No photo of Nasir Memon

Nasir Memon

Full Professor CIS; Principal Investigator

    1990 …2019
    If you made any changes in Pure these will be visible here soon.

    Research Output

    Filter
    Conference contribution
    2019

    Content authentication for neural imaging pipelines: End-to-end optimization of photo provenance in complex distribution channels

    Korus, P. & Memon, N., Jun 2019, Proceedings - 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2019. IEEE Computer Society, p. 8613-8621 9 p. 8953353. (Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition; vol. 2019-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    DeepMasterPrints: Generating masterprints for dictionary attacks via latent variable evolution

    Bontrager, P., Roy, A., Togelius, J., Memon, N. & Ross, A., Apr 24 2019, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems, BTAS 2018. Institute of Electrical and Electronics Engineers Inc., 8698539. (2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems, BTAS 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Encrypted Domain Skin Tone Detection for Pornographic Image Filtering

    Yaqub, W., Mohanty, M. & Memon, N., Feb 11 2019, Proceedings of AVSS 2018 - 2018 15th IEEE International Conference on Advanced Video and Signal-Based Surveillance. Institute of Electrical and Electronics Engineers Inc., 8639350. (Proceedings of AVSS 2018 - 2018 15th IEEE International Conference on Advanced Video and Signal-Based Surveillance).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Factors Affecting Enf Based Time-of-recording Estimation for Video

    Vatansever, S., DIrik, A. E. & Memon, N., May 1 2019, 2019 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 2497-2501 5 p. 8682419. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings; vol. 2019-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    New me: Understanding expert and non-expert perceptions and usage of the Tor anonymity network

    Gallagher, K., Patil, S. & Memon, N., Jan 1 2019, Proceedings of the 13th Symposium on Usable Privacy and Security, SOUPS 2017. USENIX Association, p. 385-398 14 p. (Proceedings of the 13th Symposium on Usable Privacy and Security, SOUPS 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2018

    Evolutionary methods for generating synthetic masterprint templates: Dictionary attack in fingerprint recognition

    Roy, A., Memon, N., Togelius, J. & Ross, A., Jul 13 2018, Proceedings - 2018 International Conference on Biometrics, ICB 2018. Institute of Electrical and Electronics Engineers Inc., p. 39-46 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Fast camera fingerprint matching in very large databases

    Taspinar, S., Sencar, H. T., Bayram, S. & Memon, N., Feb 20 2018, 2017 IEEE International Conference on Image Processing, ICIP 2017 - Proceedings. IEEE Computer Society, Vol. 2017-September. p. 4088-4092 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Image carving with missing headers and missing fragments

    Durmus, E., Mohanty, M., Taspinar, S., Uzun, E. & Memon, N., Jan 23 2018, 2017 IEEE Workshop on Information Forensics and Security, WIFS 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Peeling the onion’s user experience layer: Examining naturalistic use of the Tor Browser

    Gallagher, K., Patil, S., Dolan-Gavitt, B., McCoy, D. & Memon, N., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1290-1305 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Towards camera identification from cropped query images

    Yaqub, W., Mohanty, M. & Memon, N., Aug 29 2018, 2018 IEEE International Conference on Image Processing, ICIP 2018 - Proceedings. IEEE Computer Society, p. 3798-3802 5 p. 8451749. (Proceedings - International Conference on Image Processing, ICIP).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2017

    Boolean circuit camouflage: Cryptographic models, limitations, provable results and a random oracle realization

    Di Crescenzo, G., Rajendran, J., Karri, R. & Memon, N., Nov 3 2017, ASHES 2017 - Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 7-16 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Detecting structurally anomalous logins within enterprise networks

    Siadati, H. & Memon, N., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Vol. Part F131467. p. 1273-1284 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Source camera attribution using stabilized video

    Taspinar, S., Mohanty, M. & Memon, N., Jan 18 2017, 8th IEEE International Workshop on Information Forensics and Security, WIFS 2016. Institute of Electrical and Electronics Engineers Inc., 7823918

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    X-Platform phishing: Abusing trust for targeted attacks short paper

    Siadati, H., Nguyen, T. & Memon, N., Jan 1 2017, Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Revised Selected Papers. Springer Verlag, Vol. 10323 LNCS. p. 587-596 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10323 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2016

    Cultural and psychological factors in cyber-security

    Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F. & Chen, J., Nov 28 2016, 18th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2016 - Proceedings. Association for Computing Machinery, Vol. Part F126325. p. 318-324 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Detecting malicious logins in enterprise networks using visualization

    Siadati, H., Saket, B. & Memon, N., Nov 8 2016, 2016 IEEE Symposium on Visualization for Cyber Security, VizSec 2016. Institute of Electrical and Electronics Engineers Inc., 7739582

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    PRNU based source attribution with a collection of seam-carved images

    Taspinar, S., Mohanty, M. & Memon, N., Aug 3 2016, 2016 IEEE International Conference on Image Processing, ICIP 2016 - Proceedings. IEEE Computer Society, Vol. 2016-August. p. 156-160 5 p. 7532338

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Verification code forwarding attack

    Siadati, H., Nguyen, T. & Memon, N., 2016, Technology and Practice of Passwords - 9th International Conference, PASSWORDS 2015, Proceedings. Springer Verlag, Vol. 9551. p. 65-71 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9551).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2015

    An HMM-based multi-sensor approach for continuous mobile authentication

    Roy, A., Halevi, T. & Memon, N., Dec 14 2015, 2015 IEEE Military Communications Conference, MILCOM 2015. Institute of Electrical and Electronics Engineers Inc., Vol. 2015-December. p. 1311-1316 6 p. 7357626

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Design and analysis of shoulder surfing resistant PIN based authentication mechanisms on google glass

    Yadav, D. K., Ionascu, B., Ongole, S. V. K., Roy, A. & Memon, N., 2015, Financial Cryptography and Data Security - FC 2015 International Workshops BITCOIN, WAHC, and Wearable, Revised Selected Papers. Springer Verlag, Vol. 8976. p. 281-297 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8976).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Glass OTP: Secure and convenient user authentication on google glass

    Chan, P., Halevi, T. & Memon, N., 2015, Financial Cryptography and Data Security - FC 2015 International Workshops BITCOIN, WAHC, and Wearable, Revised Selected Papers. Springer Verlag, Vol. 8976. p. 298-308 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8976).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Investigating users' readiness to trade-off biometric fingerprint data

    Halevi, T., Kuppusamy, T. K., Caiazzo, M. & Memon, N., Jun 16 2015, 2015 IEEE International Conference on Identity, Security and Behavior Analysis, ISBA 2015. Institute of Electrical and Electronics Engineers Inc., 7126366

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    I-VEST: Intelligent visual email search and triage

    Koven, J., Bertini, E., Memon, N. & Dubois, R. L., Feb 13 2015, 2014 IEEE Conference on Visual Analytics Science and Technology, VAST 2014 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 257-258 2 p. 7042518

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Leap motion controller for authentication via hand geometry and gestures

    Chan, A., Halevi, T. & Memon, N., 2015, Human Aspects of Information Security, Privacy and Trust - 3rd International Conference, HAS 2015 Held as Part of HCI International 2015, Proceedings. Springer Verlag, Vol. 9190. p. 13-22 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9190).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Quality of online signature templates

    Sae-Bae, N. & Memon, N., Jun 16 2015, 2015 IEEE International Conference on Identity, Security and Behavior Analysis, ISBA 2015. Institute of Electrical and Electronics Engineers Inc., 7126354

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Recent advances in counter PRNU based source attribution and beyond

    Karaküçük, A., Dirik, A. E., Sencar, H. T. & Memon, N. D., 2015, Proceedings of SPIE-IS and T Electronic Imaging - Media Watermarking, Security, and Forensics 2015. SPIE, Vol. 9409. 94090N

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Robust audio hashing for audio identification

    Özer, H., Sankur, B. & Memon, N., Apr 3 2015, 2004 12th European Signal Processing Conference, EUSIPCO 2004. European Signal Processing Conference, EUSIPCO, Vol. 06-10-September-2004. p. 2091-2094 4 p. 7079698

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2014

    An HMM-based behavior modeling approach for continuous mobile authentication

    Roy, A., Halevi, T. & Memon, N., 2014, 2014 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2014. Institute of Electrical and Electronics Engineers Inc., p. 3789-3793 5 p. 6854310

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    A robust model for paper-reviewer assignment

    Liu, X., Suel, T. & Memon, N., Oct 6 2014, RecSys 2014 - Proceedings of the 8th ACM Conference on Recommender Systems. Association for Computing Machinery, Inc, p. 25-32 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    A semi-automatic deshredding method based on curve matching

    Shang, S., Sencar, H. T., Memon, N. & Kong, X., Jan 28 2014, 2014 IEEE International Conference on Image Processing, ICIP 2014. Institute of Electrical and Electronics Engineers Inc., p. 5537-5541 5 p. 7026120

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Finger-drawn pin authentication on touch devices

    Van Nguyen, T., Sae-Bae, N. & Memon, N., Jan 28 2014, 2014 IEEE International Conference on Image Processing, ICIP 2014. Institute of Electrical and Electronics Engineers Inc., p. 5002-5006 5 p. 7026013

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Touchpad input for continuous biometric authentication

    Chan, A., Halevi, T. & Memon, N., 2014, Communications and Multimedia Security - 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Proceedings. Springer Verlag, Vol. 8735 LNCS. p. 86-91 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8735 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Towards automatic detection of child pornography

    Sae-Bae, N., Sun, X., Sencar, H. T. & Memon, N. D., Jan 28 2014, 2014 IEEE International Conference on Image Processing, ICIP 2014. Institute of Electrical and Electronics Engineers Inc., p. 5332-5336 5 p. 7026079

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2013

    A cost-effective decision tree based approach to steganalysis

    Li, L., Sencar, H. T. & Memon, N., 2013, Proceedings of SPIE-IS and T Electronic Imaging - Media Watermarking, Security, and Forensics 2013. Vol. 8665. 86650P

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    A lightweight combinatorial approach for inferring the ground truth from multiple annotators

    Liu, X., Li, L. & Memon, N., 2013, Machine Learning and Data Mining in Pattern Recognition - 9th International Conference, MLDM 2013, Proceedings. Vol. 7988 LNAI. p. 616-628 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7988 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    A pilot study of cyber security and privacy related behavior and personality traits

    Halevi, T., Lewis, J. & Memon, N., 2013, WWW 2013 Companion - Proceedings of the 22nd International Conference on World Wide Web. p. 737-744 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    A Simple and Effective Method for Online Signature Verification

    Sae-Bae, N. & Memon, N., Jan 27 2013, BIOSIG 2013 - Proceedings of the 12th International Conference of the Biometrics Special Interest Group. Institute of Electrical and Electronics Engineers Inc., 6617153

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Mining groups of common interest: Discovering topical communities with network flows

    Li, L. & Memon, N., 2013, Machine Learning and Data Mining in Pattern Recognition - 9th International Conference, MLDM 2013, Proceedings. Vol. 7988 LNAI. p. 405-420 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7988 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Seam-carving based anonymization against image & video source attribution

    Bayram, S., Sencar, H. T. & Memon, N. D., 2013, 2013 IEEE International Workshop on Multimedia Signal Processing, MMSP 2013. p. 272-277 6 p. 6659300

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Selective Robust Image Encryption for Social Networks

    Emir Dirik, A. & Memon, N., 2013, Multimedia Communications, Services and Security - 6th International Conference, MCSS 2013, Proceedings. Springer Verlag, Vol. 368 CCIS. p. 71-81 11 p. (Communications in Computer and Information Science; vol. 368 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    What is biometric information and how to measure it?

    Sutcu, Y., Tabassi, E., Sencar, H. T. & Memon, N., 2013, 2013 IEEE International Conference on Technologies for Homeland Security, HST 2013. p. 67-72 6 p. 6698978

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2012

    Biometric-rich gestures: A novel approach to authentication on multi-touch devices

    Sae-Bae, N., Ahmed, K., Isbister, K. & Memon, N., 2012, Conference Proceedings - The 30th ACM Conference on Human Factors in Computing Systems, CHI 2012. p. 977-986 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Investigating multi-touch gestures as a novel biometric modality

    Sae-Bae, N., Memon, N. & Isbister, K., 2012, 2012 IEEE 5th International Conference on Biometrics: Theory, Applications and Systems, BTAS 2012. p. 156-161 6 p. 6374571

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2011

    ACE-Cost: Acquisition cost efficient classifier by hybrid decision tree with local SVM leaves

    Li, L., Topkara, U. & Memon, N., 2011, Machine Learning and Data Mining in Pattern Recognition - 7th International Conference, MLDM 2011, Proceedings. Vol. 6871 LNAI. p. 60-74 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6871 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Proceedings of SPIE - The International Society for Optical Engineering: Introduction

    Memon, N. D., Dittmann, J., Alattar, A. M. & Delp, E. J., 2011, Proceedings of SPIE-IS and T Electronic Imaging - Media Watermarking, Security, and Forensics III. Vol. 7880. 788001

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2010

    An ensemble of classifiers approach to steganalysis

    Bayram, S., Dirik, A. E., Sencar, H. T. & Memon, N., 2010, Proceedings - 2010 20th International Conference on Pattern Recognition, ICPR 2010. p. 4376-4379 4 p. 5597874

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Efficient techniques for sensor fingerprint matching in large image and video databases

    Bayram, S., Sencar, H. T. & Memon, N., 2010, Proceedings of SPIE-IS and T Electronic Imaging - Media Forensics and Security II. Vol. 7541. 754109

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Friends of an enemy: Identifying local members of peer-to-peer botnets using mutual contacts

    Coskun, B., Dietrich, S. & Memon, N., 2010, Proceedings - 26th Annual Computer Security Applications Conference, ACSAC 2010. p. 131-140 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    How to measure biometric information?

    Sutcu, Y., Sencar, H. T. & Memon, N., 2010, Proceedings - 2010 20th International Conference on Pattern Recognition, ICPR 2010. p. 1469-1472 4 p. 5597172

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    NetStore: An efficient storage infrastructure for network forensics and monitoring

    Giura, P. & Memon, N., 2010, Recent Advances in Intrusion Detection - 13th International Symposium, RAID 2010, Proceedings. Vol. 6307 LNCS. p. 277-296 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6307 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution