Name
Papers
Collaborators
KASSEM FAWAZ
44
82
Citations 
PageRank 
Referers 
190
19.60
621
Referees 
References 
1096
464
Search Limit
1001000
Title
Citations
PageRank
Year
Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems.00.342022
Experimental Security Analysis of the App Model in Business Collaboration Platforms00.342022
AEROKEY: Using Ambient Electromagnetic Radiation for Secure and Usable Wireless Device Authentication00.342022
CONFIDANT: A Privacy Controller for Social Robots00.342022
Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps.00.342022
SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks00.342022
Towards More Robust Keyword Spotting for Voice Assistants00.342022
The Roaming Edge and its Applications.00.342021
PriSEC: A Privacy Settings Enforcement Controller00.342021
Powercut And Obfuscator: An Exploration Of The Design Space For Privacy-Preserving Interventions For Smart Speakers00.342021
PEDRO: Secure Pedestrian Mobility Verification in V2P Communication using Commercial Off-the-shelf Mobile Devices00.342021
Kalεido - Real-Time Privacy Control for Eye-Tracking Systems.00.342021
The Privacy Policy Landscape After the GDPR20.362020
Preech - A System for Privacy-Preserving Speech Transcription.00.342020
Enhancing ML Robustness Using Physical-World Constraints.00.342019
Privacy Protection for Audio Sensing Against Multi-Microphone Adversaries.10.342019
Velody: Nonlinear Vibration Challenge-Response for Resilient User Authentication20.352019
Wearable Technology brings Security to Alexa and Siri.00.342018
The Privacy Policy Landscape After the GDPR.10.362018
Characterizing Privacy Perceptions of Voice Assistants: A Technology Probe Study.00.342018
Traversing the Quagmire that is Privacy in your Smart Home.10.372018
Speed Trap Optimal Patrolling: STOP Playing Stackelberg Security Games.00.342018
Continuous Authentication for Voice Assistants.220.812017
PriBots: Conversational Privacy with Chatbots.40.462016
RT-OPEX: Flexible Scheduling for Cloud-RAN Processing.50.492016
Privacy vs. Reward in Indoor Location-Based Services.00.342016
Protecting Privacy Of Ble Device Users100.682016
Replication enabled distributed cache invalidation method: replication enabled distributed cache management system for wireless mobile networks00.342015
LinkDroid: Reducing Unregulated Aggregation of App Usage Behaviors10.352015
PBCOV: a property-based coverage criterion20.372015
Anatomization and Protection of Mobile Apps’ Location Privacy Threats140.572015
Location Privacy Protection for Smartphone Users491.542014
Improving vehicular safety message delivery through the implementation of a cognitive vehicular network120.562013
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks140.672013
A two-layer cache replication scheme for dense mobile ad hoc networks10.362012
A privacy-preserving cache management system for MANETs10.352012
A proxy-based architecture for dynamic discovery and invocation of web services from mobile devices90.722012
Slow port scanning detection.50.442011
Fuzzy cognitive Vehicular Ad hoc Networks10.362011
Data delivery guarantees in congested Vehicular ad hoc networks using cognitive networks251.122011
Extending The Dsrc'S Control Channel Using Cognitive Networking Concepts And Fuzzy Logic10.362011
CRUST: Implementation of clustering and routing functions for mobile ad hoc networks using reactive tuple-spaces20.392009
Indoor Propagation Effects On Toa Bias For Joint Gnss And Terrestrial Radio Based Localization00.342009
A fast HTML web page change detection approach based on hashing and reducing the number of similarity computations50.462008