Ryan Shah

ORCID: 0000-0003-1348-8423
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Access Control and Trust
  • Cryptography and Data Security
  • Music and Audio Processing
  • Spam and Phishing Detection
  • Speech Recognition and Synthesis
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Migraine and Headache Studies
  • Privacy-Preserving Technologies in Data
  • Blockchain Technology Applications and Security
  • Digital Media Forensic Detection
  • Information and Cyber Security
  • Security and Verification in Computing
  • Digital Rights Management and Security
  • Digital and Cyber Forensics
  • Organ Donation and Transplantation
  • Cybersecurity and Cyber Warfare Studies
  • User Authentication and Security Systems
  • Biomedical and Engineering Education
  • IoT and Edge/Fog Computing
  • Network Security and Intrusion Detection
  • Traumatic Brain Injury and Neurovascular Disturbances
  • Adversarial Robustness in Machine Learning
  • Educational Games and Gamification

Heriot-Watt University
2025

Thomas Jefferson University
2025

Children's Hospital of Philadelphia
2024

University of Strathclyde
2018-2022

University Ucinf
2019-2021

University of Richmond
2021

Advertising is a primary means for revenue generation millions of websites and smartphone apps. Naturally, fraction abuse ad networks to systematically defraud advertisers their money. Modern defences have matured overcome some forms click fraud but measurement studies reported that third clicks supplied by could be clickspam. Our work develops novel inference techniques which can isolate attacks using fundamental properties. We propose two defences, mimicry bait-click, provide clickspam...

10.1145/3317549.3323407 article EN 2019-05-15

We present a first evaluation of Serious Slow Game Jam (SSGJ) methodology as mechanism for co-designing serious games in the application domain cybersecurity, to evaluate how SSGJ contributed improving understanding cybersecurity. To this end, we engaged 13 participants with no experience multidisciplinary involving domain-specific, pedagogical, and game design knowledge, encouraged engagement in-between scheduled days SSGJ. Findings show improved confidence their knowledge cybersecurity...

10.1145/3709745 article EN cc-by-nc-nd Games Research and Practice 2025-01-18

Background: Eighty percent of youth with migraine report photophobia. It is unknown if photophobia leads to light avoidant behavior, and such behaviors worsen sensitivity disrupt sleep. Recently developed wearable, continuous loggers allow us address these open questions. We conducted a pilot study determine the feasibility measuring exposure using wearable in migraine. Methods: Youth 10 21 years old headache-specialist confirmed ICHD-3 diagnosis were recruited from CHOP headache clinics....

10.1101/2025.04.30.650986 preprint EN cc-by 2025-05-01

The security and privacy of refugee communities have emerged as pressing concerns in the context increasing global migration. Rohingya refugees are a stateless Muslim minority group Myanmar who were forced to flee their homes after conflict broke out, with many fleeing neighbouring countries ending up camps, such Bangladesh. However, others migrated Malaysia those arrive there live within community urban refugees. not legally recognized limited restricted access public resources healthcare...

10.48550/arxiv.2304.01617 preprint EN cc-by-nc-sa arXiv (Cornell University) 2023-01-01

Cybersecurity is an important topic which often viewed as one that inaccessible due to steep learning curves and a perceived requirement of needing specialist knowledge. With constantly changing threat landscape, practical solutions such best-practices are employed, but the number critical cybersecurity-related incidents remains high. To address these concerns, National Cyber Security Centre published Body Knowledge (CyBOK) provide comprehensive information base used advise underpin...

10.2139/ssrn.4621045 preprint EN 2023-01-01

Advertising is a primary means for revenue generation millions of websites and smartphone apps (publishers). Naturally, fraction publishers abuse the ad-network to systematically defraud advertisers their money. Defenses have matured overcome some forms click fraud but are inadequate against threat organic attacks. Malware detection systems including honeypots fail stop apps; filters better measurement studies reported that third clicks supplied by ad-networks fake; collaborations between...

10.48550/arxiv.1903.00733 preprint EN cc-by arXiv (Cornell University) 2019-01-01

In this paper, the current state of security in robotics is described to be need review. When we consider safety mechanisms implemented an Internet-connected robot, requirement becomes a crucial requirement. Upon review field robotics, four key requirements are addressing: supply chain for calibration, integrity and authenticity commands (i.e. teleoperation), physical-plane finally, secure, controlled logging auditing.

10.48550/arxiv.1904.03033 preprint EN cc-by arXiv (Cornell University) 2019-01-01

Distributed sensor networks such as IoT deployments generate large quantities of measurement data. Often, the analytics that runs on this data is available a web service which can be purchased for fee. A major concern in ecosystem ensuring security companies offer Information Rights Management (IRM) solution to problem managing usage and access rights transits administrative boundaries. IRM enables individuals corporations create restricted data, have its flow from organisation individual...

10.1145/3288599.3295582 article EN 2019-01-04

Connected robots play a key role in automating industrial workflows. Robots can expose sensitive operational information to remote adversaries. Despite the use of end-to-end encryption, passive adversary could fingerprint and reconstruct entire workflows being carried out developing detailed understanding how facilities operate. In this paper, we investigate whether attacker accurately robot movements Using neural network-based traffic analysis approach, found that attackers predict...

10.1145/3507657.3529659 article EN 2022-05-07

Connected robots play a key role in Industry 4.0, providing automation and higher efficiency for many industrial workflows. Unfortunately, these can leak sensitive information regarding operational workflows to remote adversaries. While there exists mandates the use of end-to-end encryption data transmission such settings, it is entirely possible passive adversaries fingerprint reconstruct entire being carried out -- establishing an understanding how facilities operate. In this paper, we...

10.48550/arxiv.2205.08426 preprint EN cc-by arXiv (Cornell University) 2022-01-01

The use of connected surgical robotics to automate medical procedures presents new privacy challenges. We argue that conventional patient consent protocols no longer work. Indeed robots replace human surgeons take on an extraordinary level responsibility. Surgeons undergo years training and peer review in a strongly regulated environment, derive trust via patient's faith the hospital system. Robots other hand differently, integrity software governs their operation. From perspective, there...

10.48550/arxiv.1909.01862 preprint EN cc-by arXiv (Cornell University) 2019-01-01

We propose VoIPLoc, a novel location fingerprinting technique and apply it to the VoIP call provenance problem. It exploits echo-location information embedded within audio support fine-grained inference. found consistent statistical features induced by echo-reflection characteristics of into recorded speech. These are discernible traces received at destination, enabling evaluated VoIPLoc developing dataset through channels over Tor network. show that recording locations can be fingerprinted...

10.1145/3448300.3467816 preprint EN 2021-06-24

Socially Assistive Robots (SARs) have shown promising potential in therapeutic scenarios as decision-making instructors or motivational companions. In human-human therapy, experts often communicate the thought process behind decisions they make to promote transparency and build trust. As research aims incorporate more complex models into these robots drive better interaction, ability for SAR explain its becomes an increasing challenge. We present latest examples of decision-makers. argue...

10.48550/arxiv.2303.14054 preprint EN cc-by-nc-sa arXiv (Cornell University) 2023-01-01
Coming Soon ...