Follow
Ajaya Neupane
Ajaya Neupane
Principal Researcher, Palo Alto Networks
Verified email at uab.edu - Homepage
Title
Cited by
Cited by
Year
Rendered Insecure: GPU Side Channel Attacks are Practical
H Naghibijouybari, A Neupane, Z Qian, N Abu-Ghazaleh
25th ACM Conference on Computer and Communications Security (CCS), 2018
2182018
Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems
S Li, A Neupane, S Paul, C Song, SV Krishnamurthy, AKR Chowdhury, ...
Network and Distributed System Security Symposium, 2019
142*2019
A multi-modal neuro-physiological study of phishing detection and malware warnings
A Neupane, ML Rahman, N Saxena, L Hirshfield
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
672015
Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries
D Wang, A Neupane, Z Qian, N Abu-Ghazaleh, SV Krishnamurthy, ...
Network and Distributed System Security Symposium, 2019
572019
Neural markers of cybersecurity: An fMRI study of phishing and malware warnings
A Neupane, N Saxena, JO Maximo, R Kana
IEEE Transactions on information forensics and security 11 (9), 1970-1983, 2016
442016
Neural Signatures of User-Centered Security: An fMRI Study of Phishing, and Malware Warnings.
A Neupane, N Saxena, K Kuruvilla, M Georgescu, RK Kana
NDSS, 2014
432014
Users really do respond to smishing
ML Rahman, D Timko, H Wali, A Neupane
Proceedings of the Thirteenth ACM Conference on Data and Application …, 2023
262023
Task-dependent changes in frontal–parietal activation and connectivity during visual search
JO Maximo, A Neupane, N Saxena, RM Joseph, RK Kana
Brain Connectivity 6 (4), 335-344, 2016
232016
Do social disorders facilitate social engineering? A case study of autism and phishing attacks
A Neupane, K Satvat, N Saxena, D Stavrinos, HJ Bishop
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
212018
Peep: Passively eavesdropping private input via brainwave signals
A Neupane, ML Rahman, N Saxena
Financial Cryptography and Data Security: 21st International Conference, FC …, 2017
202017
Neural underpinnings of website legitimacy and familiarity detection: An fnirs study
A Neupane, N Saxena, L Hirshfield
Proceedings of the 26th International Conference on World Wide Web, 1571-1580, 2017
192017
Side channel attacks on gpus
H Naghibijouybari, A Neupane, Z Qian, N Abu-Ghazaleh
IEEE Transactions on Dependable and Secure Computing 18 (4), 1950-1961, 2019
172019
The Crux of Voice (In) Security: A Brain Study of Speaker Legitimacy Detection
A Neupane, N Saxena, L Hirshfield, SE Bratt
Network and Distributed System Security Symposium, 2019
142019
Brain hemorrhage: When brainwaves leak sensitive medical conditions and personal information
A Neupane, K Satvat, M Hosseini, N Saxena
2019 17th International Conference on Privacy, Security and Trust (PST), 1-10, 2019
112019
Learning Tensor-based Representations from Brain-Computer Interface Data for Cybersecurity
ML Rahman, S Bardhan, A Neupane, E Papalexakis, C Song
European Conference on Machine Learning and Principles and Practice of …, 2018
62018
Beyond the CPU: Side–Channel Attacks on GPUs
H Naghibijouybari, A Neupane, Z Qian, N Abu-Ghazaleh
IEEE Design & Test 38 (3), 15-21, 2021
52021
Machine learning based fileless malware traffic classification using image visualization
FA Demmese, A Neupane, S Khorsandroo, M Wang, K Roy, Y Fu
Cybersecurity 6 (1), 32, 2023
42023
Catcha: When cats track your movements online
P Shrestha, N Saxena, A Neupane, K Satvat
Information Security Practice and Experience: 15th International Conference …, 2019
42019
IAC: On the Feasibility of Utilizing Neural Signals for Access Control
ML Rahman, A Neupane, C Song
Annual Computer Security Applications Conference (ACSAC), 2018
42018
Edge-assisted detection and summarization of key global events from distributed crowd-sensed data
A Fahim, A Neupane, E Papalexakis, L Kaplan, SV Krishnamurthy, ...
2019 IEEE International Conference on Cloud Engineering (IC2E), 76-85, 2019
22019
The system can't perform the operation now. Try again later.
Articles 1–20