no code implementations • 18 Jul 2022 • Cagri Arisoy, Anuradha Mandal, Nitesh Saxena
In this paper, we attempt to garner an in-depth understanding of users' susceptibility to text-centric fake news attacks via a neuro-cognitive methodology.
no code implementations • 26 Feb 2021 • Kiavash Satvat, Maliheh Shirvanian, Nitesh Saxena
PASSAT is an application transparent to the cloud servers that allows users to securely and efficiently store and access their files stored on public cloud storage based on a single master password.
Cryptography and Security
1 code implementation • 12 Jul 2019 • S Abhishek Anand, Chen Wang, Jian Liu, Nitesh Saxena, Yingying Chen
In this paper, we build a speech privacy attack that exploits speech reverberations generated from a smartphone's inbuilt loudspeaker captured via a zero-permission motion sensor (accelerometer).
Cryptography and Security
no code implementations • 3 Nov 2015 • Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, N. Asokan
Contextual proximity detection (or, co-presence detection) is a promising approach to defend against relay attacks in many mobile authentication systems.
Cryptography and Security