Abdul Serwadda
Orcid: 0000-0002-2907-0673
According to our database1,
Abdul Serwadda
authored at least 44 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
The Road to Web 3.0: Empirical Insights into Full Node Workload in the Bitcoin Blockchain.
Proceedings of the International Conference on Smart Applications, 2024
Proceedings of the 18th IEEE International Conference on Semantic Computing, 2024
Unmasking the Giant: A Comprehensive Evaluation of ChatGPT's Proficiency in Coding Algorithms and Data Structures.
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024
Proceedings of the 16th International Conference on Human System Interaction, 2024
Secure Audio Classification for Voice Assistants: A Multi-Party Homomorphic Approach.
Proceedings of the 16th International Conference on Human System Interaction, 2024
Proceedings of the IEEE World AI IoT Congress, 2024
2022
Proceedings of the 4th IEEE International Conference on Trust, 2022
Proceedings of the IWSPA@CODASPY 2022: Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics, 2022
2021
Comput. Secur., 2021
Proceedings of the 2021 IEEE SmartWorld, 2021
Proceedings of the International Conference on Smart Applications, 2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021
Proceedings of the IEEE International Conference on Agents, 2021
User Perceptions of Defensive Techniques Against Keystroke Timing Attacks During Password Entry.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
2019
IEEE Trans. Biom. Behav. Identity Sci., 2019
Kinetic Song Comprehension: Deciphering Personal Listening Habits via Phone Vibrations.
CoRR, 2019
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Proceedings of the 2019 IEEE International Conference on Prognostics and Health Management, 2019
Proceedings of the 3rd International Conference on Compute and Data Analysis, 2019
2018
Gaming the Gamer: Adversarial Fingerprinting of Gaming Apps using Smartphone Accelerometers.
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018
Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, 2018
Proceedings of the 2018 International Conference of the Biometrics Special Interest Group, 2018
2017
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017
2016
Your substance abuse disorder is an open secret! Gleaning sensitive personal information from templates in an EEG-based authentication system.
Proceedings of the 8th IEEE International Conference on Biometrics Theory, 2016
Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns.
Proceedings of the 8th IEEE International Conference on Biometrics Theory, 2016
Springer, ISBN: 978-3-319-46769-6, 2016
2015
When Mice devour the Elephants: A DDoS attack against size-based scheduling schemes in the internet.
Comput. Secur., 2015
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015
2014
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
ACM Trans. Inf. Syst. Secur., 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms.
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013
2012
Transforming animals in a cyber-behavioral biometric menagerie with Frog-Boiling attacks.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012
2011
Towards end-host-based identification of competing protocols against TCP in a bottleneck link.
Ann. des Télécommunications, 2011
Using global knowledge of users' typing traits to attack keystroke biometrics templates.
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011
2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010