


default search action
Eugene Y. Vasserman
Person information
- affiliation: Kansas State University, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c28]Abhilekha Dalal, Rushrukh Rayan, Adrita Barua, Eugene Y. Vasserman, Md. Kamruzzaman Sarker, Pascal Hitzler:
On the Value of Labeled Data and Symbolic Methods for Hidden Neuron Activation Analysis. NeSy (2) 2024: 109-131 - [i6]Adrita Barua, Gary Brase, Ke Dong, Pascal Hitzler, Eugene Y. Vasserman:
On the Psychology of GPT-4: Moderately anxious, slightly masculine, honest, and humble. CoRR abs/2402.01777 (2024) - [i5]Abhilekha Dalal, Rushrukh Rayan, Adrita Barua, Eugene Y. Vasserman, Md. Kamruzzaman Sarker, Pascal Hitzler:
On the Value of Labeled Data and Symbolic Methods for Hidden Neuron Activation Analysis. CoRR abs/2404.13567 (2024) - 2023
- [i4]Abhilekha Dalal, Md. Kamruzzaman Sarker
, Adrita Barua, Eugene Y. Vasserman, Pascal Hitzler:
Understanding CNN Hidden Neuron Activations Using Structured Background Knowledge and Deductive Reasoning. CoRR abs/2308.03999 (2023) - [i3]William Bergeron, Michael Jones, Chase Barber, Kale DeYoung, George T. Amariucai, Kaleb Ernst, Nathan Fleming, Peter Michaleas, Sandeep Pisharody, Nathan Wells, Antonio Rosa, Eugene Y. Vasserman, Jeremy Kepner:
Hypersparse Traffic Matrix Construction using GraphBLAS on a DPU. CoRR abs/2310.18334 (2023) - 2021
- [j10]Chandra Sharma
, Samuel Moylan, Eugene Y. Vasserman
, George T. Amariucai
:
Review of the Security of Backward-Compatible Automotive Inter-ECU Communication. IEEE Access 9: 114854-114869 (2021) - [j9]Hong Liu, Eugene Y. Vasserman:
Side-channel Programming for Software Integrity Checking. EAI Endorsed Trans. Security Safety 8(28): e2 (2021) - 2020
- [j8]Qais Tasali, Christine Sublett, Eugene Y. Vasserman
:
Controlled BTG: Toward Flexible Emergency Override in Interoperable Medical Systems. EAI Endorsed Trans. Security Safety 6(22): e2 (2020) - [c27]Qais Tasali, Nikesh Gyawali, Eugene Y. Vasserman
:
Time series anomaly detection in medical break-the-glass. HotSoS 2020: 28:1-28:2
2010 – 2019
- 2019
- [i2]Chandra Sharma, Samuel Moylan, George T. Amariucai, Eugene Y. Vasserman
:
An Extended Survey on Vehicle Security. CoRR abs/1910.04150 (2019) - 2018
- [j7]Michael Schliep, Eugene Y. Vasserman
, Nicholas Hopper:
Consistent Synchronous Group Off-The-Record Messaging with SYM-GOTR. Proc. Priv. Enhancing Technol. 2018(3): 181-202 (2018) - [c26]Chandan Chowdhury, Dalton A. Hahn, Matthew R. French, Eugene Y. Vasserman, Pratyusa K. Manadhata, Alexandru G. Bardas:
eyeDNS: Monitoring a University Campus Network. ICC 2018: 1-7 - 2017
- [c25]Sam Procter
, Eugene Y. Vasserman
, John Hatcliff:
SAFE and Secure: Deeply Integrating Security in a New Hazard Analysis. ARES 2017: 66:1-66:10 - [c24]Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Y. Vasserman
, Yongdae Kim
:
Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin. CCS 2017: 195-209 - [c23]Mikael Lindvall, Madeline Diep, Michele Klein, Paul L. Jones, Yi Zhang
, Eugene Y. Vasserman
:
Safety-Focused Security Requirements Elicitation for Medical Device Software. RE 2017: 134-143 - [c22]Qais Tasali, Chandan Chowdhury, Eugene Y. Vasserman
:
A Flexible Authorization Architecture for Systems of Interoperable Medical Devices. SACMAT 2017: 9-20 - [c21]Hong Liu, Eugene Y. Vasserman
:
Gray-Box Software Integrity Checking via Side-Channels. SecureComm 2017: 3-23 - [c20]Todd Carpenter, John Hatcliff, Eugene Y. Vasserman
:
A Reference Separation Architecture for Mixed-Criticality Medical and IoT Devices. SafeThings@SenSys 2017: 14-19 - [i1]Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Y. Vasserman, Yongdae Kim:
Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin. CoRR abs/1708.09790 (2017) - 2016
- [c19]Yang Xue, Eugene Y. Vasserman
:
Simple and compact flow fingerprinting robust to transit through low-latency anonymous networks. CCNC 2016: 765-773 - 2015
- [c18]Krishna K. Venkatasubramanian, Eugene Y. Vasserman
, Vasiliki Sfyrla, Oleg Sokolsky, Insup Lee:
Requirement Engineering for Functional Alarm System for Interoperable Medical Devices. SAFECOMP 2015: 252-266 - [c17]Hong Liu, Hongmin Li, Eugene Y. Vasserman
:
Practicality of Using Side-Channel Analysis for Software Integrity Checking of Embedded Systems. SecureComm 2015: 277-293 - 2014
- [c16]Carlos Salazar, Eugene Y. Vasserman
:
Retrofitting Communication Security into a Publish/Subscribe Middleware Platform. FHIES/SEHC 2014: 10-25 - [c15]Krishna K. Venkatasubramanian, Eugene Y. Vasserman
, Oleg Sokolsky, Insup Lee:
Functional Alarms for Systems of Interoperable Medical Devices. HASE 2014: 247-248 - [c14]Scott Bell, Tim Frey, Eugene Y. Vasserman
:
Spreading the word: introducing pre-service teachers to programming in the K12 classroom. SIGCSE 2014: 187-192 - 2013
- [j6]Abedelaziz Mohaisen, Denis Foo Kune, Eugene Y. Vasserman
, Myungsun Kim, Yongdae Kim
:
Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs. IEEE Trans. Dependable Secur. Comput. 10(6): 380-393 (2013) - [j5]Eugene Y. Vasserman
, Nicholas Hopper:
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks. IEEE Trans. Mob. Comput. 12(2): 318-332 (2013) - [c13]Sumeet Gujrati, Eugene Y. Vasserman
:
The usability of truecrypt, or how i learned to stop whining and fix an interface. CODASPY 2013: 83-94 - [c12]Eugene Y. Vasserman
, John Hatcliff:
Foundational Security Principles for Medical Application Platforms - (Extended Abstract). WISA 2013: 213-217 - [c11]Hong Liu, Eugene Y. Vasserman
, Nicholas Hopper:
Improved group off-the-record messaging. WPES 2013: 249-254 - 2012
- [j4]Krishna K. Venkatasubramanian, Eugene Y. Vasserman
, Oleg Sokolsky, Insup Lee:
Security and Interoperable-Medical-Device Systems, Part 1. IEEE Secur. Priv. 10(5): 61-63 (2012) - [j3]Eugene Y. Vasserman
, Krishna K. Venkatasubramanian, Oleg Sokolsky, Insup Lee:
Security and Interoperable-Medical-Device Systems, Part 2: Failures, Consequences, and Classification. IEEE Secur. Priv. 10(6): 70-73 (2012) - [c10]John Hatcliff, Andrew L. King, Insup Lee, Alasdair Macdonald, Anura Fernando, Michael Robkin, Eugene Y. Vasserman
, Sandy Weininger, Julian M. Goldman
:
Rationale and Architecture Principles for Medical Application Platforms. ICCPS 2012: 3-12 - [c9]Eugene Y. Vasserman, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim:
One-Way Indexing for Plausible Deniability in Censorship Resistant Storage. FOCI 2012 - 2011
- [c8]Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim, Eugene Y. Vasserman:
Losing Control of the Internet: Using the Data Plane to Attack the Control Plane. NDSS 2011 - 2010
- [j2]Nicholas Hopper, Eugene Y. Vasserman
, Eric Chan-Tin:
How much anonymity does network latency leak? ACM Trans. Inf. Syst. Secur. 13(2): 13:1-13:28 (2010) - [c7]Abedelaziz Mohaisen, Eugene Y. Vasserman
, Max Schuchard, Denis Foo Kune, Yongdae Kim
:
Secure encounter-based social networks: requirements, challenges, and designs. CCS 2010: 717-719 - [c6]Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim
, Eugene Y. Vasserman
:
Losing control of the internet: using the data plane to attack the control plane. CCS 2010: 726-728
2000 – 2009
- 2009
- [j1]Eugene Y. Vasserman
, Nicholas Hopper, James Tyra:
Silent Knock : practical, provably undetectable authentication. Int. J. Inf. Sec. 8(2): 121-135 (2009) - [c5]Eugene Y. Vasserman
, Rob Jansen, James Tyra, Nicholas Hopper, Yongdae Kim
:
Membership-concealing overlay networks. CCS 2009: 390-399 - 2007
- [c4]Nicholas Hopper, Eugene Y. Vasserman
, Eric Chan-Tin:
How much anonymity does network latency leak? CCS 2007: 82-91 - [c3]Eugene Y. Vasserman
, Nicholas Hopper, John Laxson, James Tyra:
SilentKnock: Practical, Provably Undetectable Authentication. ESORICS 2007: 122-138 - [c2]Ivan Osipkov, Eugene Y. Vasserman
, Nicholas Hopper, Yongdae Kim
:
Combating Double-Spending Using Cooperative P2P Systems. ICDCS 2007: 41 - 2006
- [c1]Nicholas Hopper, Eugene Y. Vasserman
:
On the effectiveness of k;-anonymity against traffic analysis and surveillance. WPES 2006: 9-18
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint