Anupam Das

Orcid: 0000-0002-8961-9963

Affiliations:
  • North Carolina State University, Raleigh, NC, USA
  • Carnegie Mellon University, PA, USA (former)
  • University of Illinois at Urbana-Champaign, IL, USA (PhD)
  • Bangladesh University of Engineering and Technology, Dhaka, Bangladesh (former)


According to our database1, Anupam Das authored at least 53 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Fully-Configurable Open-Source Software-Defined Digital Quantized Spiking Neural Core Architecture.
CoRR, 2024

Enabling Developers, Protecting Users: Investigating Harassment and Safety in VR.
Proceedings of the 33rd USENIX Security Symposium, 2024

Understanding Parents' Perceptions and Practices Toward Children's Security and Privacy in Virtual Reality.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

JSHint: Revealing API Usage to Improve Detection of Malicious JavaScript.
Proceedings of the Information Security - 27th International Conference, 2024

Automated Generation of Behavioral Signatures for Malicious Web Campaigns.
Proceedings of the Information Security - 27th International Conference, 2024

2023
Natural Voice Interface for the Next Generation of Smart Spaces.
Proceedings of the 24th International Workshop on Mobile Computing Systems and Applications, 2023

VoicePM: A Robust Privacy Measurement on Voice Anonymity.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

Spying through Your Voice Assistants: Realistic Voice Command Fingerprinting.
Proceedings of the 32nd USENIX Security Symposium, 2023

MetaMorphosis: Task-oriented Privacy Cognizant Feature Generation for Multi-task Learning.
Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation, 2023

INSPIRE: Instance-Level Privacy-Pre Serving Transformation for Vehicular Camera Videos.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

Speaker Orientation-Aware Privacy Control to Thwart Misactivation of Voice Assistants.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

Comparative Privacy Analysis of Mobile Browsers.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

2022
Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices.
Proc. Priv. Enhancing Technol., 2022

Analyzing the Impact and Accuracy of Facebook Activity on Facebook's Ad-Interest Inference Process.
Proc. ACM Hum. Comput. Interact., 2022

Hey Alexa, Who Am I Talking to?: Analyzing Users' Perception and Awareness Regarding Third-party Alexa Skills.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
"Did you know this camera tracks your mood?": Understanding Privacy Expectations and Preferences in the Age of Video Analytics.
Proc. Priv. Enhancing Technol., 2021

HandLock: Enabling 2-FA for Smart Home Voice Assistants using Inaudible Acoustic Signal.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

A 2-FA for home voice assistants using inaudible acoustic signal.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

Privacy during Pandemic: A Global View of Privacy Practices around COVID-19 Apps.
Proceedings of the COMPASS '21: ACM SIGCAS Conference on Computing and Sustainable Societies, Virtual Event, Australia, 28 June 2021, 2021

Understanding People's Attitude and Concerns towards Adopting IoT Devices.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

Understanding the Privacy Implications of Adblock Plus's Acceptable Ads.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
How Risky Are Real Users' IFTTT Applets?
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

2018
Enabling Live Video Analytics with a Scalable and Privacy-Aware Framework.
ACM Trans. Multim. Comput. Commun. Appl., 2018

Every Move You Make: Exploring Practical Issues in Smartphone Motion Sensor Fingerprinting and Countermeasures.
Proc. Priv. Enhancing Technol., 2018

Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice.
IEEE Pervasive Comput., 2018

Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

The Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes.
Proceedings of the 26th International Conference on World Wide Web, 2017

Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

A Scalable and Privacy-Aware IoT Service for Live Video Analytics.
Proceedings of the 8th ACM on Multimedia Systems Conference, 2017

Password correlation: Quantification, evaluation and application.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Every Move You Make: Tracking Smartphone Users through Motion Sensors.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

Towards Privacy-Aware Smart Buildings: Capturing, Communicating, and Enforcing Privacy Policies and Preferences.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

Assisting Users in a World Full of Cameras: A Privacy-Aware Infrastructure for Computer Vision Applications.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

2016
Understanding and mitigating the privacy risks of smartphone sensor fingerprinting
PhD thesis, 2016

Smartphone Fingerprinting Via Motion Sensors: Analyzing Feasiblity at Large-Scale and Studing Real Usage Patterns.
CoRR, 2016

Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction.
Proc. Priv. Enhancing Technol., 2015

Exploring Ways To Mitigate Sensor-Based Smartphone Fingerprinting.
CoRR, 2015

2014
Fingerprinting Smart Devices Through Embedded Acoustic Components.
CoRR, 2014

The Tangled Web of Password Reuse.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Analyzing an adaptive reputation metric for anonymity systems.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Re<sup>3</sup>: relay reliability reputation for anonymity systems.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Transparent and Flexible Network Management for Big Data Processing in the Cloud.
Proceedings of the 5th USENIX Workshop on Hot Topics in Cloud Computing, 2013

Securing Anonymous Communication Channels under the Selective DoS Attack.
Proceedings of the Financial Cryptography and Data Security, 2013

PnP: improving web browsing performance over tor using web resource prefetch-and-push.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems.
IEEE Trans. Dependable Secur. Comput., 2012

2011
Securing Tor Tunnels under the Selective-DoS Attack
CoRR, 2011

2010
A novel feedback based fast adaptive trust model for P2P networks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

2009
Evolving Multilayer Neural Networks Using Permutation free Encoding Technique.
Proceedings of the 2009 International Conference on Artificial Intelligence, 2009

2008
Permutation Free Encoding Technique for Evolving Neural Networks.
Proceedings of the Advances in Neural Networks, 2008


  Loading...