Matthew Wright
Orcid: 0000-0002-8489-6347Affiliations:
- Rochester Institute of Technology, NY, USA
- University of Texas at Arlington, Department of Computer Science and Engineering (former)
- University of Massachusetts Amherst, Department of Computer Science (former)
According to our database1,
Matthew Wright
authored at least 111 papers
between 2002 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
MADAR: Efficient Continual Learning for Malware Analysis with Diversity-Aware Replay.
CoRR, February, 2025
2024
Laserbeak: Evolving Website Fingerprinting Attacks With Attention and Multi-Channel Feature Representation.
IEEE Trans. Inf. Forensics Secur., 2024
Dungeons & Deepfakes: Using scenario-based role-play to study journalists' behavior towards using AI-based verification tools for video content.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
A First Look into Targeted Clickbait and its Countermeasures: The Power of Storytelling.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
Proceedings of the 8th Asia-Pacific Workshop on Networking, 2024
2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
2022
Behav. Inf. Technol., 2022
Evaluating Robustness of Sequence-based Deepfake Detector Models by Adversarial Perturbation.
Proceedings of the WDC@AsiaCCS '22: Proceedings of the 1st Workshop on Security Implications of Deepfakes and Cheapfakes, 2022
DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the Conference on Lifelong Learning Agents, 2022
2021
Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks With Adversarial Traces.
IEEE Trans. Inf. Forensics Secur., 2021
Inf. Comput. Secur., 2021
Comput. Secur., 2021
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
Proceedings of the 32nd British Machine Vision Conference 2021, 2021
2020
Proc. Priv. Enhancing Technol., 2020
IEEE J. Sel. Top. Signal Process., 2020
CoRR, 2020
Weaponizing Unicodes with Deep Learning -Identifying Homoglyphs with Weakly Labeled Data.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020
Proceedings of the 2020 IEEE International Joint Conference on Biometrics, 2020
They Might NOT Be Giants Crafting Black-Box Adversarial Examples Using Particle Swarm Optimization.
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
They Might NOT Be Giants: Crafting Black-Box Adversarial Examples with Fewer Queries Using Particle Swarm Optimization.
CoRR, 2019
Adv-DWF: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces.
CoRR, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Poster: Understanding User's Decision to Interact with Potential Phishing Posts on Facebook using a Vignette Study.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Interact. Comput., 2017
Distributed Detection of Sensor Worms Using Sequential Analysis and Remote Software Attestations.
IEEE Access, 2017
Proceedings of the 3rd International Workshop on Privacy Engineering co-located with 38th IEEE Symposium on Security and Privacy, 2017
Learning System-assigned Passwords: A Preliminary Study on the People with Learning Disabilities.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
2016
Proc. Priv. Enhancing Technol., 2016
J. Netw. Comput. Appl., 2016
Inf. Comput. Secur., 2016
Proceedings of the 6th International Conference on the Internet of Things, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
POSTER: Phishing Website Detection with a Multiphase Framework to Find Visual Similarity.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
The Impact of Cues and User Interaction on the Memorability of System-Assigned Recognition-Based Graphical Passwords.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Towards Making Random Passwords Memorable: Leveraging Users' Cognitive Ability Through Multiple Cues.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
Pervasive Mob. Comput., 2014
Int. J. Hum. Comput. Stud., 2014
Fast and energy-efficient technique for jammed region mapping in wireless sensor networks.
CoRR, 2014
CoRR, 2014
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Comput. Networks, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
Passwords and interfaces: towards creating stronger passwords by using mobile phone handsets.
Proceedings of the SPSM'13, 2013
2012
IEEE Trans. Mob. Comput., 2012
ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing.
IEEE Trans. Dependable Secur. Comput., 2012
J. Networks, 2012
Ad Hoc Networks, 2012
CRISP: collusion-resistant incentive-compatible routing and forwarding in opportunistic networks.
Proceedings of the 15th ACM International Conference on Modeling, 2012
Proceedings of IEEE International Conference on Communications, 2012
2011
Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing.
IEEE Trans. Mob. Comput., 2011
EnPassant: anonymous routing for disruption-tolerant networks with applications in assistive environments.
Secur. Commun. Networks, 2011
Electron. Commer. Res. Appl., 2011
Comput. Secur., 2011
Comput. Networks, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Netw. Protoc. Algorithms, 2010
Comput. Networks, 2010
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010
Proceedings of the Information Hiding - 12th International Conference, 2010
Selective Cross Correlation in Passive Timing Analysis Attacks against Low-Latency Mixes.
Proceedings of the Global Communications Conference, 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
Towards modeling the behavior of physical intruders in a region monitored by a wireless sensor network.
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, 2010
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, 2010
2009
Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks.
Ad Hoc Networks, 2009
ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Sensor Networks Using Sequential Analysis.
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009
PEON: privacy-enhanced opportunistic networks with applications in assistive environments.
Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, 2009
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
2008
ACM Trans. Inf. Syst. Secur., 2008
Proceedings of the Privacy Enhancing Technologies, 2008
Proceedings of the Proceedings P2P'08, 2008
2007
Proceedings of the IEEE International Conference on Network Protocols, 2007
Proceedings of the Computer Security, 2007
2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
2005
Proceedings of the Applied Cryptography and Network Security, 2005
2004
ACM Trans. Inf. Syst. Secur., 2004
Proceedings of the Financial Cryptography, 2004
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004
2003
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003
2002
Proceedings of the Network and Distributed System Security Symposium, 2002