Recent Works
search all worksSorted by most recent date added to the index first, which may not be the same as publication date order.
2025 article
Machine Learning-Aided Detection of DoS Attacks in Power Systems using Side-Channel Monitoring
2025 journal article
Multimedia-based cybersecurity and privacy professional development on educational technology for K-12 personnel
Educational Technology Research and Development.
2025 article
$$\textsf{Pri} \texttt {FHE}\textsf{te}$$: Achieving Full-Privacy in Account-Based Cryptocurrencies is Possible
2025 article
Detecting Stealthy Web Bots: A Behavioral Analysis Framework for OpenWPM Automation
2025 article
How to Recover a Cryptographic Secret From the Cloud
2025 article
It Should Be Easy but... New Users' Experiences and Challenges with Secret Management Tools
2025 article
Hardware-Enabled Mechanisms for Verifying Responsible AI Development
2025 conference paper
Poster: Computer Security Researchers' Experiences with Vulnerability Disclosures
Ramulu, H. S., Rotthaler, A. L., Rossel, J., Rodriguez, R. G., Wermke, D., Fahl, S., … Acar, Y. (2025, November 19).
2025 conference paper
Same Script, Different Behavior: Characterizing Divergent JavaScript Execution Across Different Device Platforms
Zafar, A., Su, J., Datta, S., Kapravelos, A., & Das, A. (2025, November 19).
2025 article
The Fellowship of the Leak: Power Analysis of a Masked FrodoKEM Hardware Accelerator
2025 article
PUF-Augmented QR: Harnessing QR Code Background for Surface Authentication Via Physically Unclonable Features (PUFs)
2025 conference paper
NTK-DFL: Enhancing decentralized federated learning in heterogeneous settings via neural tangent kernel
International Conference on Machine Learning.
2025 conference paper
PortLLM: Personalizing evolving large language models with training-free and portable model patches
International Conference on Learning Representations.
2025 conference paper
SCALE: Towards collaborative content analysis in social science with large language model agents and human intervention
Annual Meeting of the Association for Computational Linguistics.
2025 conference paper
GateBleed: Exploiting On-Core Accelerator Power Gating for High Performance and Stealthy Attacks on AI
Kalyanapu, J., Dizani, F., Asher, D., Ghanbari, A., Cammarota, R., Aysu, A., & Ajorpaz, S. M. (2025, October 18).
2025 journal article
SoK: An empirical investigation of malware techniques in advanced persistent threat attacks
COMPUTERS & SECURITY, 157.
2025 conference paper
An Empirical Study on Reproducible Packaging in Open-Source Ecosystems
2025 IEEE/ACM 47th International Conference on Software Engineering (ICSE).
2025 conference paper
Context Matters: Qualitative Insights into Developers’ Approaches and Challenges with Software Composition Analysis
Proceedings of the USENIX Security Symposium. https://www.usenix.org/system/files/usenixsecurity25-lin-elizabeth.pdf
Contributors: E. Lin, S. Gowda, W. Enck & D. Wermke
2025 article
SpecMPK: Efficient In-Process Isolation with Speculative and Secure Permission Update Instruction
2025 IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE, HPCA, pp. 394–408.
2025 article
Exploring multidimensional factors influencing teachers' technology integration in K-12 education: A systematic review
Martin, F., Gezer, T., & Ceviker, E. (2025, July 29). JOURNAL OF RESEARCH ON TECHNOLOGY IN EDUCATION, Vol. 7.
2025 review
The affordances of Artificial Intelligence (AI) and ethical considerations across the instruction cycle: A systematic review of AI in online higher education
[Review of ]. INTERNET AND HIGHER EDUCATION, 67.
2025 article
Digital distractions in education: a systematic review of research on causes, consequences and prevention strategies
Educational Technology Research and Development.
2025 conference paper
Combating Dark-side of Computing - Exploring Perceptions of AI-augmented Mis/disinformation among Higher Education Students
Martin, F., DeLarm, J., Zhuang, M., Cheng, Y., Rand, W., & Lee, J. (2025, August 3).
2025 article
Mining temporal attack patterns from cyberthreat intelligence reports
Rahman, M. R., Wroblewski, B., Matthews, Q., Morgan, B., Menzies, T., & Williams, L. (2025, July 22). KNOWLEDGE AND INFORMATION SYSTEMS, Vol. 7.
2025 journal article
TikTok engagement traces over time and health risky behaviors: Combining data linkage and computational methods
TELEMATICS AND INFORMATICS, 101.