Follow
Faysal Hossain Shezan
Faysal Hossain Shezan
Verified email at uta.edu - Homepage
Title
Cited by
Cited by
Year
Privacy in repair: An analysis of the privacy challenges surrounding broken digital artifacts in bangladesh
SI Ahmed, S Guha, MR Rifat, FH Shezan, N Dell
Proceedings of the Eighth International Conference on Information and …, 2016
502016
Read between the lines: An empirical measurement of sensitive applications of voice personal assistant systems
FH Shezan, H Hu, J Wang, G Wang, Y Tian
Proceedings of the Web Conference 2020, 1006-1017, 2020
372020
Using sonar for liveness detection to protect smart speakers against remote attackers
Y Lee, Y Zhao, J Zeng, K Lee, N Zhang, FH Shezan, Y Tian, K Chen, ...
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020
372020
Vulnerability detection in recent Android apps: An empirical study
FH Shezan, SF Afroze, A Iqbal
2017 International Conference on Networking, Systems and Security (NSysS), 55-63, 2017
362017
Verhealth: Vetting medical voice applications through policy enforcement
FH Shezan, H Hu, G Wang, Y Tian
Proceedings of the ACM on interactive, mobile, wearable and ubiquitous …, 2020
222020
Side channel attacks in computation offloading systems with gpu virtualization
S Liu, Y Wei, J Chi, FH Shezan, Y Tian
2019 IEEE Security and Privacy Workshops (SPW), 156-161, 2019
162019
Breaking down the defenses: A comparative survey of attacks on large language models
AG Chowdhury, MM Islam, V Kumar, FH Shezan, V Jain, A Chadha
arXiv preprint arXiv:2403.04786, 2024
122024
TKPERM: cross-platform permission knowledge transfer to detect overprivileged third-party applications
FH Shezan, K Cheng, Z Zhang, Y Cao, Y Tian
Network and Distributed Systems Security (NDSS) Symposium, 2020
122020
Detecting abnormal behaviors in smart home
Y Yu, C Li, MA Jonas, C Ma, FH Shezan, S Shen, P Gao, Y Tian
2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems …, 2019
72019
Privacy vulnerabilities in the practices of repairing broken digital artifacts in Bangladesh
S Guha, MR Rifat, FH Shezan, N Dell
Information Technologies and International Development, 2017
72017
The development of low cost exercise monitoring device for paralytic
SS Rahman, SS Nusaka, FH Shezan, MAR Sarkar
2015 IEEE International WIE Conference on Electrical and Computer …, 2015
72015
Side channel attacks in computation offloading systems with gpu virtualization. In 2019 IEEE Security and Privacy Workshops (SPW)
S Liu, Y Wei, J Chi, FH Shezan, Y Tian
San Francisco, CA, USA, 156-161, 2019
62019
Categorizing defects in infrastructure as code
A Rahman, S Elder, FH Shezan, V Frost, J Stallings, LA Williams
North Carolina State University. Dept. of Computer Science, 2019
52019
High Performance Approximate Computing by Adaptive Relaxed Synchronization
B Islam, FH Shezan, R Shahriyar
2016 IEEE 18th International Conference on High Performance Computing and …, 2016
42016
Towards Usable Security Analysis Tools for {Trigger-Action} Programming
MK McCall, E Zeng, FH Shezan, M Yang, L Bauer, A Bichhawat, C Cobb, ...
Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 301-320, 2023
32023
NL2GDPR: Automatically develop GDPR compliant Android application features from natural language
FH Shezan, Y Lao, M Peng, X Wang, M Sun, P Li
2022 IEEE Conference on Communications and Network Security (CNS), 1-9, 2022
32022
Bugs in infrastructure as code
A Rahman, S Elder, FH Shezan, V Frost, J Stallings, L Williams
arXiv preprint arXiv:1809.07937, 2018
32018
Chkplug: Checking gdpr compliance of wordpress plugins via cross-language code property graph
FH Shezan, Z Su, M Kang, N Phair, PW Thomas, M Dam, Y Cao, Y Tian
Network and Distributed System Security (NDSS) Symposium 2023, 2023
22023
Perception hacking for 2D cursorjacking in virtual reality
Z Su, FH Shezan, Y Tian, D Evans, S Heo
Proceedings of the 1st Workshop on Novel Challenges of Safety, Security and …, 2022
22022
SAFETAP: An Efficient Incremental Analyzer for Trigger-Action Programs
MK McCall, FH Shezan, A Bichhawat, C Cobb, L Jia, Y Tian, C Grace, ...
Carnegie Mellon University, 2021
22021
The system can't perform the operation now. Try again later.
Articles 1–20