About Me

I am a 5th year PhD candidate in the Department of Computer Information Science and Engineering (CISE) at the University of Florida (UF) and a research assistant in the Florida Institute for Cybersecurity (FICS) research lab. I am advised by Patrick Traynor. I earned a BS in mathematics and BS in computer science from Fort Valley State University (FVSU) and an MS in computer science from North Carolina A & T State University. In 2015, I was named a GEM Fellowship Scholar.

My research focus is digital finance privacy and security.


Google Scholar



Scaife, N., Bowers, J., Peeters, C., Hernandez, G., Sherman, I., Traynor, P., and Anthony, L.(2019) Kiss from a Rogue: Evaluating Detectability of Pay-at-the-Pump Card Skimmers, Proceedings of the 2019 IEEE Symposium on Security and Privacy (IEEE S&P 2019). [.pdf]

Bowers, J., Sherman, I., Butler, R., and Traynor, P.(2019) Characterizing Security and Privacy Practices in Emerging Digital Credit Applications, Proceedings of the 12th ACM Conference on Securty and Privacy in Wireless and Mobile Networks (ACM WiSec 2019). [.pdf]

Peeters, C., Abdullah, H., Scaife, N., Bowers, J., Traynor, P., Reaves, B. and Butler, K.(2018) Sonar: Detecting SS7 Redirection Attacks Via Call Audio-Based Distance Bounding, Proceedings of the IEEE Symposium on Security and Privacy (IEEE S&P 2018). [.pdf]

Traynor, P., Butler, K., Bowers, J., and Reaves, B.(2017) FinTechSec: Addressing the Security Challenges of Digital Financial Services IEEE Security & Privacy. [.pdf]

Reaves, B., Bowers, J., Scaife, N., Bates, A., Bhartiya, A., Traynor, P. and Butler, K. (2017) Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications. ACM Transactions on Privacy and Security (ACM TOPS 2017). [.pdf]

Bowers, J., Reaves, B., Sherman, I., Traynor, P. and Butler, K. (2017) Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services. Proceedings of the Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). [.pdf]

Reaves, B., Bowers, J. D., Gorski III, S. A., Anise, O., Bobhate, R., Cho, R., Das, H.,...Traynor, P. (2016) *droid: Assessment and Evaluation of Android Application Analysis Tools. ACM Computing Surveys. [.pdf]

Nathan Mack, Jasmine Bowers, Henry Williams, Gerry Dozier, and Joseph Shelton, "The Best Way to a Strong Defense is a Strong Offense: Mitigating Deanonymization Attacks via Iterative Language Translation," International Journal of Machine Learning and Computing vol.5, no. 5, pp. 409-413, 2015. [.pdf]

Bowers, J. D. (2015) Mitigating Deanonymization Attacks via Iterative Language Translation for Social Networks (Master's Thesis). Retrieved from ProQuest Dissertations and Theses. (Accession Order No. 1591467) [.pdf]


Currently, I serve as a University of Florida McNair Scholars mentor.

In 2017, I served as a summer Distributed Research Experiences for Undergraduates (DREU) mentor to Joshua Uduehi. [summer recap]

In 2014, I served as a STARS Computing Corps mentor to Madison McCotter.

Contact Me