No photo of Nasir Memon

Nasir Memon

Full Professor CIS; Principal Investigator

    1990 …2019
    If you made any changes in Pure, your changes will be visible here soon.

    Research Output 1990 2019

    2019

    Adversarial optimization for dictionary attacks on speaker verification

    Marras, M., Korus, P., Memon, N. & Fenu, G., Jan 1 2019, In : Proceedings of the Annual Conference of the International Speech Communication Association, INTERSPEECH. 2019-September, p. 2913-2917 5 p.

    Research output: Contribution to journalConference article

    Speaker Verification
    Glossaries
    Attack
    Optimization
    Vulnerability

    Analysis of rolling shutter effect on ENF-based video forensics

    Vatansever, S., Dirik, A. E. & Memon, N., Sep 1 2019, In : IEEE Transactions on Information Forensics and Security. 14, 9, p. 2262-2275 14 p., 8626496.

    Research output: Contribution to journalArticle

    Circuit theory
    Cameras
    Video recording
    Frequency estimation
    Light sources

    DeepMasterPrints: Generating masterprints for dictionary attacks via latent variable evolution

    Bontrager, P., Roy, A., Togelius, J., Memon, N. & Ross, A., Apr 24 2019, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems, BTAS 2018. Institute of Electrical and Electronics Engineers Inc., 8698539. (2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems, BTAS 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Latent Variables
    Glossaries
    Covariance matrix
    Fingerprint
    Attack

    Encrypted Domain Skin Tone Detection for Pornographic Image Filtering

    Yaqub, W., Mohanty, M. & Memon, N., Feb 11 2019, Proceedings of AVSS 2018 - 2018 15th IEEE International Conference on Advanced Video and Signal-Based Surveillance. Institute of Electrical and Electronics Engineers Inc., 8639350. (Proceedings of AVSS 2018 - 2018 15th IEEE International Conference on Advanced Video and Signal-Based Surveillance).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Skin
    Cryptography
    Pixels
    Degradation
    Experiments

    Every Shred Helps: Assembling Evidence from Orphaned JPEG Fragments

    Durmus, E., Korus, P. & Memon, N., Sep 1 2019, In : IEEE Transactions on Information Forensics and Security. 14, 9, p. 2372-2386 15 p., 8636549.

    Research output: Contribution to journalArticle

    Law enforcement
    Metadata
    Luminance
    Computational complexity
    Imaging techniques

    Factors Affecting Enf Based Time-of-recording Estimation for Video

    Vatansever, S., DIrik, A. E. & Memon, N., May 1 2019, 2019 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 2497-2501 5 p. 8682419. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings; vol. 2019-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Circuit theory
    Light sources
    Lighting
    Compression ratio (machinery)
    Electricity

    Kid on the phone! Toward automatic detection of children on mobile devices

    Nguyen, T., Roy, A. & Memon, N., Jul 1 2019, In : Computers and Security. 84, p. 334-348 15 p.

    Research output: Contribution to journalArticle

    Mobile devices
    Sensors
    Touch screens
    Education
    interaction

    New me: Understanding expert and non-expert perceptions and usage of the Tor anonymity network

    Gallagher, K., Patil, S. & Memon, N., Jan 1 2019, Proceedings of the 13th Symposium on Usable Privacy and Security, SOUPS 2017. USENIX Association, p. 385-398 14 p. (Proceedings of the 13th Symposium on Usable Privacy and Security, SOUPS 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2018

    Distinctiveness, complexity, and repeatability of online signature templates

    Sae-Bae, N., Memon, N. & Sooraksa, P., Dec 1 2018, In : Pattern Recognition. 84, p. 332-344 13 p.

    Research output: Contribution to journalArticle

    Experiments

    Evolutionary methods for generating synthetic masterprint templates: Dictionary attack in fingerprint recognition

    Roy, A., Memon, N., Togelius, J. & Ross, A., Jul 13 2018, Proceedings - 2018 International Conference on Biometrics, ICB 2018. Institute of Electrical and Electronics Engineers Inc., p. 39-46 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    dictionaries
    Dermatoglyphics
    Glossaries
    attack
    templates

    Fast camera fingerprint matching in very large databases

    Taspinar, S., Sencar, H. T., Bayram, S. & Memon, N., Feb 20 2018, 2017 IEEE International Conference on Image Processing, ICIP 2017 - Proceedings. IEEE Computer Society, Vol. 2017-September. p. 4088-4092 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cameras
    Composite materials
    Testing

    Image carving with missing headers and missing fragments

    Durmus, E., Mohanty, M., Taspinar, S., Uzun, E. & Memon, N., Jan 23 2018, 2017 IEEE Workshop on Information Forensics and Security, WIFS 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cameras
    Sensors
    Experiments

    Introduction to the special issue on integrating biometrics and forensics

    Nappi, M., Memon, N., Riccio, D. & Uhl, A., Jan 1 2018, (Accepted/In press) In : Pattern Recognition Letters.

    Research output: Contribution to journalArticle

    Biometrics

    Peeling the onion’s user experience layer: Examining naturalistic use of the Tor Browser

    Gallagher, K., Patil, S., Dolan-Gavitt, B., McCoy, D. & Memon, N., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1290-1305 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Peeling
    Opacity
    Websites

    Tap-based user authentication for smartwatches

    Nguyen, T. & Memon, N., Sep 1 2018, In : Computers and Security. 78, p. 174-186 13 p.

    Research output: Contribution to journalArticle

    Authentication
    Touch screens
    Watches
    experiment
    performance

    Towards camera identification from cropped query images

    Yaqub, W., Mohanty, M. & Memon, N., Aug 29 2018, 2018 IEEE International Conference on Image Processing, ICIP 2018 - Proceedings. IEEE Computer Society, p. 3798-3802 5 p. 8451749. (Proceedings - International Conference on Image Processing, ICIP).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cameras
    Light sources
    Testing
    Experiments
    2017

    Boolean circuit camouflage: Cryptographic models, limitations, provable results and a random oracle realization

    Di Crescenzo, G., Rajendran, J., Karri, R. & Memon, N., Nov 3 2017, ASHES 2017 - Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 7-16 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Camouflage
    Networks (circuits)
    Cryptography
    Hardware
    Integrated circuits

    Cultural and psychological factors in cyber-security

    Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F. & Chen, J., Sep 1 2017, In : Journal of Mobile Multimedia. 13, 1-2, p. 43-56 14 p.

    Research output: Contribution to journalArticle

    psychological factors
    cultural factors
    Security of data
    personality
    personality traits

    Detecting structurally anomalous logins within enterprise networks

    Siadati, H. & Memon, N., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Vol. Part F131467. p. 1273-1284 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Intrusion detection
    Industry

    Detecting the Presence of ENF Signal in Digital Videos: A Superpixel-Based Approach

    Vatansever, S., Dirik, A. E. & Memon, N., Oct 1 2017, In : IEEE Signal Processing Letters. 24, 10, p. 1463-1467 5 p., 8012515.

    Research output: Contribution to journalArticle

    Electrical Networks
    Digital Video
    Luminance
    Video recording
    Signal detection

    DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices

    Nguyen, T. V., Sae-Bae, N. & Memon, N., May 1 2017, In : Computers and Security. 66, p. 115-128 14 p.

    Research output: Contribution to journalArticle

    Authentication
    Computer keyboards
    Touch screens
    Biometrics
    secrecy

    How Biometric Authentication Poses New Challenges to Our Security and Privacy [In the Spotlight]

    Memon, N., Jul 1 2017, In : IEEE Signal Processing Magazine. 34, 4, p. 194-196 3 p., 7974880.

    Research output: Contribution to journalArticle

    Biometrics
    Authentication
    Privacy
    Fingerprint
    Homeland Security

    "i Can Actually Be a Super Sleuth": Promising Practices for Engaging Adolescent Girls in Cybersecurity Education

    Jethwani, M. M., Memon, N., Seo, W. & Richer, A., Mar 1 2017, In : Journal of Educational Computing Research. 55, 1, p. 3-25 23 p.

    Research output: Contribution to journalArticle

    Computer science
    Education
    adolescent
    education
    role theory

    IllusionPIN: Shoulder-Surfing Resistant Authentication Using Hybrid Images

    Papadopoulos, A., Nguyen, T., Durmus, E. & Memon, N., Jul 8 2017, (Accepted/In press) In : IEEE Transactions on Information Forensics and Security.

    Research output: Contribution to journalArticle

    Computer keyboards
    Authentication
    Cameras
    Touch screens
    Smartphones

    MasterPrint: Exploring the Vulnerability of Partial Fingerprint-Based Authentication Systems

    Roy, A., Memon, N. & Ross, A., Sep 1 2017, In : IEEE Transactions on Information Forensics and Security. 12, 9, p. 2013-2025 13 p., 7893784.

    Research output: Contribution to journalArticle

    Authentication
    Consumer electronics
    Smartphones
    Sensors

    Mind your SMSes: Mitigating social engineering in second factor authentication

    Siadati, H., Nguyen, T., Gupta, P., Jakobsson, M. & Memon, N., Mar 1 2017, In : Computers and Security. 65, p. 14-28 15 p.

    Research output: Contribution to journalArticle

    Authentication
    engineering
    SMS
    search engine
    service provider

    PRNU-Based Camera Attribution from Multiple Seam-Carved Images

    Taspinar, S., Mohanty, M. & Memon, N., Dec 1 2017, In : IEEE Transactions on Information Forensics and Security. 12, 12, p. 3065-3080 16 p., 8006244.

    Research output: Contribution to journalArticle

    Cameras
    Pixels
    Experiments
    self-efficacy
    Decision making
    decision making
    career
    hacker

    Source camera attribution using stabilized video

    Taspinar, S., Mohanty, M. & Memon, N., Jan 18 2017, 8th IEEE International Workshop on Information Forensics and Security, WIFS 2016. Institute of Electrical and Electronics Engineers Inc., 7823918

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    attribution
    video
    Cameras
    Stabilization
    stabilization

    X-Platform phishing: Abusing trust for targeted attacks short paper

    Siadati, H., Nguyen, T. & Memon, N., Jan 1 2017, Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Revised Selected Papers. Springer Verlag, Vol. 10323 LNCS. p. 587-596 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10323 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Electronic mail
    Electronic Mail
    Attack
    Target
    Telecommunication links
    2016

    Cultural and psychological factors in cyber-security

    Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F. & Chen, J., Nov 28 2016, 18th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2016 - Proceedings. Association for Computing Machinery, Vol. Part F126325. p. 318-324 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Security of data

    Detecting malicious logins in enterprise networks using visualization

    Siadati, H., Saket, B. & Memon, N., Nov 8 2016, 2016 IEEE Symposium on Visualization for Cyber Security, VizSec 2016. Institute of Electrical and Electronics Engineers Inc., 7739582

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Visualization
    Industry
    Target
    Penetration
    Lateral

    Invest: Intelligent visual email search and triage

    Koven, J., Bertini, E., DuBois, R. L. & Memon, N., Jan 1 2016, p. S138-S148.

    Research output: Contribution to conferencePaper

    Open Access
    Electronic mail
    Display devices

    InVEST: Intelligent visual email search and triage

    Koven, J., Bertini, E., Dubois, L. & Memon, N., Aug 7 2016, In : Digital Investigation. 18, p. S138-S148

    Research output: Contribution to journalArticle

    Triage
    Electronic mail
    Comb and Wattles
    Research Personnel
    money

    PRNU based source attribution with a collection of seam-carved images

    Taspinar, S., Mohanty, M. & Memon, N., Aug 3 2016, 2016 IEEE International Conference on Image Processing, ICIP 2016 - Proceedings. IEEE Computer Society, Vol. 2016-August. p. 156-160 5 p. 7532338

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cameras

    Verification code forwarding attack

    Siadati, H., Nguyen, T. & Memon, N., 2016, Technology and Practice of Passwords - 9th International Conference, PASSWORDS 2015, Proceedings. Springer Verlag, Vol. 9551. p. 65-71 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9551).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Attack
    Password
    Internet service providers
    Remediation
    Mobile phones
    2015

    An HMM-based multi-sensor approach for continuous mobile authentication

    Roy, A., Halevi, T. & Memon, N., Dec 14 2015, 2015 IEEE Military Communications Conference, MILCOM 2015. Institute of Electrical and Electronics Engineers Inc., Vol. 2015-December. p. 1311-1316 6 p. 7357626

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Hidden Markov models
    Mobile devices
    Authentication
    Sensors
    Gyroscopes

    Cybersecurity Competitions: The Human Angle

    Bashir, M., Lambert, A., Guo, B., Memon, N. & Halevi, T., Sep 1 2015, In : IEEE Security and Privacy. 13, 5, p. 74-79 6 p., 7310819.

    Research output: Contribution to journalArticle

    career
    Students
    event
    student

    Design and analysis of shoulder surfing resistant PIN based authentication mechanisms on google glass

    Yadav, D. K., Ionascu, B., Ongole, S. V. K., Roy, A. & Memon, N., 2015, Financial Cryptography and Data Security - FC 2015 International Workshops BITCOIN, WAHC, and Wearable, Revised Selected Papers. Springer Verlag, Vol. 8976. p. 281-297 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8976).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Authentication
    Glass
    Augmented reality
    Augmented Reality
    User Studies

    Glass OTP: Secure and convenient user authentication on google glass

    Chan, P., Halevi, T. & Memon, N., 2015, Financial Cryptography and Data Security - FC 2015 International Workshops BITCOIN, WAHC, and Wearable, Revised Selected Papers. Springer Verlag, Vol. 8976. p. 298-308 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8976).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    User Authentication
    Password
    Authentication
    Glass
    Smartphones

    Investigating users' readiness to trade-off biometric fingerprint data

    Halevi, T., Kuppusamy, T. K., Caiazzo, M. & Memon, N., Jun 16 2015, 2015 IEEE International Conference on Identity, Security and Behavior Analysis, ISBA 2015. Institute of Electrical and Electronics Engineers Inc., 7126366

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Dermatoglyphics
    Biometrics
    Authentication
    Decision making
    Motivation

    I-VEST: Intelligent visual email search and triage

    Koven, J., Bertini, E., Memon, N. & Dubois, R. L., Feb 13 2015, 2014 IEEE Conference on Visual Analytics Science and Technology, VAST 2014 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 257-258 2 p. 7042518

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Electronic mail

    Leap motion controller for authentication via hand geometry and gestures

    Chan, A., Halevi, T. & Memon, N., 2015, Human Aspects of Information Security, Privacy and Trust - 3rd International Conference, HAS 2015 Held as Part of HCI International 2015, Proceedings. Springer Verlag, Vol. 9190. p. 13-22 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9190).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Gesture
    Authentication
    Controller
    Controllers
    Geometry

    Quality of online signature templates

    Sae-Bae, N. & Memon, N., Jun 16 2015, 2015 IEEE International Conference on Identity, Security and Behavior Analysis, ISBA 2015. Institute of Electrical and Electronics Engineers Inc., 7126354

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Statistical methods
    Experiments
    Datasets

    Recent advances in counter PRNU based source attribution and beyond

    Karaküçük, A., Dirik, A. E., Sencar, H. T. & Memon, N. D., 2015, Proceedings of SPIE-IS and T Electronic Imaging - Media Watermarking, Security, and Forensics 2015. SPIE, Vol. 9409. 94090N

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Uniformity
    Signal processing
    counters
    multimedia
    attack

    Robust audio hashing for audio identification

    Özer, H., Sankur, B. & Memon, N., Apr 3 2015, 2004 12th European Signal Processing Conference, EUSIPCO 2004. European Signal Processing Conference, EUSIPCO, Vol. 06-10-September-2004. p. 2091-2094 4 p. 7079698

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Hash functions
    Singular value decomposition
    Time series
    Experiments

    Sensor fingerprint identification through composite fingerprints and group testing

    Bayram, S., Sencar, H. T. & Memon, N., Mar 1 2015, In : IEEE Transactions on Information Forensics and Security. 10, 3, p. 597-612 16 p., 6996017.

    Research output: Contribution to journalArticle

    Sensors
    Composite materials
    Testing
    Cameras
    Imaging techniques
    2014

    Analysis of seam-carving-based anonymization of images against PRNU noise pattern-based source attribution

    Dirik, A. E., Sencar, H. T. & Memon, N., Dec 1 2014, In : IEEE Transactions on Information Forensics and Security. 9, 12, p. 2277-2290 14 p., 6914598.

    Research output: Contribution to journalArticle

    Cameras
    Pixels
    Availability

    An HMM-based behavior modeling approach for continuous mobile authentication

    Roy, A., Halevi, T. & Memon, N., 2014, 2014 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2014. Institute of Electrical and Electronics Engineers Inc., p. 3789-3793 5 p. 6854310

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Hidden Markov models
    Mobile devices
    Authentication
    Experiments

    A robust model for paper-reviewer assignment

    Liu, X., Suel, T. & Memon, N., Oct 6 2014, RecSys 2014 - Proceedings of the 8th ACM Conference on Recommender Systems. Association for Computing Machinery, Inc, p. 25-32 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Recommender systems
    Industry
    Experiments