Furkan Alaca
School of Computing, Queen's University

Journals

Comparative analysis and framework evaluating mimicry-resistant and invisible web authentication schemes
Furkan Alaca, AbdelRahman Abdou, and P.C. van Oorschot. IEEE TDSC 18(2):534-549 (March-April 2021).
Authors' copy: arXiv.1708.01706 [cs.CR] (arXiv.org e-print, Cornell University Library, 30 Mar 2019)
[IEEE Xplore]

Comparative analysis and framework evaluating web single sign-on systems
Furkan Alaca and P.C. van Oorschot. ACM Computing Surveys 53 (5) 112:1-112:34, Sept. 2020.
Authors' copy: arXiv:1805.00094 [cs.CR] (arXiv.org e-print, Cornell University Library, 9 Aug 2020)
[ACM Digital Library]

Why phishing still works: User strategies for combating phishing attacks
Mohamed Alsharnouby, Furkan Alaca, and Sonia Chiasson. International Journal of Human-Computer Studies (Elsevier), 82:69-82, 2015.
[ Preprint] [ScienceDirect]

Aggregate interference distribution from large wireless networks with correlated shadowing: An analytical-numerical-simulation approach
Sebastian S. Szyszkowicz, Furkan Alaca, Halim Yanikomeroglu, and John Thompson. IEEE Transactions on Vehicular Technology, vol. 60, no. 6, pp. 2752-2764, July 2011.
[ Full Text] [IEEE Xplore]

Conferences, Workshops, and Technical Reports

Privacy-Preserving Multi-Party Keyword-Based Classification of Unstructured Text Data
Ian Pépin, Furkan Alaca, and Farhana Zulkernine. International Conference on Distributed Computing in Sensor Systems and the Internet of Things (DCOSS-IoT), 2024.
[Accepted for publication]

Vulnerability of Open-Source Face Recognition Systems to Blackbox Attacks: A Case Study with InsightFace
Nafiz Sadman, Kazi Amit Hasan, Elyas Rashno, Furkan Alaca, Yuan Tian, and Farhana Zulkernine. IEEE Symposium Series on Computational Intelligence, 2023.
[ Authors' copy]

If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes
Anthony Tam, Furkan Alaca, and David Barrera. Proceedings of the 15th International Symposium on Foundations & Practice of Security, 2022.
[ Authors' copy]

A Multi-Course Report on the Experience of Unplanned Online Exams
Larry Yueli Zhang, Andrew K. Petersen, Michael Liut, Bogdan Simion, and Furkan Alaca. Proceedings of the 52nd ACM Technical Symposium on Computer Science Education (SIGCSE), 2021.
[DOI link]

Device fingerprinting for augmenting web authentication: Classification and analysis of methods
Furkan Alaca and P.C. van Oorschot. ACSAC 2016, December 5-9, Los Angeles, CA.
[ Authors' copy]

A genetic algorithm based cell switch-off scheme for energy saving in dense cell deployments
Furkan Alaca, Akram Bin Sediq, and Halim Yanikomeroglu. IEEE Global Communications Conference (Globecom 2012) Workshop: The 8th Broadband Wireless Access Workshop, 3–7 December 2012, Anaheim, CA.
[ Authors' copy] [IEEE Xplore]

Application of sensor networks in a smart apartment
Omid Abari, Furkan Alaca, James Green, and Rafik Goubran. Conference of the Canadian Medical and Biological Engineering Society, June 2010, Vancouver, BC.
[ResearchGate]

Efficient simulation using shadowing fields of many wireless interferers with correlated shadowing
Sebastian S. Szyszkowicz, Furkan Alaca, Halim Yanikomeroglu, and John S. Thompson. IEEE Vehicular Technology Conference (VTC2010-Spring), 16–19 May 2010, Taipei, Taiwan.
[ Authors' copy] [IEEE Xplore]