Publications

(2026). ArgMLLMs: Argumentative Multimodal Safety Judgements with Contestable Reasoning. Proceedings of the 8th International Workshop on EXplainable, Trustworthy, and Responsible AI and Multi-Agent Systems (EXTRAAMAS 2026).

Cite

(2026). Selective Fine-Tuning for Targeted and Robust Concept Unlearning. arXiv preprint arXiv:2602.07919.

PDF Cite Project

(2025). Understanding Dementia Speech Alignment with Diffusion-Based Image Generation. Proc. Interspeech 2025.

Cite

(2025). Leaky Diffusion: Attribute Leakage in Text-Guided Image Generation. Proceedings on Privacy Enhancing Technologies.

PDF Cite

(2025). DiDOTS: Knowledge Distillation from Large-Language-Models for Dementia Obfuscation in Transcribed Speech. Proceedings on Privacy Enhancing Technologies.

PDF Cite

(2025). ClaritySpeech: Dementia Obfuscation in Speech. Proc. Interspeech 2025.

PDF Cite

(2024). MobileConfig: Remote Configuration Management for Mobile Apps at Hyperscale. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24).

PDF Cite URL

(2024). Username Squatting on Online Social Networks: A Study on X. Proceedings of the 19th ACM Asia Conference on Computer and Communications Security.

PDF Cite DOI URL

(2024). Rain-Reaper: Unmasking LiDAR-based Detector Vulnerabilities in Rain. 2024 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).

PDF Cite

(2024). Prosody-Driven Privacy-Preserving Dementia Detection. Interspeech.

PDF Cite

(2024). Adversarial 3D Virtual Patches using Integrated Gradients. 2024 IEEE Security and Privacy Workshops (SPW).

Cite DOI

(2023). XFaaS: Hyperscale and Low Cost Serverless Functions at Meta. Proceedings of the 29th Symposium on Operating Systems Principles (SOSP 23).

PDF Cite

(2023). ServiceRouter: Hyperscale and Minimal Cost Service Mesh at Meta. 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23).

PDF Cite

(2023). Evaluating User Behavior in Smartphone Security: A Psychometric Perspective. USENIX Symposium on Usable Privacy and Security (SOUPS).

PDF Cite

(2023). Conveyor: One-Tool-Fits-All Continuous Software Deployment at Meta. 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23).

PDF Cite

(2022). Vision: Design Fiction for Cybersecurity: Using Science Fiction to Help Software Developers Anticipate Problems. Proceedings of the 2022 European Symposium on Usable Security.

PDF Cite

(2022). Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception. 2022 IEEE Security and Privacy Workshops (SPW).

PDF Cite

(2022). Data Augmentation for Dementia Detection in Spoken Language. Interspeech 2022, 23rd Annual Conference of the International Speech Communication Association, Incheon, Korea, 18-22 September 2022.

PDF Cite DOI

(2021). Temporal consistency checks to detect LiDAR spoofing attacks on autonomous vehicle perception. Proceedings of the 1st Workshop on Security and Privacy for Mobile AI.

Cite

(2021). Shadow-catcher: Looking into shadows to detect ghost objects in autonomous vehicle 3d sensing. Computer Security–ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part I 26.

PDF Cite

(2021). Quantifying and Localizing Usable Information Leakage from Neural Network Gradients. arXiv preprint arXiv:2105.13929.

PDF Cite

(2021). Open, Sesame! Introducing Access Control to Voice Services. Proceedings of the 1st Workshop on Security and Privacy for Mobile AI.

PDF Cite

(2021). Object Removal Attacks on LiDAR-based 3D Object Detectors. Workshop on Automotive and Autonomous Vehicle Security (AutoSec).

PDF Cite

(2021). Layer-wise characterization of latent information leakage in federated learning. Distributed and Private Machine Learning (DPML) workshop..

PDF Cite

(2021). Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing Services. Annual Computer Security Applications Conference.

PDF Cite

(2020). Determination of a next state of multiple IoT devices within an environment. Google Patents.

PDF Cite

(2020). External resource control of mobile devices. Google Patents.

PDF Cite

(2020). Darknetz: towards model privacy at the edge using trusted execution environments. Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services.

PDF Cite

(2019). Determining car positions. Google Patents.

PDF Cite

(2019). Identifying JavaScript skimmers on high-value websites. Imperial College of Science, Technology and Medicine, Imperial College London.

Cite

(2019). BEEER: distributed record and replay for medical devices in hospital operating rooms. Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security.

PDF Cite

(2018). Toward an Extensible Framework for Redaction. 1st International Workshop on Security and Privacy for the Internet-of-Things.

PDF Cite

(2018). Resolving the predicament of android custom permissions. The Network and Distributed System Security Symposium (NDSS).

PDF Cite

(2018). Codrive: Improving automobile positioning via collaborative driving. IEEE INFOCOM 2018-IEEE Conference on Computer Communications.

PDF Cite

(2017). Understanding IoT security through the data crystal ball: Where we are now and where we are going to be. arXiv preprint arXiv:1703.09809.

PDF Cite

(2017). HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps. Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks.

PDF Cite

(2017). Ghost installer in the shadow: Security analysis of app installation on android. 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

PDF Cite

(2017). CamForensics: Understanding visual privacy leaks in the wild. Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems.

PDF Cite

(2016). Free for all! assessing user data exposure to advertising libraries on android.. The Network and Distributed System Security Symposium (NDSS).

PDF Cite

(2016). Draco: A system for uniform and fine-grained access control for web code on android. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.

PDF Cite

(2015). What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources.. The Network and Distributed System Security Symposium (NDSS).

PDF Cite

(2014). Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android.. The Network and Distributed System Security Symposium (NDSS).

PDF Cite

(2013). Identity, location, disease and more: Inferring your secrets from android public resources. Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security.

PDF Cite

(2013). Discovering the invisible city: Location-based games for learning in smart cities.. IxD&A.

PDF Cite

(2011). Content creation by end users for location-sensitive mobile educational games. Proceedings, IS-EUD 2011 Workshop Involving End Users and Domain Experts in Design of Educational Games.

Cite