Follow
Logan Blue
Logan Blue
Research Scientist, Harbor Labs
Verified email at ufl.edu - Homepage
Title
Cited by
Cited by
Year
Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications
B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017
211*2017
Identity and content authentication for phone calls
PG Traynor, BG Reaves, LE Blue, L Vargas, H Abdullah, T Shrimpton
US Patent 10,764,043, 2020
1692020
Hear" no evil", see" kenansville": Efficient and transferable black-box attacks on speech recognition and voice identification systems
H Abdullah, MS Rahman, W Garcia, K Warren, AS Yadav, T Shrimpton, ...
2021 IEEE Symposium on Security and Privacy (SP), 712-729, 2021
1052021
Hello, is it me you're looking for? differentiating between human and electronic speakers for voice interface security
L Blue, L Vargas, P Traynor
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and …, 2018
802018
Sending out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways
B Reaves, N Scaife, D Tian, L Blue, P Traynor, KRB Butler
2016 IEEE Symposium on Security and Privacy (SP), 339-356, 2016
692016
2ma: Verifying voice commands via two microphone authentication
L Blue, H Abdullah, L Vargas, P Traynor
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
522018
{AuthentiCall}: Efficient Identity and Content Authentication for Phone Calls
B Reaves, L Blue, H Abdullah, L Vargas, P Traynor, T Shrimpton
26th USENIX Security Symposium (USENIX Security 17), 575-592, 2017
452017
Detecting SMS spam in the age of legitimate bulk messaging
B Reaves, L Blue, D Tian, P Traynor, KRB Butler
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
332016
Who are you (i really wanna know)? detecting audio {DeepFakes} through vocal tract reconstruction
L Blue, K Warren, H Abdullah, C Gibson, L Vargas, J O'Dell, K Butler, ...
31st USENIX Security Symposium (USENIX Security 22), 2691-2708, 2022
302022
Characterizing the security of the SMS ecosystem with public gateways
B Reaves, L Vargas, N Scaife, D Tian, L Blue, P Traynor, KRB Butler
ACM Transactions on Privacy and Security (TOPS) 22 (1), 1-31, 2018
152018
Digital Healthcare-Associated Infection: A Case Study on the Security of a Major Multi-Campus Hospital System.
L Vargas, L Blue, V Frost, C Patton, N Scaife, KRB Butler, P Traynor
NDSS, 2019
62019
Attacks as defenses: Designing robust audio captchas using attacks on automatic speech recognition systems
H Abdullah, A Karlekar, S Prasad, MS Rahman, L Blue, LA Bauer, ...
arXiv preprint arXiv:2203.05408, 2022
52022
Method and apparatus for differentiating between human and electronic speaker for voice interface security
PG Traynor, LE Blue, L Vargas
US Patent 11,176,960, 2021
32021
Lux: Enabling ephemeral authorization for display-limited IoT devices
L Blue, S Marchal, P Traynor, N Asokan
Proceedings of the International Conference on Internet-of-Things Design and …, 2021
12021
Detecting deep-fake audio through vocal tract reconstruction
PG Traynor, K Butler, LE Blue, L Vargas, KS Warren, H Abdullah, ...
US Patent 11,694,694, 2023
2023
Identifying Different Audio Sources Through Fluid Dynamic and Acoustic Evaluation of Their Source Mechanics
L Blue
University of Florida, 2023
2023
Practical end-to-end cryptographic authentication for telephony over voice channels
PG Traynor, BG Reaves, LE Blue
US Patent 11,329,831, 2022
2022
Poster: AuthentiCall: Efficient Identity and Content Authentication for Phone Calls
B Reaves, L Blue, H Abdullah, L Vargas, P Traynor, T Shrimpton
2017
The system can't perform the operation now. Try again later.
Articles 1–18