Kassem Fawaz
Cited by
Cited by
Polisis: Automated analysis and presentation of privacy policies using deep learning
H Harkous, K Fawaz, R Lebret, F Schaub, KG Shin, K Aberer
27th USENIX Security Symposium (USENIX Security 18), 531-548, 2018
Continuous authentication for voice assistants
H Feng, K Fawaz, KG Shin
Proceedings of the 23rd Annual International Conference on Mobile Computing …, 2017
Location privacy protection for smartphone users
K Fawaz, KG Shin
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
The privacy policy landscape after the GDPR
T Linden, R Khandelwal, H Harkous, K Fawaz
arXiv preprint arXiv:1809.08396, 2018
Protecting Privacy of BLE Device Users
K Fawaz, KH Kim, KG Shin
25th USENIX Security Symposium (USENIX Security 16), 2016
Anatomization and Protection of Mobile Apps’ Location Privacy Threats
K Fawaz, H Feng, KG Shin
24th USENIX Security Symposium (USENIX Security 15), 753-768, 2015
Improving reliability of safety applications in vehicle ad hoc networks through the implementation of a cognitive network
K Fawaz, A Ghandour, M Olleik, H Artail
2010 17th international conference on telecommunications, 798-805, 2010
{PriBots}: Conversational privacy with chatbots
H Harkous, K Fawaz, KG Shin, K Aberer
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016
Method and system for performing behavioral analysis operations in a mobile device based on application state
K Fawaz, V Sridhara, R Gupta, M Christodorescu
US Patent 9,147,072, 2015
Data delivery guarantees in congested vehicular ad hoc networks using cognitive networks
AJ Ghandour, K Fawaz, H Artail
2011 7th international wireless communications and mobile computing …, 2011
Preech: A system for {Privacy-Preserving} speech transcription
S Ahmed, AR Chowdhury, K Fawaz, P Ramanathan
29th USENIX Security Symposium (USENIX Security 20), 2703-2720, 2020
Pre-identifying probable malicious rootkit behavior using behavioral contracts
D Fiala, M Christodorescu, V Sridhara, R Gupta, K Fawaz
US Patent 9,323,929, 2016
System and method for authenticating voice commands for a voice assistant
K Fawaz, F Huan, KG Shin
US Patent 10,566,007, 2020
DCIM: Distributed cache invalidation method for maintaining cache consistency in wireless mobile networks
K Fawaz, H Artail
IEEE Transactions on Mobile Computing 12 (4), 680-693, 2012
Slow port scanning detection
M Dabbagh, AJ Ghandour, K Fawaz, W El Hajj, H Hajj
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
Using normalized confidence values for classifying mobile device behaviors
K Fawaz, V Sridhara, R Gupta, Y Chen
US Patent 10,089,582, 2018
Face-off: Adversarial face obfuscation
V Chandrasekaran, C Gao, B Tang, K Fawaz, S Jha, S Banerjee
arXiv preprint arXiv:2003.08861, 2020
Methods and systems of dynamically generating and using device-specific and device-state-specific classifier models for the efficient classification of mobile device behaviors
V Sridhara, R Gupta, K Fawaz
US Patent App. US20140187177 A1, 2014
Velody: Nonlinear vibration challenge-response for resilient user authentication
J Li, K Fawaz, Y Kim
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
A fast HTML web page change detection approach based on hashing and reducing the number of similarity computations
H Artail, K Fawaz
Data & Knowledge Engineering 66 (2), 326-337, 2008
The system can't perform the operation now. Try again later.
Articles 1–20