Nikolay Ivanov

Orcid: 0000-0002-2325-2847

According to our database1, Nikolay Ivanov authored at least 26 papers between 1993 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
GigaPevt: Multimodal Medical Assistant.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Multi-Turn Hidden Backdoor in Large Language Model-powered Chatbot Models.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
AutoThing: A Secure Transaction Framework for Self-Service Things.
IEEE Trans. Serv. Comput., 2023

TxT: Real-Time Transaction Encapsulation for Ethereum Smart Contracts.
IEEE Trans. Inf. Forensics Secur., 2023

Graph Learning for Interactive Threat Detection in Heterogeneous Smart Home Rule Data.
Proc. ACM Manag. Data, 2023

Security Threat Mitigation for Smart Contracts: A Comprehensive Survey.
ACM Comput. Surv., 2023

A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?
CoRR, 2023

Security Threat Mitigation For Smart Contracts: A Survey.
CoRR, 2023

DynamicFL: Balancing Communication Dynamics and Client Manipulation for Federated Learning.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023

2022
Is Rust C++-fast? Benchmarking System Languages on Everyday Routines.
CoRR, 2022

Decentralization Paradox: A Study of Hegemonic and Risky ERC-20 Tokens.
CoRR, 2022

Et tu, Blockchain? Outsmarting Smart Contracts via Social Engineering.
CoRR, 2022

SPECPATCH: Human-In-The-Loop Adversarial Audio Spectrogram Patch Attack on Speech Recognition.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

SUPERVOICE: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Constraint-Based Inference of Heuristics for Foreign Exchange Trade Model Optimization.
CoRR, 2021

System-Wide Security for Offline Payment Terminals.
Proceedings of the Security and Privacy in Communication Networks, 2021

Rectifying Administrated ERC20 Tokens.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Blockumulus: A Scalable Framework for Smart Contracts on the Cloud.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

EthClipper: A Clipboard Meddling Attack on Hardware Wallets with Address Verification Evasion.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
SmartWiFi: Universal and Secure Smart Contract-Enabled WiFi Hotspot.
Proceedings of the Security and Privacy in Communication Networks, 2020

2019
Bird's-Eye - Large-Scale Visual Analytics of City Dynamics using Social Location Data.
Comput. Graph. Forum, 2019

2012
Manual dexterity correlating with right lobule VI volume in right-handed 14-year-olds.
NeuroImage, 2012

A System of Relational Syllogistic Incorporating Full Boolean Reasoning.
J. Log. Lang. Inf., 2012

2011
Relational Syllogistics
CoRR, 2011

1993
The Globalized Growth of the ACM Scholastic Programming Contest (abstract).
Proceedings of the ACM 21th Conference on Computer Science, 1993


  Loading...