default search action
Mohamed Ali Kâafar
Mohamad Ali Kâafar – Dali Kaafar
Person information
- affiliation: Macquarie University, Faculty of Science and Engineering, Australia
- affiliation: CSIRO Data61, Sydney, Australia
- affiliation: NICTA, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j46]Muhammad Salman, Muhammad Ikram, Mohamed Ali Kâafar:
Investigating Evasive Techniques in SMS Spam Filtering: A Comparative Analysis of Machine Learning Models. IEEE Access 12: 24306-24324 (2024) - [j45]Houssem Jmal, Firas Ben Hmida, Nardine Basta, Muhammad Ikram, Mohamad Ali Kâafar, Andy Walker:
SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation. IEEE Trans. Inf. Forensics Secur. 19: 1601-1613 (2024) - [j44]Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Linh Duc Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia:
Use of cryptography in malware obfuscation. J. Comput. Virol. Hacking Tech. 20(1): 135-152 (2024) - [c118]Rahat Masood, Wing Yan Cheng, Dinusha Vatsalan, Deepak Mishra, Hassan Jameel Asghar, Dali Kaafar:
Privacy Preserving Release of Mobile Sensor Data. ARES 2024: 5:1-5:13 - [i94]Hina Qayyum, Muhammad Ikram, Benjamin Zi Hao Zhao, Ian D. Wood, Nicolas Kourtellis, Mohamed Ali Kâafar:
Exploring the Distinctive Tweeting Patterns of Toxic Twitter Users. CoRR abs/2401.14141 (2024) - [i93]Hina Qayyum, Muhammad Ikram, Benjamin Zi Hao Zhao, Ian D. Wood, Nicolas Kourtellis, Mohamed Ali Kâafar:
On mission Twitter Profiles: A Study of Selective Toxic Behavior. CoRR abs/2401.14252 (2024) - [i92]Benjamin Zi Hao Zhao, Muhammad Ikram, Mohamed Ali Kâafar:
GPTs Window Shopping: An analysis of the Landscape of Custom ChatGPT Models. CoRR abs/2405.10547 (2024) - [i91]Hina Qayyum, Muhammad Ikram, Benjamin Zi Hao Zhao, Ian D. Wood, Mohamad Ali Kâafar, Nicolas Kourtellis:
SenTopX: Benchmark for User Sentiment on Various Topics. CoRR abs/2406.02801 (2024) - [i90]Conor Atkins, Ian D. Wood, Mohamed Ali Kâafar, Hassan Asghar, Nardine Basta, Michal Kepkowski:
ConvoCache: Smart Re-Use of Chatbot Responses. CoRR abs/2406.18133 (2024) - [i89]Muhammad Salman, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Muhammad Ikram, Sidharth Kaushik, Mohamed Ali Kâafar:
On the Robustness of Malware Detectors to Adversarial Samples. CoRR abs/2408.02310 (2024) - 2023
- [j43]Benjamin Tag, Niels van Berkel, Sunny Verma, Benjamin Zi Hao Zhao, Shlomo Berkovsky, Dali Kaafar, Vassilis Kostakos, Olga Ohrimenko:
DDoD: Dual Denial of Decision Attacks on Human-AI Teams. IEEE Pervasive Comput. 22(1): 77-84 (2023) - [j42]Rana Salal Ali, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Tham Nguyen, Ian David Wood, Mohamed Ali Kâafar:
Unintended Memorization and Timing Attacks in Named Entity Recognition Models. Proc. Priv. Enhancing Technol. 2023(2): 329-346 (2023) - [j41]Dinusha Vatsalan, Raghav Bhaskar, Mohamed Ali Kâafar:
Local Differentially Private Fuzzy Counting in Stream Data Using Probabilistic Data Structures. IEEE Trans. Knowl. Data Eng. 35(8): 8185-8198 (2023) - [c117]Conor Atkins, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Ian D. Wood, Mohamed Ali Kâafar:
Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories. ACNS (1) 2023: 284-308 - [c116]I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar:
An Empirical Analysis of Security and Privacy Risks in Android Cryptocurrency Wallet Apps. ACNS 2023: 699-725 - [c115]Nan Wu, Dinusha Vatsalan, Mohamed Ali Kâafar, Sanath Kumar Ramesh:
Privacy-Preserving Record Linkage for Cardinality Counting. AsiaCCS 2023: 53-64 - [c114]Hina Qayyum, Muhammad Ikram, Benjamin Zi Hao Zhao, Ian D. Wood, Nicolas Kourtellis, Mohamed Ali Kâafar:
Exploring the Distinctive Tweeting Patterns of Toxic Twitter Users. IEEE Big Data 2023: 3624-3633 - [c113]Hina Qayyum, Muhammad Ikram, Benjamin Zi Hao Zhao, Ian D. Wood, Nicolas Kourtellis, Mohamed Ali Kâafar:
On mission Twitter Profiles: A Study of Selective Toxic Behavior. IEEE Big Data 2023: 3634-3643 - [c112]Junda Lu, Yukai Miao, Mingyang Chen, Bo Huang, Bing Li, Wei Wang, Dinusha Vatsalan, Mohamed Ali Kâafar:
Distance Maximization and Defences on Deep Hashing Based Image Retrieval. ICKG 2023: 176-183 - [c111]Michal Kepkowski, Maciej Machulak, Ian D. Wood, Dali Kaafar:
Challenges with Passwordless FIDO2 in an Enterprise Setting: A Usability Study. SecDev 2023: 37-48 - [c110]Wei-Zhu Yeoh, Michal Kepkowski, Gunnar Heide, Dali Kaafar, Lucjan Hanzlik:
Fast IDentity Online with Anonymous Credentials (FIDO-AC). USENIX Security Symposium 2023: 3029-3046 - [c109]Hina Qayyum, Benjamin Zi Hao Zhao, Ian D. Wood, Muhammad Ikram, Nicolas Kourtellis, Mohamed Ali Kâafar:
A longitudinal study of the top 1% toxic Twitter profiles. WebSci 2023: 292-303 - [i88]Nan Wu, Dinusha Vatsalan, Mohamed Ali Kâafar, Sanath Kumar Ramesh:
Privacy-Preserving Record Linkage for Cardinality Counting. CoRR abs/2301.04000 (2023) - [i87]Hina Qayyum, Benjamin Zi Hao Zhao, Ian D. Wood, Muhammad Ikram, Mohamed Ali Kâafar, Nicolas Kourtellis:
A longitudinal study of the top 1% toxic Twitter profiles. CoRR abs/2303.14603 (2023) - [i86]Conor Atkins, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Ian D. Wood, Mohamed Ali Kâafar:
Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories. CoRR abs/2304.05371 (2023) - [i85]Gioacchino Tangari, Shreesh Keskar, Hassan Jameel Asghar, Dali Kaafar:
On the Adversarial Inversion of Deep Biometric Representations. CoRR abs/2304.05561 (2023) - [i84]Wei-Zhu Yeoh, Michal Kepkowski, Gunnar Heide, Dali Kaafar, Lucjan Hanzlik:
Fast IDentity Online with Anonymous Credentials (FIDO-AC). CoRR abs/2305.16758 (2023) - [i83]Houssem Jmal, Firas Ben Hmida, Nardine Basta, Muhammad Ikram, Mohamed Ali Kâafar, Andy Walker:
SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation. CoRR abs/2305.19487 (2023) - [i82]Ian D. Wood, Michal Kepkowski, Leron Zinatullin, Travis Darnley, Mohamed Ali Kâafar:
An analysis of scam baiting calls: Identifying and extracting scam stages and scripts. CoRR abs/2307.01965 (2023) - [i81]Michal Kepkowski, Maciej Machulak, Ian D. Wood, Dali Kaafar:
Challenges with Passwordless FIDO2 in an Enterprise Setting: A Usability Study. CoRR abs/2308.08096 (2023) - [i80]Hassan Jameel Asghar, Zhigang Lu, Zhongrui Zhao, Dali Kaafar:
Practical, Private Assurance of the Value of Collaboration. CoRR abs/2310.02563 (2023) - 2022
- [j40]Michal Kepkowski, Lucjan Hanzlik, Ian D. Wood, Mohamed Ali Kâafar:
How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy. Proc. Priv. Enhancing Technol. 2022(4): 705-726 (2022) - [j39]Yi Chen, Hongxia Wang, Kim-Kwang Raymond Choo, Peisong He, Zoran Salcic, Dali Kaafar, Xuyun Zhang:
DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain. IEEE Trans. Dependable Secur. Comput. 19(4): 2405-2420 (2022) - [j38]Zhigang Lu, Hassan Jameel Asghar, Mohamed Ali Kâafar, Darren Webb, Peter Dickinson:
A Differentially Private Framework for Deep Learning With Convexified Loss Functions. IEEE Trans. Inf. Forensics Secur. 17: 2151-2165 (2022) - [j37]Nan Wu, Dinusha Vatsalan, Sunny Verma, Mohamed Ali Kâafar:
Fairness and Cost Constrained Privacy-Aware Record Linkage. IEEE Trans. Inf. Forensics Secur. 17: 2644-2656 (2022) - [j36]Nazim Uddin Sheikh, Hassan Jameel Asghar, Farhad Farokhi, Mohamed Ali Kâafar:
Do Auto-Regressive Models Protect Privacy? Inferring Fine-Grained Energy Consumption From Aggregated Model Parameters. IEEE Trans. Serv. Comput. 15(6): 3198-3209 (2022) - [c108]Nardine Basta, Muhammad Ikram, Mohamed Ali Kâafar, Andy Walker:
Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation Framework. NOMS 2022: 1-7 - [c107]Hina Qayyum, Muhammad Salman, I Wayan Budi Sentana, Giang Linh Duc Nguyen, Muhammad Ikram, Gareth Tyson, Mohamed Ali Kâafar:
A First Look at Android Apps' Third-Party Resources Loading. NSS 2022: 193-213 - [p2]Rahat Masood, Shlomo Berkovsky, Mohamed Ali Kâafar:
Tracking and Personalization. Modern Socio-Technical Perspectives on Privacy 2022: 171-202 - [i79]Hina Qayyum, Benjamin Zi Hao Zhao, Ian D. Wood, Muhammad Ikram, Mohamed Ali Kâafar, Nicolas Kourtellis:
A deep dive into the consistently toxic 1% of Twitter. CoRR abs/2202.07853 (2022) - [i78]Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar, Roya Ensafi:
A Study of Third-party Resources Loading on Web. CoRR abs/2203.03077 (2022) - [i77]Nardine Basta, Ming Ding, Muhammad Ikram, Mohamed Ali Kâafar:
5G-Enabled Pseudonymity for Cooperative Intelligent Transportation System. CoRR abs/2203.10673 (2022) - [i76]Zhigang Lu, Hassan Jameel Asghar, Mohamed Ali Kâafar, Darren Webb, Peter Dickinson:
A Differentially Private Framework for Deep Learning with Convexified Loss Functions. CoRR abs/2204.01049 (2022) - [i75]Rahat Masood, Wing Yan Cheng, Dinusha Vatsalan, Deepak Mishra, Hassan Jameel Asghar, Mohamed Ali Kâafar:
Privacy Preserving Release of Mobile Sensor Data. CoRR abs/2205.06641 (2022) - [i74]Michal Kepkowski, Lucjan Hanzlik, Ian D. Wood, Mohamed Ali Kâafar:
How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy. CoRR abs/2205.08071 (2022) - [i73]Nan Wu, Dinusha Vatsalan, Sunny Verma, Mohamed Ali Kâafar:
Fairness and Cost Constrained Privacy-Aware Record Linkage. CoRR abs/2206.15089 (2022) - [i72]Dinusha Vatsalan, Raghav Bhaskar, Mohamed Ali Kâafar:
Local Differentially Private Fuzzy Counting in Stream Data using Probabilistic Data Structure. CoRR abs/2208.05264 (2022) - [i71]Muhammad Salman, Muhammad Ikram, Mohamed Ali Kâafar:
An Empirical Analysis of SMS Scam Detection Systems. CoRR abs/2210.10451 (2022) - [i70]Rana Salal Ali, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Tham Nguyen, Ian David Wood, Dali Kaafar:
Unintended Memorization and Timing Attacks in Named Entity Recognition Models. CoRR abs/2211.02245 (2022) - [i69]Benjamin Tag, Niels van Berkel, Sunny Verma, Benjamin Zi Hao Zhao, Shlomo Berkovsky, Dali Kaafar, Vassilis Kostakos, Olga Ohrimenko:
DDoD: Dual Denial of Decision Attacks on Human-AI Teams. CoRR abs/2212.03980 (2022) - [i68]Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang L. D. Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia:
SoK: Use of Cryptography in Malware Obfuscation. CoRR abs/2212.04008 (2022) - [i67]Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Linh Duc Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia:
SoK: Use of Cryptography in Malware Obfuscation. IACR Cryptol. ePrint Arch. 2022: 1699 (2022) - 2021
- [j35]Gioacchino Tangari, Muhammad Ikram, I Wayan Budi Sentana, Kiran Ijaz, Mohamed Ali Kâafar, Shlomo Berkovsky:
Analyzing security issues of android mobile health and medical applications. J. Am. Medical Informatics Assoc. 28(10): 2074-2084 (2021) - [j34]Yuantian Miao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Benjamin Zi Hao Zhao, Dali Kaafar, Yang Xiang:
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services. Proc. Priv. Enhancing Technol. 2021(1): 209-228 (2021) - [j33]Farhad Farokhi, Nan Wu, David B. Smith, Mohamed Ali Kâafar:
The Cost of Privacy in Asynchronous Differentially-Private Machine Learning. IEEE Trans. Inf. Forensics Secur. 16: 2118-2129 (2021) - [c106]Marina Dehez-Clementi, Jérôme Lacan, Jean-Christophe Deneuville, Hassan Asghar, Dali Kaafar:
A Blockchain-enabled Anonymous-yet- Traceable Distributed Key Generation. Blockchain 2021: 257-265 - [c105]Benjamin Zi Hao Zhao, Aviral Agrawal, Catisha Coburn, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kâafar, Darren Webb, Peter Dickinson:
On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models. EuroS&P 2021: 232-251 - [c104]Nazim Uddin Sheikh, Zhigang Lu, Hassan Jameel Asghar, Mohamed Ali Kâafar:
Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics. ICETE (Selected Papers) 2021: 305-333 - [c103]Nazim Uddin Sheikh, Zhigang Lu, Hassan Asghar, Mohamed Ali Kâafar:
Trace Recovery: Inferring Fine-grained Trace of Energy Data from Aggregates. SECRYPT 2021: 283-294 - [c102]I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar, Shlomo Berkovsky:
Empirical Security and Privacy Analysis of Mobile Symptom Checking Apps on Google Play. SECRYPT 2021: 665-673 - [c101]I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar:
BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-domain Routing via Blockchain. SECRYPT 2021: 674-679 - [i66]Zainab Abaid, Dilip Sarkar, Mohamed Ali Kâafar, Sanjay K. Jha:
All Infections are Not Created Equal: Time-Sensitive Prediction of Malware Generated Network Attacks. CoRR abs/2102.01944 (2021) - [i65]Benjamin Zi Hao Zhao, Aviral Agrawal, Catisha Coburn, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kâafar, Darren Webb, Peter Dickinson:
On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models. CoRR abs/2103.07101 (2021) - [i64]Tham Nguyen, Hassan Jameel Asghar, Raghav Bhaskar, Dali Kaafar, Farhad Farokhi:
Sharing in a Trustless World: Privacy-Preserving Data Analytics with Potentially Cheating Participants. CoRR abs/2106.09904 (2021) - [i63]I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar:
BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-Domain Routing Via Blockchain. CoRR abs/2107.07063 (2021) - [i62]I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar, Shlomo Berkovsky:
Empirical Security and Privacy Analysis of Mobile Symptom Checking Applications on Google Play. CoRR abs/2107.13754 (2021) - [i61]Nardine Basta, Muhammad Ikram, Mohamed Ali Kâafar, Andy Walker:
Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation Framework. CoRR abs/2111.10967 (2021) - 2020
- [j32]Hassan Jameel Asghar, Ming Ding, Thierry Rakotoarivelo, Sirine Mrabet, Dali Kaafar:
Differentially Private Release of Datasets using Gaussian Copula. J. Priv. Confidentiality 10(2) (2020) - [j31]Parameswaran Kamalaruban, Victor Perrier, Hassan Jameel Asghar, Mohamed Ali Kâafar:
Not All Attributes are Created Equal: dX -Private Mechanisms for Linear Queries. Proc. Priv. Enhancing Technol. 2020(1): 103-125 (2020) - [j30]Hassan Jameel Asghar, Dali Kaafar:
Averaging Attacks on Bounded Noise-based Disclosure Control Algorithms. Proc. Priv. Enhancing Technol. 2020(2): 358-378 (2020) - [j29]Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar, Noha Loizon, Roya Ensafi:
Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading. ACM Trans. Priv. Secur. 23(2): 8:1-8:27 (2020) - [j28]Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar, Francesca Trevisan, Haiyue Yuan:
Exploiting Behavioral Side Channels in Observation Resilient Cognitive Authentication Schemes. ACM Trans. Priv. Secur. 24(1): 1:1-1:33 (2020) - [j27]Qing Yang, Yiran Shen, Dinusha Vatsalan, Jianpei Zhang, Mohamed Ali Kâafar, Wen Hu:
P4Mobi: A Probabilistic Privacy-Preserving Framework for Publishing Mobility Datasets. IEEE Trans. Veh. Technol. 69(7): 6987-6999 (2020) - [c100]Benjamin Zi Hao Zhao, Mohamed Ali Kâafar, Nicolas Kourtellis:
Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning. CCSW 2020: 15-26 - [c99]I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar:
BlockJack: Blocking IP Prefix Hijacker in Inter-Domain Routing. StudentWorkshop@CoNEXT 2020: 1-2 - [c98]Marina Dehez-Clementi, Jean-Christophe Deneuville, Jérôme Lacan, Hassan Asghar, Dali Kaafar:
Who Let theDOGSOut: Anonymous but Auditable Communications Using Group Signature Schemes with Distributed Opening. DPM/CBT@ESORICS 2020: 437-446 - [c97]Maryam Shahpasand, Leonard G. C. Hamey, Mohamed Ali Kâafar, Dinusha Vatsalan:
Feature-Based Adversarial Attacks Against Machine Learnt Mobile Malware Detectors. ITNAC 2020: 1-8 - [c96]Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar:
On the Resilience of Biometric Authentication Systems against Random Inputs. NDSS 2020 - [c95]Nan Wu, Farhad Farokhi, David B. Smith, Mohamed Ali Kâafar:
The Value of Collaboration in Convex Machine Learning with Differential Privacy. SP 2020: 304-317 - [p1]Arash Shaghaghi, Mohamed Ali Kâafar, Rajkumar Buyya, Sanjay Jha:
Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future Directions. Handbook of Computer Networks and Cyber Security 2020: 341-387 - [i60]Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar:
On the Resilience of Biometric Authentication Systems against Random Inputs. CoRR abs/2001.04056 (2020) - [i59]Farhad Farokhi, Mohamed Ali Kâafar:
Modelling and Quantifying Membership Information Leakage in Machine Learning. CoRR abs/2001.10648 (2020) - [i58]Shakila Mahjabin Tonni, Farhad Farokhi, Dinusha Vatsalan, Dali Kaafar:
Data and Model Dependencies of Membership Inference Attack. CoRR abs/2002.06856 (2020) - [i57]Farhad Farokhi, Mohamed Ali Kâafar:
Predicting Performance of Asynchronous Differentially-Private Learning. CoRR abs/2003.08500 (2020) - [i56]Mahmood Yousefi-Azar, Mohamed Ali Kâafar, Andy Walker:
Unsupervised Learning for security of Enterprise networks by micro-segmentation. CoRR abs/2003.11231 (2020) - [i55]Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar, Francesca Trevisan, Haiyue Yuan:
Exploiting Behavioral Side-Channels in Observation Resilient Cognitive Authentication Schemes. CoRR abs/2007.11210 (2020) - [i54]Benjamin Zi Hao Zhao, Mohamed Ali Kâafar, Nicolas Kourtellis:
Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning. CoRR abs/2008.08807 (2020) - [i53]Matthieu Monteiro, Kumara Kahatapitiya, Hassan Jameel Asghar, Kanchana Thilakarathna, Thierry Rakotoarivelo, Dali Kaafar, Shujun Li, Ron Steinfeld, Josef Pieprzyk:
Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices. IACR Cryptol. ePrint Arch. 2020: 261 (2020)
2010 – 2019
- 2019
- [j26]Hassan Jameel Asghar, Emiliano De Cristofaro, Guillaume Jourjon, Mohamed Ali Kâafar, Laurent Mathy, Luca Melis, Craig Russell, Mang Yu:
Fast privacy-preserving network function outsourcing. Comput. Networks 163 (2019) - [j25]Hailong Huang, Andrey V. Savkin, Ming Ding, Mohamed Ali Kâafar:
Optimized deployment of drone base station to improve user experience in cellular networks. J. Netw. Comput. Appl. 144: 49-58 (2019) - [j24]Fangzhou Jiang, Kanchana Thilakarathna, Sirine Mrabet, Mohamed Ali Kâafar, Aruna Seneviratne:
uStash: A Novel Mobile Content Delivery System for Improving User QoE in Public Transport. IEEE Trans. Mob. Comput. 18(6): 1447-1460 (2019) - [j23]Shizhe Zang, Ming Ding, David Smith, Paul Tyler, Thierry Rakotoarivelo, Mohamed Ali Kâafar:
The Impact of Adverse Weather Conditions on Autonomous Vehicles: How Rain, Snow, Fog, and Hail Affect the Performance of a Self-Driving Car. IEEE Veh. Technol. Mag. 14(2): 103-111 (2019) - [c94]Benjamin Zi Hao Zhao, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kâafar, Abdelberi Chaabane, Kanchana Thilakarathna:
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists. AsiaCCS 2019: 193-205 - [c93]Muhammad Ikram, Pierrick Beaume, Mohamed Ali Kâafar:
DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling. ICETE (2) 2019: 211-219 - [c92]Saad Sajid Hashmi, Muhammad Ikram, Mohamed Ali Kâafar:
A Longitudinal Analysis of Online Ad-Blocking Blacklists. LCN Symposium 2019: 158-165 - [c91]Victor Perrier, Hassan Jameel Asghar, Dali Kaafar:
Private Continual Release of Real-Valued Data Streams. NDSS 2019 - [c90]Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar, Noha Loizon, Roya Ensafi:
The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading. WWW 2019: 2851-2857 - [i52]Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar, Noha Loizon, Roya Ensafi:
The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading. CoRR abs/1901.07699 (2019) - [i51]Hassan Jameel Asghar, Ming Ding, Thierry Rakotoarivelo, Sirine Mrabet, Mohamed Ali Kâafar:
Differentially Private Release of High-Dimensional Datasets using the Gaussian Copula. CoRR abs/1902.01499 (2019) - [i50]Hassan Jameel Asghar, Dali Kaafar:
Averaging Attacks on Bounded Perturbation Algorithms. CoRR abs/1902.06414 (2019) - [i49]Benjamin Zi Hao Zhao, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kâafar, Abdelberi Chaabane, Kanchana Thilakarathna:
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists. CoRR abs/1904.10629 (2019) - [i48]Yuantian Miao, Benjamin Zi Hao Zhao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Dali Kaafar, Yang Xiang:
The Audio Auditor: Participant-Level Membership Inference in Voice-Based IoT. CoRR abs/1905.07082 (2019) - [i47]Muhammad Ikram, Pierrick Beaume, Mohamed Ali Kâafar:
DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling. CoRR abs/1905.09136 (2019) - [i46]Saad Sajid Hashmi, Muhammad Ikram, Mohamed Ali Kâafar:
A Longitudinal Analysis of Online Ad-Blocking Blacklists. CoRR abs/1906.00166 (2019) - [i45]Nan Wu, Farhad Farokhi, David B. Smith, Mohamed Ali Kâafar:
The Value of Collaboration in Convex Machine Learning with Differential Privacy. CoRR abs/1906.09679 (2019) - [i44]Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kâafar:
On Inferring Training Data Attributes in Machine Learning Models. CoRR abs/1908.10558 (2019) - [i43]Shaofeng Li, Benjamin Zi Hao Zhao, Jiahao Yu, Minhui Xue, Dali Kaafar, Haojin Zhu:
Invisible Backdoor Attacks Against Deep Neural Networks. CoRR abs/1909.02742 (2019) - 2018
- [j22]Jagmohan Chauhan, Mohamed Ali Kâafar, Anirban Mahanti:
The Web for Underpowered Mobile Devices: Lessons Learned from Google Glass. IEEE Internet Comput. 22(3): 38-47 (2018) - [j21]Ming Ding, David López-Pérez, Holger Claussen, Mohamed Ali Kâafar:
On the Fundamental Characteristics of Ultra-Dense Small Cell Networks. IEEE Netw. 32(3): 92-100 (2018) - [j20]Rahat Masood, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar:
Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking. Proc. Priv. Enhancing Technol. 2018(2): 122-142 (2018) - [j19]Gaogang Xie, Zhenyu Li, Mohamed Ali Kâafar, Qinghua Wu:
Access Types Effect on Internet Video Services and Its Implications on CDN Caching. IEEE Trans. Circuits Syst. Video Technol. 28(5): 1183-1196 (2018) - [c89]Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kâafar, Elisa Bertino, Sanjay Jha:
Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations. LCN 2018: 553-561 - [c88]Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kâafar, Sanjay Jha:
Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems. NCA 2018: 1-5 - [c87]Rahat Masood, Dinusha Vatsalan, Muhammad Ikram, Mohamed Ali Kâafar:
Incognito: A Method for Obfuscating Web Data. WWW 2018: 267-276 - [i42]Arash Shaghaghi, Mohamed Ali Kâafar, Rajkumar Buyya, Sanjay Jha:
Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions. CoRR abs/1804.00262 (2018) - [i41]Loqman Salamatian, Dali Kaafar, Kavé Salamatian:
A Geometric Approach for Real-time Monitoring of Dynamic Large Scale Graphs: AS-level graphs illustrated. CoRR abs/1806.00676 (2018) - [i40]