default search action
Abdul Serwadda
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c34]Sayed Erfan Arefin, Abdul Serwadda:
Dissecting the Origins of the Power Side-Channel in Deep Neural Networks. AIIoT 2024: 414-420 - [c33]Tasnia Ashrafi Heya, Abdul Serwadda:
Secure Audio Classification for Voice Assistants: A Multi-Party Homomorphic Approach. HSI 2024: 1-8 - [c32]Tasnia Ashrafi Heya, Abdul Serwadda:
Exploiting Voice-Controlled Devices to Infer the Layouts of Private Spaces. HSI 2024: 1-8 - [c31]Sayed Erfan Arefin, Tasnia Ashrafi Heya, Hasan Al-Qudah, Ynes Ineza, Abdul Serwadda:
Unmasking the Giant: A Comprehensive Evaluation of ChatGPT's Proficiency in Coding Algorithms and Data Structures. ICAART (1) 2024: 412-419 - [c30]Tasnia Ashrafi Heya, Ynes Ineza, Sayed Erfan Arefin, Godsgift Uzor, Abdul Serwadda:
Stable or Shaky? The Semantics of ChatGPT's Behavior Under Repeated Queries. ICSC 2024: 110-116 - [c29]Sayed Erfan Arefin, Abdul Serwadda:
The Road to Web 3.0: Empirical Insights into Full Node Workload in the Bitcoin Blockchain. SmartNets 2024: 1-6 - [i4]Sayed Erfan Arefin, Abdul Serwadda:
Exploiting HDMI and USB Ports for GPU Side-Channel Insights. CoRR abs/2410.02539 (2024) - 2023
- [i3]Sayed Erfan Arefin, Tasnia Heya Ashrafi, Hasan Al-Qudah, Ynes Ineza, Abdul Serwadda:
Unmasking the giant: A comprehensive evaluation of ChatGPT's proficiency in coding algorithms and data structures. CoRR abs/2307.05360 (2023) - 2022
- [c28]Hassan Wasswa, Abdul Serwadda:
The Proof is in the Glare: On the Privacy Risk Posed by Eyeglasses in Video Calls. IWSPA@CODASPY 2022: 46-54 - [c27]Gustavo Casqueiro, Sayed Erfan Arefin, Tasnia Heya Ashrafi, Abdul Serwadda, Hassan Wasswa:
Weaponizing IoT Sensors: When Table Choice Poses a Security Vulnerability. TPS-ISA 2022: 160-167 - [i2]Tasnia Heya Ashrafi, Abdul Serwadda, Isaac Griswold-Steiner, Richard Matovu:
A Wearables-Driven Attack on Examination Proctoring. CoRR abs/2203.08217 (2022) - 2021
- [j7]Isaac Griswold-Steiner, Zachary LeFevre, Abdul Serwadda:
Smartphone speech privacy concerns from side-channel attacks on facial biomechanics. Comput. Secur. 100: 102110 (2021) - [c26]Isaac Griswold-Steiner, N'godjigui Junior Diarrassouba, Shreyesh Arangath, Abdul Serwadda:
User Perceptions of Defensive Techniques Against Keystroke Timing Attacks During Password Entry. CHI Extended Abstracts 2021: 244:1-244:6 - [c25]Jundong Chen, Md. Shafaeat Hossain, Abdul Serwadda, Fei Han:
Modeling Follow-Unfollow Mechanism in Social Networks with Evolutionary Game. ICA 2021: 37-40 - [c24]Sayed Erfan Arefin, Abdul Serwadda:
Deep Neural Exposure: You Can Run, But Not Hide Your Neural Network Architecture! IH&MMSec 2021: 75-80 - [c23]Tasnia Heya Ashrafi, Abdul Serwadda, Isaac Griswold-Steiner, Richard Matovu:
A Wearables-Driven Attack on Examination Proctoring. PST 2021: 1-7 - [c22]Sraddhanjali Acharya, Abdul Serwadda:
On Finger Stretching and Bending Dynamics as a Biometric Modality. SmartNets 2021: 1-8 - [c21]Sraddhanjali Acharya, Abdul Serwadda, Argenis V. Bilbao:
That phone charging hub knows your video playlist! SmartWorld/SCALCOM/UIC/ATC/IOP/SCI 2021: 160-169 - 2020
- [c20]Richard Matovu, Abdul Serwadda, Argenis V. Bilbao, Isaac Griswold-Steiner:
Defensive Charging: Mitigating Power Side-Channel Attacks on Charging Smartphones. CODASPY 2020: 179-190
2010 – 2019
- 2019
- [j6]Isaac Griswold-Steiner, Richard Matovu, Abdul Serwadda:
Wearables-Driven Freeform Handwriting Authentication. IEEE Trans. Biom. Behav. Identity Sci. 1(3): 152-164 (2019) - [c19]Sraddhanjali Acharya, Richard Matovu, Abdul Serwadda, Isaac Griswold-Steiner:
Gamification of Wearable Data Collection: A Tool for both Friend and Foe. ICCDA 2019: 68-77 - [c18]Ozhan Gecgel, Stephen Ekwaro-Osire, João Paulo Dias, Abdul Serwadda, Fisseha M. Alemayehu, Abraham Nispel:
Gearbox Fault Diagnostics Using Deep Learning with Simulated Data. ICPHM 2019: 1-8 - [c17]Zakery Fyke, Isaac Griswold-Steiner, Abdul Serwadda:
Prying into Private Spaces Using Mobile Device Motion Sensors. PST 2019: 1-10 - [i1]Richard Matovu, Isaac Griswold-Steiner, Abdul Serwadda:
Kinetic Song Comprehension: Deciphering Personal Listening Habits via Phone Vibrations. CoRR abs/1909.09123 (2019) - 2018
- [c16]Richard Matovu, Abdul Serwadda, David Irakiza, Isaac Griswold-Steiner:
Jekyll and Hyde: On The Double-Faced Nature of Smart-Phone Sensor Noise Injection. BIOSIG 2018: 1-6 - [c15]Tahrima Mustafa, Richard Matovu, Abdul Serwadda, Nicholas Muirhead:
Unsure How to Authenticate on Your VR Headset?: Come on, Use Your Head! IWSPA@CODASPY 2018: 23-30 - [c14]Richard Matovu, Abdul Serwadda:
Gaming the Gamer: Adversarial Fingerprinting of Gaming Apps using Smartphone Accelerometers. UEMCON 2018: 489-496 - [c13]Isaac Griswold-Steiner, Zakery Fyke, Mushfique Ahmed, Abdul Serwadda:
Morph-a-Dope: Using Pupil Manipulation to Spoof Eye Movement Biometrics. UEMCON 2018: 543-552 - 2017
- [c12]Isaac Griswold-Steiner, Richard Matovu, Abdul Serwadda:
Handwriting watcher: A mechanism for smartwatch-driven handwriting authentication. IJCB 2017: 216-224 - 2016
- [b1]Rastko R. Selmic, Vir V. Phoha, Abdul Serwadda:
Wireless Sensor Networks - Security, Coverage, and Localization. Springer 2016, ISBN 978-3-319-46767-2, pp. 1-215 - [j5]Abdul Serwadda, Vir V. Phoha, Zibo Wang, Rajesh Kumar, Diksha Shukla:
Toward Robotic Robbery on the Touch Screen. ACM Trans. Inf. Syst. Secur. 18(4): 14:1-14:25 (2016) - [c11]Rajesh Kumar, Vir V. Phoha, Abdul Serwadda:
Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns. BTAS 2016: 1-8 - [c10]Richard Matovu, Abdul Serwadda:
Your substance abuse disorder is an open secret! Gleaning sensitive personal information from templates in an EEG-based authentication system. BTAS 2016: 1-7 - 2015
- [j4]Abdul Serwadda, Vir V. Phoha:
When Mice devour the Elephants: A DDoS attack against size-based scheduling schemes in the internet. Comput. Secur. 53: 31-43 (2015) - [c9]Sujit Poudel, Abdul Serwadda, Vir V. Phoha:
On humanoid robots imitating human touch gestures on the smart phone. BTAS 2015: 1-7 - [c8]Abdul Serwadda, Vir V. Phoha, Sujit Poudel, Leanne M. Hirshfield, Danushka Bandara, Sarah E. Bratt, Mark R. Costa:
fNIRS: A new modality for brain activity-based biometric authentication. BTAS 2015: 1-7 - 2014
- [c7]Diksha Shukla, Rajesh Kumar, Abdul Serwadda, Vir V. Phoha:
Beware, Your Hands Reveal Your Secrets! CCS 2014: 904-917 - [c6]Abena Primo, Vir V. Phoha, Rajesh Kumar, Abdul Serwadda:
Context-Aware Active Authentication Using Smartphone Accelerometer Measurements. CVPR Workshops 2014: 98-105 - 2013
- [j3]Abdul Serwadda, Zibo Wang, Patrick Koch, Sathya Govindarajan, Raviteja Pokala, Adam Goodkind, David Guy Brizan, Andrew Rosenberg, Vir V. Phoha, Kiran S. Balagani:
Scan-Based Evaluation of Continuous Keystroke Authentication Systems. IT Prof. 15(4): 20-23 (2013) - [j2]Abdul Serwadda, Vir V. Phoha:
Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings. ACM Trans. Inf. Syst. Secur. 16(2): 8 (2013) - [c5]Abdul Serwadda, Vir V. Phoha, Zibo Wang:
Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms. BTAS 2013: 1-8 - [c4]Abdul Serwadda, Vir V. Phoha:
When kids' toys breach mobile phone security. CCS 2013: 599-610 - 2012
- [c3]Zibo Wang, Abdul Serwadda, Kiran S. Balagani, Vir V. Phoha:
Transforming animals in a cyber-behavioral biometric menagerie with Frog-Boiling attacks. BTAS 2012: 289-296 - 2011
- [j1]Idris A. Rai, Abdul Serwadda:
Towards end-host-based identification of competing protocols against TCP in a bottleneck link. Ann. des Télécommunications 66(1-2): 59-77 (2011) - [c2]Abdul Serwadda, Vir V. Phoha, Ankunda R. Kiremire:
Using global knowledge of users' typing traits to attack keystroke biometrics templates. MM&Sec 2011: 51-60 - 2010
- [c1]Abdul Serwadda, Vir V. Phoha, Idris A. Rai:
Size-based scheduling: a recipe for DDOS? CCS 2010: 729-731
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint