Publications

Publications from Project

  1. Alzantot, M., Sharma, Y., Elgohary, A., Ho, B.J., Srivastava, M., and Chang, K.W. Generating Natural Language Adversarial Examples. 2018 Conference on Empirical Methods in Natural Language Processing (EMNLP).
  2. Alzantot, M; Balaji, B; Srivastava, M (2017). Did you hear that? Adversarial Examples Against Automatic Speech Recognition. NIPS 2017 Machine Deception Workshop.
  3. Liu, R., and Srivastava, M., 2018, October. VirtSense: Virtualize Sensing through ARM TrustZone on Internet-of-Things. In the 3rd Workshop on System Software for Trusted Execution (SysTEX 2018).
  4. Sultangazin, A and Tabuada, P. (2018). Towards the use of symmetries to ensure privacy in control over the cloud. IEEE Control and Decision Conference (CDC). 
  5. Sultangazin, A. and Diggavi, S. and Tabuada, P. (2018). Protecting the privacy of networked multi-agent systems controlled over the cloud. International Conference on Computer Communications and Networks (ICCCN).

Prior Related Publications by IoTSnP Researchers

Secure Control and Sensing

  1. Shoukry, Yasser, Paul Martin, Yair Yona, Suhas Diggavi, and Mani Srivastava. "Attack Resilience and Recovery using Physical Challenge Response Authentication for Active Sensors Under Integrity Attacks." arXiv preprint arXiv:1605.02062 (2016). (paper)
  2. Shoukry, Yasser, Paul Martin, Yair Yona, Suhas Diggavi, and Mani Srivastava. "PyCRA: Physical challenge-response authentication for active sensors under spoofing attacks." In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1004-1015. ACM, 2015. (paper)
  3. Shoukry, Yasser, Paul Martin, Paulo Tabuada, and Mani Srivastava. "Non-invasive spoofing attacks for anti-lock braking systems." In International Workshop on Cryptographic Hardware and Embedded Systems, pp. 55-72. Springer, Berlin, Heidelberg, 2013. (paper)
  4. Shoukry, Yasser, Jose Araujo, Paulo Tabuada, Mani Srivastava, and Karl H. Johansson. "Minimax control for cyber-physical systems under network packet scheduling attacks." In Proceedings of the 2nd ACM international conference on High confidence networked systems, pp. 93-100. ACM, 2013. (paper)
  5. Ganeriwal, Saurabh, Christina Pöpper, Srdjan Čapkun, and Mani B. Srivastava. "Secure time synchronization in sensor networks." ACM Transactions on Information and System Security (TISSEC) 11, no. 4 (2008): 23. (paper)
  6. Čapkun, Srdjan, Kasper Rasmussen, Mario Cagalj,  and Mani Srivastava. "Secure location verification with hidden and mobile base stations." IEEE Transactions on Mobile Computing 7, no. 4 (2008): 470-483. (paper)

Privacy-aware Sensing

  1. Alanwar, Amr, Yasser Shoukry, Supriyo Chakraborty, Paul Martin, Paulo Tabuada, and Mani B. Srivastava. "PrOLoc: resilient localization with private observers using partial homomorphic encryption." In IPSN, pp. 41-52. 2017. (paper)
  2. Shoukry, Yasser, Konstantinos Gatsis, Amr Alanwar, George J. Pappas, Sanjit A. Seshia, Mani Srivastava, and Paulo Tabuada. "Privacy-aware quadratic optimization using partially homomorphic encryption." In Decision and Control (CDC), 2016 IEEE 55th Conference on, pp. 5053-5058. IEEE, 2016. (paper)
  3. Saleheen, Nazir, Supriyo Chakraborty, Nasir Ali, Md Mahbubur Rahman, Syed Monowar Hossain, Rummana Bari, Eugene Buder, Mani Srivastava, and Santosh Kumar. "mSieve: differential behavioral privacy in time series of mobile sensor data." In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 706-717. ACM, 2016. (paper)
  4. Ziad, M. Tarek Ibn, Amr Alanwar, Moustafa Alzantot, and Mani Srivastava. "CryptoImg: Privacy preserving processing over encrypted images." In Communications and Network Security (CNS), 2016 IEEE Conference on, pp. 570-575. IEEE, 2016. (paper)
  5. Higuchi, Takamasa, Paul Martin, Supriyo Chakraborty, and Mani Srivastava. "AnonyCast: privacy-preserving location distribution for anonymous crowd tracking systems." In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 1119-1130. ACM, 2015. (paper)
  6. Chakraborty, Supriyo, Chenguang Shen, Kasturi Rangan Raghavan, Yasser Shoukry, Matt Millar, and Mani B. Srivastava. "ipShield: A Framework For Enforcing Context-Aware Privacy." In NSDI, pp. 143-156. 2014. (paper)
  7. Chakraborty, Supriyo, Nicolas Bitouzé, Mani Srivastava, and Lara Dolecek. "Protecting data against unwanted inferences." In Information Theory Workshop (ITW), 2013 IEEE, pp. 1-5. IEEE, 2013. (paper)
  8. Chakraborty, Supriyo, Kasturi Rangan Raghavan, Matthew P. Johnson, and Mani B. Srivastava. "A framework for context-aware privacy of sensor data on mobile systems." In Proceedings of the 14th Workshop on Mobile Computing Systems and Applications, p. 11. ACM, 2013. (paper)
  9. Chakraborty, Supriyo, Kasturi Rangan Raghavan, Mani Srivastava, and Harris Teague. "Model-based context privacy for personal data streams." In Proceedings of the 2012 ACM conference on Computer and communications security, pp. 1046-1048. ACM, 2012. (paper)
  10. Chakraborty, Supriyo, Kasturi Rangan Raghavan, Mani B. Srivastava, Chatschik Bisdikian, and Lance M. Kaplan. "An obfuscation framework for controlling value of information during sharing." In Statistical Signal Processing Workshop (SSP), 2012 IEEE, pp. 157-160. IEEE, 2012. (paper)
  11. Chakraborty, Supriyo, Kasturi Rangan Raghavan, Mani B. Srivastava, Chatschik Bisdikian, and Lance M. Kaplan. "Balancing value and risk in information sharing through obfuscation." In Information Fusion (FUSION), 2012 15th International Conference on, pp. 1615-1622. IEEE, 2012. (paper)
  12. Chakraborty, Supriyo, Zainul Charbiwala, Haksoo Choi, Kasturi Rangan Raghavan, and Mani B. Srivastava. "Balancing behavioral privacy and information utility in sensory data flows." Pervasive and Mobile Computing 8, no. 3 (2012): 331-345. (paper)
  13. Raij, Andrew, Animikh Ghosh, Santosh Kumar, and Mani Srivastava. "Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment." In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 11-20. ACM, 2011. (paper)