Sotabase
Home
Researchers
Career
·
Ph.D. Candidate in the Siebel School of Computing and Data Science
,
University of Illinois Urbana-Champaign
2023–
Publications
(16)
Towards a trusted unmanned aerial system using blockchain for the protection of critical infrastructure
Transactions on Emerging Telecommunications Technologies · 2019
47
cited
FaceHack: Triggering backdoored facial recognition systems using facial characteristics
arXiv.org · 2020
42
cited
ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in ICS Control Applications
USENIX Security Symposium · 2021
39
cited
FaceHack: Attacking Facial Recognition Systems Using Malicious Facial Characteristics
IEEE Transactions on Biometrics Behavior and Identity Science · 2022
25
cited
Everybody’s Got ML, Tell Me What Else You Have: Practitioners’ Perception of ML-Based Security Tools and Explanations
IEEE Symposium on Security and Privacy · 2023
23
cited
I came, I saw, I hacked: Automated Generation of Process-independent Attacks for Industrial Control Systems
ACM Asia Conference on Computer and Communications Security · 2020
17
cited
CYBER-ATTACKS ON THE DATA COMMUNICATION OF DRONES MONITORING CRITICAL INFRASTRUCTURE
Computer Science & Information Technology (CS & IT) · 2018
16
cited
Image reconstruction attacks on distributed machine learning models
DistributedML@CoNEXT · 2021
8
cited
PurpCode: Reasoning for Safer Code Generation
arXiv.org · 2025
7
cited
SNIFU: Secure Network Interception for Firmware Updates in legacy PLCs
IEEE VLSI Test Symposium · 2020
7
cited
Attacks on Visualization-Based Malware Detection: Balancing Effectiveness and Executability
Deployable Machine Learning for Security Defense · 2021
6
cited
Generative Active Adaptation for Drifting and Imbalanced Network Intrusion Detection
arXiv.org · 2025
3
cited
Towards PLC-Specific Binary Analysis Tools: An Investigation of Codesys-Compiled PLC Software Applications
CPSIOTSEC@CCS · 2023
3
cited
VeriSMS: A Message Verification System for Inclusive Patient Outreach against Phishing Attacks
International Conference on Human Factors in Computing Systems · 2024
3
cited
You Can't Judge a Binary by Its Header: Data-Code Separation for Non-Standard ARM Binaries Using Pseudo Labels
IEEE Symposium on Security and Privacy · 2025
3
cited
High school students’ perceptions of third-party tracking and personalization
Journal of emerging investigators · 2025
Sotabase
Hadjer Benkraouda | Researcher Profile | Sotabase | Sotabase