ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1808.02741
  4. Cited By
Peek-a-Boo: I see your smart home activities, even encrypted!

Peek-a-Boo: I see your smart home activities, even encrypted!

8 August 2018
Abbas Acar
Hossein Fereidooni
Tigist Abera
A. Sikder
Markus Miettinen
Hidayet Aksu
Mauro Conti
A. Sadeghi
Selcuk Uluagac
ArXivPDFHTML

Papers citing "Peek-a-Boo: I see your smart home activities, even encrypted!"

11 / 11 papers shown
Title
MADEA: A Malware Detection Architecture for IoT blending Network Monitoring and Device Attestation
MADEA: A Malware Detection Architecture for IoT blending Network Monitoring and Device Attestation
Renascence Tarafder Prapty
R. Trimananda
Sashidhar Jakkamsetti
Gene Tsudik
A. Markopoulou
61
0
0
24 Feb 2025
MAVERICK: An App-independent and Platform-agnostic Approach to Enforce
  Policies in IoT Systems at Runtime
MAVERICK: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime
M. Mazhar
Li Li
Endadul Hoque
Omar Chowdhury
26
3
0
02 Feb 2023
SoK: Secure Human-centered Wireless Sensing
SoK: Secure Human-centered Wireless Sensing
Wei Sun
Tingjun Chen
Neil Zhenqiang Gong
13
5
0
22 Nov 2022
When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning
  and Classical Machine Learning Approaches for Encrypted Malware Traffic
  Classification
When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification
Adi Lichy
Ofek Bader
Ran Dubin
A. Dvir
Chen Hajaj
17
29
0
16 Jun 2022
Deep Adversarial Learning on Google Home devices
Deep Adversarial Learning on Google Home devices
Andrea Ranieri
David J. Caputo
Luca Verderame
Alessio Merlo
L. Caviglione
AAML
14
6
0
25 Feb 2021
A Survey on Device Behavior Fingerprinting: Data Sources, Techniques,
  Application Scenarios, and Datasets
A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets
Pedro Miguel Sánchez Sánchez
José María Jorquera Valero
Alberto Huertas Celdrán
Gérome Bovet
M. Pérez
Gregorio Martínez Pérez
22
95
0
07 Aug 2020
A Survey on Security and Privacy Issues in Modern Healthcare Systems:
  Attacks and Defenses
A Survey on Security and Privacy Issues in Modern Healthcare Systems: Attacks and Defenses
Akm Iqtidar Newaz
A. Sikder
Mohammad Ashiqur Rahman
A. S. Uluagac
46
173
0
15 May 2020
Canopy: A Verifiable Privacy-Preserving Token Ring based Communication
  Protocol for Smart Homes
Canopy: A Verifiable Privacy-Preserving Token Ring based Communication Protocol for Smart Homes
Nisha Panwar
Shantanu Sharma
Guoxi Wang
S. Mehrotra
N. Venkatasubramanian
9
11
0
08 Apr 2020
IoT Device Identification Using Deep Learning
IoT Device Identification Using Deep Learning
J. Kotak
Yuval Elovici
11
56
0
25 Feb 2020
Real-time Analysis of Privacy-(un)aware IoT Applications
Real-time Analysis of Privacy-(un)aware IoT Applications
Leonardo Babun
Z. Berkay Celik
Patrick D. McDaniel
A. S. Uluagac
39
47
0
24 Nov 2019
A Context-aware Framework for Detecting Sensor-based Threats on Smart
  Devices
A Context-aware Framework for Detecting Sensor-based Threats on Smart Devices
A. Sikder
Hidayet Aksu
A. S. Uluagac
AAML
18
44
0
22 Oct 2019
1