


Остановите войну!
for scientists:
Mohamed Ali Kâafar
Dali Kaafar
Person information

- affiliation: Macquarie University, Faculty of Science and Engineering, Australia
- affiliation: CSIRO Data61, Sydney, Australia
- affiliation: NICTA, Australia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j36]Zhigang Lu, Hassan Jameel Asghar, Mohamed Ali Kâafar, Darren Webb, Peter Dickinson:
A Differentially Private Framework for Deep Learning With Convexified Loss Functions. IEEE Trans. Inf. Forensics Secur. 17: 2151-2165 (2022) - [c106]Nardine Basta, Muhammad Ikram, Mohamed Ali Kâafar, Andy Walker:
Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation Framework. NOMS 2022: 1-7 - [i72]Hina Qayyum, Benjamin Zi Hao Zhao, Ian D. Wood, Muhammad Ikram, Mohamed Ali Kâafar, Nicolas Kourtellis:
A deep dive into the consistently toxic 1% of Twitter. CoRR abs/2202.07853 (2022) - [i71]Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar, Roya Ensafi:
A Study of Third-party Resources Loading on Web. CoRR abs/2203.03077 (2022) - [i70]Nardine Basta, Ming Ding, Muhammad Ikram, Mohamed Ali Kâafar:
5G-Enabled Pseudonymity for Cooperative Intelligent Transportation System. CoRR abs/2203.10673 (2022) - [i69]Zhigang Lu, Hassan Jameel Asghar, Mohamed Ali Kâafar, Darren Webb, Peter Dickinson:
A Differentially Private Framework for Deep Learning with Convexified Loss Functions. CoRR abs/2204.01049 (2022) - [i68]Rahat Masood, Wing Yan Cheng, Dinusha Vatsalan, Deepak Mishra, Hassan Jameel Asghar, Mohamed Ali Kâafar:
Privacy Preserving Release of Mobile Sensor Data. CoRR abs/2205.06641 (2022) - [i67]Michal Kepkowski, Lucjan Hanzlik, Ian Wood, Mohamed Ali Kâafar:
How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy. CoRR abs/2205.08071 (2022) - 2021
- [j35]Gioacchino Tangari
, Muhammad Ikram
, I Wayan Budi Sentana, Kiran Ijaz
, Mohamed Ali Kâafar
, Shlomo Berkovsky
:
Analyzing security issues of android mobile health and medical applications. J. Am. Medical Informatics Assoc. 28(10): 2074-2084 (2021) - [j34]Yuantian Miao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Benjamin Zi Hao Zhao, Dali Kaafar, Yang Xiang:
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services. Proc. Priv. Enhancing Technol. 2021(1): 209-228 (2021) - [j33]Farhad Farokhi
, Nan Wu, David B. Smith
, Mohamed Ali Kâafar
:
The Cost of Privacy in Asynchronous Differentially-Private Machine Learning. IEEE Trans. Inf. Forensics Secur. 16: 2118-2129 (2021) - [c105]Marina Dehez-Clementi
, Jérôme Lacan, Jean-Christophe Deneuville, Hassan Asghar
, Dali Kaafar
:
A Blockchain-enabled Anonymous-yet- Traceable Distributed Key Generation. Blockchain 2021: 257-265 - [c104]Benjamin Zi Hao Zhao, Aviral Agrawal, Catisha Coburn, Hassan Jameel Asghar
, Raghav Bhaskar, Mohamed Ali Kâafar
, Darren Webb, Peter Dickinson:
On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models. EuroS&P 2021: 232-251 - [c103]Nazim Uddin Sheikh, Zhigang Lu, Hassan Asghar
, Mohamed Ali Kâafar
:
Trace Recovery: Inferring Fine-grained Trace of Energy Data from Aggregates. SECRYPT 2021: 283-294 - [c102]I Wayan Budi Sentana
, Muhammad Ikram
, Mohamed Ali Kâafar
, Shlomo Berkovsky
:
Empirical Security and Privacy Analysis of Mobile Symptom Checking Apps on Google Play. SECRYPT 2021: 665-673 - [c101]I Wayan Budi Sentana
, Muhammad Ikram
, Mohamed Ali Kâafar
:
BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-domain Routing via Blockchain. SECRYPT 2021: 674-679 - [i66]Zainab Abaid, Dilip Sarkar, Mohamed Ali Kâafar, Sanjay K. Jha:
All Infections are Not Created Equal: Time-Sensitive Prediction of Malware Generated Network Attacks. CoRR abs/2102.01944 (2021) - [i65]Benjamin Zi Hao Zhao, Aviral Agrawal, Catisha Coburn, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kâafar, Darren Webb, Peter Dickinson:
On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models. CoRR abs/2103.07101 (2021) - [i64]Tham Nguyen, Hassan Jameel Asghar, Raghav Bhaskar, Dali Kaafar, Farhad Farokhi:
Sharing in a Trustless World: Privacy-Preserving Data Analytics with Potentially Cheating Participants. CoRR abs/2106.09904 (2021) - [i63]I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar:
BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-Domain Routing Via Blockchain. CoRR abs/2107.07063 (2021) - [i62]I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar, Shlomo Berkovsky:
Empirical Security and Privacy Analysis of Mobile Symptom Checking Applications on Google Play. CoRR abs/2107.13754 (2021) - [i61]Nardine Basta, Muhammad Ikram, Mohamed Ali Kâafar, Andy Walker:
Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation Framework. CoRR abs/2111.10967 (2021) - 2020
- [j32]Hassan Jameel Asghar
, Ming Ding, Thierry Rakotoarivelo, Sirine Mrabet, Dali Kaafar
:
Differentially Private Release of Datasets using Gaussian Copula. J. Priv. Confidentiality 10(2) (2020) - [j31]Parameswaran Kamalaruban, Victor Perrier, Hassan Jameel Asghar, Mohamed Ali Kâafar:
Not All Attributes are Created Equal: dX -Private Mechanisms for Linear Queries. Proc. Priv. Enhancing Technol. 2020(1): 103-125 (2020) - [j30]Hassan Jameel Asghar, Dali Kaafar:
Averaging Attacks on Bounded Noise-based Disclosure Control Algorithms. Proc. Priv. Enhancing Technol. 2020(2): 358-378 (2020) - [j29]Muhammad Ikram
, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar
, Noha Loizon, Roya Ensafi:
Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading. ACM Trans. Priv. Secur. 23(2): 8:1-8:27 (2020) - [j28]Benjamin Zi Hao Zhao
, Hassan Jameel Asghar
, Mohamed Ali Kâafar
, Francesca Trevisan
, Haiyue Yuan
:
Exploiting Behavioral Side Channels in Observation Resilient Cognitive Authentication Schemes. ACM Trans. Priv. Secur. 24(1): 1:1-1:33 (2020) - [j27]Qing Yang
, Yiran Shen
, Dinusha Vatsalan
, Jianpei Zhang
, Mohamed Ali Kâafar
, Wen Hu:
P4Mobi: A Probabilistic Privacy-Preserving Framework for Publishing Mobility Datasets. IEEE Trans. Veh. Technol. 69(7): 6987-6999 (2020) - [c100]Benjamin Zi Hao Zhao, Mohamed Ali Kâafar
, Nicolas Kourtellis:
Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning. CCSW@CCS 2020: 15-26 - [c99]I Wayan Budi Sentana
, Muhammad Ikram
, Mohamed Ali Kâafar
:
BlockJack: Blocking IP Prefix Hijacker in Inter-Domain Routing. StudentWorkshop@CoNEXT 2020: 1-2 - [c98]Marina Dehez-Clementi
, Jean-Christophe Deneuville, Jérôme Lacan, Hassan Asghar
, Dali Kaafar
:
Who Let theDOGSOut: Anonymous but Auditable Communications Using Group Signature Schemes with Distributed Opening. DPM/CBT@ESORICS 2020: 437-446 - [c97]Maryam Shahpasand, Leonard G. C. Hamey
, Mohamed Ali Kâafar
, Dinusha Vatsalan
:
Feature-Based Adversarial Attacks Against Machine Learnt Mobile Malware Detectors. ITNAC 2020: 1-8 - [c96]Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar:
On the Resilience of Biometric Authentication Systems against Random Inputs. NDSS 2020 - [c95]Nan Wu, Farhad Farokhi
, David B. Smith, Mohamed Ali Kâafar
:
The Value of Collaboration in Convex Machine Learning with Differential Privacy. IEEE Symposium on Security and Privacy 2020: 304-317 - [p1]Arash Shaghaghi, Mohamed Ali Kâafar
, Rajkumar Buyya
, Sanjay Jha:
Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future Directions. Handbook of Computer Networks and Cyber Security 2020: 341-387 - [i60]Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar:
On the Resilience of Biometric Authentication Systems against Random Inputs. CoRR abs/2001.04056 (2020) - [i59]Farhad Farokhi, Mohamed Ali Kâafar:
Modelling and Quantifying Membership Information Leakage in Machine Learning. CoRR abs/2001.10648 (2020) - [i58]Shakila Mahjabin Tonni, Farhad Farokhi, Dinusha Vatsalan, Dali Kaafar:
Data and Model Dependencies of Membership Inference Attack. CoRR abs/2002.06856 (2020) - [i57]Farhad Farokhi, Mohamed Ali Kâafar:
Predicting Performance of Asynchronous Differentially-Private Learning. CoRR abs/2003.08500 (2020) - [i56]Mahmood Yousefi-Azar, Mohamed Ali Kâafar, Andy Walker:
Unsupervised Learning for security of Enterprise networks by micro-segmentation. CoRR abs/2003.11231 (2020) - [i55]Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar, Francesca Trevisan, Haiyue Yuan:
Exploiting Behavioral Side-Channels in Observation Resilient Cognitive Authentication Schemes. CoRR abs/2007.11210 (2020) - [i54]Benjamin Zi Hao Zhao, Mohamed Ali Kâafar, Nicolas Kourtellis:
Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning. CoRR abs/2008.08807 (2020) - [i53]Matthieu Monteiro, Kumara Kahatapitiya, Hassan Jameel Asghar, Kanchana Thilakarathna, Thierry Rakotoarivelo, Dali Kaafar, Shujun Li, Ron Steinfeld, Josef Pieprzyk:
Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices. IACR Cryptol. ePrint Arch. 2020: 261 (2020)
2010 – 2019
- 2019
- [j26]Hassan Jameel Asghar
, Emiliano De Cristofaro, Guillaume Jourjon, Mohamed Ali Kâafar
, Laurent Mathy, Luca Melis, Craig Russell, Mang Yu:
Fast privacy-preserving network function outsourcing. Comput. Networks 163 (2019) - [j25]Hailong Huang
, Andrey V. Savkin, Ming Ding, Mohamed Ali Kâafar
:
Optimized deployment of drone base station to improve user experience in cellular networks. J. Netw. Comput. Appl. 144: 49-58 (2019) - [j24]Fangzhou Jiang
, Kanchana Thilakarathna
, Sirine Mrabet, Mohamed Ali Kâafar
, Aruna Seneviratne:
uStash: A Novel Mobile Content Delivery System for Improving User QoE in Public Transport. IEEE Trans. Mob. Comput. 18(6): 1447-1460 (2019) - [j23]Shizhe Zang
, Ming Ding, David Smith
, Paul Tyler, Thierry Rakotoarivelo, Mohamed Ali Kâafar
:
The Impact of Adverse Weather Conditions on Autonomous Vehicles: How Rain, Snow, Fog, and Hail Affect the Performance of a Self-Driving Car. IEEE Veh. Technol. Mag. 14(2): 103-111 (2019) - [c94]Benjamin Zi Hao Zhao, Muhammad Ikram
, Hassan Jameel Asghar
, Mohamed Ali Kâafar
, Abdelberi Chaabane, Kanchana Thilakarathna:
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists. AsiaCCS 2019: 193-205 - [c93]Muhammad Ikram
, Pierrick Beaume, Mohamed Ali Kâafar
:
DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling. ICETE (2) 2019: 211-219 - [c92]Saad Sajid Hashmi
, Muhammad Ikram
, Mohamed Ali Kâafar
:
A Longitudinal Analysis of Online Ad-Blocking Blacklists. LCN Symposium 2019: 158-165 - [c91]Victor Perrier, Hassan Jameel Asghar, Dali Kaafar:
Private Continual Release of Real-Valued Data Streams. NDSS 2019 - [c90]Muhammad Ikram
, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar
, Noha Loizon, Roya Ensafi:
The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading. WWW 2019: 2851-2857 - [i52]Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar, Noha Loizon, Roya Ensafi:
The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading. CoRR abs/1901.07699 (2019) - [i51]Hassan Jameel Asghar, Ming Ding, Thierry Rakotoarivelo, Sirine Mrabet, Mohamed Ali Kâafar:
Differentially Private Release of High-Dimensional Datasets using the Gaussian Copula. CoRR abs/1902.01499 (2019) - [i50]Hassan Jameel Asghar, Dali Kaafar:
Averaging Attacks on Bounded Perturbation Algorithms. CoRR abs/1902.06414 (2019) - [i49]Benjamin Zi Hao Zhao, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kâafar, Abdelberi Chaabane, Kanchana Thilakarathna:
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists. CoRR abs/1904.10629 (2019) - [i48]Yuantian Miao, Benjamin Zi Hao Zhao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Dali Kaafar, Yang Xiang:
The Audio Auditor: Participant-Level Membership Inference in Voice-Based IoT. CoRR abs/1905.07082 (2019) - [i47]Muhammad Ikram, Pierrick Beaume, Mohamed Ali Kâafar:
DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling. CoRR abs/1905.09136 (2019) - [i46]Saad Sajid Hashmi, Muhammad Ikram, Mohamed Ali Kâafar:
A Longitudinal Analysis of Online Ad-Blocking Blacklists. CoRR abs/1906.00166 (2019) - [i45]Nan Wu
, Farhad Farokhi, David B. Smith, Mohamed Ali Kâafar:
The Value of Collaboration in Convex Machine Learning with Differential Privacy. CoRR abs/1906.09679 (2019) - [i44]Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kâafar:
On Inferring Training Data Attributes in Machine Learning Models. CoRR abs/1908.10558 (2019) - [i43]Shaofeng Li, Benjamin Zi Hao Zhao, Jiahao Yu, Minhui Xue, Dali Kaafar, Haojin Zhu:
Invisible Backdoor Attacks Against Deep Neural Networks. CoRR abs/1909.02742 (2019) - 2018
- [j22]Jagmohan Chauhan, Mohamed Ali Kâafar
, Anirban Mahanti:
The Web for Underpowered Mobile Devices: Lessons Learned from Google Glass. IEEE Internet Comput. 22(3): 38-47 (2018) - [j21]Ming Ding, David López-Pérez, Holger Claussen
, Mohamed Ali Kâafar
:
On the Fundamental Characteristics of Ultra-Dense Small Cell Networks. IEEE Netw. 32(3): 92-100 (2018) - [j20]Rahat Masood, Benjamin Zi Hao Zhao, Hassan Jameel Asghar
, Mohamed Ali Kâafar
:
Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking. Proc. Priv. Enhancing Technol. 2018(2): 122-142 (2018) - [j19]Gaogang Xie
, Zhenyu Li
, Mohamed Ali Kâafar
, Qinghua Wu:
Access Types Effect on Internet Video Services and Its Implications on CDN Caching. IEEE Trans. Circuits Syst. Video Technol. 28(5): 1183-1196 (2018) - [c89]Arash Shaghaghi, Salil S. Kanhere
, Mohamed Ali Kâafar
, Elisa Bertino, Sanjay Jha:
Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations. LCN 2018: 553-561 - [c88]Arash Shaghaghi, Salil S. Kanhere
, Mohamed Ali Kâafar
, Sanjay Jha
:
Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems. NCA 2018: 1-5 - [c87]Rahat Masood, Dinusha Vatsalan
, Muhammad Ikram
, Mohamed Ali Kâafar
:
Incognito: A Method for Obfuscating Web Data. WWW 2018: 267-276 - [i42]Arash Shaghaghi, Mohamed Ali Kâafar, Rajkumar Buyya, Sanjay Jha:
Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions. CoRR abs/1804.00262 (2018) - [i41]Loqman Salamatian, Dali Kaafar, Kavé Salamatian:
A Geometric Approach for Real-time Monitoring of Dynamic Large Scale Graphs: AS-level graphs illustrated. CoRR abs/1806.00676 (2018) - [i40]Parameswaran Kamalaruban, Victor Perrier, Hassan Jameel Asghar, Mohamed Ali Kâafar:
dX-Private Mechanisms for Linear Queries. CoRR abs/1806.02389 (2018) - [i39]Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kâafar, Elisa Bertino, Sanjay Jha:
Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations. CoRR abs/1807.02593 (2018) - [i38]Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kâafar, Sanjay Jha:
Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems. CoRR abs/1809.06988 (2018) - [i37]Victor Perrier, Hassan Jameel Asghar, Dali Kaafar:
Private Continual Release of Real-Valued Data Streams. CoRR abs/1811.03197 (2018) - [i36]Qingrong Chen, Chong Xiang, Minhui Xue, Bo Li, Nikita Borisov, Dali Kaafar, Haojin Zhu:
Differentially Private Data Generative Models. CoRR abs/1812.02274 (2018) - 2017
- [j18]Kanchana Thilakarathna
, Suranga Seneviratne, Kamal Gupta, Mohamed Ali Kâafar
, Aruna Seneviratne:
A deep dive into location-based communities in social discovery networks. Comput. Commun. 100: 78-90 (2017) - [j17]Kanchana Thilakarathna
, Fangzhou Jiang, Sirine Mrabet, Mohamed Ali Kâafar
, Aruna Seneviratne
, Gaogang Xie:
Crowd-Cache: Leveraging on spatio-temporal correlation in content popularity for mobile networking in proximity. Comput. Commun. 100: 104-117 (2017) - [j16]Hassan Jameel Asghar
, Mohamed Ali Kâafar
:
When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack. J. Math. Cryptol. 11(3): 177-194 (2017) - [j15]Muhammad Ikram
, Hassan Jameel Asghar
, Mohamed Ali Kâafar
, Anirban Mahanti, Balachander Krishnamurthy:
Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning. Proc. Priv. Enhancing Technol. 2017(1): 79-99 (2017) - [j14]Zhenyu Li, Mohamed Ali Kâafar
, Kavé Salamatian
, Gaogang Xie:
Characterizing and Modeling User Behavior in a Large-Scale Mobile Live Streaming System. IEEE Trans. Circuits Syst. Video Technol. 27(12): 2675-2686 (2017) - [j13]Muhammad Ikram, Lucky Onwuzurike, Shehroze Farooqi, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar
, M. Zubair Shafiq:
Measuring, Characterizing, and Detecting Facebook Like Farms. ACM Trans. Priv. Secur. 20(4): 13:1-13:28 (2017) - [j12]Suranga Seneviratne, Aruna Seneviratne, Mohamed Ali Kâafar
, Anirban Mahanti, Prasant Mohapatra:
Spam Mobile Apps: Characteristics, Detection, and in the Wild Analysis. ACM Trans. Web 11(1): 4:1-4:29 (2017) - [c86]Arash Shaghaghi, Mohamed Ali Kâafar
, Sanjay Jha
:
WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks. AsiaCCS 2017: 849-861 - [c85]Rahat Masood, Benjamin Zi Hao Zhao, Hassan Jameel Asghar
, Mohamed Ali Kâafar
:
POSTER: TouchTrack: How Unique are your Touch Gestures? CCS 2017: 2555-2557 - [c84]Shehroze Farooqi, Guillaume Jourjon, Muhammad Ikram, Mohamed Ali Kâafar
, Emiliano De Cristofaro, Muhammad Zubair Shafiq, Arik Friedman, Fareed Zaffar:
Characterizing key stakeholders in an online black-hat marketplace. eCrime 2017: 17-27 - [c83]Jagmohan Chauhan, Benjamin Zi Hao Zhao, Hassan Jameel Asghar
, Jonathan Chan, Mohamed Ali Kâafar
:
BehavioCog: An Observation Resistant Authentication Scheme. Financial Cryptography 2017: 39-58 - [c82]Muhammad Ikram
, Mohamed Ali Kâafar
:
A first look at mobile Ad-Blocking apps. NCA 2017: 343-350 - [c81]Zainab Abaid, Mohamed Ali Kâafar
, Sanjay Jha
:
Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers. NCA 2017: 375-384 - [c80]Zainab Abaid, Mohamed Ali Kâafar
, Sanjay Jha
:
Early detection of in-the-wild botnet attacks by exploiting network communication uniformity: An empirical study. Networking 2017: 1-9 - [c79]Wei Wu, Ren Ping Liu, Wei Ni, Dali Kaafar
, Xiaojing Huang
:
AC-PROT: An Access Control Model to Improve Software-Defined Networking Security. VTC Spring 2017: 1-5 - [e2]Mohamed Ali Kâafar
, Steve Uhlig, Johanna Amann:
Passive and Active Measurement - 18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings. Lecture Notes in Computer Science 10176, Springer 2017, ISBN 978-3-319-54327-7 [contents] - [i35]Hassan Jameel Asghar, Paul Tyler, Mohamed Ali Kâafar:
Differentially Private Release of Public Transport Data: The Opal Use Case. CoRR abs/1705.05957 (2017) - [i34]Hassan Jameel Asghar, Paul Tyler, Mohamed Ali Kâafar:
On the Privacy of the Opal Data Release: A Response. CoRR abs/1705.08994 (2017) - [i33]Muhammad Ikram, Lucky Onwuzurike, Shehroze Farooqi, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, M. Zubair Shafiq:
Measuring, Characterizing, and Detecting Facebook Like Farms. CoRR abs/1707.00190 (2017) - [i32]David B. Smith, Kanchana Thilakarathna, Mohamed Ali Kâafar:
More Flexible Differential Privacy: The Application of Piecewise Mixture Distributions in Query Release. CoRR abs/1707.01189 (2017) - [i31]Amit Tiroshi, Tsvi Kuflik, Shlomo Berkovsky, Mohamed Ali Kâafar:
Graph Based Recommendations: From Data Representation to Feature Extraction and Application. CoRR abs/1707.01250 (2017) - [i30]Fangzhou Jiang, Kanchana Thilakarathna, Sirine Mrabet, Mohamed Ali Kâafar, Aruna Seneviratne:
uStash: a Novel Mobile Content Delivery System for Improving User QoE in Public Transport. CoRR abs/1708.04078 (2017) - [i29]Arash Shaghaghi, Mohamed Ali Kâafar, Sanjay Jha:
WedgeTail 2.0: An Intrusion Prevention System for the Data Plane of Software Defined Networks. CoRR abs/1708.05477 (2017) - [i28]Muhammad Ikram, Mohamed Ali Kâafar:
A First Look at Ad Blocking Apps on Google Play. CoRR abs/1709.02901 (2017) - [i27]Ming Ding, David López-Pérez, Holger Claussen, Mohamed Ali Kâafar:
On the Fundamental Characteristics of Ultra-Dense Small Cell Networks. CoRR abs/1710.05297 (2017) - [i26]Hailong Huang, Andrey V. Savkin, Ming Ding, Mohamed Ali Kâafar:
Optimized Deployment of Autonomous Drones to Improve User Experience in Cellular Networks. CoRR abs/1712.02124 (2017) - 2016
- [j11]Zhenyu Li, Mohamed Ali Kâafar
, Gaogang Xie:
Session Throughput Prediction for Internet Videos. IEEE Commun. Mag. 54(12): 152-157 (2016) - [j10]Qinghua Wu, Zhenyu Li, Gareth Tyson, Steve Uhlig, Mohamed Ali Kâafar
, Gaogang Xie:
Privacy-Aware Multipath Video Caching for Content-Centric Networks. IEEE J. Sel. Areas Commun. 34(8): 2219-2230 (2016) - [j9]Arik Friedman, Shlomo Berkovsky
, Mohamed Ali Kâafar
:
A differential privacy framework for matrix factorization recommender systems. User Model. User Adapt. Interact. 26(5): 425-458 (2016) - [c78]Jagmohan Chauhan, Hassan Jameel Asghar
, Anirban Mahanti, Mohamed Ali Kâafar
:
Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case. ACNS 2016: 648-665 - [c77]Luca Melis, Hassan Jameel Asghar
, Emiliano De Cristofaro, Mohamed Ali Kâafar
:
Private Processing of Outsourced Network Functions: Feasibility and Constructions. SDN-NFV@CODASPY 2016: 39-44 - [c76]Zhenyu Li, Xiaohui Wang, Ningjing Huang, Mohamed Ali Kâafar, Zhenhua Li, Jianer Zhou, Gaogang Xie, Peter Steenkiste:
An Empirical Analysis of a Large-scale Mobile Cloud Storage Service. Internet Measurement Conference 2016: 287-301 - [c75]Muhammad Ikram, Narseo Vallina-Rodriguez, Suranga Seneviratne, Mohamed Ali Kâafar, Vern Paxson:
An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps. Internet Measurement Conference 2016: 349-364 - [c74]Dong Wang, Zhenyu Li, Gaogang Xie, Mohamed Ali Kâafar
, Kavé Salamatian:
Adwords management for third-parties in SEM: An optimisation model and the potential of Twitter. INFOCOM 2016: 1-9 - [c73]Zainab Abaid, Dilip Sarkar, Mohamed Ali Kâafar
, Sanjay Jha
:
The Early Bird Gets the Botnet: A Markov Chain Based Early Warning System for Botnet Attacks. LCN 2016: 61-68 - [c72]Ralph Holz, Johanna Amann, Olivier Mehani, Mohamed Ali Kâafar, Matthias Wachs:
TLS in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication. NDSS 2016 - [c71]Arash Shaghaghi, Mohamed Ali Kâafar
, Sandra Scott-Hayward, Salil S. Kanhere
, Sanjay K. Jha
:
Towards Policy Enforcement Point as a Service (PEPS). NFV-SDN 2016: 50-55 - [c70]Jagmohan Chauhan, Suranga Seneviratne, Mohamed Ali Kâafar
, Anirban Mahanti, Aruna Seneviratne:
Characterization of early smartwatch apps. PerCom Workshops 2016: 1-6 - [c69]Fangzhou Jiang, Kanchana Thilakarathna
, Sirine Mrabet, Mohamed Ali Kâafar
:
uDrop: Pushing drop-box to the edge of mobile network. PerCom Workshops 2016: 1-3 - [c68]Hassan Jameel Asghar
, Luca Melis, Cyril Soldani, Emiliano De Cristofaro, Mohamed Ali Kâafar
, Laurent Mathy:
SplitBox: Toward Efficient Private Network Function Virtualization. HotMiddlebox@SIGCOMM 2016: 7-13 - [i25]Luca Melis, Hassan Jameel Asghar, Emiliano De Cristofaro, Mohamed Ali Kâafar:
Private Processing of Outsourced Network Functions: Feasibility and Constructions. CoRR abs/1601.06454 (2016) - [i24]Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kâafar, Balachander Krishnamurthy, Anirban Mahanti:
Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning. CoRR abs/1603.06289 (2016) - [i23]Hassan Jameel Asghar, Luca Melis, Cyril Soldani, Emiliano De Cristofaro, Mohamed Ali Kâafar, Laurent Mathy:
SplitBox: Toward Efficient Private Network Function Virtualization. CoRR abs/1605.03772 (2016) - [i22]Arash Shaghaghi, Mohamed Ali Kâafar, Sandra Scott-Hayward, Salil S. Kanhere, Sanjay K. Jha:
Towards Policy Enforcement Point as a Service (PEPS). CoRR abs/1610.02526 (2016) - [i21]Jagmohan Chauhan, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Jonathan Chan, Mohamed Ali Kâafar:
BehavioCog: An Observation Resistant Authentication Scheme. CoRR abs/1610.09044 (2016) - 2015
- [j8]