Name
Affiliation
Papers
PATRICK TRAYNOR
Georgia Tech Information Security Center, Georgia Institute of Technology
89
Collaborators
Citations 
PageRank 
144
1171
87.80
Referers 
Referees 
References 
2851
2303
1296
Search Limit
1001000
Title
Citations
PageRank
Year
Demystifying Limited Adversarial Transferability in Automatic Speech Recognition Systems00.342022
Beyond Lp Clipping - Equalization based Psychoacoustic Attacks against ASRs.00.342021
Credit Card Fraud Is a Computer Security Problem00.342021
Privacy-Preserving Localization using Enclaves00.342021
Hear "No Evil", See "Kenansville"*: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems10.362021
On the Detection of Disinformation Campaign Activity with Network Analysis10.402020
Are You Going to Answer That? Measuring User Responses to Anti-Robocall Application Indicators00.342020
Enclave-based privacy-preserving localization: poster00.342019
Examining DES-based Cipher Suite Support within the TLS Ecosystem.00.342019
A Hybrid Approach to Secure Function Evaluation Using SGX00.342019
Toward Automated Firmware Analysis in the IoT Era.10.352019
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems.10.352019
Kiss from a Rogue: Evaluating Detectability of Pay-at-the-Pump Card Skimmers00.342019
More Cowbell: Lessons Learned in Developing the Skim Reaper00.342019
Digital Healthcare-Associated Infection - A Case Study on the Security of a Major Multi-Campus Hospital System.00.342019
Characterizing security and privacy practices in emerging digital credit applications00.342019
Outsourcing computation for private function evaluation.00.342019
A Hybrid Approach To Secure Function Evaluation Using Sgx20.362019
A Practical Intel SGX Setting for Linux Containers in the Cloud.20.412019
The Cards Aren't Alright: Detecting Counterfeit Gift Cards Using Encoding Jitter10.372018
Mitigating Risk while Complying with Data Retention Laws.10.352018
Hello, Is It Me You're Looking For?: Differentiating Between Human and Electronic Speakers for Voice Interface Security.40.432018
2MA: Verifying Voice Commands via Two Microphone Authentication.70.462018
Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding10.352018
Characterizing the Security of the SMS Ecosystem with Public Gateways.00.342018
Authenticall: Efficient Identity And Content Authentication For Phone Calls30.382017
Phonion: Practical Protection of Metadata in Telephony Networks.10.352017
Privacy preserving localization using a distributed particle filtering protocol.00.342017
Detecting Mobile Malicious Webpages in Real Time.30.412017
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications00.342017
FinTechSec: Addressing the Security Challenges of Digital Financial Services.00.342017
Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services.10.632017
Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways90.732016
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data402.442016
*droid: Assessment and Evaluation of Android Application Analysis Tools80.502016
Making Usb Great Again With Usbfilter60.552016
OPFE: Outsourcing Computation for Private Function Evaluation.00.342016
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation110.482016
AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels.20.362016
Efficient and secure template blinding for biometric authentication.00.342016
Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation.130.542016
Detecting SMS Spam in the Age of Legitimate Bulk Messaging.20.372016
Uncovering Use-After-Free Conditions in Compiled Code20.372015
More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations130.752015
OnionDNS: A seizure-resistant top-level Domain40.502015
Mo(bile) money, mo(bile) problems: analysis of branchless banking applications in the developing world221.092015
Accountable wiretapping - or - I know they can hear you now.40.412015
Outsourcing Secure Two-Party Computation as a Black Box.80.442015
Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge60.592015
An Empirical Evaluation of Security Indicators in Mobile Web Browsers90.562015
  • 1
  • 2