Identity and content authentication for phone calls PG Traynor, BG Reaves, LE Blue, L Vargas, H Abdullah, T Shrimpton US Patent 10,764,043, 2020 | 192 | 2020 |
Practical hidden voice attacks against speech and speaker recognition systems H Abdullah, W Garcia, C Peeters, P Traynor, KRB Butler, J Wilson NDSS Symposium 2019, 2019 | 190 | 2019 |
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems H Abdullah, K Warren, V Bindschaedler, N Papernot, P Traynor 2021 IEEE Symposium on Security and Privacy (SP), 2020 | 160 | 2020 |
Hear" no evil", see" kenansville": Efficient and transferable black-box attacks on speech recognition and voice identification systems H Abdullah, MS Rahman, W Garcia, L Blue, K Warren, AS Yadav, ... 2021 IEEE Symposium on Security and Privacy (SP), 2019 | 123 | 2019 |
2ma: Verifying voice commands via two microphone authentication L Blue, H Abdullah, L Vargas, P Traynor Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 55 | 2018 |
{AuthentiCall}: Efficient Identity and Content Authentication for Phone Calls B Reaves, L Blue, H Abdullah, L Vargas, P Traynor, T Shrimpton 26th USENIX Security Symposium (USENIX Security 17), 575-592, 2017 | 48 | 2017 |
Who are you (i really wanna know)? detecting audio {DeepFakes} through vocal tract reconstruction L Blue, K Warren, H Abdullah, C Gibson, L Vargas, J O'Dell, K Butler, ... 31st USENIX Security Symposium (USENIX Security 22), 2691-2708, 2022 | 41 | 2022 |
Sonar: Detecting SS7 redirection attacks with audio-based distance bounding C Peeters, H Abdullah, N Scaife, J Bowers, P Traynor, B Reaves, K Butler 2018 IEEE Symposium on Security and Privacy (SP), 567-582, 2018 | 30 | 2018 |
Demystifying limited adversarial transferability in automatic speech recognition systems H Abdullah, A Karlekar, V Bindschaedler, P Traynor International conference on learning representations (ICLR), 2021 | 16 | 2021 |
Beyond Clipping: Equalization based Psychoacoustic Attacks against ASRs H Abdullah, MS Rahman, C Peeters, C Gibson, W Garcia, ... Asian Conference on Machine Learning, 672-688, 2021 | 10 | 2021 |
Attacks as defenses: Designing robust audio captchas using attacks on automatic speech recognition systems H Abdullah, A Karlekar, S Prasad, MS Rahman, L Blue, LA Bauer, ... arXiv preprint arXiv:2203.05408, 2022 | 6 | 2022 |
Noise survey in offshore operations MNA Rahman, H Abdullah SPE International Conference and Exhibition on Health, Safety, Environment …, 1991 | 3 | 1991 |
Transferable Adversarial Perturbations between Self-Supervised Speech Recognition Models R Olivier, H Abdullah, B Raj The Second Workshop on New Frontiers in Adversarial Machine Learning, 2023 | 1 | 2023 |
Watch What You Pretrain For: Targeted, Transferable Adversarial Examples on Self-Supervised Speech Recognition models R Olivier, H Abdullah, B Raj arXiv preprint arXiv:2209.13523, 2022 | 1 | 2022 |
Detecting deep-fake audio through vocal tract reconstruction PG Traynor, K Butler, LE Blue, L Vargas, KS Warren, H Abdullah, ... US Patent 11,694,694, 2023 | | 2023 |
Detecting SS7 redirection attacks with audio-based distance bounding PG Traynor, C Peeters, BG Reaves, H Abdullah, K Butler, J Bowers, ... US Patent 11,265,717, 2022 | | 2022 |
Explaining, Exploiting, and Defending: Adversarial Machine Learning and Voice Processing Systems H Abdullah University of Florida, 2022 | | 2022 |
Poster: AuthentiCall: Efficient Identity and Content Authentication for Phone Calls B Reaves, L Blue, H Abdullah, L Vargas, P Traynor, T Shrimpton | | 2017 |
Effects of calcium on Ralstonia solanacearum, pH and anatomical characters of Capsicum annuum MA Rahman, H Abdullah MALAYSIAN APPLIED BIOLOGY 26, 29-36, 1997 | | 1997 |
Is Memorization Actually Necessary for Generalization? H Abdullah, K Wang, B Hoak, Y Wang, SS Arora, Y Cai | | |