Personal information

United States

Biography

Matthew Wright, PhD, is a Professor and Chair of Cybersecurity at Rochester Institute of Technology (RIT). Dr. Wright earned his PhD in Computer Science at UMass Amherst in 2005 and previously worked as a faculty member in Computer Science and Engineering at the University of Texas at Arlington from 2005-2016. He is the winner of a NSF CAREER Award.

Activities

Employment (3)

Rochester Institute of Technology: Rochester, NY, US

2022-07-01 to present | Professor and Chair (Cybersecurity)
Employment
Source: Self-asserted source
Matthew Wright

Rochester Institute of Technology: Rochester, NY, US

2016-08-01 to 2022-06-30 | Professor and Director (Computing Security)
Employment
Source: Self-asserted source
Matthew Wright

University of Texas at Arlington: Arlington, TX, US

2005-01-01 to 2016-05-31 | Associate Professor (Computer Science and Engineering)
Employment
Source: Self-asserted source
Matthew Wright

Education and qualifications (2)

University of Massachusetts Amherst: Amherst, MA, US

1999-09-01 to 2005-05-01 | PhD in Computer Science (Computer Science)
Education
Source: Self-asserted source
Matthew Wright

Harvey Mudd College: Claremont, CA, US

1995-08-20 to 1999-05-01 | BS in Computer Science (Computer Science)
Education
Source: Self-asserted source
Matthew Wright

Works (50 of 102)

Items per page:
Page 1 of 3

DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification

Proceedings - IEEE Symposium on Security and Privacy
2022 | Conference paper
EID:

2-s2.0-85135956900

Part of ISSN: 10816011
Contributors: Oh, S.E.; Yang, T.; Mathews, N.; Holland, J.K.; Rahman, M.S.; Hopper, N.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Distributed detection of replica node attacks

Distributed Sensor Networks: Sensor Networking and Applications
2022 | Book chapter
EID:

2-s2.0-85137028894

Contributors: Ho, J.-W.; Liu, D.; Wright, M.; Das, S.K.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Evaluating Robustness of Sequence-based Deepfake Detector Models by Adversarial Perturbation

WDC 2022 - Proceedings of the 1st Workshop on Security Implications of Deepfakes and Cheapfakes
2022 | Conference paper
EID:

2-s2.0-85134424866

Contributors: Shahriyar, S.A.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

On improving the memorability of system-assigned recognition-based passwords

Behaviour and Information Technology
2022 | Journal article
EID:

2-s2.0-85097414588

Part of ISSN: 13623001 0144929X
Contributors: Al-Ameen, M.N.; Marne, S.T.; Fatema, K.; Wright, M.; Scielzo, S.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

ON THE LIMITATIONS OF CONTINUAL LEARNING FOR MALWARE CLASSIFICATION

arXiv
2022 | Other
EID:

2-s2.0-85136172502

Part of ISSN: 23318422
Contributors: Rahman, M.S.; Wright, M.; Coull, S.E.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

A first look into users’ perceptions of facial recognition in the physical world

Computers and Security
2021 | Journal article
EID:

2-s2.0-85102263576

Part of ISSN: 01674048
Contributors: Seng, S.; Al-Ameen, M.N.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

A look into user privacy andthird-party applications in Facebook

Information and Computer Security
2021 | Journal article
EID:

2-s2.0-85111052131

Part of ISSN: 2056497X 20564961
Contributors: Seng, S.; Al-Ameen, M.N.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Gradient Frequency Modulation for Visually Explaining Video Understanding Models

arXiv
2021 | Other
EID:

2-s2.0-85122368189

Part of ISSN: 23318422
Contributors: Lin, X.; Bao, W.; Wright, M.; Kong, Y.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Locimotion: Towards learning a strong authentication secret in a single session

Conference on Human Factors in Computing Systems - Proceedings
2021 | Conference paper
EID:

2-s2.0-85106695486

Contributors: Doolani, J.; Wright, M.; Setty, R.; Haque, S.M.T.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Mockingbird: Defending against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces

IEEE Transactions on Information Forensics and Security
2021 | Journal article
EID:

2-s2.0-85096861702

Part of ISSN: 15566021 15566013
Contributors: Rahman, M.S.; Imani, M.; Mathews, N.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

What a SHAME: Smart Assistant Voice Command Fingerprinting Utilizing Deep Learning

WPES 2021 - Proceedings of the 20th Workshop on Privacy in the Electronic Society, co-located with CCS 2021
2021 | Conference paper
EID:

2-s2.0-85120533987

Contributors: Hyland, J.; Schneggenburger, C.; Lim, N.; Ruud, J.; Mathews, N.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

A Forensically Sound Method of Identifying Downloaders and Uploaders in Freenet

Proceedings of the ACM Conference on Computer and Communications Security
2020 | Conference paper
EID:

2-s2.0-85096156965

Part of ISSN: 15437221
Contributors: Levine, B.N.; Liberatore, M.; Lynn, B.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Detecting adversarial patches with class conditional reconstruction networks

arXiv
2020 | Other
EID:

2-s2.0-85098809897

Part of ISSN: 23318422
Contributors: Deng, P.; Rahman, M.S.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Leveraging edges and optical flow on faces for deepfake detection

IJCB 2020 - IEEE/IAPR International Joint Conference on Biometrics
2020 | Conference paper
EID:

2-s2.0-85099709951

Contributors: Chintha, A.; Rao, A.; Sohrawardi, S.; Bhatt, K.; Wright, M.; Ptucha, R.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Recurrent Convolutional Structures for Audio Spoof and Video Deepfake Detection

IEEE Journal on Selected Topics in Signal Processing
2020 | Journal article
EID:

2-s2.0-85090432090

Part of ISSN: 19410484 19324553
Contributors: Chintha, A.; Thai, B.; Sohrawardi, S.J.; Bhatt, K.; Hickerson, A.; Wright, M.; Ptucha, R.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

They might not be giants crafting black-box adversarial examples using particle swarm optimization

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2020 | Book
EID:

2-s2.0-85091568181

Part of ISSN: 16113349 03029743
Contributors: Mosli, R.; Wright, M.; Yuan, B.; Pan, Y.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Weaponizing unicodes with deep learning - identifying homoglyphs with weakly labeled data

arXiv
2020 | Other
EID:

2-s2.0-85098434949

Part of ISSN: 23318422
Contributors: Deng, P.; Linsky, C.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Weaponizing Unicodes with Deep Learning -Identifying Homoglyphs with Weakly Labeled Data

Proceedings - 2020 IEEE International Conference on Intelligence and Security Informatics, ISI 2020
2020 | Conference paper
EID:

2-s2.0-85098953642

Contributors: Deng, P.; Linsky, C.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Mockingbird: Defending against deep-learning-basedwebsite fingerprinting attacks with adversarial traces

arXiv
2019 | Other
EID:

2-s2.0-85093639647

Part of ISSN: 23318422
Contributors: Imani, M.; Rahman, M.S.; Mathews, N.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Modified relay selection and circuit selection for faster Tor

IET Communications
2019 | Journal article
EID:

2-s2.0-85073740617

Part of ISSN: 17518628
Contributors: Imani, M.; Amirabadi, M.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Poster: Evaluating security metrics for website fingerprinting

Proceedings of the ACM Conference on Computer and Communications Security
2019 | Conference paper
EID:

2-s2.0-85075940314

Part of ISSN: 15437221
Contributors: Mathews, N.; Rahman, M.S.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Poster: Towards robust open-world detection of deepfakes

Proceedings of the ACM Conference on Computer and Communications Security
2019 | Conference paper
EID:

2-s2.0-85075930822

Part of ISSN: 15437221
Contributors: Sohrawardi, S.J.; Seng, S.; Chintha, A.; Hickerson, A.; Wright, M.; Thai, B.; Ptucha, R.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Poster: Understanding user's decision to interact with potential phishing posts on facebook using a vignette study

Proceedings of the ACM Conference on Computer and Communications Security
2019 | Conference paper
EID:

2-s2.0-85075929991

Part of ISSN: 15437221
Contributors: Seng, S.; Al-Ameen, M.N.; Kocabas, H.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Poster: Video fingerprinting in tor

Proceedings of the ACM Conference on Computer and Communications Security
2019 | Conference paper
EID:

2-s2.0-85075929834

Part of ISSN: 15437221
Contributors: Rahman, M.S.; Mathews, N.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

The impact of cues and user interaction on the memorability of system-assigned recognition-based graphical passwords

SOUPS 2015 - Proceedings of the 11th Symposium on Usable Privacy and Security
2019 | Conference paper
EID:

2-s2.0-85075912801

Contributors: Al-Ameen, M.N.; Fatema, K.; Wright, M.; Scielzo, S.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

They might not be giants crafting black-box adversarial examples with fewer queries using particle swarm optimization

arXiv
2019 | Other
EID:

2-s2.0-85094732347

Part of ISSN: 23318422
Contributors: Mosli, R.; Wright, M.; Yuan, B.; Pan, Y.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Tik-Tok: The utility of packet timing in website fingerprinting attacks

arXiv
2019 | Other
EID:

2-s2.0-85093795009

Part of ISSN: 23318422
Contributors: Rahman, M.S.; Sirinam, P.; Mathews, N.; Gangadhara, K.G.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Triplet fingerprinting: More practical and portable website fingerprinting with N-shot learning

Proceedings of the ACM Conference on Computer and Communications Security
2019 | Conference paper
EID:

2-s2.0-85075933109

Part of ISSN: 15437221
Contributors: Sirinam, P.; Rahman, M.S.; Mathews, N.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Deep fingerprinting: Undermining website fingerprinting defenses with deep learning

arXiv
2018 | Other
EID:

2-s2.0-85092871654

Part of ISSN: 23318422
Contributors: Sirinam, P.; Imani, M.; Juarez, M.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Deep fingerprinting: Undermining website fingerprinting defenses with deep learning

Proceedings of the ACM Conference on Computer and Communications Security
2018 | Conference paper
EID:

2-s2.0-85056817554

Part of ISSN: 15437221
Contributors: Sirinam, P.; Juarez, M.; Imani, M.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

POSTER: Adversarial Traces for Website Fingerprinting Defense

Proceedings of the ACM Conference on Computer and Communications Security
2018 | Conference paper
EID:

2-s2.0-85091968538

Part of ISSN: 15437221
Contributors: Imani, M.; Rahman, M.S.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Towards predicting efficient and anonymous tor circuits

arXiv
2018 | Other
EID:

2-s2.0-85094990448

Part of ISSN: 23318422
Contributors: Barton, A.; Imani, M.; Ming, J.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Towards predicting efficient and anonymous tor circuits

Proceedings of the 27th USENIX Security Symposium
2018 | Conference paper
EID:

2-s2.0-85076275560

Contributors: Barton, A.; Imani, M.; Ming, J.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Understanding feature discovery in website fingerprinting attacks

2018 IEEE Western New York Image and Signal Processing Workshop, WNYISPW 2018
2018 | Conference paper
EID:

2-s2.0-85060281227

Contributors: Mathews, N.; Sirinam, P.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Distributed detection of sensor worms using sequential analysis and remote software attestations

IEEE Access
2017 | Journal article
EID:

2-s2.0-85018478695

Contributors: Ho, J.-W.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Exploring the Potential of GeoPass: A Geographic Location-Password Scheme

Interacting with Computers
2017 | Journal article
EID:

2-s2.0-85021786104

Contributors: Al-Ameen, M.N.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Forming Guard Sets using AS Relationships

arXiv
2017 | Other
EID:

2-s2.0-85092849005

Part of ISSN: 23318422
Contributors: Imani, M.; Barton, A.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

LiLAC: Lightweight Low-Latency Anonymous Chat

Proceedings - 2017 IEEE Symposium on Privacy-Aware Computing, PAC 2017
2017 | Conference paper
EID:

2-s2.0-85046531610

Contributors: Podolanko, J.P.; Pobala, R.; Mucklai, H.; Danezis, G.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Statistical detection of downloaders in freenet

CEUR Workshop Proceedings
2017 | Conference paper
EID:

2-s2.0-85027877714

Contributors: Levine, B.N.; Liberatore, M.; Lynn, B.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

The evaluation of circuit selection methods on Tor

arXiv
2017 | Other
EID:

2-s2.0-85092829260

Part of ISSN: 23318422
Contributors: Imani, M.; Amirabadi, M.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Distributed Detection of Replica Node Attacks

Distributed Sensor Networks: Second Edition: Sensor Networking and Applications
2016 | Book chapter
Part of DOI: 10.1201/b12988-29
EID:

2-s2.0-85135662773

Contributors: Ho, J.-W.; Liu, D.; Wright, M.; Das, S.K.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

IPersea: Towards improving the Sybil-resilience of social DHT

Journal of Network and Computer Applications
2016 | Journal article
EID:

2-s2.0-84973174691

Contributors: Al-Ameen, M.N.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Leveraging autobiographical memory for two-factor online authentication

Information and Computer Security
2016 | Journal article
EID:

2-s2.0-84992223432

Contributors: Al-Ameen, M.N.; Haque, S.M.T.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

POSTER: Phishing website detection with a multiphase framework to find visual similarity

Proceedings of the ACM Conference on Computer and Communications Security
2016 | Conference paper
EID:

2-s2.0-84995480633

Contributors: Asudeh, O.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Split-pipeline model for worm propagation over IoT

ACM International Conference Proceeding Series
2016 | Conference paper
EID:

2-s2.0-85000982025

Contributors: Choi, M.; Jang, J.; Kwon, Y.; Lim, S.; Ho, J.-W.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Toward an efficient website fingerprinting defense

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2016 | Book
EID:

2-s2.0-84990055867

Contributors: Juarez, M.; Imani, M.; Perry, M.; Diaz, C.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Exploiting temporal dynamics in Sybil defenses

Proceedings of the ACM Conference on Computer and Communications Security
2015 | Conference paper
EID:

2-s2.0-84954131005

Contributors: Liu, C.; Gao, P.; Wright, M.; Mittal, P.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Leveraging real-life facts to make random passwords more memorable

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2015 | Book
EID:

2-s2.0-84951738324

Contributors: Al-Ameen, M.N.; Fatema, K.; Wright, M.; Scielzo, S.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Towards making random passwords memorable: Leveraging users' cognitive ability through multiple cues

Conference on Human Factors in Computing Systems - Proceedings
2015 | Conference paper
EID:

2-s2.0-84951082067

Contributors: Al-Ameen, M.N.; Wright, M.; Scielzo, S.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier

Design and evaluation of persea, a sybil-resistant DHT

ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security
2014 | Conference paper
EID:

2-s2.0-84984923530

Contributors: Al-Ameen, M.N.; Wright, M.
Source: Self-asserted source
Matthew Wright via Scopus - Elsevier
Items per page:
Page 1 of 3