If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the expert's scholarly documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 3 Similar Profiles
Access control Engineering & Materials Science
Semantics Engineering & Materials Science
Active networks Engineering & Materials Science
Network protocols Engineering & Materials Science
Specifications Engineering & Materials Science
Servers Engineering & Materials Science
Monitoring Engineering & Materials Science
Cryptography Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1985 2018

Evaluating Detectors on Optimal Attack Vectors that enable Electricity Theft and DER Fraud

Badrinath Krishna, V., Gunter, C. & Sanders, W. H., May 4 2018, (Accepted/In press) In : IEEE Journal on Selected Topics in Signal Processing.

Research output: Contribution to journalArticle

Energy resources
Electricity
Detectors
Advanced metering infrastructures
Smart meters

NRF: A naive re-identification framework

Santu, S. K. K., Bindschadler, V., Zhai, C. & Gunter, C., Oct 15 2018, WPES 2018 - Proceedings of the 2018 Workshop on Privacy in the Electronic Society, co-located with CCS 2018. Association for Computing Machinery, p. 121-132 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Agglomeration
Big data

Property inference attacks on fully connected neural networks using permutation invariant representations

Ganju, K., Wang, Q., Yang, W., Gunter, C. & Borisov, N., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 619-633 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Neural networks
Classifiers
Invariance
Learning systems

Response: Real-time, secure, and privacy-aware video redaction system

Chen, B., Nahrstedt, K. & Gunter, C., Nov 5 2018, Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Mobiquitous 2018. Association for Computing Machinery, p. 39-48 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cameras
Encapsulation

HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps

Demetriou, S., Zhang, N., Lee, Y., Wang, X., Gunter, C., Zhou, X. & Grace, M., Jul 18 2017, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017. Association for Computing Machinery, Inc, p. 122-133 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Routers
Wi-Fi
Computer hardware
Cryptography