Tushar M. Jois
Tushar M. Jois
Assistant Professor, City College of New York
Verified email at - Homepage
Cited by
Cited by
Meteor: Cryptographically secure steganography for realistic distributions
G Kaptchuk, TM Jois, M Green, AD Rubin
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
Squint hard enough: attacking perceptual hashing with adversarial machine learning
J Prokos, N Fendley, M Green, R Schuster, E Tromer, T Jois, Y Cao
32nd USENIX Security Symposium (USENIX Security 23), 211-228, 2023
SoK: Cryptographic Confidentiality of Data on Mobile Devices
M Zinkus, TM Jois, M Green
Proceedings on Privacy Enhancing Technologies 2022 (1), 586-607, 2021
DOVE: A Data-Oblivious Virtual Environment
HB Lee, TM Jois, CW Fletcher, CA Gunter
Network and Distributed System Security Symposium (NDSS), 2021
Towards Application-Driven IoT Education
M Khanafer, TM Jois
2023 IEEE Global Engineering Education Conference (EDUCON), 1-7, 2023
WDPKR: Wireless device profiling kit and reconnaissance
T Jois, C Moncaliano
Hot Topics in the Science of Security (HotSoS) Symposium, 2021
Root the (Ballot) Box: Designing Security Engineering Courses with E-Voting
TM Jois, A Almogbil, L Kostick
Proceedings of the 55th ACM Technical Symposium on Computer Science …, 2024
Smart Use of Smart Devices in Your Home: A Smart-Home Security and Privacy Workshop for the General Public
TM Jois, T Pavlovich, BM McCarron, D Kotz, TJ Pierson
Proceedings of the 55th ACM Technical Symposium on Computer Science …, 2024
SocIoTy: Practical Cryptography in Smart Home Contexts
TM Jois, G Beck, S Belikovetsky, J Carrigan, A Chator, L Kostick, M Zinkus, ...
Proceedings on Privacy Enhancing Technologies, 2024
Security and Privacy for the Modern World
TM Jois
Johns Hopkins University, 2023
Pulsar: Secure Steganography through Diffusion Models
TM Jois, G Beck, G Kaptchuk
Cryptology ePrint Archive, 2023
On Building the Data-Oblivious Virtual Environment
TM Jois, HB Lee, CW Fletcher, CA Gunter
The system can't perform the operation now. Try again later.
Articles 1–12