Muhammad Sajidur Rahman
Muhammad Sajidur Rahman
Ph.D. Candidate, University of Florida
Verified email at - Homepage
Cited by
Cited by
API Blindspots: Why Experienced Developers Write Vulnerable Code
DS Oliveira, T Lin, MS Rahman, R Akefirad, D Ellis, E Perez, R Bobhate, ...
Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018), 315-328, 2018
Hear "no evil", see "kenansville": Efficient and transferable black-box attacks on speech recognition and voice identification systems
H Abdullah, MS Rahman, W Garcia, K Warren, AS Yadav, T Shrimpton, ...
2021 IEEE Symposium on Security and Privacy (SP), 712-729, 2021
Smart blood query: a novel mobile phone based privacy-aware blood donor recruitment and management system for developing regions
MS Rahman, KA Akter, S Hossain, A Basak, SI Ahmed
2011 IEEE Workshops of International Conference on Advanced Information …, 2011
Of Ulti,'hajano', and" Matachetar otanetak datam" Exploring Local Practices of Exchanging Confidential and Sensitive Information in Urban Bangladesh
SMT Haque, P Saha, MS Rahman, SI Ahmed
Proceedings of the ACM on Human-Computer Interaction 3 (CSCW), 1-22, 2019
An Exploratory Study of User Perceptions of Payment Methods in the UK and the US
K Krol, MS Rahman, S Parkin, E De Cristofaro, E Vasserman
NDSS Workshop on Usable Security (USEC), 2016
An empirical case study on Stack Overflow to explore developers’ security challenges
MS Rahman
Kansas State University, 2016
Beyond Clipping: Equalization based Psychoacoustic Attacks against ASRs
H Abdullah, MS Rahman, C Peeters, C Gibson, W Garcia, ...
Asian Conference on Machine Learning, 672-688, 2021
SO{U}RCERER: Developer-Driven Security Testing Framework for Android Apps
M Sajidur Rahman, B Kojusner, R Kennedy, P Pathak, L Qi, B Williams
36th IEEE/ACM International Conference on Automated Software Engineering …, 2021
Combating Social Media Information Operations with Neural Language Models
MS Rahman, P Tully
2020 USENIX Security and AI Networking Summit, 2020
The system can't perform the operation now. Try again later.
Articles 1–9