


default search action
Brent Lagesse
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c32]Anthony J. Bustamante, Sarah Asad, Daniela Nicklas, Brent Lagesse:
A Dual-Model Anomaly Detection Algorithm for non-linear stream data in Smart City Environments. DCOSS-IoT 2024: 540-547 - [c31]Gautam Kumar, Brent Lagesse:
Thimblerig: A Game-Theoretic, Adaptive, Risk-limiting Security System for Cloud Systems. NOMS 2024: 1-6 - [c30]Sarah Asad, Breanna Powell
, Christopher Long, Daniela Nicklas, Brent Lagesse
:
"Where Am I?": Unraveling Challenges in Smart City Data Cleaning to Establish a Ground Truth Framework. PerCom Workshops 2024: 649-654 - [c29]Christopher Perdriau
, Vidushi Ojha
, Kaitlynn T. Gray
, Brent Lagesse
, Colleen M. Lewis
:
The Diversity-Hire Narrative in CS: Sources, Impacts, and Responses. SIGCSE (1) 2024: 1049-1055 - 2023
- [c28]Christopher Perdriau
, Vidushi Ojha
, Kaitlynn T. Gray
, Brent Lagesse
, Colleen M. Lewis
:
The Diversity-Hire Narrative in CS: Sources, Impacts, and Mitigation Strategies. ICER (2) 2023: 20-21 - [c27]Jeffy Jahfar Poozhithara, Hazeline U. Asuncion, Brent Lagesse
:
Keyword Extraction From Specification Documents for Planning Security Mechanisms. ICSE 2023: 1661-1673 - [c26]Vidushi Ojha
, Christopher Perdriau
, Brent Lagesse
, Colleen M. Lewis
:
Computing Specializations: Perceptions of AI and Cybersecurity Among CS Students. SIGCSE (1) 2023: 966-972 - 2022
- [c25]Jeffy Jahfar Poozhithara, Hazeline U. Asuncion, Brent Lagesse:
Towards Lightweight Detection of Design Patterns in Source Code. SEKE 2022: 95-99 - 2021
- [c24]Brent Lagesse, Gabriel Nguyen, Utsav Goswami, Kevin Wu:
You Had to Be There: Private Video Sharing for Mobile Phones using Fully Homomorphic Encryption. PerCom Workshops 2021: 730-735 - [i6]Jeffrey Murray Jr, Afra Mashhadi, Brent Lagesse, Michael Stiber:
Privacy Preserving Techniques Applied to CPNI Data: Analysis and Recommendations. CoRR abs/2101.09834 (2021) - 2020
- [j4]Kevin Wu, Brent Lagesse
:
Detecting hidden webcams with delay-tolerant similarity of simultaneous observation. Pervasive Mob. Comput. 65: 101154 (2020) - [c23]Utsav Goswami, Kevin Wang, Gabriel Nguyen, Brent Lagesse:
Privacy-Preserving Mobile Video Sharing using Fully Homomorphic Encryption. PerCom Workshops 2020: 1-3 - [c22]Nicholas Handaja, Brent Lagesse
:
CAPP: A Context-Aware Proof of Presence for Crowdsensing Incentives. PerCom Workshops 2020: 1-6 - [i5]Jeffy Jahfar Poozhithara, Hazeline U. Asuncion, Brent Lagesse:
Automated Query Generation for Design Pattern Mining in Source Code. CoRR abs/2007.13025 (2020) - [i4]Jia Wang, Brent Lagesse:
KeyGuard: Using Selective Encryption to Mitigate Keylogging in Third-Party IME. CoRR abs/2011.10012 (2020) - [i3]Adedayo Odesile, Brent Lagesse:
TrustSense: An energy efficient trust scheme for clustered wireless sensor networks. CoRR abs/2011.10017 (2020)
2010 – 2019
- 2019
- [c21]Kevin Wu, Brent Lagesse
:
Do You See What I See?Detecting Hidden Streaming Cameras Through Similarity of Simultaneous Observation. PerCom 2019: 1-10 - [c20]Abirami Sankara Narayanan, Yang Peng, Brent Lagesse
:
iService: A Cloud-Based Scheduling Service for Efficient Usage of IoT Resources. PerCom Workshops 2019: 279-284 - [c19]Marc J. Dupuis, Camelia Bejan, Matt Bishop
, Scott David, Brent Lagesse:
Design Patterns for Compensating Controls for Securing Financial Sessions. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1437-1443 - [i2]Kevin Wu, Brent Lagesse:
Do You See What I See? Detecting Hidden Streaming Cameras Through Similarity of Simultaneous Observation. CoRR abs/1901.02818 (2019) - [i1]Cody Burkard, Brent Lagesse
:
Can Intelligent Hyperparameter Selection Improve Resistance to Adversarial Examples? CoRR abs/1902.05586 (2019) - 2018
- [c18]Brent Lagesse
, Kevin Wu, Jaynie Shorb, Zealous Zhu:
Detecting Spies in IoT Systems using Cyber-Physical Correlation. PerCom Workshops 2018: 185-190 - [c17]Brent Lagesse
, Kevin Wu, Jaynie Shorb, Zealous Zhu:
Automated Hidden Sensor Detection in Sensor-Rich Spaces. PerCom Workshops 2018: 433-435 - [c16]Ajay Palleri Kesavan, Neil Prakasam, Ambika Hegde, Brent Lagesse
:
Enabling Crowd Sensing for Non-Experts. PerCom Workshops 2018: 442-444 - 2017
- [j3]Aboubakr Benabbas
, Golnaz Elmamooz
, Brent Lagesse, Daniela Nicklas
, Ute Schmid
:
Living Lab Bamberg: an infrastructure to explore smart city research challenges in the wild. Künstliche Intell. 31(3): 265-271 (2017) - [c15]Cody Burkard, Brent Lagesse
:
Analysis of Causative Attacks against SVMs Learning from Data Streams. IWSPA@CODASPY 2017: 31-36 - [c14]Gautam Kumar, Brent Lagesse:
Limited Use Cryptographic Tokens in Securing Ephemeral Cloud Servers. ICISSP 2017: 447-454 - [c13]Ruth M. Ogunnaike, Brent Lagesse
:
Toward consumer-friendly security in smart environments. PerCom Workshops 2017: 612-617 - 2016
- [j2]Eleonora Borgia
, Danielo G. Gomes
, Brent Lagesse
, Rodger Lea, Daniele Puccinelli:
Special issue on "Internet of Things: Research challenges and Solutions". Comput. Commun. 89-90: 1-4 (2016) - [c12]Brent Lagesse
, Cody Burkard, Julio Perez:
Securing pervasive systems against adversarial machine learning. PerCom Workshops 2016: 1-4 - 2012
- [j1]Brent Lagesse
:
Analytical evaluation of P2P reputation systems. Int. J. Commun. Networks Distributed Syst. 9(1/2): 82-96 (2012) - 2011
- [c11]James Horey, Brent Lagesse
:
Latency Minimizing Tasking for Information Processing Systems. ICDM Workshops 2011: 167-173 - [c10]Brent Lagesse
:
Challenges in securing the interface between the cloud and pervasive systems. PerCom Workshops 2011: 106-110 - [c9]Craig A. Shue, Brent Lagesse
:
Embracing the cloud for better cyber security. PerCom Workshops 2011: 245-250 - 2010
- [c8]Brent Lagesse
, Mohan Kumar, Svetha Venkatesh
, Mihai M. Lazarescu
:
Augmenting trust establishment in dynamic systems with social networks. CSIIRW 2010: 72 - [c7]Brent Lagesse
, Mohan Kumar, Matthew K. Wright
:
ReSCo: A middleware component for Reliable Service Composition in pervasive systems. PerCom Workshops 2010: 486-491 - [c6]Brent Lagesse:
Privacy Challenges for Wireless Medical Devices. HealthSec 2010 - [e1]Ehab Al-Shaer, Brent Lagesse, Craig A. Shue:
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010. ACM 2010, ISBN 978-1-4503-0092-6 [contents]
2000 – 2009
- 2009
- [c5]Brent Lagesse
:
Trust and Security in Dynamic Systems. PerCom 2009: 1-2 - [c4]Brent Lagesse
, Mohan Kumar, Justin Mazzola Paluska, Matthew K. Wright
:
DTT: A Distributed Trust Toolkit for Pervasive Systems. PerCom 2009: 1-8 - 2008
- [c3]Brent Lagesse
, Mohan Kumar, Matthew K. Wright
:
AREX: An Adaptive System for Secure Resource Access in Mobile P2P Systems. Peer-to-Peer Computing 2008: 43-52 - [c2]Brent Lagesse
, Mohan Kumar:
A Novel Utility and Game-Theoretic Based Security Mechanism for Mobile P2P Systems. PerCom 2008: 486-491 - 2007
- [c1]Brent Lagesse
, Mohan Kumar:
UBCA: Utility-Based Clustering Architecture for Peer-to-Peer Systems. ICDCS Workshops 2007: 10
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint