Mobile devices are becoming smarter to satisfy modern user\u27s increasing needs better, which is achieved by equipping divers of sensors and integrating the most cutting-edge Deep Learning (DL) techniques. As a sophisticated system, it is often vulnerable to multiple attacks (side-channel attacks, neural backdoor, etc.). This dissertation proposes solutions to maintain the cyber-hygiene of the DL-Based smartphone system by exploring possible vulnerabilities and developing countermeasures. First, I actively explore possible vulnerabilities on the DL-Based smartphone system to develop proactive defense mechanisms. I discover a new side-channel attack on smartphones using the unrestricted magnetic sensor data. I demonstrate that attackers can...
Nowadays, we are more and more reliant on Deep Learning (DL) models and thus it is essential to safe...
To cope with the increasing variability and sophistication of modern attacks, machine learning has b...
For detecting and resolving the various types of malware, novel techniques are proposed, among which...
Mobile devices are becoming smarter to satisfy modern user\u27s increasing needs better, which is ac...
This paper reports a new side-channel attack to smartphones using the unrestricted magnetic sensor d...
Advancements in microelectronics have increased the popularity of mobile devices like cellphones, t...
In last years smartphone and tablet devices have been handling an increasing variety of sensitive re...
open access articleThe Android operating system has been the most popular for smartphones and tablet...
The vulnerability of smartphones to cyberattacks has been a severe concern to users arising from the...
Malware is very dangerous while attacked a device system. The device that can be attacked by malware...
Rapid advances in artificial intelligence (AI), machine learning (ML), and deep learning (DL) over t...
The significance of security is often overlooked until a catastrophic event occurs. This holds for t...
Deep learning has facilitated human-level performance on several tasks spanning a multitude of domai...
As deep learning (DL) is becoming a key component in many business and safety-critical systems, such...
Malicious developers are developing unsafe mobile apps which puts users at risk of exposing their pe...
Nowadays, we are more and more reliant on Deep Learning (DL) models and thus it is essential to safe...
To cope with the increasing variability and sophistication of modern attacks, machine learning has b...
For detecting and resolving the various types of malware, novel techniques are proposed, among which...
Mobile devices are becoming smarter to satisfy modern user\u27s increasing needs better, which is ac...
This paper reports a new side-channel attack to smartphones using the unrestricted magnetic sensor d...
Advancements in microelectronics have increased the popularity of mobile devices like cellphones, t...
In last years smartphone and tablet devices have been handling an increasing variety of sensitive re...
open access articleThe Android operating system has been the most popular for smartphones and tablet...
The vulnerability of smartphones to cyberattacks has been a severe concern to users arising from the...
Malware is very dangerous while attacked a device system. The device that can be attacked by malware...
Rapid advances in artificial intelligence (AI), machine learning (ML), and deep learning (DL) over t...
The significance of security is often overlooked until a catastrophic event occurs. This holds for t...
Deep learning has facilitated human-level performance on several tasks spanning a multitude of domai...
As deep learning (DL) is becoming a key component in many business and safety-critical systems, such...
Malicious developers are developing unsafe mobile apps which puts users at risk of exposing their pe...
Nowadays, we are more and more reliant on Deep Learning (DL) models and thus it is essential to safe...
To cope with the increasing variability and sophistication of modern attacks, machine learning has b...
For detecting and resolving the various types of malware, novel techniques are proposed, among which...