Kevin Butler
University of Florida
H-index: 39
North America-United States
Top articles of Kevin Butler
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Every Breath You Don't Take: Deepfake Speech Detection Using Breath | arXiv preprint arXiv:2404.15143 | Seth Layton Thiago De Andrade Daniel Olszewski Kevin Warren Carrie Gates | 2024/4/23 |
AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management | arXiv preprint arXiv:2404.11815 | Jennifer Sheldon Weidong Zhu Adnan Abdullah Sri Hrushikesh Varma Bhupathiraju Takeshi Sugawara | 2024/4/18 |
Privacy-Preserving Gaze Data Streaming in Immersive Interactive Virtual Reality: Robustness and User Experience | arXiv preprint arXiv:2402.07687 | Ethan Wilson Azim Ibragimov Michael J Proulx Sai Deep Tetali Kevin Butler | 2024/2/12 |
5GAC-Analyzer: Identifying Over-Privilege Between 5G Core Network Functions | Policy | Seaver Thorn K Virgil English Kevin RB Butler William Enck | 2024 |
Protecting Satellite Proximity Operations via Secure Multi-Party Computation | Caroline Fedele Kevin Butler Christopher Petersen Tyler Lovelly | 2024 | |
Auditory Eyesight: Demystifying {μs-Precision} Keystroke Tracking Attacks on Unconstrained Keyboard Inputs | Yazhou Tu Liqun Shan Md Imran Hossen Sara Rampazzi Kevin Butler | 2023 | |
Privacy-preserving datasets of eye-tracking samples with applications in XR | IEEE Transactions on Visualization and Computer Graphics | Brendan David-John Kevin Butler Eakta Jain | 2023/2/22 |
Automated security analysis of baseband firmware | 2023/5/30 | ||
" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences | Daniel Olszewski Allison Lu Carson Stillman Kevin Warren Cole Kitroser | 2023/11/15 | |
Privacy and security | ACM SIGCAS Computers and Society | Carl S Guynes Grichard G Vedder Michael T Vanecek | 1996/3/1 |
Less is more: dimension reduction finds on-manifold adversarial examples in hard-label attacks | Washington Garcia Pin-Yu Chen Hamilton Scott Clouse Somesh Jha Kevin RB Butler | 2023/2/8 | |
Eye-tracked virtual reality: A comprehensive survey on methods and privacy challenges | Efe Bozkir Süleyman Özdel Mengdi Wang Brendan David-John Hong Gao | 2023/5/23 | |
Detecting audio deepfakes through acoustic prosodic modeling | 2023/10/26 | ||
Method and apparatus for vetting universal serial bus device firmware | 2023/1/31 | ||
Side eye: Characterizing the limits of pov acoustic eavesdropping from smartphone cameras with rolling shutters and movable lenses | Yan Long Pirouz Naghavi Blas Kojusner Kevin Butler Sara Rampazzi | 2022/12/28 | |
Deep Note: Can Acoustic Interference Damage the Availability of Hard Disk Storage in Underwater Data Centers? | Jennifer Sheldon Weidong Zhu Adnan Abdullah Kevin Butler Md Jahidul Islam | 2023/7/9 | |
Following the Money: Characterizing the Monetization Ecosystem of Stalkerware Through Application Analysis | Kevin Butler | 2023 | |
Blue’s Clues: Practical Discovery of Non-Discoverable Bluetooth Devices | Tyler Tucker Hunter Searle Kevin Butler Patrick Traynor | 2023/5/21 | |
Detecting deep-fake audio through vocal tract reconstruction | 2023/7/4 | ||
Fuzz The Power: Dual-role State Guided Black-box Fuzzing for {USB} Power Delivery | Kyungtae Kim Sungwoo Kim Kevin RB Butler Antonio Bianchi Rick Kennell | 2023 |