- Privacy, Security, and Data Protection
- Advanced Malware Detection Techniques
- Adversarial Robustness in Machine Learning
- Privacy-Preserving Technologies in Data
- User Authentication and Security Systems
- Anomaly Detection Techniques and Applications
- Internet Traffic Analysis and Secure E-voting
- Opportunistic and Delay-Tolerant Networks
- Mobile Ad Hoc Networks
- Vehicular Ad Hoc Networks (VANETs)
- Face recognition and analysis
- Hate Speech and Cyberbullying Detection
- Innovative Human-Technology Interaction
- Network Security and Intrusion Detection
- Caching and Content Delivery
- Social Media and Politics
- Mobile Crowdsensing and Crowdsourcing
- Speech Recognition and Synthesis
- Power Line Communications and Noise
- Cognitive Radio Networks and Spectrum Sensing
- Access Control and Trust
- Security and Verification in Computing
- IoT and Edge/Fog Computing
- Digital Mental Health Interventions
- Digital and Cyber Forensics
University of Wisconsin–Madison
2017-2025
Loyola University Chicago
2022
University of Michigan
2014-2017
American University of Beirut
2008-2013
Deutsches Zentrum für Luft- und Raumfahrt e. V. (DLR)
2009
Voice has become an increasingly popular User Interaction (UI) channel, mainly contributing to the current trend of wearables, smart vehicles, and home automation systems. assistants such as Alexa, Siri, Google Now, have our everyday fixtures, especially when/where touch interfaces are inconvenient or even dangerous use, driving exercising. The open nature voice channel makes difficult secure, hence exposed various threats demonstrated by security researchers. To defend against these...
As smartphones are increasingly used to run apps that provide users with location-based services, the users' location privacy has become a major concern. Existing solutions this concern deficient in terms of practicality, efficiency, and effectiveness. To address problem, we design, implement, evaluate LP-Guardian, novel comprehensive framework for protection Android smartphone users. LP-Guardian's overcomes shortcomings existing approaches by addressing tracking, profiling, identification...
Privacy policies are the primary channel through which companies inform users about their data collection and sharing practices. These often long difficult to comprehend. Short notices based on information extracted from privacy have been shown be useful but face a significant scalability hurdle, given number of evolution over time. Companies, users, researchers, regulators still lack usable scalable tools cope with breadth depth policies. To address these hurdles, we propose an automated...
Abstract The EU General Data Protection Regulation (GDPR) is one of the most demanding and comprehensive privacy regulations all time. A year after it went into effect, we study its impact on landscape policies online. We conduct first longitudinal, in-depth, at-scale assessment before GDPR. gauge complete consumption cycle these policies, from user impressions until compliance assessment. create a diverse corpus two sets 6,278 unique English-language inside outside EU, covering their...
Researchers have suggested Vehicular Ad hoc Networks as a way to enable car communications and allow for the exchange of safety other types information among cars. The Wireless Access in Environments (WAVE) protocol stack is standardized by IEEE, it allocates spectrum vehicular communication. In our work we prove that does not provide sufficient reliable information. To alleviate this problem, present system employs cognitive network principles increase allocated control channel (CCH) WAVE...
Demystifying on-device AI on Instagram and TikTok.
Abstract Objective This Emerging Ideas report explores families' (parents and their children) uses gratification for ChatGPT. Background Generative artificial intelligence–based conversational agents, such as ChatGPT, can be used to accomplish a variety of tasks, yet little is known about how why parents children may use these technologies. Methods We conducted semistructured qualitative exploratory interviews with 12 U.S.‐based families that had experience sharing ChatGPT account. Families...
The Wireless Access in Vehicular Environments (WAVE) protocol stack is one of the most important protocols used to allocate spectrum for vehicular communication. In a previous work, we proved that WAVE does not provide sufficient reliable exchange safety information. More specifically, message delay acceptable and exceeds application requirements. this paper, propose system provides Data delivery guarantees using Cognitive networks principles congested ad hoc networks. We will refer our as...
Biometrics have been widely adopted for enhancing user authentication, benefiting usability by exploiting pervasive and collectible unique characteristics from physiological or behavioral traits of human. However, successful attacks on "static" biometrics such as fingerprints reported where an adversary acquires users' stealthily compromises non-resilient biometrics.
Abstract Advances in deep learning have made face recognition technologies pervasive. While useful to social media platforms and users, this technology carries significant privacy threats. Coupled with the abundant information they about service providers can associate users interactions, visited places, activities, preferences–some of which user may not want share. Additionally, facial models used by various agencies are trained data scraped from platforms. Existing approaches mitigate...
This paper proposes distributed cache invalidation mechanism (DCIM), a client-based consistency scheme that is implemented on top of previously proposed architecture for caching data items in mobile ad hoc networks (MANETs), namely COACS, where special nodes the queries and addresses store responses to these queries. We have also server-based scheme, named SSUM, whereas this paper, we introduce DCIM totally client-based. pull-based algorithm implements adaptive time live (TTL), piggybacking,...
Voice has become an increasingly popular User Interaction (UI) channel, with voice-activated devices becoming regular fixtures in our homes. The popularity of voice-based assistants (VAs), however, have brought along significant privacy and security threats to their users. Recent revelations indicated that some VAs record user's private conversations continuously innocuously. With the being connected Internet, they can leak recorded content without authorization. Moreover, these often do not...
Port scanning is the most popular reconnaissance technique attackers use to discover services they can break into. detection has received a lot of attention by researchers. However slow port scan attack deceive existing Intrusion Detection Systems (IDS). In this paper, we present new, simple, and efficient method for detecting scans. Our proposed mainly composed two phases: (1) feature collection phase that analyzes network traffic extracts features needed classify certain IP as malicious or...
Browser extensions offer a variety of valuable features and functionalities. They also pose significant security risk if not properly designed or reviewed. Prior works have shown that browser can access manipulate data fields, including sensitive such as passwords, credit card numbers, Social Security numbers. In this paper, we present an empirical study the risks posed by extensions. Specifically, first build proof-of-concept extension steal user information. We find passes Chrome Webstore...
Mobile devices are getting more pervasive, and it is becoming increasingly necessary to integrate web services into applications that run on these devices. We introduce a novel approach for dynamically invoking service methods from mobile with minimal user intervention only involves entering search phrase values the method parameters. The architecture overcomes technical challenges involve consuming discovered by introducing man-in-the-middle (MIM) server provides whose responsibility...
As social robots become increasingly prevalent in day-to-day environments, they will participate conversations and appropriately manage the information shared with them. However, little is known about how might discern sensitivity of information, which has major implications for human-robot trust. a first step to address part this issue, we designed privacy controller, Confidant, conversational robots, capable using contextual metadata (e.g., sentiment, relationships, topic) from model...
Google has mandated developers to use Data Safety Sections (DSS) increase transparency in data collection and sharing practices. In this paper, we present a comprehensive analysis of Google's Section using both quantitative qualitative methods. We conduct the first large-scale measurement study DSS apps from Android Play store (n=1.1M). find that there are internal inconsistencies within reported also trends over under-reporting practices DSSs. Next, longitudinal explore how evolve time,...
Although the Internet of Things (IoT) computing paradigm is promising new applications, it introduces unprecedented security and privacy threats to individuals their environments. The interactions within IoT make more challenging protect users devices against these threats.
It is cost-effective to process wireless frames on general purpose processors (GPPs) in place of dedicated hardware. Wireless operators are decoupling signal processing from basestations and implementing it a cloud compute resources, also known as cloud-RAN (C-RAN). A C-RAN must meet the deadlines frames; for example, 3ms transport, decode respond an LTE uplink frame. The design baseband these platforms thus major challenge which various real-time scheduling techniques have been proposed. In...