What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ajaya Neupane
Google Scholar
ORCID:
0000-0001-7651-6095
10
publications in security and cryptology related venues
Year
Venue
Title
2019
conf/ndss
Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems.
Shasha Li
Ajaya Neupane
Sujoy Paul
Chengyu Song
Srikanth V. Krishnamurthy
Amit K. Roy-Chowdhury
Ananthram Swami
2019
conf/ndss
The Crux of Voice (In)Security: A Brain Study of Speaker Legitimacy Detection.
Ajaya Neupane
Nitesh Saxena
Leanne M. Hirshfield
Sarah E. Bratt
2019
conf/ndss
Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries.
Daimeng Wang
Ajaya Neupane
Zhiyun Qian
Nael B. Abu-Ghazaleh
Srikanth V. Krishnamurthy
Edward J. M. Colbert
Paul L. Yu
2018
conf/ccs
Rendered Insecure: GPU Side Channel Attacks are Practical.
Hoda Naghibijouybari
Ajaya Neupane
Zhiyun Qian
Nael B. Abu-Ghazaleh
2018
conf/acsac
IAC: On the Feasibility of Utilizing Neural Signals for Access Control.
Md. Lutfor Rahman
Ajaya Neupane
Chengyu Song
2018
conf/acsac
Do Social Disorders Facilitate Social Engineering?: A Case Study of Autism and Phishing Attacks.
Ajaya Neupane
Kiavash Satvat
Nitesh Saxena
Despina Stavrinos
Haley Johnson Bishop
2017
conf/fc
PEEP: Passively Eavesdropping Private Input via Brainwave Signals.
Ajaya Neupane
Md. Lutfor Rahman
Nitesh Saxena
2016
journals/tifs
Neural Markers of Cybersecurity: An fMRI Study of Phishing and Malware Warnings.
Ajaya Neupane
Nitesh Saxena
Jose Omar Maximo
Rajesh K. Kana
2015
conf/ccs
A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware Warnings.
Ajaya Neupane
Md. Lutfor Rahman
Nitesh Saxena
Leanne M. Hirshfield
2014
conf/ndss
Neural Signatures of User-Centered Security: An fMRI Study of Phishing, and Malware Warnings.
Ajaya Neupane
Nitesh Saxena
Keya Kuruvilla
Michael Georgescu
Rajesh K. Kana
Coauthors
Ajaya Neupane
(10)
Amit K. Roy-Chowdhury
(1)
Ananthram Swami
(1)
Chengyu Song
(2)
Daimeng Wang
(1)
Despina Stavrinos
(1)
Edward J. M. Colbert
(1)
Haley Johnson Bishop
(1)
Hoda Naghibijouybari
(1)
Jose Omar Maximo
(1)
Keya Kuruvilla
(1)
Kiavash Satvat
(1)
Leanne M. Hirshfield
(2)
Md. Lutfor Rahman
(3)
Michael Georgescu
(1)
Nael B. Abu-Ghazaleh
(2)
Nitesh Saxena
(6)
Paul L. Yu
(1)
Rajesh K. Kana
(2)
Sarah E. Bratt
(1)
Shasha Li
(1)
Srikanth V. Krishnamurthy
(2)
Sujoy Paul
(1)
Zhiyun Qian
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to