Patrick Traynor
University of Florida
H-index: 42
North America-United States
Top articles of Patrick Traynor
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Every Breath You Don't Take: Deepfake Speech Detection Using Breath | arXiv preprint arXiv:2404.15143 | Seth Layton Thiago De Andrade Daniel Olszewski Kevin Warren Carrie Gates | 2024/4/23 |
SYSTEMS AND METHODS FOR DETECTING CALL PROVENANCE FROM CALL AUDIO | 2023/12/19 | ||
LeopardSeal: Detecting Call Interception via Audio Rogue Base Stations | Christian Peeters Tyler Tucker Anushri Jain Kevin Butler Patrick Traynor | 2023/6/18 | |
Method, apparatus, and system for detecting card skimming devices | 2023/10/31 | ||
Blue’s Clues: Practical Discovery of Non-Discoverable Bluetooth Devices | Tyler Tucker Hunter Searle Kevin Butler Patrick Traynor | 2023/5/21 | |
Detecting audio deepfakes through acoustic prosodic modeling | 2023/10/26 | ||
" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences | Daniel Olszewski Allison Lu Carson Stillman Kevin Warren Cole Kitroser | 2023/11/15 | |
Detecting deep-fake audio through vocal tract reconstruction | 2023/7/4 | ||
Automated security analysis of baseband firmware | 2023/5/30 | ||
Analyzing the monetization ecosystem of stalkerware | Proceedings on Privacy Enhancing Technologies | Cassidy Gibson Vanessa Frost Katie Platt Washington Garcia Luis Vargas | 2022/10 |
Practical end-to-end cryptographic authentication for telephony over voice channels | 2022/5/10 | ||
Who are you (i really wanna know)? detecting audio {DeepFakes} through vocal tract reconstruction | Logan Blue Kevin Warren Hadi Abdullah Cassidy Gibson Luis Vargas | 2022 | |
Method, apparatus, and computer program product for secure two-factor authentication | 2011/7/21 | ||
FIRMWIRE: Transparent dynamic analysis for cellular baseband firmware | Network and Distributed Systems Security Symposium (NDSS) 2022 | Grant Hernandez Marius Muench Dominik Maier Alyssa Milburn Shinjo Park | 2022/1 |
HallMonitor: A Framework for Identifying Network Policy Violations in Software | Daniel Olszewski Weidong Zhu Sandeep Sathyanarayana Kevin Butler Patrick Traynor | 2022/10/3 | |
Attacks as defenses: Designing robust audio captchas using attacks on automatic speech recognition systems | arXiv preprint arXiv:2203.05408 | Hadi Abdullah Aditya Karlekar Saurabh Prasad Muhammad Sajidur Rahman Logan Blue | 2022/3/10 |
SMS OTP security (SOS) hardening SMS-based two factor authentication | Christian Peeters Christopher Patton Imani NS Munyaka Daniel Olszewski Thomas Shrimpton | 2022/5/30 | |
Detecting SS7 redirection attacks with audio-based distance bounding | 2022/3/1 | ||
Book Chapters | J Chatterjee M Mahadevappa Pal M RR BC Sarkar R Ghosh | 2013/3 | |
Method and apparatus for differentiating between human and electronic speaker for voice interface security | 2021/11/16 |