Furkan Alaca
School of Computing, Queen's University

Journals

Comparative analysis and framework evaluating mimicry-resistant and invisible web authentication schemes
Furkan Alaca, AbdelRahman Abdou, and P.C. van Oorschot. IEEE TDSC 18(2):534-549 (March-April 2021).
Authors' copy: arXiv.1708.01706 [cs.CR] (arXiv.org e-print, Cornell University Library, 30 Mar 2019)
[IEEE Xplore]

Comparative analysis and framework evaluating web single sign-on systems
Furkan Alaca and P.C. van Oorschot. ACM Computing Surveys 53 (5) 112:1-112:34, Sept. 2020.
Authors' copy: arXiv:1805.00094 [cs.CR] (arXiv.org e-print, Cornell University Library, 9 Aug 2020)
[ACM Digital Library]

Why phishing still works: User strategies for combating phishing attacks
Mohamed Alsharnouby, Furkan Alaca, and Sonia Chiasson. International Journal of Human-Computer Studies (Elsevier), 82:69-82, 2015.
[ Preprint] [ScienceDirect]

Aggregate interference distribution from large wireless networks with correlated shadowing: An analytical-numerical-simulation approach
Sebastian S. Szyszkowicz, Furkan Alaca, Halim Yanikomeroglu, and John Thompson. IEEE Transactions on Vehicular Technology, vol. 60, no. 6, pp. 2752-2764, July 2011.
[ Full Text] [IEEE Xplore]

Conferences, Workshops, and Technical Reports

Ch4os: Discretized Generative Adversarial Network for Functionality-preserving Evasive Modification on Malware
Christopher Molloy, Furkan Alaca, Steven H. H. Ding. International Conference on Artificial Neural Networks 2024, September 17-20, Lugano-Viganello, Switzerland.
[LNCS (SpringerLink)]

Privacy-Preserving Multi-Party Keyword-Based Classification of Unstructured Text Data
Ian Pépin, Furkan Alaca, and Farhana Zulkernine. International Conference on Distributed Computing in Sensor Systems and the Internet of Things (DCOSS-IoT), 2024.
[IEEE Xplore]

Triage-Bot: An Assistive Triage Framework
Drishti Sharma, Elyas Rashno, Farhana Zulkernine, Eyad El Khodary, Max Beninger, Ronan Almeida, Furkan Alaca, Khalid Elgazzar IEEE International Conference on Digital Health 2024, July 7-13, Shenzhen, China.
[IEEE Xplore]

Vulnerability of Open-Source Face Recognition Systems to Blackbox Attacks: A Case Study with InsightFace
Nafiz Sadman, Kazi Amit Hasan, Elyas Rashno, Furkan Alaca, Yuan Tian, and Farhana Zulkernine. IEEE Symposium Series on Computational Intelligence, 2023.
[IEEE Xplore] [ Authors' copy]

If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes
Anthony Tam, Furkan Alaca, and David Barrera. Proceedings of the 15th International Symposium on Foundations & Practice of Security, 2022.
[LNCS (SpringerLink)] [ Authors' copy]

A Multi-Course Report on the Experience of Unplanned Online Exams
Larry Yueli Zhang, Andrew K. Petersen, Michael Liut, Bogdan Simion, and Furkan Alaca. Proceedings of the 52nd ACM Technical Symposium on Computer Science Education (SIGCSE), 2021.
[ACM Digital Library]

Device fingerprinting for augmenting web authentication: Classification and analysis of methods
Furkan Alaca and P.C. van Oorschot. ACSAC 2016, December 5-9, Los Angeles, CA.
[ACM Digital Library] [ Authors' copy]

A genetic algorithm based cell switch-off scheme for energy saving in dense cell deployments
Furkan Alaca, Akram Bin Sediq, and Halim Yanikomeroglu. IEEE Global Communications Conference (Globecom 2012) Workshop: The 8th Broadband Wireless Access Workshop, 3–7 December 2012, Anaheim, CA.
[ Authors' copy] [IEEE Xplore]

Application of sensor networks in a smart apartment
Omid Abari, Furkan Alaca, James Green, and Rafik Goubran. Conference of the Canadian Medical and Biological Engineering Society, June 2010, Vancouver, BC.
[ResearchGate]

Efficient simulation using shadowing fields of many wireless interferers with correlated shadowing
Sebastian S. Szyszkowicz, Furkan Alaca, Halim Yanikomeroglu, and John S. Thompson. IEEE Vehicular Technology Conference (VTC2010-Spring), 16–19 May 2010, Taipei, Taiwan.
[ Authors' copy] [IEEE Xplore]