If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the expert's scholarly documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 4 Similar Profiles
Communication Engineering & Materials Science
Cryptography Engineering & Materials Science
Websites Engineering & Materials Science
Communication systems Engineering & Materials Science
Smartphones Engineering & Materials Science
Network protocols Engineering & Materials Science
Watermarking Engineering & Materials Science
Access control Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2001 2019

Outguard: Detecting in-browser covert cryptocurrency mining in the wild

Kharraz, A., Lever, C., Borisov, N., Ma, Z., Mason, J., Antonakakis, M., Murley, P., Miller, A. E. & Bailey, M. D., May 13 2019, The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019. Association for Computing Machinery, Inc, p. 840-852 13 p. (The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Web browsers
Paint
Ecosystems
Electronic money

Property inference attacks on fully connected neural networks using permutation invariant representations

Ganju, K., Wang, Q., Yang, W., Gunter, C. & Borisov, N., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 619-633 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Neural networks
Classifiers
Invariance
Learning systems

The Web’s sixth sense: A study of scripts accessing smartphone sensors

Das, A., Borisov, N., Acar, G. & Pradeep, A., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1515-1532 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smartphones
Sensors
Application programming interfaces (API)
Gesture recognition
Websites

TightRope: Towards optimal load-balancing of paths in anonymous networks

Darir, H., Sibai, H., Borisov, N., Dullerud, G. E. & Mitra, S., Oct 15 2018, WPES 2018 - Proceedings of the 2018 Workshop on Privacy in the Electronic Society, co-located with CCS 2018. Association for Computing Machinery, p. 76-85 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Resource allocation

Mining on someone else’s dime: Mitigating covert mining operations in clouds and enterprises

Tahir, R., Huzaifa, M., Das, A., Ahmad, M., Gunter, C., Zaffar, F., Caesar, M. C. & Borisov, N., Jan 1 2017, Research in Attacks, Intrusions, and Defenses - 20th International Symposium, RAID 2017, Proceedings. Polychronakis, M., Antonakakis, M., Dacier, M. & Bailey, M. (eds.). Springer-Verlag, p. 287-310 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10453 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mining
Miners
Industry
Program processors
Virtualization

Datasets

A Crawl of the Mobile Web Measuring Sensor Accesses

Das, A. (Creator), Acar, G. (Creator), Borisov, N. (Creator), Pradeep, A. (Creator), University of Illinois at Urbana-Champaign, Oct 3 2018

Dataset