Skip to main content

Showing 1–10 of 10 results for author: Wijewickrama, R

.
  1. arXiv:2504.20340  [pdf, other

    cs.AI cs.CV cs.HC

    A Picture is Worth a Thousand Prompts? Efficacy of Iterative Human-Driven Prompt Refinement in Image Regeneration Tasks

    Authors: Khoi Trinh, Scott Seidenberger, Raveen Wijewickrama, Murtuza Jadliwala, Anindya Maiti

    Abstract: With AI-generated content becoming ubiquitous across the web, social media, and other digital platforms, it is vital to examine how such content are inspired and generated. The creation of AI-generated images often involves refining the input prompt iteratively to achieve desired visual outcomes. This study focuses on the relatively underexplored concept of image regeneration using AI, in which a… ▽ More

    Submitted 28 April, 2025; originally announced April 2025.

  2. arXiv:2501.06177  [pdf, other

    cs.ET cs.CY cs.HC

    ScooterLab: A Programmable and Participatory Sensing Research Testbed using Micromobility Vehicles

    Authors: Ubaidullah Khan, Raveen Wijewickrama, Buddhi Ashan M. K., A. H. M. Nazmus Sakib, Khoi Trinh, Christina Duthie, Nima Najafian, Ahmer Patel, R. N. Molina, Anindya Maiti, Sushil K. Prasad, Greg P. Griffin, Murtuza Jadliwala

    Abstract: Micromobility vehicles, such as e-scooters, are increasingly popular in urban communities but present significant challenges in terms of road safety, user privacy, infrastructure planning, and civil engineering. Addressing these critical issues requires a large-scale and easily accessible research infrastructure to collect diverse mobility and contextual data from micromobility users in realistic… ▽ More

    Submitted 10 January, 2025; originally announced January 2025.

  3. arXiv:2411.02805  [pdf, other

    cs.CR cs.NI

    NinjaDoH: A Censorship-Resistant Moving Target DoH Server Using Hyperscalers and IPNS

    Authors: Scott Seidenberger, Marc Beret, Raveen Wijewickrama, Murtuza Jadliwala, Anindya Maiti

    Abstract: We introduce NinjaDoH, a novel DNS over HTTPS (DoH) protocol that leverages the InterPlanetary Name System (IPNS), along with public cloud infrastructure, to create a censorship-resistant moving target DoH service. NinjaDoH is specifically designed to evade traditional censorship methods that involve blocking DoH servers by IP addresses or domains by continually altering the server's network ident… ▽ More

    Submitted 4 November, 2024; originally announced November 2024.

  4. arXiv:2410.08406  [pdf, other

    cs.HC cs.AI

    Promptly Yours? A Human Subject Study on Prompt Inference in AI-Generated Art

    Authors: Khoi Trinh, Joseph Spracklen, Raveen Wijewickrama, Bimal Viswanath, Murtuza Jadliwala, Anindya Maiti

    Abstract: The emerging field of AI-generated art has witnessed the rise of prompt marketplaces, where creators can purchase, sell, or share prompts for generating unique artworks. These marketplaces often assert ownership over prompts, claiming them as intellectual property. This paper investigates whether concealed prompts sold on prompt marketplaces can be considered as secure intellectual property, given… ▽ More

    Submitted 10 October, 2024; originally announced October 2024.

  5. arXiv:2406.10279  [pdf, other

    cs.SE cs.AI cs.CR cs.LG

    We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs

    Authors: Joseph Spracklen, Raveen Wijewickrama, A H M Nazmus Sakib, Anindya Maiti, Bimal Viswanath, Murtuza Jadliwala

    Abstract: The reliance of popular programming languages such as Python and JavaScript on centralized package repositories and open-source software, combined with the emergence of code-generating Large Language Models (LLMs), has created a new type of threat to the software supply chain: package hallucinations. These hallucinations, which arise from fact-conflicting errors when generating code using LLMs, re… ▽ More

    Submitted 2 March, 2025; v1 submitted 11 June, 2024; originally announced June 2024.

    Comments: To appear in the 2025 USENIX Security Symposium. 22 pages, 14 figures, 8 tables. Edited from original version for submission to a different conference. No change to original results or findings

  6. arXiv:2311.02288  [pdf, other

    cs.CR cs.HC cs.SD eess.AS

    OverHear: Headphone based Multi-sensor Keystroke Inference

    Authors: Raveen Wijewickrama, Maryam Abbasihafshejani, Anindya Maiti, Murtuza Jadliwala

    Abstract: Headphones, traditionally limited to audio playback, have evolved to integrate sensors like high-definition microphones and accelerometers. While these advancements enhance user experience, they also introduce potential eavesdropping vulnerabilities, with keystroke inference being our concern in this work. To validate this threat, we developed OverHear, a keystroke inference framework that leverag… ▽ More

    Submitted 3 November, 2023; originally announced November 2023.

  7. arXiv:2307.08550  [pdf, other

    cs.CR

    TorMult: Introducing a Novel Tor Bandwidth Inflation Attack

    Authors: Christoph Sendner, Jasper Stang, Alexandra Dmitrienko, Raveen Wijewickrama, Murtuza Jadliwala

    Abstract: The Tor network is the most prominent system for providing anonymous communication to web users, with a daily user base of 2 million users. However, since its inception, it has been constantly targeted by various traffic fingerprinting and correlation attacks aiming at deanonymizing its users. A critical requirement for these attacks is to attract as much user traffic to adversarial relays as poss… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

  8. SkinSense: Efficient Vibration-based Communications Over Human Body Using Motion Sensors

    Authors: Raveen Wijewickrama, Sameer Anis Dohadwalla, Anindya Maiti, Murtuza Jadliwala, Sashank Narain

    Abstract: Recent growth in popularity of mobile and wearable devices has re-ignited the need for reliable and stealthy communication side-channels to enable applications such as secret/PIN sharing, co-location proofs and user authentication. Existing short-range wireless radio technology such as Bluetooth/BLE and NFC, although mature and robust, is prone to eavesdropping, jamming and/or interference, and is… ▽ More

    Submitted 7 February, 2023; originally announced March 2023.

  9. arXiv:2001.01387  [pdf, other

    cs.CR

    Security and Privacy Challenges in Upcoming Intelligent Urban Micromobility Transportation Systems

    Authors: Nisha Vinayaga-Sureshkanth, Raveen Wijewickrama, Anindya Maiti, Murtuza Jadliwala

    Abstract: Micromobility vehicles are gaining popularity due to their portable nature, and their ability to serve short distance urban commutes better than traditional modes of transportation. Most of these vehicles, offered by various micromobility service providers around the world, are shareable and can be rented (by-the-minute) by riders, thus eliminating the need of owning and maintaining a personal veh… ▽ More

    Submitted 5 January, 2020; originally announced January 2020.

  10. arXiv:1908.05846  [pdf, other

    cs.CY

    Impact of E-Scooters on Pedestrian Safety: A Field Study Using Pedestrian Crowd-Sensing

    Authors: Anindya Maiti, Nisha Vinayaga-Sureshkanth, Murtuza Jadliwala, Raveen Wijewickrama, Greg P. Griffin

    Abstract: The popularity and proliferation of electric scooters (e-scooters) as a micromobility solution in our cities and urban communities has been rapidly rising. Rent-by-the-minute pricing and a healthy competition between micromobility service providers is also benefiting riders with low trip costs. However, an unprepared urban infrastructure, combined with uncertain operation policies and poor regulat… ▽ More

    Submitted 22 July, 2020; v1 submitted 16 August, 2019; originally announced August 2019.