


Остановите войну!
for scientists:


default search action
Raheem A. Beyah
Raheem Beyah – Reheem Beyah
Person information

- affiliation: Georgia Institute of Technology, Atlanta, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j64]Yiming Wu
, Zhiyuan Xie, Shouling Ji
, Zhenguang Liu
, Xuhong Zhang, Changting Lin
, Shuiguang Deng
, Jun Zhou, Ting Wang
, Raheem Beyah:
Fraud-Agents Detection in Online Microfinance: A Large-Scale Empirical Study. IEEE Trans. Dependable Secur. Comput. 20(2): 1169-1185 (2023) - [c107]Chenyang Lyu, Jiacheng Xu, Shouling Ji, Xuhong Zhang, Qinying Wang, Binbin Zhao, Gaoning Pan, Wei Cao, Peng Cheng, Raheem Beyah:
MINER: A Hybrid Data-Driven Approach for REST API Fuzzing. USENIX Security Symposium 2023 - [c106]Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, Raheem Beyah:
UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware. USENIX Security Symposium 2023 - [i12]Chenyang Lyu, Jiacheng Xu, Shouling Ji, Xuhong Zhang, Qinying Wang, Binbin Zhao, Gaoning Pan, Wei Cao, Raheem Beyah:
MINER: A Hybrid Data-Driven Approach for REST API Fuzzing. CoRR abs/2303.02545 (2023) - [i11]Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, Raheem Beyah:
UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware. CoRR abs/2306.11206 (2023) - 2022
- [j63]Tianyu Du, Shouling Ji, Bo Wang, Sirui He, Jinfeng Li, Bo Li, Tao Wei, Yunhan Jia, Raheem Beyah, Ting Wang:
DetectS ec: Evaluating the robustness of object detection models to adversarial attacks. Int. J. Intell. Syst. 37(9): 6463-6492 (2022) - [j62]Anni Zhou
, Raheem Beyah, Rishikesan Kamaleswaran
:
OnAI-Comp: An Online AI Experts Competing Framework for Early Sepsis Detection. IEEE ACM Trans. Comput. Biol. Bioinform. 19(6): 3595-3603 (2022) - [j61]Yuwei Li
, Shouling Ji
, Chenyang Lyu, Yuan Chen
, Jianhai Chen, Qinchen Gu
, Chunming Wu
, Raheem Beyah:
V-Fuzz: Vulnerability Prediction-Assisted Evolutionary Fuzzing for Binary Programs. IEEE Trans. Cybern. 52(5): 3745-3756 (2022) - [j60]Chenghui Shi
, Xiaogang Xu
, Shouling Ji
, Kai Bu
, Jianhai Chen, Raheem Beyah, Ting Wang
:
Adversarial CAPTCHAs. IEEE Trans. Cybern. 52(7): 6095-6108 (2022) - [j59]Binbin Zhao
, Shouling Ji
, Wei-Han Lee, Changting Lin
, Haiqin Weng, Jingzheng Wu, Pan Zhou
, Liming Fang
, Raheem Beyah:
A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices. IEEE Trans. Dependable Secur. Comput. 19(3): 1826-1840 (2022) - [j58]Qinchen Gu
, David Formby
, Shouling Ji
, Brendan Saltaformaggio, Anu G. Bourgeois, Raheem Beyah:
This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 19(5): 3218-3230 (2022) - [j57]Changjiang Li
, Shouling Ji
, Haiqin Weng, Bo Li, Jie Shi, Raheem Beyah, Shanqing Guo
, Zonghui Wang
, Ting Wang
:
Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications. IEEE Trans. Dependable Secur. Comput. 19(6): 3987-4001 (2022) - [c105]Chenyang Lyu, Hong Liang, Shouling Ji, Xuhong Zhang, Binbin Zhao, Meng Han, Yun Li, Zhe Wang, Wenhai Wang, Raheem Beyah:
SLIME: program-sensitive energy allocation for fuzzing. ISSTA 2022: 365-377 - [c104]Binbin Zhao, Shouling Ji, Jiacheng Xu
, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, Raheem Beyah:
A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware. ISSTA 2022: 442-454 - [c103]Sizhuang Liang, Saman A. Zonouz, Raheem Beyah:
Hiding My Real Self! Protecting Intellectual Property in Additive Manufacturing Systems Against Optical Side-Channel Attacks. NDSS 2022 - [c102]Chenyang Lyu, Shouling Ji, Xuhong Zhang, Hong Liang, Binbin Zhao, Kangjie Lu, Raheem Beyah:
EMS: History-Driven Mutation for Coverage-based Fuzzing. NDSS 2022 - [c101]Yuhao Mao, Chong Fu, Saizhuo Wang
, Shouling Ji, Xuhong Zhang, Zhenguang Liu, Jun Zhou, Alex X. Liu, Raheem Beyah, Ting Wang:
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings. SP 2022: 1423-1439 - [c100]Tohid Shekari, Alvaro A. Cárdenas, Raheem Beyah:
MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and Defenses. USENIX Security Symposium 2022: 3539-3556 - [i10]Yuhao Mao, Chong Fu, Saizhuo Wang, Shouling Ji, Xuhong Zhang, Zhenguang Liu, Jun Zhou, Alex X. Liu, Raheem Beyah, Ting Wang:
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings. CoRR abs/2204.04063 (2022) - [i9]Qinying Wang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Yuhong Kan, Zhaowei Lin, Changting Lin, Shuiguang Deng, Alex X. Liu, Raheem Beyah:
MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols. CoRR abs/2208.08751 (2022) - [i8]Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, Raheem Beyah:
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware. CoRR abs/2212.13716 (2022) - 2021
- [j56]Long Cheng
, Ke Tian
, Danfeng Daphne Yao, Lui Sha, Raheem A. Beyah:
Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 18(2): 825-842 (2021) - [j55]Chengkun Wei
, Qinchen Gu
, Shouling Ji
, Wenzhi Chen
, Zonghui Wang, Raheem Beyah
:
OB-WSPES: A Uniform Evaluation System for Obfuscation-Based Web Search Privacy. IEEE Trans. Dependable Secur. Comput. 18(6): 2719-2735 (2021) - [c99]Tuan Le, Sriharsha Etigowni, Sizhuang Liang, Xirui Peng
, H. Jerry Qi, Mehdi Javanmard, Saman A. Zonouz, Raheem Beyah:
Physical Logic Bombs in 3D Printers via Emerging 4D Techniques. ACSAC 2021: 732-747 - [c98]Tianyu Du, Shouling Ji, Lujia Shen, Yao Zhang, Jinfeng Li, Jie Shi, Chengfang Fang, Jianwei Yin, Raheem Beyah, Ting Wang:
Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks. CCS 2021: 516-534 - [c97]Tohid Shekari, Celine Irvene, Alvaro A. Cárdenas
, Raheem Beyah:
MaMIoT: Manipulation of Energy Market Leveraging High Wattage IoT Botnets. CCS 2021: 1338-1356 - [c96]Sriharsha Etigowni, Sizhuang Liang, Saman A. Zonouz, Raheem Beyah:
Physics-Aware Security Monitoring against Structural Integrity Attacks in 3D Printers. DSN 2021: 507-518 - [c95]Sizhuang Liang, Xirui Peng
, H. Jerry Qi, Saman A. Zonouz, Raheem Beyah:
A Practical Side-Channel Based Intrusion Detection System for Additive Manufacturing Systems. ICDCS 2021: 1075-1087 - [c94]Peiyu Liu, Shouling Ji, Xuhong Zhang, Qinming Dai, Kangjie Lu, Lirong Fu, Wenzhi Chen, Peng Cheng, Wenhai Wang, Raheem Beyah:
IFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware. ASE 2021: 805-816 - [c93]Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang:
UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers. USENIX Security Symposium 2021: 2777-2794 - [c92]Qinying Wang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Yuhong Kan, Zhaowei Lin, Changting Lin, Shuiguang Deng, Alex X. Liu, Raheem Beyah:
MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols. USENIX Security Symposium 2021: 4205-4222 - 2020
- [j54]Neetesh Saxena, Alvaro A. Cárdenas, Raheem Beyah
, Rongxing Lu, Kim-Kwang Raymond Choo
, Yiran Chen:
Introduction to the Special Issue on User-Centric Security and Safety for CPS. ACM Trans. Cyber Phys. Syst. 4(3): 29:1-29:2 (2020) - [j53]David Formby
, Raheem Beyah
:
Temporal Execution Behavior for Host Anomaly Detection in Programmable Logic Controllers. IEEE Trans. Inf. Forensics Secur. 15: 1455-1469 (2020) - [c91]Tianyu Du, Shouling Ji, Jinfeng Li, Qinchen Gu, Ting Wang, Raheem Beyah
:
SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems. AsiaCCS 2020: 357-369 - [c90]Chenghui Shi, Shouling Ji, Qianjun Liu, Changchang Liu, Yuefeng Chen, Yuan He, Zhe Liu, Raheem Beyah
, Ting Wang:
Text Captcha Is Dead? A Large Scale Deployment and Empirical Study. CCS 2020: 1391-1406 - [c89]Peiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Wei-Han Lee, Tao Lu, Wenzhi Chen, Raheem Beyah
:
Understanding the Security Risks of Docker Hub. ESORICS (1) 2020: 257-276 - [c88]Shouling Ji, Qinchen Gu, Haiqin Weng, Qianjun Liu, Pan Zhou, Jing Chen, Zhao Li
, Raheem Beyah
, Ting Wang:
De-Health: All Your Online Health Information Are Belong to Us. ICDE 2020: 1609-1620 - [i7]Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang:
UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers. CoRR abs/2010.01785 (2020)
2010 – 2019
- 2019
- [j52]Haiqin Weng, Binbin Zhao, Shouling Ji, Jianhai Chen, Ting Wang, Qinming He, Raheem Beyah
:
Towards understanding the security of modern image captchas and underground captcha-solving services. Big Data Min. Anal. 2(2): 118-144 (2019) - [j51]Shreyas Kulkarni
, Qinchen Gu, Eric Myers, Lalith Polepeddi, Szilárd Lipták
, Raheem Beyah
, Deepak Divan
:
Enabling a Decentralized Smart Grid Using Autonomous Edge Control Devices. IEEE Internet Things J. 6(5): 7406-7419 (2019) - [j50]Kaiyu Tang, Meng Han, Qinchen Gu, Anni Zhou, Raheem Beyah
, Shouling Ji:
ShareSafe: An Improved Version of SecGraph. KSII Trans. Internet Inf. Syst. 13(11): 5731-5754 (2019) - [j49]Abbas Acar
, Wenyi Liu, Raheem Beyah, Kemal Akkaya, Arif Selcuk Uluagac:
A privacy-preserving multifactor authentication system. Secur. Priv. 2(5) (2019) - [j48]Abbas Acar, Wenyi Liu, Raheem Beyah, Kemal Akkaya, Arif Selcuk Uluagac:
A privacy-preserving multifactor authentication system. Secur. Priv. 2(6) (2019) - [j47]Shouling Ji
, Ting Wang, Jianhai Chen, Weiqing Li, Prateek Mittal, Raheem Beyah
:
De-SAG: On the De-Anonymization of Structure-Attribute Graph Data. IEEE Trans. Dependable Secur. Comput. 16(4): 594-607 (2019) - [j46]Xiaojing Liao
, Preethi Srinivasan, David Formby
, Raheem A. Beyah
:
Di-PriDA: Differentially Private Distributed Load Balancing Control for the Smart Grid. IEEE Trans. Dependable Secur. Comput. 16(6): 1026-1039 (2019) - [j45]Zhen Hong
, Rui Wang
, Shouling Ji, Raheem Beyah
:
Attacker Location Evaluation-Based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems. IEEE Trans. Inf. Forensics Secur. 14(5): 1337-1350 (2019) - [j44]Zhen Hong
, Qian Shao, Xiaojing Liao, Raheem Beyah
:
A secure routing protocol with regional partitioned clustering and Beta trust management in smart home. Wirel. Networks 25(7): 3805-3823 (2019) - [c87]Celine Irvene, Tohid Shekari, David Formby, Raheem Beyah
:
If I Knew Then What I Know Now: On Reevaluating DNP3 Security using Power Substation Traffic. ICSS 2019: 48-59 - [c86]Tohid Shekari, Christian Bayens, Morris Cohen, Lukas Graber, Raheem Beyah:
RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid. NDSS 2019 - [c85]Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, Raheem Beyah:
MOPT: Optimized Mutation Scheduling for Fuzzers. USENIX Security Symposium 2019: 1949-1966 - [i6]Chenghui Shi, Xiaogang Xu, Shouling Ji, Kai Bu, Jianhai Chen, Raheem A. Beyah, Ting Wang:
Adversarial CAPTCHAs. CoRR abs/1901.01107 (2019) - [i5]Shouling Ji, Haiqin Weng, Yiming Wu, Pan Zhou, Qinming He, Raheem Beyah, Ting Wang:
FDI: Quantifying Feature-based Data Inferability. CoRR abs/1902.00714 (2019) - [i4]Shouling Ji, Qinchen Gu, Haiqin Weng, Qianjun Liu, Pan Zhou, Qinming He, Raheem Beyah, Ting Wang:
De-Health: All Your Online Health Information Are Belong to Us. CoRR abs/1902.00717 (2019) - [i3]Celine Irvene, David Formby, Raheem Beyah:
On Evaluating the Effectiveness of the HoneyBot: A Case Study. CoRR abs/1905.12061 (2019) - 2018
- [j43]Syed Hassan Ahmed, Jalel Ben-Othman, Jaime Lloret, Ashfaq A. Khokhar, Raheem Beyah
, Antonio Sánchez, Wael Guibène:
Emerging Technologies for Connected and Smart Vehicles. IEEE Commun. Mag. 56(10): 20-21 (2018) - [j42]Xiaojing Liao, Sumayah A. Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang, Shuang Hao, Raheem Beyah
:
Cloud repository as a malicious service: challenge, identification and implication. Cybersecur. 1(1): 14 (2018) - [j41]Qinchen Gu, David Formby, Shouling Ji, Hasan Cam, Raheem A. Beyah
:
Fingerprinting for Cyber-Physical System Security: Device Physics Matters Too. IEEE Secur. Priv. 16(5): 49-59 (2018) - [j40]Ju Ren, Yi Pan
, Andrzej Goscinski, Raheem A. Beyah
:
Edge Computing for the Internet of Things. IEEE Netw. 32(1): 6-7 (2018) - [j39]Celine Irvene, David Formby, Samuel Litchfield, Raheem A. Beyah
:
HoneyBot: A Honeypot for Robotic Systems. Proc. IEEE 106(1): 61-70 (2018) - [j38]Shukun Yang
, Shouling Ji
, Raheem A. Beyah
:
DPPG: A Dynamic Password Policy Generation System. IEEE Trans. Inf. Forensics Secur. 13(3): 545-558 (2018) - [c84]Binbin Zhao, Haiqin Weng, Shouling Ji, Jianhai Chen, Ting Wang, Qinming He, Reheem Beyah
:
Towards Evaluating the Security of Real-World Deployed Image CAPTCHAs. AISec@CCS 2018: 85-96 - [c83]Shouling Ji, Tianyu Du, Zhen Hong, Ting Wang, Raheem A. Beyah
:
Quantifying Graph Anonymity, Utility, and De-anonymity. INFOCOM 2018: 1736-1744 - [c82]Halim Burak Yesilyurt, Hidayet Aksu, A. Selcuk Uluagac, Raheem A. Beyah
:
SOTA: Secure Over-the-Air Programming of IoT Devices. MILCOM 2018: 1-8 - [c81]Peng Wang, Xianghang Mi, Xiaojing Liao, XiaoFeng Wang, Kan Yuan, Feng Qian, Raheem A. Beyah:
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations. NDSS 2018 - [c80]David Formby, Milad Rad, Raheem A. Beyah:
Lowering the Barriers to Industrial Control System Security with GRFICS. ASE @ USENIX Security Symposium 2018 - [e2]Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu:
Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 254, Springer 2018, ISBN 978-3-030-01700-2 [contents] - [e1]Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu:
Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 255, Springer 2018, ISBN 978-3-030-01703-3 [contents] - [i2]Monodeep Kar, Arvind Singh, Sanu Mathew, Santosh Ghosh, Anand Rajan, Vivek De, Raheem A. Beyah, Saibal Mukhopadhyay:
Blindsight: Blinding EM Side-Channel Leakage using Built-In Fully Integrated Inductive Voltage Regulator. CoRR abs/1802.09096 (2018) - [i1]Long Cheng, Ke Tian, Danfeng Yao, Lui Sha, Raheem A. Beyah:
Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems. CoRR abs/1805.00074 (2018) - 2017
- [j37]Shouling Ji
, Prateek Mittal, Raheem A. Beyah
:
Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey. IEEE Commun. Surv. Tutorials 19(2): 1305-1326 (2017) - [j36]David Formby, Anwar Walid, Raheem A. Beyah:
A Case Study in Power Substation Network Dynamics. Proc. ACM Meas. Anal. Comput. Syst. 1(1): 19:1-19:24 (2017) - [j35]Shouling Ji
, Shukun Yang, Xin Hu, Weili Han, Zhigong Li, Raheem A. Beyah
:
Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords. IEEE Trans. Dependable Secur. Comput. 14(5): 550-564 (2017) - [j34]Trey Reece, Supreeth Sathyanarayana, William H. Robinson
, Raheem A. Beyah
:
On The Outside Looking In: Towards Detecting Counterfeit Devices Using Network Traffic Analysis. IEEE Trans. Multi Scale Comput. Syst. 3(1): 50-61 (2017) - [c79]Shouling Ji, Shukun Yang, Anupam Das, Xin Hu, Raheem A. Beyah
:
Password correlation: Quantification, evaluation and application. INFOCOM 2017: 1-9 - [c78]Xurong Li, Chunming Wu, Shouling Ji, Qinchen Gu, Raheem A. Beyah
:
HSTS Measurement and an Enhanced Stripping Attack Against HTTPS. SecureComm 2017: 489-509 - [c77]David Formby, Anwar I. Walid, Raheem A. Beyah
:
A Case Study in Power Substation Network Dynamics. SIGMETRICS (Abstracts) 2017: 66 - [c76]Sumayah A. Alrwais, Xiaojing Liao, Xianghang Mi
, Peng Wang, Xiaofeng Wang, Feng Qian, Raheem A. Beyah
, Damon McCoy:
Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks. IEEE Symposium on Security and Privacy 2017: 805-823 - [c75]Christian Bayens, Tuan Le, Luis Garcia, Raheem A. Beyah, Mehdi Javanmard, Saman A. Zonouz:
See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing. USENIX Security Symposium 2017: 1181-1198 - 2016
- [j33]Shruthi Ravichandran, Ramalingam K. Chandrasekar, A. Selcuk Uluagac
, Raheem A. Beyah
:
A simple visualization and programming framework for wireless sensor networks: PROVIZ. Ad Hoc Networks 53: 1-16 (2016) - [j32]Samuel Litchfield, David Formby, Jonathan D. Rogers
, A. P. Sakis Meliopoulos, Raheem A. Beyah
:
Rethinking the Honeypot for Cyber-Physical Systems. IEEE Internet Comput. 20(5): 9-17 (2016) - [j31]Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, Raheem A. Beyah
:
Seed-Based De-Anonymizability Quantification of Social Networks. IEEE Trans. Inf. Forensics Secur. 11(7): 1398-1411 (2016) - [j30]Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing (Selena) He, Raheem A. Beyah
:
General Graph Data De-Anonymization: From Mobility Traces to Social Networks. ACM Trans. Inf. Syst. Secur. 18(4): 12:1-12:29 (2016) - [j29]Shouling Ji, Mingyuan Yan, Raheem A. Beyah
, Zhipeng Cai
:
Semi-Structure Routing and Analytical Frameworks for Cognitive Radio Networks. IEEE Trans. Mob. Comput. 15(4): 996-1008 (2016) - [j28]Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Raheem A. Beyah
:
Structural Data De-Anonymization: Theory and Practice. IEEE/ACM Trans. Netw. 24(6): 3523-3536 (2016) - [c74]Xiaojing Liao, Kan Yuan, XiaoFeng Wang, Zhou Li
, Luyi Xing, Raheem A. Beyah
:
Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence. CCS 2016: 755-766 - [c73]Xiaojing Liao, Sumayah A. Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang, Shuang Hao, Raheem A. Beyah
:
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service. CCS 2016: 1541-1552 - [c72]Shouling Ji, Weiqing Li, Shukun Yang, Prateek Mittal, Raheem A. Beyah
:
On the relative de-anonymizability of graph data: Quantification and evaluation. INFOCOM 2016: 1-9 - [c71]David Formby, Preethi Srinivasan, Andrew M. Leonard, Jonathan D. Rogers, Raheem A. Beyah:
Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems. NDSS 2016 - [c70]Xiaojing Liao, Kan Yuan, XiaoFeng Wang, Zhongyu Pei, Hao Yang, Jianjun Chen, Hai-Xin Duan, Kun Du, Eihal Alowaisheq, Sumayah A. Alrwais, Luyi Xing, Raheem A. Beyah
:
Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search. IEEE Symposium on Security and Privacy 2016: 707-723 - [c69]Xiaojing Liao, Chang Liu, Damon McCoy, Elaine Shi, Shuang Hao, Raheem A. Beyah
:
Characterizing Long-tail SEO Spam on Cloud Web Hosting Services. WWW 2016: 321-332 - 2015
- [j27]Jing (Selena) He, Shouling Ji, Raheem A. Beyah
, Ying Xie, Yingshu Li:
Constructing load-balanced virtual backbones in probabilistic wireless sensor networks via multi-objective genetic algorithm. Trans. Emerg. Telecommun. Technol. 26(2): 147-163 (2015) - [j26]Sakthi Vignesh Radhakrishnan, A. Selcuk Uluagac
, Raheem A. Beyah
:
GTID: A Technique for Physical Device and Device Type Fingerprinting. IEEE Trans. Dependable Secur. Comput. 12(5): 519-532 (2015) - [j25]Lanier A. Watkins, William H. Robinson
, Raheem A. Beyah
:
Using Network Traffic to Infer Hardware State: A Kernel-Level Investigation. ACM Trans. Embed. Comput. Syst. 14(3): 55:1-55:22 (2015) - [j24]Shouling Ji, Raheem A. Beyah
, Zhipeng Cai
:
Broadcast Scheduling With Latency and Redundancy Analysis for Cognitive Radio Networks. IEEE Trans. Veh. Technol. 64(7): 3090-3097 (2015) - [j23]Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem A. Beyah
:
Attacking and securing beacon-enabled 802.15.4 networks. Wirel. Networks 21(5): 1517-1535 (2015) - [c68]Shouling Ji, Shukun Yang, Ting Wang, Changchang Liu, Wei-Han Lee, Raheem A. Beyah
:
PARS: A Uniform and Open-source Password Analysis and Research System. ACSAC 2015: 321-330 - [c67]Christopher Wampler, A. Selcuk Uluagac, Raheem A. Beyah
:
Information Leakage in Encrypted IP Video Traffic. GLOBECOM 2015: 1-7 - [c66]A. P. Sakis Meliopoulos, George J. Cokkinides, Raheem A. Beyah
, Seth Walters, Paul Myrda:
Cyber Security and Operational Reliability. HICSS 2015: 2655-2663 - [c65]Troy J. Nunnally, A. Selcuk Uluagac
, Raheem A. Beyah
:
InterSec: An interaction system for network security applications. ICC 2015: 7132-7138 - [c64]Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, Raheem A. Beyah:
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge. NDSS 2015 - [c63]Shouling Ji, Zhipeng Cai
, Jing (Selena) He, Raheem A. Beyah
:
Primary social behavior aware routing and scheduling for Cognitive Radio Networks. SECON 2015: 417-425 - [c62]Shouling Ji, Zhipeng Cai
, Meng Han, Raheem A. Beyah
:
Whitespace measurement and virtual backbone construction for Cognitive Radio Networks: From the social perspective. SECON 2015: 435-443 - [c61]Shouling Ji, Weiqing Li, Prateek Mittal, Xin Hu, Raheem A. Beyah:
SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization. USENIX Security Symposium 2015: 303-318 - 2014
- [j22]Shouling Ji, Raheem A. Beyah
, Zhipeng Cai
:
Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks. IEEE Trans. Mob. Comput. 13(3): 626-637 (2014) - [c60]David Formby, Sang Shin Jung, John A. Copeland, Raheem A. Beyah
:
An Empirical Study of TCP Vulnerabilities in Critical Power System Devices. SEGS@CCS 2014: 39-44 - [c59]Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Raheem A. Beyah
:
Structural Data De-anonymization: Quantification, Practice, and Implications. CCS 2014: 1040-1053 - [c58]A. Selcuk Uluagac
, Venkatachalam Subramanian, Raheem A. Beyah
:
Sensory channel threats to Cyber Physical Systems: A wake-up call. CNS 2014: 301-309 - [c57]A. Selcuk Uluagac
, Wenyi Liu, Raheem A. Beyah
:
A multi-factor re-authentication framework with user privacy. CNS 2014: 504-505 - [c56]