Sitemap

A list of all the posts and pages found on the site. For you robots out there, there is an XML version available for digesting as well.

Pages

Posts

Future Blog Post

less than 1 minute read

Published:

This post will show up by default. To disable scheduling of future posts, edit config.yml and set future: false.

Blog Post number 4

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 3

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 2

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 1

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

portfolio

Ciphercraft

This library is an open-source java library that allows for secure multi-party computation, and is flexible for various uses such as indoor localization, drone collision avoidance and decision tree evaluation.

publications

Server-side Fingerprint-Based Indoor Localization Using Encrypted Sorting

Published in IEEE Mobile Ad Hoc and Sensor Systems (MASS), 2019

This paper is about secure indoor localization using homomorphic encryption. We compare an approach of sorting encrypted numbers at the server compared to decrypting at the client phone. While decrypting at the server is slower, it does save some battery for the client

Recommended citation: Quijano, Andrew, and Kemal Akkaya. "Server-side fingerprint-based indoor localization using encrypted sorting." 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems Workshops (MASSW). IEEE, 2019.
Download Paper | Download Slides | Download Bibtex

Maximum Covering Subtrees for Phylogenetic Networks

Published in IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB), 2020

This paper solved an open question about the minimum number of nodes to remove from a phylogenetic network N to make it tree-based.

Recommended citation: Davidov, Nathan, et al. "Maximum covering subtrees for phylogenetic networks." IEEE/ACM Transactions on Computational Biology and Bioinformatics 18.6 (2020): 2823-2827.
Download Paper | Download Bibtex

Out of Our Depth with Deep Fakes: How the Law Fails Victims of Deep Fake Nonconsensual Pornography

Published in Richmond Journal of Law and Technology, 2021

This paper discusses deep fake nonconsensual pornography, and the need for Section 230 revision as copyright law would not provide sufficient protection to victims

Recommended citation: Kobriger, Kate, et al. "Out of our depth with deep fakes: How the law fails victims of deep fake nonconsensual pornography." Rich. JL & Tech. 28 (2021): 204.
Download Paper | Download Slides | Download Bibtex

Privacy-Preserving Drone Navigation Through Homomorphic Encryption for Collision Avoidance

Published in IEEE Local Computer Networks (LCN), 2024

This paper implements the line intersection algorithm using partially Homomorphic encryption. This approach leads to much faster performance and maintain privacy of the paths of two drones.

Recommended citation: Luedeman, Allan, et al. "Privacy-Preserving Drone Navigation Through Homomorphic Encryption for Collision Avoidance." 2024 IEEE 49th Conference on Local Computer Networks (LCN). IEEE, 2024.
Download Paper | Download Slides | Download Bibtex

Enhanced Outsourced and Secure Inference for Tall Sparse Decision Trees

Published in IEEE - International Performance Computing and Communications Conference (IPCCC), 2024

This paper is about implementing a privacy-preserving decision tree, but in the case of tall sparse decision trees. To improve performance, we minimize number of encrypted integer comparisons while also generally preserving timing attack resistance

Recommended citation: Quijano, Andrew, et al. "Enhanced Outsourced and Secure Inference for Tall Sparse Decision Trees." 2024 IEEE International Performance, Computing, and Communications Conference (IPCCC). IEEE, 2024.
Download Paper | Download Slides | Download Bibtex

Reap the Rewards: Bridging Risk Assessment and Secure Application Development Practices

Published in ACM Computer and Communications Security (CCS), 2025

This paper leverages using Model Based Systems Engineering (MBSE) to create a more systematic approach to measuring cyber risk. This also goes over the creation of an MBSE plug-in, Risk Evaluation Assessment Plugin (REAP), which can help simulate cyber risk and RTO/RPO compliance

Recommended citation: Quijano et al. "REAP the Rewards: Bridging Risk Assessment and Secure Application Development Practices" ACM Computer and Communication Security (2025)
Download Paper | Download Bibtex

talks

teaching

Columbia University - all course assistant experience

Class, Columbia University, Computer Science, 2019

This post will go over my experience as a course assistant at Columbia University from Fall 2018 to Fall 2021, this post will go over my experience as a course assistant at Columbia University.

Application Security - New York University

Class, New York University, Computer Science and Engineering, 2023

I was an Adjunct Professor for the Cyberfellows Application Security course for the following semesters: Spring 2023, Fall 2023, Spring 2024.