关注
Anupam Das
Anupam Das
在 ncsu.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
The Tangled Web of Password Reuse.
A Das, J Bonneau, M Caesar, N Borisov, X Wang
Network and Distributed SystemSecurity Symposium (NDSS), 2014
6522014
SecuredTrust: a dynamic trust computation model for secured communication in multiagent systems
A Das, MM Islam
IEEE Transactions on Dependable and Secure Computing 9 (2), 261-274, 2011
2952011
Personalized privacy assistant
N Sadeh, B Liu, A Das, M Degeling, F Schaub
US Patent 10,956,586, 2021
2552021
Do you hear what i hear?: Fingerprinting smart devices through embedded acoustic components
A Das, N Borisov, M Caesar
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
2082014
Some recipes can do more than spoil your appetite: Analyzing the security and privacy risks of ifttt recipes
M Surbatovich, J Aljuraidan, L Bauer, A Das, L Jia
Proceedings of the 26th International Conference on World Wide Web, 1501-1510, 2017
1962017
Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses.
A Das, N Borisov, M Caesar
NDSS, 2016
1802016
A scalable and privacy-aware IoT service for live video analytics
J Wang, B Amos, A Das, P Pillai, N Sadeh, M Satyanarayanan
Proceedings of the 8th ACM on Multimedia Systems Conference, 38-49, 2017
1662017
Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice
A Das, M Degeling, D Smullen, N Sadeh
IEEE Pervasive Computing 17 (3), 35-46, 2018
1452018
The Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors
A Das, G Acar, N Borisov, A Pradeep
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1122018
Assisting users in a world full of cameras: A privacy-aware infrastructure for computer vision applications
A Das, M Degeling, X Wang, J Wang, N Sadeh, M Satyanarayanan
2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops …, 2017
1022017
Transparent and Flexible Network Management for Big Data Processing in the Cloud
A Das, C Lumezanu, Y Zhang, V Singh, G Jiang, C Yu
USENIX HotCloud 2013, 2013
1022013
Riding out domsday: Towards detecting and preventing dom cross-site scripting
W Melicher, A Das, M Sharif, L Bauer, L Jia
2018 Network and Distributed System Security Symposium (NDSS), 2018
962018
Mining on someone else’s dime: Mitigating covert mining operations in clouds and enterprises
R Tahir, M Huzaifa, A Das, M Ahmad, C Gunter, F Zaffar, M Caesar, ...
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017
932017
Towards privacy-aware smart buildings: Capturing, communicating, and enforcing privacy policies and preferences
P Pappachan, M Degeling, R Yus, A Das, S Bhagavatula, W Melicher, ...
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
892017
Hey Alexa, is this skill safe?: Taking a closer look at the Alexa skill ecosystem
C Lentzsch, SJ Shah, B Andow, M Degeling, A Das, W Enck
Network and Distributed Systems Security (NDSS) Symposium2021, 2021
772021
Defending tor from network adversaries: A case study of network path prediction
J Juen, A Johnson, A Das, N Borisov, M Caesar
Proceedings on Privacy Enhancing Technologies 2015 (2), 171-187, 2015
692015
Enabling live video analytics with a scalable and privacy-aware framework
J Wang, B Amos, A Das, P Pillai, N Sadeh, M Satyanarayanan
ACM Transactions on Multimedia Computing, Communications, and Applications …, 2018
632018
How Risky Are Real Users'{IFTTT} Applets?
C Cobb, M Surbatovich, A Kawakami, M Sharif, L Bauer, A Das, L Jia
Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 505-529, 2020
552020
Every move you make: Exploring practical issues in smartphone motion sensor fingerprinting and countermeasures
A Das, N Borisov, E Chou
Proceedings on Privacy Enhancing Technologies 2018 (1), 88-108, 2018
482018
Exploring ways to mitigate sensor-based smartphone fingerprinting
A Das, N Borisov, M Caesar
arXiv preprint arXiv:1503.01874, 2015
472015
系统目前无法执行此操作,请稍后再试。
文章 1–20