Kassem Fawaz
Orcid: 0000-0002-4609-7691
According to our database1,
Kassem Fawaz
authored at least 90 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Reliable Heading Tracking for Pedestrian Road Crossing Prediction Using Commodity Devices.
CoRR, 2024
Evaluating the Impact of Warning Modalities and False Alarms in Pedestrian Crossing Alert System.
CoRR, 2024
CoRR, 2024
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024
Exploring the Interplay Between Interaction Experience and Security Perception of Payment Authentication in Virtual Reality.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2024
Unpacking Privacy Labels: A Measurement and Developer Perspective on Google's Data Safety Section.
Proceedings of the 33rd USENIX Security Symposium, 2024
A Picture is Worth 500 Labels: A Case Study of Demographic Disparities in Local Machine Learning Models for Instagram and TikTok.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Do Large Code Models Understand Programming Concepts? Counterfactual Analysis for Code Predicates.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
I see an IC: A Mixed-Methods Approach to Study Human Problem-Solving Processes in Hardware Reverse Engineering.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
CoRR, 2023
CoRR, 2023
Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks.
CoRR, 2023
"I Want the Payment Process to be Cool": Understanding How Interaction Factors into Security and Privacy Perception of Authentication in Virtual Reality.
CoRR, 2023
CoRR, 2023
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
"It's up to the Consumer to be Smart": Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box Attacks.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps.
Proc. Priv. Enhancing Technol., 2022
AEROKEY: Using Ambient Electromagnetic Radiation for Secure and Usable Wireless Device Authentication.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022
SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
I Know Your Triggers: Defending Against Textual Backdoor Attacks with Benign Backdoor Augmentation.
Proceedings of the IEEE Military Communications Conference, 2022
Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems.
Proceedings of the International Conference on Machine Learning, 2022
Proceedings of the ACM/IEEE International Conference on Human-Robot Interaction, 2022
2021
CoRR, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
PowerCut and Obfuscator: An Exploration of the Design Space for Privacy-Preserving Interventions for Smart Speakers.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
PEDRO: Secure Pedestrian Mobility Verification in V2P Communication using Commercial Off-the-shelf Mobile Devices.
Proceedings of the CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 2021
2020
Proceedings of the 29th USENIX Security Symposium, 2020
2019
Proc. Priv. Enhancing Technol., 2019
Proceedings of the 11th International Conference on Communication Systems & Networks, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Wirel. Pers. Commun., 2018
GetMobile Mob. Comput. Commun., 2018
CoRR, 2018
Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 Workshop on IoT Security and Privacy, 2018
2017
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017
2016
Proc. Priv. Enhancing Technol., 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the Workshop on Security Fatigue, 2016
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, 2016
2015
Replication enabled distributed cache invalidation method: replication enabled distributed cache management system for wireless mobile networks.
Wirel. Commun. Mob. Comput., 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks.
IEEE Trans. Mob. Comput., 2013
Improving vehicular safety message delivery through the implementation of a cognitive vehicular network.
Ad Hoc Networks, 2013
2012
A Proxy-Based Architecture for Dynamic Discovery and Invocation of Web Services from Mobile Devices.
IEEE Trans. Serv. Comput., 2012
Proceedings of the 19th International Conference on Telecommunications, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
2011
Proceedings of the IEEE 7th International Conference on Wireless and Mobile Computing, 2011
Extending the DSRC's control channel using cognitive networking concepts and Fuzzy Logic.
Proceedings of the IEEE 22nd International Symposium on Personal, 2011
Data delivery guarantees in congested Vehicular ad hoc networks using cognitive networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
2010
Improving reliability of safety applications in vehicle ad hoc networks through the implementation of a cognitive network.
Proceedings of the 17th International Conference on Telecommunications, 2010
2009
CRUST: Implementation of clustering and routing functions for mobile ad hoc networks using reactive tuple-spaces.
Ad Hoc Networks, 2009
Indoor Propagation Effects on ToA Bias for Joint GNSS and Terrestrial Radio Based Localization.
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009
2008
A fast HTML web page change detection approach based on hashing and reducing the number of similarity computations.
Data Knowl. Eng., 2008