrics |
Alexandru | Bardas | 1850406 | CRII: SaTC: Creating and Managing Structurally-Morphing IT Systems - Moving Targets |
Alexandru | Bardas | 1915824 | A Sociotechnical Metrics Framework for Network and Security Operations Centers |
France | Belanger | SES-2039172 | Information Privacy Tensions and Decisions in Families during COVID‐19 |
Terry | Benzel | 1925773, 1925616, 1925564, 1925588 | Sharing Expertise and Artifacts for Reuse through Cybersecurity Community Hub (SEARCCH) |
Julia | Bernd | 2114229, 2114230 | Foregrounding Bystanders as Stakeholders in Smart Home Product Design |
Vincent | Bindschaedler | 2055123 | SaTC: CORE: Medium: Countering Surveillanceware Using Deception-Based Generative Models and Systems Mechanisms |
Gedare | Bloom | 2046705 | CAREER: Foundations for Real-Time System Security |
Alexandra | Boldyreva | 1946919 | Provable Security Analysis of FIDO2 |
Borzoo | Bonakdarpour | 2100989 | SaTC: CORE: Small: Techniques for Software Model Checking of Hyperproperties |
Shaunak D. | Bopardikar | 2134076 | SaTC: CORE: SMALL: Data-driven Attack and Defense Modeling for Cyber-physical Systems (CPS) |
Kelly | Caine | 1940679 | Cryptographic Provenance for Digital Publishing |
Bogdan | Carbunar | 2013671 | SaTC: CORE: Small: Deconstructing and Neutralizing Search Rank Fraud |
Bogdan | Carbunar | 2114911 | Collaborative Research: EAGER: SaTC-EDU: Just-in-Time Artificial Intelligence-Driven Cyber Abuse Education in Social Networks |
Krishnendu | Chakrabarty | 2011561 | Security of FPGA-as-a-Service for Reconfigurable Systems: Securing FPGA bitstreams and Preventing IP Theft |
Krishnendu | Chakrabarty | 2049335 | Secure and Trustworthy Cyberphysical Microfluidic Systems |
David | Chan-Tin | 1919004 and 1918591 | Personalized Cybersecurity Education and Training |
Bo | Chen | 1938130 | EAGER: Enabling Secure Data Recovery for Mobile Devices against Malicious Attacks |
Bo | Chen | CNS-1928331, 1928349 | SaTC: CORE: Small: Collaborative: Hardware-assisted Plausibly Deniable System for Mobile Devices |
Hsinchun | Chen | 1936370 | SaTC: CORE: Small: Cybersecurity Big Data Research for Hacker Community: A Topic and Language Modeling Approach |
Hao | Chen | 1801751 | SaTC: CORE: Medium: Collaborative: Towards Robust Machine Learning Systems |
Yu | Chen | CNS-2039342 | EAGER: SAVED: Secure Audio and Video Data from Deepfake Attacks Leveraging Environmental Fingerprints |
Yingying | Chen | 1820624 | Exploiting Physical Properties in Wireless Networks for Implicit Authentication |
Yingying | Chen | 2114220 | Collaborative Research: SaTC: CORE: Small: Securing IoT and Edge Devices under Audio Adversarial Attacks |
Qi | Chen | 1930041, 1929771 | SaTC: TTP: Medium: Collaborative: Exposing and Mitigating Security/Safety Concerns of CAVs: A Holistic and Realistic Security Testing Platform for Emerging CAVs |
Adam | Chlipala | 2130671 | Scaling Correct-by-Construction Code Generation for Cryptography |
Christian | Collberg | 1145913, 2040206 | The Tigress Endpoint Protection Tool - Transition to Practice |
Alberto | Dainotti | 1705024 | MapKIT—Mapping Key Internet Terrain |
Melissa | Dark | 2117073 | ARC - Assessment Resources for Cybersecurity |
Sajal K. | Das | 2030611, 2030624 | TAURUS: Towards a Unified Robust and Secure Data Driven Approach for Attack Detection in Smart Living |
Sauvik | Das | 2029519 | Corporeal Cybersecurity: Improving End-User Security and Privacy with Physicalized Computing Interfaces |
Sauvik | Das | 2126058 | Privacy through Design: A Design Methodology to Promote the Creation of Privacy-Conscious Consumer AI |
Leigh Ann | DeLyser | 2028426 | The JROTC Impact Study:Bringing Cybersecurity Skills and Training to JROTC Cadets |
Srini | Devadas | 2115587 | SaTC: CORE: Medium: Provably Secure, Usable, and Performant Enclaves in Multicore Processors |
Natasha | Devroye | 1909547 | Arbiter PUF Faults: Impact, Testing, and Diagnosis |
Shiri | Dori-Hacohen | 2147305 | Fairness via AI: Bias Reduction in Medical Information |
Christopher | Doss | 2039612, 2039613, 2039614 | Safeguarding STEM Education and Scientific Knowledge in the age of Hyper realistic AI-Generated Data |
Salim | El Rouayheb | 1801630 | Secure Distributed Coded Computations for IoT: An Information Theoretic and Network Approach |
Michalis | FALOUTSOS | 2132642 | SOFIA: Finding and Profiling Malware Source Code in Public Archives at Scale |
Liyue | Fan | 1949217 | Differentially Private Obfuscation for Face and Eye Images |
Fariborz | Farahmand | 2041788 | Advancing Cybersecurity Education to Human-Level Artificial Intelligence |
Kassem | Fawaz | 1942014 | CAREER: Presentation and Mitigation of Privacy Risks for Online Users |
Lisa | Fazio | 2122640 | How False Beliefs Form and How to Correct Them |
Nick | Feamster | 2041970 | EAGER: SaTC-EDU: Training Mid-Career Security Professionals in Machine Learning and Data-Driven Cybersecurity |
Earlence | Fernandes | 2144376 | Security and Privacy Foundations of Internet-Scale User-Centered Automation |
Ferdinando | Fioretto | 2133169 | Collaborative Research: SaTC: CORE: Small: Privacy and Fairness in Critical Decision Making |
Alvis | Fong | 2017289 | CyberTraining: Pilot: Modular Experiential Learning for Secure, Safe, and Reliable AI (MELSSRAI) |
Christina | Garman | 1816422 | Bento: Bringing Network Function Virtualization to Tor |
Jean-Luc | Gaudiot | 2026675 | Securing Information Systems with Flexible Hardware Techniques |
Sanjay | Goel | 1912874 | Thwarting the Malicious Insider Evolution Process: The Theory of Strained Betrayal |
Guofei | Gu | 1816497 | Adversarial Learning via Modeling Interpretation |
Nikhil | Gupta | DGE-1931724 | SaTC: EDU: Collaborative: An Educational Initiative on Cybersecurity in Additive Manufacturing |
Maanak | Gupta | 2025682 | Collaborative Research: SaTC: EDU: Artificial Intelligence Assisted Malware Analysis |
Willie | Harrison | 1910812 | CIF: Small: Best wiretap codes for real-world information-theoretic security |
Ting | He | 1946022 | SaTC: CORE: Small: Adversarial Network Reconnaissance in Software Defined Networking |
Yuan | Hong | CNS-2034870, 2034615 | Collaborative Research: SaTC: CORE: Small: Privately Collecting and Analyzing V2X Data for Urban Traffic Modeling |
Tamzidul | Hoque | 2114157, 2114165, 2114200 | Hardware Security Education for All Through Seamless Extension of Existing Curricula |
Mitra Bokaei | Hosseini | 2055772, 2055773 | Collaborative Research: SaTC: CORE: Medium: Narrowing The Gap Between Privacy Expectations and Reality in Mobile Health |
Fei | Hu | NSF DGE-1723250 | Captivology-Stimuli-based Learning (CAPITAL) of Big Data Security (BigSec): Towards a Science/Engineering, Career-Oriented Training |
Charles | Hughes | 2114808 | Improving Cybersecurity Education for Adolescents with Autism Through Automated Augmented Self-Monitoring Applications |
Stratis | Ioannidis | 1717213 | MaSSIF: Massively Scalable Secure Computation Infrastructure using FPGAs |
Murtuza | Jadliwala | 1943351 | CAREER: A Holistic Context-based Approach for Security and Privacy in the Era of Ubiquitous Sensing and Computing |
Shweta | Jain | CNS-2131182 | Cultivating and Developing Research Talent to Support Research in Cyber-Security |
Ahmad | Javaid | 1903419, 1903423 | INteractive Animated VIsualization and PracTice basEd Cybersecurity Curriculum and Training (InviteCyber) Framework for Developing Next-gen Cyber-Aware Workforce |
Limin | Jia | 1704542 | Towards a Usable, Practical, and Provably Secure Browser Infrastructure |
Limin | Jia | 2114148 | Toward Safe, Private, and Secure Home Automation: From Formal Modeling to User Evaluation |
Naima | Kaabouch | 2006674 | GPS Spoofing/Mimicking Attacks on UAS: Detection Techniques Based on Machine and Deep Learning |
Apu | Kapadia | 1814476 | Socio-Technical Strategies for Enhancing Privacy in Photo Sharing |
Avinash | Karanth | CCF-1936794 | Dynamic GARUDA: Securing Programs with Hardware Monitors Using Higher Language Abstractions |
Latifur | Khan | 2039542 | EAGER: SaTC AI-Cybersecurity: Secure and Privacy-Preserving Adaptive Artificial Intelligence Curriculum Development for Cyber Security |
Latifur | Khan | 1931800 | SATC: EDU: Curriculum Development for Secure Blockchain Technologies |
Farshad | Khorrami | 2039615 | NSF SATC: TTP: Small: Tracking Run-time Anomalies in Code Execution (TRACE) |
Taesoo | Kim | 1563848 | PRIWDEN: Universally Hardening SGX Programs via Load-Time Synthesis |
David | Kotz | CNS-1955805, 1955172, 1955228, 1955231 | SPLICE: Security and Privacy in the Lifecycle of IoT for Consumer Environments |
Yingjie | Lao | 2047384 | CAREER: Protecting Deep Learning Systems against Hardware-Oriented Vulnerabilities |
Loukas | Lazos | 1813401 | SaTC: CORE: Small: Secure Cloud Storage Verification Methods |
Jaewoo | Lee | 1943046 | CAREER: Robust Adaptive Optimization Algorithms for Differentially Private Learning |
Qinghua | Li | 1751255 | Towards Automated Asset-Vulnerability Mapping for Vulnerability Management |
Zhou | Li | 2039634 | Multi-Level Attack and Defense Simulation Environment for Artificial Intelligence Education and Research |
Hui | Lin | 2144513 | PARP: Mislead Physical-Disruption Attacks by Preemptive Anti-Reconnaissance for Power Grids' Cyber-Physical Infrastructures |
Heather | Lipford | 1814110, 1814068, 1814439 | Leveraging community oversight to enhance collective efficacy for privacy and security |
Wenjing | Lou | 1916902, 1916926 | Toward Enforceable Data Usage Control in Cloud-based IoT Systems |
Aidong | Lu | 1564039 | Collaborative: Online Social Network Fraud and Attack Research and Identification |
Siwei | Lyu | 2153112 | SaTC: CORE: Small: Combating AI Synthesized Fake Media Beyond Detection |
Khalid | Malik | 1815724, 1816019 | Forensic Examiner: Testbed for Benchmarking Digital Audio Forensic Algorithms |
Hafiz | Malik | 2035770 | Linking2Source: Security of In-Vehicle Networks via Source Identification |
Madhav | Marathe | 2041952 | Pandemic Research for Preparedness and Resilience (PREPARE): Building a Research Community for the Next Pandemic |
Athina | Markopoulou | 1956393, 1955227, 2103439, 1956435 | ProperData: Protecting Personal Data Flow on the Internet |
Florence | Martin | 2015554 | Digital Safety Immersion for Elementary School Students |
Florence | Martin | 2122416 | Advancing Cybersecurity and Privacy of Educational Technologies used in K12 Schools by Supporting School Administrators, Technology Support Staff, and Teachers |
Aaron | Massey | 1938121 | Enabling Regulatory Compliance for Software Engineering |
Patrick | McDaniel | 1805310 | The Center for Trustworthy Machine Learning |
Muhammad Taqi Raza | Mehdi | CNS-2051621 | Automatic Exploits Detection and Mitigation for Industrial Control System Protocols |
Hoda | Mehrpouyan | 1846493 | Formal TOols foR SafEty aNd Security of Industrial ControlSystems (FORENSICS) |
Jiang | Ming | 2128703 | SaTC: CORE: Small: A Transparent and Customizable Android Container-Based Virtualization Architecture for Dynamic Malware Analysis |
Jelena | Mirkovic | 1815495 | Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Servers |
Prabhat | Mishra | 1936040 | SaTC : CORE: Small: Trustworthy System on Chip Design using Secure On Chip Communication Architecture |
Alan | Mislove | CNS-1955227, 1956435, 1916020, 1916153 | Ad Delivery Algorithms: The Hidden Arbiters of Political Messaging |
Chrystalla | Mouza | 1821794 | Cybersecurity Education Using Interactive Storytelling with Social Robots |
Mehran | Mozaffari Kermani | 1801488 | Countermeasures Against Side-Channel Attacks Targeting Hardware and Embedded System Implementations of Post-Quantum Cryptographic Algorithms |
Frank | Mueller | 1813004 | Timing Based Security in Real-Time Systems: T-SYS & T_Pack |
Manohar | Murthi | 2123635, 2123618 | Multi-Disciplinary Analyses of the Nature and Spread of Unsubstantiated Information Online |
Adwait | Nadkarni | 1815336 | SaTC: CORE: Small: Enabling Systematic Evaluation of the Soundness of Android Security Analysis Techniques |
Tempestt | Neal | 2039373, 2039379 | Toward Age-Aware Continuous Authentication on Personal Computing Devices |
Nick | Nikiforakis | 1941617 | CAREER: Tools and Techniques for Preserving Integrity on the Web |
Chandra | Orrill | 2114981 | Opening Doors for Cybersecurity & AI: An Interdisciplinary Approach to Engaging Middle School Students |
Balaji | Palanisamy | 2020071 | Blockchain-based Mechanisms for Timed Data Release and Timed Transactions |
Charalampos | Papamanthou | 1652259 | Efficient and Secure Distributed Consensus |
Yilang | Peng | 2150716 | Collaborative: SaTC: Core: Small: Understanding how visual features of misinformation influence credibility perceptions |
Roberto | Perdisci | 2126641 | Defending Against Social Engineering Attacks with In-Browser AI |
Alfredo | Perez | 1950416, 1560214 | REU@CSU: An REU Site in Security for Mobile Sensing and the IoT |
Hai | Phan | CNS-1935928, 1935923 | SaTC: CORE: When Adversarial Learning Meets Differential Privacy: Theoretical Foundation and Applications |
Calton | Pu | 2039653 | Live Reality: Up-to-Date Information Quality |
Zhiyun | Qian | 1953932, 1953933 | SaTC: CORE: Small: Collaborative: Deep and Efficient Dynamic Analysis of Operating System Kernels |
Akond | Rahman | 2026869 | eSLIC: Enhanced Security Static Analysis of Configuration Scripts |
Mizanur | Rahman | 2104999 | Cyber Resilient Localization and Navigation for Autonomous Vehicles |
Ajita | Rattani | 2129173 | Probing Fairness of Ocular Biometrics Methods Across Demographic Variations |
Indrakshi | Ray | CNS-1715458 | Detecting and Reconstructing Network Anomalies and Intrusions in Heavy Duty Vehicles |
Aunshul | Rege | 2032292 | SaTC: EDU: Educating STEM Students and Teachers about the Relevance of Social Engineering in Cyberattacks and Cybersecurity |
Yi | Ren | 2101052 | SaTC: Core: Small: Decentralized Attribution and Secure Training of Generative Models |
Armin | Sarabi | 20122001 | A Deep Learning Framework for Intelligent Active and Passive Measurements in the Age of Internet of Things |
Patrick | Schaumont | 1931639 | An End-to-End Analysis of EMFI Attacks on Bit-sliced Post-Quantum Implementations |
Alexander | Schwarzmann | 2131538 | A Robust Framework with Rigorous Semantics and Security Guarantees for Election-Day Voter Check-in |
Kent | Seamons | 1816929 | Usable Key Management and Forward Secrecy for Secure Email |
R | Sekar | 1918667 | RADAR: Real-time Advanced Detection and Attack Reconstruction |
Hossain | Shahriar | 2100115, 2100134 | Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware |
Micah | Sherr | CNS-1925497 | Expanding Research Frontiers with a Next-Generation Anonymous Communication Experimentation (ACE) Framework |
Tao | Shu | 2006998 | CNS Core: Small: Enabling Privacy-Preserving Routing-on-Context in IoT |
Akbar | Siami Namin | 1821560 | SaTC: EDU: Improving Student Learning and Engagement in Digital Forensics through Collaborative Investigation of Cyber Security Incidents and Simulated Capture-the-Flag Exercises |
Akbar | Siami Namin | 1564293 | SBE: Medium: User-Centric Design of a Sonification System for Automatically Alarming Security Threats and Impact |
Yasin | Silva | 2036127 | BullyBlocker - Interdisciplinary Models to Identify and Understand Cyberbullying |
Linhai | Song | CNS-1955965 | Rethinking Toolchain Design for Rust |
WenZhan | Song | 2019311 | Cyber-threat Detection and Diagnosis in Multistage Manufacturing Systems through Cyber and Physical Data Analytics |
Houbing | Song | 1956193 | SaTC: EDU: Collaborative: Bolstering UAV Cybersecurity Education through Curriculum Development with Hands-on Laboratory Framework |
Anna | Squicciarini | CNS2029976, 2029881 | Collaborative research: SaTC: Core: Small: Privacy protection of Vehicles location in Spatial Crowdsourcing under realistic adversarial models |
Meera | Sridhar | 1947295 | SaTC: EDU: Enhancing Security Education in Hybrid Mobile and Internet of Things Firmware through Inclusive, Engaging, Learning Modules (E-SHIIELD) |
Tripakis | Stavros | 1801546, 1801342, 1801399 | Bridging the Gap Between Protocol Design and Implementation through Automated Mapping |
Kevin | Steinmetz | 1916284 | SaTC: Core: Small: Collaborative: Understanding Law-Enforcement Cyber Investigations |
Shreyas | Sundaram | CNS-1718637 | TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems |
Ravi | Tandon | 1715947 | Privacy Preserving Wireless Federated Learning |
Yuzhe | Tang | 2104532 | Collaborative Research: SaTC: EDU: Developing Instructional Laboratories for Blockchain Security Applications |
Unal | Tatar | 1948261 | CRII: SaTC: Graph-based Probabilistic Cyber Risk Modeling |
Yuan | Tian | 1943100 | Secure Voice-Controlled Platforms |
Andrew | Tolmach | 2048499 | Specifying and Verifying Secure Compilation of C Code to Tagged Hardware |
Carlene | Turner | 1956428 | Excellence in Research - The Impact of Cybersecurity Policies on Employees' Efficiency and Performance Predictability |
Blase | Ur | 2047827 | CAREER: Usable, Data-Driven Transparency and Access for Consumer Privacy |
Krishna | Venkatasubramanian | 1947022 | SaTC: CORE: Small: Authentication Solutions for Individuals with Upper Extremity Impairment |
Boyang | Wang | 1947913 | Fingerprinting Encrypted Voice Traffic on Smart Speakers |
GANG | WANG | 2055233 | Combating Concept Drift in Security Applications with Self-Supervised Learning |
Yang | Wang | 1652497 | Inclusive Privacy and Security for People with Visual Impairments (PVI) |
Yang | Wang | 2114991 | Teaching High School Students about Cybersecurity and Artificial Intelligence Ethics |
Yang | Wang | 2126314 | Novel Algorithms and Tools for Empowering People Who Are Blind to Safeguard Private Visual Content |
XiaoFeng | Wang | 1801432, 1850725, 1801652 | SaTC: CORE: Medium: Collaborative: Understanding and Discovering Emerging Cybercrimes through Automatic Analysis of Online Text Traces |
Ting | Wang | 1953893 | Trustworthy Machine Learning from Untrusted Models |
Tao | Wei | 2027069 | SaTC:CORE: Medium: Introducing DIVOT: A Novel Architecture for Runtime Anti-Probing/Tampering on I/O Buses |
Sheng | Wei | 1912593 | Security of Heterogeneous CPU-FPGA Systems |
Jin | Wei-Kocsis | 2114974 | EAGER: SaTC-EDU: Cybersecurity Education in the Age of Artificial Intelligence: A Novel Proactive and Collaborative Learning Paradigm |
Jake | Williams | 1850014 | Moderating Effects of Automation on Information Transmission in Social Forums |
Shomir | Wilson | 2105736, 2105734, 2105745 | PrivaSeer: A Large-Scale, Longitudinal Resource to Advance Technical and Legal Understanding of Textual Privacy Information |
Shomir | Wilson | 1914444 | Answering People’s Privacy Questions: Weaving Together User-centered Design, Natural Language Processing and Legal Considerations |
Xusheng | Xiao | 2028748 | DEPIMPACT: Back-Propagating System Dependency Impact for Attack Investigation |
Jiafeng | Xie | 2020625 | SaTC: CORE: Small: Fast Algorithm Originated Fault Detection Scheme for Ring-LWE based Cryptographic Hardware |
Aiping | Xiong | 1915801 | Associative Inference: Another Cognitive Driver of Misinformation Susceptibility |
Dongyan | Xu | CNS-1801534 | KSplit: Automating Device Driver Isolation |
Shouhuai | Xu | 2122631 | A Framework for Enhancing the Resilience of Cyber Attack Classification Mechanisms |
Jun | Xu | 2213727 | Collaborative Research: SaTC: CORE: Medium: Rethinking Fuzzing for Security |
Dongpeng | Xu | 1948489 | CRII: SaTC: Simplification of Mixed Boolean-Arithmetic Obfuscated Expression |
Qiben | Yan | 1950171 | Interactive Attack on Smartphone Voice System Through Power Line |
Mengjia | Yan | 2046359 | A Quantitative Framework for Analyzing and Mitigating Microarchitectural Side Channels |
Baijian | Yang | 1820573, 1820608 | Cyber Human Ecosystem of Engaged Security Education (CHEESE) |
Fan | Yao | 2019536, 2019548 | SaTC: Small: Understanding and Taming Deterministic Model Bit Flip Attacks in Deep Neural Networks |
Danfeng (Daphne) | Yao | 1929701 | SaTC: TTP: Medium: Collaborative: Deployment-quality and Accessible Solutions for Cryptography Code Development |
Tuba | Yavuz | CNS-1942235 | CAREER: Towards a Secure and Reliable Internet of Things through
Automated Model Extraction and Analysis |
Arkady | Yerukhimovich | 1955620, 1955264, 1955319 | New Approaches for Large Scale Secure Computation |
Heng | Yin | 1719175 | Towards Robust and Scalable Search of Binary Code and Data |
Chansu | Yu | 2028397 | SaTC: EDU: Transdisciplinary Cybersecurity Education for Law and Engineering Students |
Qiaoyan | Yu | 1652474 | CAREER: Proactive Defense Methods for Chip Integrity and Security |
Qiaoyan | Yu | 2022279 | SaTC: CORE: Small: Towards Securing the Hardware and Software for Approximate Computing Systems |
Shuhan | Yuan | 2103829 | Deep Learning for Insider Threat Detection |
Xu | Yuan | 1948374 | CRII: SaTC: Empowering Elastic-honeypot as Real-time Malicious Content Sniffers for Social Networks |
Yanbin | Zhao | 1949650 | SaTC: CORE: Medium: Hidden Rules in Neural Networks as Attacks and Adversarial Defenses |
Lina | Zhou | 1917537 | Implicit One‐handed Mobile User Authentication by Induced Thumb Biometrics on Touch‐screen Handheld Devices |
Sebastian | Zimmeck | 2055196 | Improving Internet Privacy with Global Privacy Control (GPC) |
Cliff | Zou | 1915780 | SaTC: EDU: Collaborative: Building a Low-cost and State-of-the-art IoT Security Hands-on Laboratory |