Fareed Zaffar

Orcid: 0000-0002-1270-5513

According to our database1, Fareed Zaffar authored at least 58 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Longitudinal Analysis of Racial and Gender Bias in New York Times and Fox News Images and Articles.
CoRR, 2024

Multitask Mayhem: Unveiling and Mitigating Safety Gaps in LLMs Fine-tuning.
CoRR, 2024

2023
Rethinking Homework in the Age of Artificial Intelligence.
IEEE Intell. Syst., 2023

WASEF: Web Acceleration Solutions Evaluation Framework.
CoRR, 2023

Towards Reproducible Ransomware Analysis.
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023

Evaluating Container Debloaters.
Proceedings of the IEEE Secure Development Conference, 2023

SoK: A Tale of Reduction, Security, and Correctness - Evaluating Program Debloating Paradigms and Their Compositions.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
Trimmer: An Automated System for Configuration-Based Software Debloating.
IEEE Trans. Software Eng., 2022

Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices.
Proc. Priv. Enhancing Technol., 2022

An internet of secure and private things: A service-oriented architecture.
Comput. Secur., 2022

FORTIFY: Software Defined Data Plane Resilience.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2022

Forensic Analysis of Configuration-based Attacks.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Trimmer: Context-Specific Code Reduction.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Are Proactive Interventions for Reddit Communities Feasible?
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

PACED: Provenance-based Automated Container Escape Detection.
Proceedings of the IEEE International Conference on Cloud Engineering, 2022

2021
Avengers Ensemble! Improving Transferability of Authorship Obfuscation.
CoRR, 2021

To Block or Not to Block: Accelerating Mobile Web Pages On-The-Fly Through JavaScript Classification.
CoRR, 2021

Poster Abstract: BounceBack - A DDoS Attack Using Unsuspecting Accomplices in the Network.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

TrackerSift: untangling mixed tracking and functional web resources.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

Through the Looking Glass: Learning to Attribute Synthetic Text Generated by Language Models.
Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume, 2021

Seeing is Believing: Exploring Perceptual Differences in DeepFake Videos.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

Accelerating Fourier and Number Theoretic Transforms using Tensor Cores and Warp Shuffles.
Proceedings of the 30th International Conference on Parallel Architectures and Compilation Techniques, 2021

2020
CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks.
Proc. Priv. Enhancing Technol., 2020

Towards Characterizing COVID-19 Awareness on Twitter.
CoRR, 2020

Measuring and mitigating OAuth access token abuse by collusion networks.
Commun. ACM, 2020

Apophanies or Epiphanies? How Crawlers Impact Our Understanding of the Web.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Phishcasting: Deep Learning for Time Series Forecasting of Phishing Attacks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

2019
A Girl Has No Name: Automated Authorship Obfuscation using Mutant-X.
Proc. Priv. Enhancing Technol., 2019

To Act or React: Investigating Proactive Strategies For Online Community Moderation.
CoRR, 2019

Quantity vs. Quality: Evaluating User Interest Profiles Using Ad Preference Managers.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

The Browsers Strike Back: Countering Cryptojacking and Parasitic Miners on the Web.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Poster Abstract: Guardian - A Smart Cloud Fabric for Virtual Patching and Customized Defenses.
Proceedings of the IEEE INFOCOM 2019, 2019

Bringing the kid back into YouTube kids: detecting inappropriate content on video streaming platforms.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

2018
Detecting and Defending Against Certificate Attacks with Origin-Bound CAPTCHAs.
Proceedings of the Security and Privacy in Communication Networks, 2018

Using SGX-Based Virtual Clones for IoT Security.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

TRIMMER: application specialization for code debloating.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

It's All in the Name: Why Some URLs are More Vulnerable to Typosquatting.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Decision-tree inspired classification algorithm to detect Tuberculosis (TB).
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

Accurate Detection of Automatically Spun Content via Stylometric Analysis.
Proceedings of the 2017 IEEE International Conference on Data Mining, 2017

Characterizing key stakeholders in an online black-hat marketplace.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017

An Anomaly Detection Fabric for Clouds Based on Collaborative VM Communities.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

Aspect Based Sentiment Analysis for Large Documents with Applications to US Presidential Elections 2016.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
To route or to secure: Tradeoffs in ICNs over MANETs.
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016

Sneak-Peek: High speed covert channels in data center networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Malware Slums: Measurement and Analysis of Malware on Traffic Exchanges.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Improving Security Awareness in the Government Sector.
Proceedings of the 17th International Digital Government Research Conference on Digital Government Research, 2016

2015
Characterizing Seller-Driven Black-Hat Marketplaces.
CoRR, 2015

A Classification Based Framework to Predict Viral Threads.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015

Who's holding the bag? Accountability in the criminal justice system.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
Covert channels in online rogue-like games.
Proceedings of the IEEE International Conference on Communications, 2014

Finding Needle in the Case-Stack: Effective Remote Monitoring of Courts.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2013
Optimized Rollback and Re-computation.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2011
Identifying the provenance of correlated anomalies.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

2010
Fine-grained tracking of Grid infections.
Proceedings of the 2010 11th IEEE/ACM International Conference on Grid Computing, 2010

2007
A Service Architecture for Countering Distributed Denial of Service Attacks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Cooperative forensics sharing.
Proceedings of the 1st International ICST Conference on Bio Inspired Models of Network, 2006

2005
Paranoid: A Global Secure File Access Control System.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005


  Loading...