William Aiken
Orcid: 0000-0003-2421-994X
According to our database1,
William Aiken
authored at least 18 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Strategic Digitalization in Oil and Gas: A Case Study on Mixed Reality and Digital Twins.
IEEE Access, 2024
2023
Measuring Improvement of F<sub>1</sub>-Scores in Detection of Self-Admitted Technical Debt.
CoRR, 2023
Proceedings of the 2023 ACM/IEEE International Conference on Technical Debt (TechDebt), 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild.
CoRR, 2022
2021
Neural network laundering: Removing black-box backdoor watermarks from deep neural networks.
Comput. Secur., 2021
2020
Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks.
CoRR, 2020
Proceedings of the International Conference on Software Security and Assurance, 2020
2019
The Light Will Be with You. Always - A Novel Continuous Mobile Authentication with the Light Sensor.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019
2018
An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Hey Siri - Are You There?: Jamming of Voice Commands Using the Resonance Effect (Work-in-Progress).
Proceedings of the International Conference on Software Security and Assurance, 2018
Ignore the Noise: Using Autoencoders against Adversarial Attacks in Reinforcement Learning (Lightning Talk).
Proceedings of the International Conference on Software Security and Assurance, 2018
POSTER: I Can't Hear This Because I Am Human: A Novel Design of Audio CAPTCHA System.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2016
Bypassing the Integrity Checking of Rights Objects in OMA DRM: a Case Study with the MelOn Music Service.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016
2015
KaaSP: keying as a service provider for small and medium enterprises using untrusted cloud services.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015
2014