Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Mohamed Ali Kâafar
@article{DBLP:journals/access/Salman0K24, author = {Muhammad Salman and Muhammad Ikram and Mohamed Ali K{\^{a}}afar}, title = {Investigating Evasive Techniques in {SMS} Spam Filtering: {A} Comparative Analysis of Machine Learning Models}, journal = {{IEEE} Access}, volume = {12}, pages = {24306--24324}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3364671}, doi = {10.1109/ACCESS.2024.3364671}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/Salman0K24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JmalHBIKW24, author = {Houssem Jmal and Firas Ben Hmida and Nardine Basta and Muhammad Ikram and Mohamed Ali K{\^{a}}afar and Andy Walker}, title = {{SPGNN-API:} {A} Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1601--1613}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3338965}, doi = {10.1109/TIFS.2023.3338965}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/JmalHBIKW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/AsgharZ0NKLC24, author = {Hassan Jameel Asghar and Benjamin Zi Hao Zhao and Muhammad Ikram and Giang Linh Duc Nguyen and Dali Kaafar and Sean Lamont and Daniel Coscia}, title = {Use of cryptography in malware obfuscation}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {20}, number = {1}, pages = {135--152}, year = {2024}, url = {https://doi.org/10.1007/s11416-023-00504-y}, doi = {10.1007/S11416-023-00504-Y}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/AsgharZ0NKLC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-14141, author = {Hina Qayyum and Muhammad Ikram and Benjamin Zi Hao Zhao and Ian D. Wood and Nicolas Kourtellis and Mohamed Ali K{\^{a}}afar}, title = {Exploring the Distinctive Tweeting Patterns of Toxic Twitter Users}, journal = {CoRR}, volume = {abs/2401.14141}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.14141}, doi = {10.48550/ARXIV.2401.14141}, eprinttype = {arXiv}, eprint = {2401.14141}, timestamp = {Tue, 06 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-14141.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-14252, author = {Hina Qayyum and Muhammad Ikram and Benjamin Zi Hao Zhao and Ian D. Wood and Nicolas Kourtellis and Mohamed Ali K{\^{a}}afar}, title = {On mission Twitter Profiles: {A} Study of Selective Toxic Behavior}, journal = {CoRR}, volume = {abs/2401.14252}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.14252}, doi = {10.48550/ARXIV.2401.14252}, eprinttype = {arXiv}, eprint = {2401.14252}, timestamp = {Tue, 06 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-14252.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pervasive/TagBVZBKKO23, author = {Benjamin Tag and Niels van Berkel and Sunny Verma and Benjamin Zi Hao Zhao and Shlomo Berkovsky and Dali Kaafar and Vassilis Kostakos and Olga Ohrimenko}, title = {DDoD: Dual Denial of Decision Attacks on Human-AI Teams}, journal = {{IEEE} Pervasive Comput.}, volume = {22}, number = {1}, pages = {77--84}, year = {2023}, url = {https://doi.org/10.1109/MPRV.2022.3218773}, doi = {10.1109/MPRV.2022.3218773}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pervasive/TagBVZBKKO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/AliZANWK23, author = {Rana Salal Ali and Benjamin Zi Hao Zhao and Hassan Jameel Asghar and Tham Nguyen and Ian David Wood and Mohamed Ali K{\^{a}}afar}, title = {Unintended Memorization and Timing Attacks in Named Entity Recognition Models}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {2}, pages = {329--346}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0056}, doi = {10.56553/POPETS-2023-0056}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/AliZANWK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/VatsalanBK23, author = {Dinusha Vatsalan and Raghav Bhaskar and Mohamed Ali K{\^{a}}afar}, title = {Local Differentially Private Fuzzy Counting in Stream Data Using Probabilistic Data Structures}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {35}, number = {8}, pages = {8185--8198}, year = {2023}, url = {https://doi.org/10.1109/TKDE.2022.3198478}, doi = {10.1109/TKDE.2022.3198478}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/VatsalanBK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AtkinsZAWK23, author = {Conor Atkins and Benjamin Zi Hao Zhao and Hassan Jameel Asghar and Ian D. Wood and Mohamed Ali K{\^{a}}afar}, editor = {Mehdi Tibouchi and Xiaofeng Wang}, title = {Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories}, booktitle = {Applied Cryptography and Network Security - 21st International Conference, {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13905}, pages = {284--308}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-33488-7\_11}, doi = {10.1007/978-3-031-33488-7\_11}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/AtkinsZAWK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SentanaIK23, author = {I Wayan Budi Sentana and Muhammad Ikram and Mohamed Ali K{\^{a}}afar}, editor = {Mehdi Tibouchi and Xiaofeng Wang}, title = {An Empirical Analysis of Security and Privacy Risks in Android Cryptocurrency Wallet Apps}, booktitle = {Applied Cryptography and Network Security - 21st International Conference, {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13906}, pages = {699--725}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-33491-7\_26}, doi = {10.1007/978-3-031-33491-7\_26}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/SentanaIK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/WuVKR23, author = {Nan Wu and Dinusha Vatsalan and Mohamed Ali K{\^{a}}afar and Sanath Kumar Ramesh}, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {Privacy-Preserving Record Linkage for Cardinality Counting}, booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {53--64}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856.3590338}, doi = {10.1145/3579856.3590338}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/WuVKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/QayyumIZWKK23, author = {Hina Qayyum and Muhammad Ikram and Benjamin Zi Hao Zhao and Ian D. Wood and Nicolas Kourtellis and Mohamed Ali K{\^{a}}afar}, editor = {Jingrui He and Themis Palpanas and Xiaohua Hu and Alfredo Cuzzocrea and Dejing Dou and Dominik Slezak and Wei Wang and Aleksandra Gruca and Jerry Chun{-}Wei Lin and Rakesh Agrawal}, title = {Exploring the Distinctive Tweeting Patterns of Toxic Twitter Users}, booktitle = {{IEEE} International Conference on Big Data, BigData 2023, Sorrento, Italy, December 15-18, 2023}, pages = {3624--3633}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/BigData59044.2023.10386402}, doi = {10.1109/BIGDATA59044.2023.10386402}, timestamp = {Fri, 02 Feb 2024 12:00:39 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/QayyumIZWKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/QayyumIZWKK23a, author = {Hina Qayyum and Muhammad Ikram and Benjamin Zi Hao Zhao and Ian D. Wood and Nicolas Kourtellis and Mohamed Ali K{\^{a}}afar}, editor = {Jingrui He and Themis Palpanas and Xiaohua Hu and Alfredo Cuzzocrea and Dejing Dou and Dominik Slezak and Wei Wang and Aleksandra Gruca and Jerry Chun{-}Wei Lin and Rakesh Agrawal}, title = {On mission Twitter Profiles: {A} Study of Selective Toxic Behavior}, booktitle = {{IEEE} International Conference on Big Data, BigData 2023, Sorrento, Italy, December 15-18, 2023}, pages = {3634--3643}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/BigData59044.2023.10386248}, doi = {10.1109/BIGDATA59044.2023.10386248}, timestamp = {Fri, 02 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/QayyumIZWKK23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbk/LuMCHLWVK23, author = {Junda Lu and Yukai Miao and Mingyang Chen and Bo Huang and Bing Li and Wei Wang and Dinusha Vatsalan and Mohamed Ali K{\^{a}}afar}, editor = {Victor S. Sheng and Chindo Hicks and Charles Ling and Vijay Raghavan and Xindong Wu}, title = {Distance Maximization and Defences on Deep Hashing Based Image Retrieval}, booktitle = {{IEEE} International Conference on Knowledge Graph, {ICKG} 2023, Shanghai, China, December 1-2, 2023}, pages = {176--183}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICKG59574.2023.00027}, doi = {10.1109/ICKG59574.2023.00027}, timestamp = {Tue, 19 Mar 2024 16:23:25 +0100}, biburl = {https://dblp.org/rec/conf/icbk/LuMCHLWVK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/KepkowskiMWK23, author = {Michal Kepkowski and Maciej Machulak and Ian D. Wood and Dali Kaafar}, title = {Challenges with Passwordless {FIDO2} in an Enterprise Setting: {A} Usability Study}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {37--48}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00017}, doi = {10.1109/SECDEV56634.2023.00017}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/KepkowskiMWK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/YeohKHKH23, author = {Wei{-}Zhu Yeoh and Michal Kepkowski and Gunnar Heide and Dali Kaafar and Lucjan Hanzlik}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Fast IDentity Online with Anonymous Credentials {(FIDO-AC)}}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {3029--3046}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/yeoh}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/YeohKHKH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/websci/QayyumZW0KK23, author = {Hina Qayyum and Benjamin Zi Hao Zhao and Ian D. Wood and Muhammad Ikram and Nicolas Kourtellis and Mohamed Ali K{\^{a}}afar}, title = {A longitudinal study of the top 1{\%} toxic Twitter profiles}, booktitle = {Proceedings of the 15th {ACM} Web Science Conference 2023, WebSci 2023, Austin, TX, USA, 30 April 2023 - 1 May 2023}, pages = {292--303}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3578503.3583619}, doi = {10.1145/3578503.3583619}, timestamp = {Sat, 27 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/websci/QayyumZW0KK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-04000, author = {Nan Wu and Dinusha Vatsalan and Mohamed Ali K{\^{a}}afar and Sanath Kumar Ramesh}, title = {Privacy-Preserving Record Linkage for Cardinality Counting}, journal = {CoRR}, volume = {abs/2301.04000}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.04000}, doi = {10.48550/ARXIV.2301.04000}, eprinttype = {arXiv}, eprint = {2301.04000}, timestamp = {Thu, 19 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-04000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-14603, author = {Hina Qayyum and Benjamin Zi Hao Zhao and Ian D. Wood and Muhammad Ikram and Mohamed Ali K{\^{a}}afar and Nicolas Kourtellis}, title = {A longitudinal study of the top 1{\%} toxic Twitter profiles}, journal = {CoRR}, volume = {abs/2303.14603}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.14603}, doi = {10.48550/ARXIV.2303.14603}, eprinttype = {arXiv}, eprint = {2303.14603}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-14603.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-05371, author = {Conor Atkins and Benjamin Zi Hao Zhao and Hassan Jameel Asghar and Ian D. Wood and Mohamed Ali K{\^{a}}afar}, title = {Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories}, journal = {CoRR}, volume = {abs/2304.05371}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.05371}, doi = {10.48550/ARXIV.2304.05371}, eprinttype = {arXiv}, eprint = {2304.05371}, timestamp = {Wed, 19 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-05371.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-05561, author = {Gioacchino Tangari and Shreesh Keskar and Hassan Jameel Asghar and Dali Kaafar}, title = {On the Adversarial Inversion of Deep Biometric Representations}, journal = {CoRR}, volume = {abs/2304.05561}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.05561}, doi = {10.48550/ARXIV.2304.05561}, eprinttype = {arXiv}, eprint = {2304.05561}, timestamp = {Wed, 19 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-05561.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-16758, author = {Wei{-}Zhu Yeoh and Michal Kepkowski and Gunnar Heide and Dali Kaafar and Lucjan Hanzlik}, title = {Fast IDentity Online with Anonymous Credentials {(FIDO-AC)}}, journal = {CoRR}, volume = {abs/2305.16758}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.16758}, doi = {10.48550/ARXIV.2305.16758}, eprinttype = {arXiv}, eprint = {2305.16758}, timestamp = {Wed, 07 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-16758.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-19487, author = {Houssem Jmal and Firas Ben Hmida and Nardine Basta and Muhammad Ikram and Mohamed Ali K{\^{a}}afar and Andy Walker}, title = {{SPGNN-API:} {A} Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation}, journal = {CoRR}, volume = {abs/2305.19487}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.19487}, doi = {10.48550/ARXIV.2305.19487}, eprinttype = {arXiv}, eprint = {2305.19487}, timestamp = {Wed, 07 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-19487.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-01965, author = {Ian D. Wood and Michal Kepkowski and Leron Zinatullin and Travis Darnley and Mohamed Ali K{\^{a}}afar}, title = {An analysis of scam baiting calls: Identifying and extracting scam stages and scripts}, journal = {CoRR}, volume = {abs/2307.01965}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.01965}, doi = {10.48550/ARXIV.2307.01965}, eprinttype = {arXiv}, eprint = {2307.01965}, timestamp = {Mon, 10 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-01965.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-08096, author = {Michal Kepkowski and Maciej Machulak and Ian D. Wood and Dali Kaafar}, title = {Challenges with Passwordless {FIDO2} in an Enterprise Setting: {A} Usability Study}, journal = {CoRR}, volume = {abs/2308.08096}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.08096}, doi = {10.48550/ARXIV.2308.08096}, eprinttype = {arXiv}, eprint = {2308.08096}, timestamp = {Wed, 23 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-08096.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-02563, author = {Hassan Jameel Asghar and Zhigang Lu and Zhongrui Zhao and Dali Kaafar}, title = {Practical, Private Assurance of the Value of Collaboration}, journal = {CoRR}, volume = {abs/2310.02563}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.02563}, doi = {10.48550/ARXIV.2310.02563}, eprinttype = {arXiv}, eprint = {2310.02563}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-02563.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/KepkowskiHWK22, author = {Michal Kepkowski and Lucjan Hanzlik and Ian D. Wood and Mohamed Ali K{\^{a}}afar}, title = {How Not to Handle Keys: Timing Attacks on {FIDO} Authenticator Privacy}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {4}, pages = {705--726}, year = {2022}, url = {https://doi.org/10.56553/popets-2022-0129}, doi = {10.56553/POPETS-2022-0129}, timestamp = {Fri, 30 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/KepkowskiHWK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/00080CHSKZ22, author = {Yi Chen and Hongxia Wang and Kim{-}Kwang Raymond Choo and Peisong He and Zoran Salcic and Dali Kaafar and Xuyun Zhang}, title = {{DDCA:} {A} Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {4}, pages = {2405--2420}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3058134}, doi = {10.1109/TDSC.2021.3058134}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/00080CHSKZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuAKWD22, author = {Zhigang Lu and Hassan Jameel Asghar and Mohamed Ali K{\^{a}}afar and Darren Webb and Peter Dickinson}, title = {A Differentially Private Framework for Deep Learning With Convexified Loss Functions}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {2151--2165}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3169911}, doi = {10.1109/TIFS.2022.3169911}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LuAKWD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WuVVK22, author = {Nan Wu and Dinusha Vatsalan and Sunny Verma and Mohamed Ali K{\^{a}}afar}, title = {Fairness and Cost Constrained Privacy-Aware Record Linkage}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {2644--2656}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3191492}, doi = {10.1109/TIFS.2022.3191492}, timestamp = {Mon, 08 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WuVVK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/SheikhAFK22, author = {Nazim Uddin Sheikh and Hassan Jameel Asghar and Farhad Farokhi and Mohamed Ali K{\^{a}}afar}, title = {Do Auto-Regressive Models Protect Privacy? Inferring Fine-Grained Energy Consumption From Aggregated Model Parameters}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {6}, pages = {3198--3209}, year = {2022}, url = {https://doi.org/10.1109/TSC.2021.3100498}, doi = {10.1109/TSC.2021.3100498}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/SheikhAFK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/BastaIKW22, author = {Nardine Basta and Muhammad Ikram and Mohamed Ali K{\^{a}}afar and Andy Walker}, title = {Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation Framework}, booktitle = {2022 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2022, Budapest, Hungary, April 25-29, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/NOMS54207.2022.9789888}, doi = {10.1109/NOMS54207.2022.9789888}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/noms/BastaIKW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/QayyumSSNITK22, author = {Hina Qayyum and Muhammad Salman and I Wayan Budi Sentana and Giang Linh Duc Nguyen and Muhammad Ikram and Gareth Tyson and Mohamed Ali K{\^{a}}afar}, editor = {Xingliang Yuan and Guangdong Bai and Cristina Alcaraz and Suryadipta Majumdar}, title = {A First Look at Android Apps' Third-Party Resources Loading}, booktitle = {Network and System Security - 16th International Conference, {NSS} 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13787}, pages = {193--213}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23020-2\_11}, doi = {10.1007/978-3-031-23020-2\_11}, timestamp = {Mon, 04 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/QayyumSSNITK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/22/MasoodBK22, author = {Rahat Masood and Shlomo Berkovsky and Mohamed Ali K{\^{a}}afar}, title = {Tracking and Personalization}, booktitle = {Modern Socio-Technical Perspectives on Privacy}, pages = {171--202}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-82786-1\_9}, doi = {10.1007/978-3-030-82786-1\_9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/22/MasoodBK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-07853, author = {Hina Qayyum and Benjamin Zi Hao Zhao and Ian D. Wood and Muhammad Ikram and Mohamed Ali K{\^{a}}afar and Nicolas Kourtellis}, title = {A deep dive into the consistently toxic 1{\%} of Twitter}, journal = {CoRR}, volume = {abs/2202.07853}, year = {2022}, url = {https://arxiv.org/abs/2202.07853}, eprinttype = {arXiv}, eprint = {2202.07853}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-07853.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-03077, author = {Muhammad Ikram and Rahat Masood and Gareth Tyson and Mohamed Ali K{\^{a}}afar and Roya Ensafi}, title = {A Study of Third-party Resources Loading on Web}, journal = {CoRR}, volume = {abs/2203.03077}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.03077}, doi = {10.48550/ARXIV.2203.03077}, eprinttype = {arXiv}, eprint = {2203.03077}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-03077.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-10673, author = {Nardine Basta and Ming Ding and Muhammad Ikram and Mohamed Ali K{\^{a}}afar}, title = {5G-Enabled Pseudonymity for Cooperative Intelligent Transportation System}, journal = {CoRR}, volume = {abs/2203.10673}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.10673}, doi = {10.48550/ARXIV.2203.10673}, eprinttype = {arXiv}, eprint = {2203.10673}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-10673.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-01049, author = {Zhigang Lu and Hassan Jameel Asghar and Mohamed Ali K{\^{a}}afar and Darren Webb and Peter Dickinson}, title = {A Differentially Private Framework for Deep Learning with Convexified Loss Functions}, journal = {CoRR}, volume = {abs/2204.01049}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.01049}, doi = {10.48550/ARXIV.2204.01049}, eprinttype = {arXiv}, eprint = {2204.01049}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-01049.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-06641, author = {Rahat Masood and Wing Yan Cheng and Dinusha Vatsalan and Deepak Mishra and Hassan Jameel Asghar and Mohamed Ali K{\^{a}}afar}, title = {Privacy Preserving Release of Mobile Sensor Data}, journal = {CoRR}, volume = {abs/2205.06641}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.06641}, doi = {10.48550/ARXIV.2205.06641}, eprinttype = {arXiv}, eprint = {2205.06641}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-06641.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-08071, author = {Michal Kepkowski and Lucjan Hanzlik and Ian D. Wood and Mohamed Ali K{\^{a}}afar}, title = {How Not to Handle Keys: Timing Attacks on {FIDO} Authenticator Privacy}, journal = {CoRR}, volume = {abs/2205.08071}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.08071}, doi = {10.48550/ARXIV.2205.08071}, eprinttype = {arXiv}, eprint = {2205.08071}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-08071.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-15089, author = {Nan Wu and Dinusha Vatsalan and Sunny Verma and Mohamed Ali K{\^{a}}afar}, title = {Fairness and Cost Constrained Privacy-Aware Record Linkage}, journal = {CoRR}, volume = {abs/2206.15089}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.15089}, doi = {10.48550/ARXIV.2206.15089}, eprinttype = {arXiv}, eprint = {2206.15089}, timestamp = {Mon, 04 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-15089.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-05264, author = {Dinusha Vatsalan and Raghav Bhaskar and Mohamed Ali K{\^{a}}afar}, title = {Local Differentially Private Fuzzy Counting in Stream Data using Probabilistic Data Structure}, journal = {CoRR}, volume = {abs/2208.05264}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.05264}, doi = {10.48550/ARXIV.2208.05264}, eprinttype = {arXiv}, eprint = {2208.05264}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-05264.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-10451, author = {Muhammad Salman and Muhammad Ikram and Mohamed Ali K{\^{a}}afar}, title = {An Empirical Analysis of {SMS} Scam Detection Systems}, journal = {CoRR}, volume = {abs/2210.10451}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.10451}, doi = {10.48550/ARXIV.2210.10451}, eprinttype = {arXiv}, eprint = {2210.10451}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-10451.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-02245, author = {Rana Salal Ali and Benjamin Zi Hao Zhao and Hassan Jameel Asghar and Tham Nguyen and Ian David Wood and Dali Kaafar}, title = {Unintended Memorization and Timing Attacks in Named Entity Recognition Models}, journal = {CoRR}, volume = {abs/2211.02245}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.02245}, doi = {10.48550/ARXIV.2211.02245}, eprinttype = {arXiv}, eprint = {2211.02245}, timestamp = {Wed, 09 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-02245.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-03980, author = {Benjamin Tag and Niels van Berkel and Sunny Verma and Benjamin Zi Hao Zhao and Shlomo Berkovsky and Dali Kaafar and Vassilis Kostakos and Olga Ohrimenko}, title = {DDoD: Dual Denial of Decision Attacks on Human-AI Teams}, journal = {CoRR}, volume = {abs/2212.03980}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.03980}, doi = {10.48550/ARXIV.2212.03980}, eprinttype = {arXiv}, eprint = {2212.03980}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-03980.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-04008, author = {Hassan Jameel Asghar and Benjamin Zi Hao Zhao and Muhammad Ikram and Giang L. D. Nguyen and Dali Kaafar and Sean Lamont and Daniel Coscia}, title = {SoK: Use of Cryptography in Malware Obfuscation}, journal = {CoRR}, volume = {abs/2212.04008}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.04008}, doi = {10.48550/ARXIV.2212.04008}, eprinttype = {arXiv}, eprint = {2212.04008}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-04008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsgharZINKLC22, author = {Hassan Jameel Asghar and Benjamin Zi Hao Zhao and Muhammad Ikram and Giang Linh Duc Nguyen and Dali Kaafar and Sean Lamont and Daniel Coscia}, title = {SoK: Use of Cryptography in Malware Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1699}, year = {2022}, url = {https://eprint.iacr.org/2022/1699}, timestamp = {Mon, 04 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AsgharZINKLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jamia/TangariISIKB21, author = {Gioacchino Tangari and Muhammad Ikram and I Wayan Budi Sentana and Kiran Ijaz and Mohamed Ali K{\^{a}}afar and Shlomo Berkovsky}, title = {Analyzing security issues of android mobile health and medical applications}, journal = {J. Am. Medical Informatics Assoc.}, volume = {28}, number = {10}, pages = {2074--2084}, year = {2021}, url = {https://doi.org/10.1093/jamia/ocab131}, doi = {10.1093/JAMIA/OCAB131}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jamia/TangariISIKB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/MiaoXCPZZKX21, author = {Yuantian Miao and Minhui Xue and Chao Chen and Lei Pan and Jun Zhang and Benjamin Zi Hao Zhao and Dali Kaafar and Yang Xiang}, title = {The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {1}, pages = {209--228}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0012}, doi = {10.2478/POPETS-2021-0012}, timestamp = {Tue, 19 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/MiaoXCPZZKX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FarokhiWSK21, author = {Farhad Farokhi and Nan Wu and David B. Smith and Mohamed Ali K{\^{a}}afar}, title = {The Cost of Privacy in Asynchronous Differentially-Private Machine Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {2118--2129}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3050603}, doi = {10.1109/TIFS.2021.3050603}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/FarokhiWSK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/Dehez-ClementiL21, author = {Marina Dehez{-}Clementi and J{\'{e}}r{\^{o}}me Lacan and Jean{-}Christophe Deneuville and Hassan Asghar and Dali Kaafar}, editor = {Yang Xiang and Ziyuan Wang and Honggang Wang and Valtteri Niemi}, title = {A Blockchain-enabled Anonymous-yet- Traceable Distributed Key Generation}, booktitle = {2021 {IEEE} International Conference on Blockchain, Blockchain 2021, Melbourne, Australia, December 6-8, 2021}, pages = {257--265}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/Blockchain53845.2021.00042}, doi = {10.1109/BLOCKCHAIN53845.2021.00042}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/blockchain2/Dehez-ClementiL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/ZhaoACABKWD21, author = {Benjamin Zi Hao Zhao and Aviral Agrawal and Catisha Coburn and Hassan Jameel Asghar and Raghav Bhaskar and Mohamed Ali K{\^{a}}afar and Darren Webb and Peter Dickinson}, title = {On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {232--251}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSP51992.2021.00025}, doi = {10.1109/EUROSP51992.2021.00025}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/ZhaoACABKWD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/SheikhLAK21, author = {Nazim Uddin Sheikh and Zhigang Lu and Hassan Jameel Asghar and Mohamed Ali K{\^{a}}afar}, editor = {Pierangela Samarati and Marten van Sinderen and Sabrina De Capitani di Vimercati and Fons Wijnhoven}, title = {Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics}, booktitle = {E-Business and Telecommunications - 18th International Conference, {ICETE} 2021, Virtual Event, July 6-9, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1795}, pages = {305--333}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-36840-0\_14}, doi = {10.1007/978-3-031-36840-0\_14}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icete/SheikhLAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SheikhLAK21, author = {Nazim Uddin Sheikh and Zhigang Lu and Hassan Asghar and Mohamed Ali K{\^{a}}afar}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Trace Recovery: Inferring Fine-grained Trace of Energy Data from Aggregates}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {283--294}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010560302830294}, doi = {10.5220/0010560302830294}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SheikhLAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SentanaIKB21, author = {I Wayan Budi Sentana and Muhammad Ikram and Mohamed Ali K{\^{a}}afar and Shlomo Berkovsky}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Empirical Security and Privacy Analysis of Mobile Symptom Checking Apps on Google Play}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {665--673}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010520106650673}, doi = {10.5220/0010520106650673}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SentanaIKB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SentanaIK21, author = {I Wayan Budi Sentana and Muhammad Ikram and Mohamed Ali K{\^{a}}afar}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {BlockJack: Towards Improved Prevention of {IP} Prefix Hijacking Attacks in Inter-domain Routing via Blockchain}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {674--679}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010521106740679}, doi = {10.5220/0010521106740679}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SentanaIK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-01944, author = {Zainab Abaid and Dilip Sarkar and Mohamed Ali K{\^{a}}afar and Sanjay K. Jha}, title = {All Infections are Not Created Equal: Time-Sensitive Prediction of Malware Generated Network Attacks}, journal = {CoRR}, volume = {abs/2102.01944}, year = {2021}, url = {https://arxiv.org/abs/2102.01944}, eprinttype = {arXiv}, eprint = {2102.01944}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-01944.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-07101, author = {Benjamin Zi Hao Zhao and Aviral Agrawal and Catisha Coburn and Hassan Jameel Asghar and Raghav Bhaskar and Mohamed Ali K{\^{a}}afar and Darren Webb and Peter Dickinson}, title = {On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models}, journal = {CoRR}, volume = {abs/2103.07101}, year = {2021}, url = {https://arxiv.org/abs/2103.07101}, eprinttype = {arXiv}, eprint = {2103.07101}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-07101.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-09904, author = {Tham Nguyen and Hassan Jameel Asghar and Raghav Bhaskar and Dali Kaafar and Farhad Farokhi}, title = {Sharing in a Trustless World: Privacy-Preserving Data Analytics with Potentially Cheating Participants}, journal = {CoRR}, volume = {abs/2106.09904}, year = {2021}, url = {https://arxiv.org/abs/2106.09904}, eprinttype = {arXiv}, eprint = {2106.09904}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-09904.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-07063, author = {I Wayan Budi Sentana and Muhammad Ikram and Mohamed Ali K{\^{a}}afar}, title = {BlockJack: Towards Improved Prevention of {IP} Prefix Hijacking Attacks in Inter-Domain Routing Via Blockchain}, journal = {CoRR}, volume = {abs/2107.07063}, year = {2021}, url = {https://arxiv.org/abs/2107.07063}, eprinttype = {arXiv}, eprint = {2107.07063}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-07063.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-13754, author = {I Wayan Budi Sentana and Muhammad Ikram and Mohamed Ali K{\^{a}}afar and Shlomo Berkovsky}, title = {Empirical Security and Privacy Analysis of Mobile Symptom Checking Applications on Google Play}, journal = {CoRR}, volume = {abs/2107.13754}, year = {2021}, url = {https://arxiv.org/abs/2107.13754}, eprinttype = {arXiv}, eprint = {2107.13754}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-13754.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-10967, author = {Nardine Basta and Muhammad Ikram and Mohamed Ali K{\^{a}}afar and Andy Walker}, title = {Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation Framework}, journal = {CoRR}, volume = {abs/2111.10967}, year = {2021}, url = {https://arxiv.org/abs/2111.10967}, eprinttype = {arXiv}, eprint = {2111.10967}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-10967.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/AsgharDRMK20, author = {Hassan Jameel Asghar and Ming Ding and Thierry Rakotoarivelo and Sirine Mrabet and Dali Kaafar}, title = {Differentially Private Release of Datasets using Gaussian Copula}, journal = {J. Priv. Confidentiality}, volume = {10}, number = {2}, year = {2020}, url = {https://doi.org/10.29012/jpc.686}, doi = {10.29012/JPC.686}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/AsgharDRMK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/KamalarubanPAK20, author = {Parameswaran Kamalaruban and Victor Perrier and Hassan Jameel Asghar and Mohamed Ali K{\^{a}}afar}, title = {Not All Attributes are Created Equal: dX -Private Mechanisms for Linear Queries}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2020}, number = {1}, pages = {103--125}, year = {2020}, url = {https://doi.org/10.2478/popets-2020-0007}, doi = {10.2478/POPETS-2020-0007}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/KamalarubanPAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/AsgharK20, author = {Hassan Jameel Asghar and Dali Kaafar}, title = {Averaging Attacks on Bounded Noise-based Disclosure Control Algorithms}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2020}, number = {2}, pages = {358--378}, year = {2020}, url = {https://doi.org/10.2478/popets-2020-0031}, doi = {10.2478/POPETS-2020-0031}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/AsgharK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/IkramMTKLE20, author = {Muhammad Ikram and Rahat Masood and Gareth Tyson and Mohamed Ali K{\^{a}}afar and Noha Loizon and Roya Ensafi}, title = {Measuring and Analysing the Chain of Implicit Trust: {A} Study of Third-party Resources Loading}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {2}, pages = {8:1--8:27}, year = {2020}, url = {https://doi.org/10.1145/3380466}, doi = {10.1145/3380466}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/IkramMTKLE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhaoAKTY20, author = {Benjamin Zi Hao Zhao and Hassan Jameel Asghar and Mohamed Ali K{\^{a}}afar and Francesca Trevisan and Haiyue Yuan}, title = {Exploiting Behavioral Side Channels in Observation Resilient Cognitive Authentication Schemes}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {1}, pages = {1:1--1:33}, year = {2020}, url = {https://doi.org/10.1145/3414844}, doi = {10.1145/3414844}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ZhaoAKTY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/Yang0VZKH20, author = {Qing Yang and Yiran Shen and Dinusha Vatsalan and Jianpei Zhang and Mohamed Ali K{\^{a}}afar and Wen Hu}, title = {P4Mobi: {A} Probabilistic Privacy-Preserving Framework for Publishing Mobility Datasets}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {69}, number = {7}, pages = {6987--6999}, year = {2020}, url = {https://doi.org/10.1109/TVT.2020.2994157}, doi = {10.1109/TVT.2020.2994157}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/Yang0VZKH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccsw-ws/ZhaoKK20, author = {Benjamin Zi Hao Zhao and Mohamed Ali K{\^{a}}afar and Nicolas Kourtellis}, editor = {Yinqian Zhang and Radu Sion}, title = {Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning}, booktitle = {CCSW'20, Proceedings of the 2020 {ACM} {SIGSAC} Conference on Cloud Computing Security Workshop, Virtual Event, USA, November 9, 2020}, pages = {15--26}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411495.3421352}, doi = {10.1145/3411495.3421352}, timestamp = {Thu, 12 Oct 2023 12:32:08 +0200}, biburl = {https://dblp.org/rec/conf/ccsw-ws/ZhaoKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/SentanaIK20, author = {I Wayan Budi Sentana and Muhammad Ikram and Mohamed Ali K{\^{a}}afar}, title = {BlockJack: Blocking {IP} Prefix Hijacker in Inter-Domain Routing}, booktitle = {CoNEXT'20: Proceedings of the Student Workshop, Barcelona, Spain, December 1, 2020}, pages = {1--2}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3426746.3434052}, doi = {10.1145/3426746.3434052}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/SentanaIK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Dehez-ClementiD20, author = {Marina Dehez{-}Clementi and Jean{-}Christophe Deneuville and J{\'{e}}r{\^{o}}me Lacan and Hassan Asghar and Dali Kaafar}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Jordi Herrera{-}Joancomart{\'{\i}}}, title = {Who Let the\emph{DOGS}Out: Anonymous but Auditable Communications Using Group Signature Schemes with Distributed Opening}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2020 International Workshops, {DPM} 2020 and {CBT} 2020, Guildford, UK, September 17-18, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12484}, pages = {437--446}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-66172-4\_28}, doi = {10.1007/978-3-030-66172-4\_28}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/Dehez-ClementiD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itnac/ShahpasandHKV20, author = {Maryam Shahpasand and Leonard G. C. Hamey and Mohamed Ali K{\^{a}}afar and Dinusha Vatsalan}, title = {Feature-Based Adversarial Attacks Against Machine Learnt Mobile Malware Detectors}, booktitle = {30th International Telecommunication Networks and Applications Conference, {ITNAC} 2020, Melbourne, Australia, November 25-27, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ITNAC50341.2020.9315144}, doi = {10.1109/ITNAC50341.2020.9315144}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itnac/ShahpasandHKV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ZhaoAK20, author = {Benjamin Zi Hao Zhao and Hassan Jameel Asghar and Mohamed Ali K{\^{a}}afar}, title = {On the Resilience of Biometric Authentication Systems against Random Inputs}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/on-the-resilience-of-biometric-authentication-systems-against-random-inputs/}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ZhaoAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WuFSK20, author = {Nan Wu and Farhad Farokhi and David B. Smith and Mohamed Ali K{\^{a}}afar}, title = {The Value of Collaboration in Convex Machine Learning with Differential Privacy}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {304--317}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00025}, doi = {10.1109/SP40000.2020.00025}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/WuFSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/ShaghaghiKBJ20, author = {Arash Shaghaghi and Mohamed Ali K{\^{a}}afar and Rajkumar Buyya and Sanjay Jha}, editor = {Brij B. Gupta and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Dharma P. Agrawal and Deepak Gupta}, title = {Software-Defined Network {(SDN)} Data Plane Security: Issues, Solutions, and Future Directions}, booktitle = {Handbook of Computer Networks and Cyber Security, Principles and Paradigms}, pages = {341--387}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-22277-2\_14}, doi = {10.1007/978-3-030-22277-2\_14}, timestamp = {Sun, 12 Nov 2023 02:22:31 +0100}, biburl = {https://dblp.org/rec/books/sp/20/ShaghaghiKBJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-04056, author = {Benjamin Zi Hao Zhao and Hassan Jameel Asghar and Mohamed Ali K{\^{a}}afar}, title = {On the Resilience of Biometric Authentication Systems against Random Inputs}, journal = {CoRR}, volume = {abs/2001.04056}, year = {2020}, url = {https://arxiv.org/abs/2001.04056}, eprinttype = {arXiv}, eprint = {2001.04056}, timestamp = {Fri, 17 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-04056.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-10648, author = {Farhad Farokhi and Mohamed Ali K{\^{a}}afar}, title = {Modelling and Quantifying Membership Information Leakage in Machine Learning}, journal = {CoRR}, volume = {abs/2001.10648}, year = {2020}, url = {https://arxiv.org/abs/2001.10648}, eprinttype = {arXiv}, eprint = {2001.10648}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-10648.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-06856, author = {Shakila Mahjabin Tonni and Farhad Farokhi and Dinusha Vatsalan and Dali Kaafar}, title = {Data and Model Dependencies of Membership Inference Attack}, journal = {CoRR}, volume = {abs/2002.06856}, year = {2020}, url = {https://arxiv.org/abs/2002.06856}, eprinttype = {arXiv}, eprint = {2002.06856}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-06856.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-08500, author = {Farhad Farokhi and Mohamed Ali K{\^{a}}afar}, title = {Predicting Performance of Asynchronous Differentially-Private Learning}, journal = {CoRR}, volume = {abs/2003.08500}, year = {2020}, url = {https://arxiv.org/abs/2003.08500}, eprinttype = {arXiv}, eprint = {2003.08500}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-08500.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-11231, author = {Mahmood Yousefi{-}Azar and Mohamed Ali K{\^{a}}afar and Andy Walker}, title = {Unsupervised Learning for security of Enterprise networks by micro-segmentation}, journal = {CoRR}, volume = {abs/2003.11231}, year = {2020}, url = {https://arxiv.org/abs/2003.11231}, eprinttype = {arXiv}, eprint = {2003.11231}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-11231.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-11210, author = {Benjamin Zi Hao Zhao and Hassan Jameel Asghar and Mohamed Ali K{\^{a}}afar and Francesca Trevisan and Haiyue Yuan}, title = {Exploiting Behavioral Side-Channels in Observation Resilient Cognitive Authentication Schemes}, journal = {CoRR}, volume = {abs/2007.11210}, year = {2020}, url = {https://arxiv.org/abs/2007.11210}, eprinttype = {arXiv}, eprint = {2007.11210}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-11210.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-08807, author = {Benjamin Zi Hao Zhao and Mohamed Ali K{\^{a}}afar and Nicolas Kourtellis}, title = {Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning}, journal = {CoRR}, volume = {abs/2008.08807}, year = {2020}, url = {https://arxiv.org/abs/2008.08807}, eprinttype = {arXiv}, eprint = {2008.08807}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-08807.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MonteiroKATRKLS20, author = {Matthieu Monteiro and Kumara Kahatapitiya and Hassan Jameel Asghar and Kanchana Thilakarathna and Thierry Rakotoarivelo and Dali Kaafar and Shujun Li and Ron Steinfeld and Josef Pieprzyk}, title = {Foxtail+: {A} Learning with Errors-based Authentication Protocol for Resource-Constrained Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {261}, year = {2020}, url = {https://eprint.iacr.org/2020/261}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MonteiroKATRKLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AsgharCJKMMRY19, author = {Hassan Jameel Asghar and Emiliano De Cristofaro and Guillaume Jourjon and Mohamed Ali K{\^{a}}afar and Laurent Mathy and Luca Melis and Craig Russell and Mang Yu}, title = {Fast privacy-preserving network function outsourcing}, journal = {Comput. Networks}, volume = {163}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2019.106893}, doi = {10.1016/J.COMNET.2019.106893}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AsgharCJKMMRY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HuangSDK19, author = {Hailong Huang and Andrey V. Savkin and Ming Ding and Mohamed Ali K{\^{a}}afar}, title = {Optimized deployment of drone base station to improve user experience in cellular networks}, journal = {J. Netw. Comput. Appl.}, volume = {144}, pages = {49--58}, year = {2019}, url = {https://doi.org/10.1016/j.jnca.2019.07.002}, doi = {10.1016/J.JNCA.2019.07.002}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/HuangSDK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/JiangTMKS19, author = {Fangzhou Jiang and Kanchana Thilakarathna and Sirine Mrabet and Mohamed Ali K{\^{a}}afar and Aruna Seneviratne}, title = {uStash: {A} Novel Mobile Content Delivery System for Improving User QoE in Public Transport}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {18}, number = {6}, pages = {1447--1460}, year = {2019}, url = {https://doi.org/10.1109/TMC.2018.2859318}, doi = {10.1109/TMC.2018.2859318}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/JiangTMKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vtm/ZangDSTRK19, author = {Shizhe Zang and Ming Ding and David Smith and Paul Tyler and Thierry Rakotoarivelo and Mohamed Ali K{\^{a}}afar}, title = {The Impact of Adverse Weather Conditions on Autonomous Vehicles: How Rain, Snow, Fog, and Hail Affect the Performance of a Self-Driving Car}, journal = {{IEEE} Veh. Technol. Mag.}, volume = {14}, number = {2}, pages = {103--111}, year = {2019}, url = {https://doi.org/10.1109/MVT.2019.2892497}, doi = {10.1109/MVT.2019.2892497}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vtm/ZangDSTRK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhaoIAKCT19, author = {Benjamin Zi Hao Zhao and Muhammad Ikram and Hassan Jameel Asghar and Mohamed Ali K{\^{a}}afar and Abdelberi Chaabane and Kanchana Thilakarathna}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {A Decade of Mal-Activity Reporting: {A} Retrospective Analysis of Internet Malicious Activity Blacklists}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {193--205}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329834}, doi = {10.1145/3321705.3329834}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhaoIAKCT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/IkramBK19, author = {Muhammad Ikram and Pierrick Beaume and Mohamed Ali K{\^{a}}afar}, editor = {Mohammad S. Obaidat and Pierangela Samarati}, title = {DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling}, booktitle = {Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague, Czech Republic, July 26-28, 2019}, pages = {211--219}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007834602110219}, doi = {10.5220/0007834602110219}, timestamp = {Tue, 06 Jun 2023 14:58:02 +0200}, biburl = {https://dblp.org/rec/conf/icete/IkramBK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/HashmiIK19, author = {Saad Sajid Hashmi and Muhammad Ikram and Mohamed Ali K{\^{a}}afar}, editor = {Soumaya Cherkaoui and Lyes Khoukhi}, title = {A Longitudinal Analysis of Online Ad-Blocking Blacklists}, booktitle = {2019 {IEEE} 44th {LCN} Symposium on Emerging Topics in Networking {(LCN} Symposium), Osnabr{\"{u}}ck, Germany, October 14-17, 2019}, pages = {158--165}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/LCNSymposium47956.2019.9000671}, doi = {10.1109/LCNSYMPOSIUM47956.2019.9000671}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/HashmiIK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/PerrierAK19, author = {Victor Perrier and Hassan Jameel Asghar and Dali Kaafar}, title = {Private Continual Release of Real-Valued Data Streams}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/private-continual-release-of-real-valued-data-streams/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/PerrierAK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/IkramMTKLE19, author = {Muhammad Ikram and Rahat Masood and Gareth Tyson and Mohamed Ali K{\^{a}}afar and Noha Loizon and Roya Ensafi}, editor = {Ling Liu and Ryen W. White and Amin Mantrach and Fabrizio Silvestri and Julian J. McAuley and Ricardo Baeza{-}Yates and Leila Zia}, title = {The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading}, booktitle = {The World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA, May 13-17, 2019}, pages = {2851--2857}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3308558.3313521}, doi = {10.1145/3308558.3313521}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/IkramMTKLE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-07699, author = {Muhammad Ikram and Rahat Masood and Gareth Tyson and Mohamed Ali K{\^{a}}afar and Noha Loizon and Roya Ensafi}, title = {The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading}, journal = {CoRR}, volume = {abs/1901.07699}, year = {2019}, url = {http://arxiv.org/abs/1901.07699}, eprinttype = {arXiv}, eprint = {1901.07699}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-07699.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-01499, author = {Hassan Jameel Asghar and Ming Ding and Thierry Rakotoarivelo and Sirine Mrabet and Mohamed Ali K{\^{a}}afar}, title = {Differentially Private Release of High-Dimensional Datasets using the Gaussian Copula}, journal = {CoRR}, volume = {abs/1902.01499}, year = {2019}, url = {http://arxiv.org/abs/1902.01499}, eprinttype = {arXiv}, eprint = {1902.01499}, timestamp = {Tue, 09 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-01499.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-06414, author = {Hassan Jameel Asghar and Dali Kaafar}, title = {Averaging Attacks on Bounded Perturbation Algorithms}, journal = {CoRR}, volume = {abs/1902.06414}, year = {2019}, url = {http://arxiv.org/abs/1902.06414}, eprinttype = {arXiv}, eprint = {1902.06414}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-06414.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-10629, author = {Benjamin Zi Hao Zhao and Muhammad Ikram and Hassan Jameel Asghar and Mohamed Ali K{\^{a}}afar and Abdelberi Chaabane and Kanchana Thilakarathna}, title = {A Decade of Mal-Activity Reporting: {A} Retrospective Analysis of Internet Malicious Activity Blacklists}, journal = {CoRR}, volume = {abs/1904.10629}, year = {2019}, url = {http://arxiv.org/abs/1904.10629}, eprinttype = {arXiv}, eprint = {1904.10629}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-10629.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-07082, author = {Yuantian Miao and Benjamin Zi Hao Zhao and Minhui Xue and Chao Chen and Lei Pan and Jun Zhang and Dali Kaafar and Yang Xiang}, title = {The Audio Auditor: Participant-Level Membership Inference in Voice-Based IoT}, journal = {CoRR}, volume = {abs/1905.07082}, year = {2019}, url = {http://arxiv.org/abs/1905.07082}, eprinttype = {arXiv}, eprint = {1905.07082}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-07082.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-09136, author = {Muhammad Ikram and Pierrick Beaume and Mohamed Ali K{\^{a}}afar}, title = {DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling}, journal = {CoRR}, volume = {abs/1905.09136}, year = {2019}, url = {http://arxiv.org/abs/1905.09136}, eprinttype = {arXiv}, eprint = {1905.09136}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-09136.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-00166, author = {Saad Sajid Hashmi and Muhammad Ikram and Mohamed Ali K{\^{a}}afar}, title = {A Longitudinal Analysis of Online Ad-Blocking Blacklists}, journal = {CoRR}, volume = {abs/1906.00166}, year = {2019}, url = {http://arxiv.org/abs/1906.00166}, eprinttype = {arXiv}, eprint = {1906.00166}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-00166.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-09679, author = {Nan Wu and Farhad Farokhi and David B. Smith and Mohamed Ali K{\^{a}}afar}, title = {The Value of Collaboration in Convex Machine Learning with Differential Privacy}, journal = {CoRR}, volume = {abs/1906.09679}, year = {2019}, url = {http://arxiv.org/abs/1906.09679}, eprinttype = {arXiv}, eprint = {1906.09679}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-09679.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-10558, author = {Benjamin Zi Hao Zhao and Hassan Jameel Asghar and Raghav Bhaskar and Mohamed Ali K{\^{a}}afar}, title = {On Inferring Training Data Attributes in Machine Learning Models}, journal = {CoRR}, volume = {abs/1908.10558}, year = {2019}, url = {http://arxiv.org/abs/1908.10558}, eprinttype = {arXiv}, eprint = {1908.10558}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-10558.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-02742, author = {Shaofeng Li and Benjamin Zi Hao Zhao and Jiahao Yu and Minhui Xue and Dali Kaafar and Haojin Zhu}, title = {Invisible Backdoor Attacks Against Deep Neural Networks}, journal = {CoRR}, volume = {abs/1909.02742}, year = {2019}, url = {http://arxiv.org/abs/1909.02742}, eprinttype = {arXiv}, eprint = {1909.02742}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-02742.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/ChauhanKM18, author = {Jagmohan Chauhan and Mohamed Ali K{\^{a}}afar and Anirban Mahanti}, title = {The Web for Underpowered Mobile Devices: Lessons Learned from Google Glass}, journal = {{IEEE} Internet Comput.}, volume = {22}, number = {3}, pages = {38--47}, year = {2018}, url = {https://doi.org/10.1109/MIC.2017.3301612}, doi = {10.1109/MIC.2017.3301612}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/ChauhanKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/DingLCK18, author = {Ming Ding and David L{\'{o}}pez{-}P{\'{e}}rez and Holger Claussen and Mohamed Ali K{\^{a}}afar}, title = {On the Fundamental Characteristics of Ultra-Dense Small Cell Networks}, journal = {{IEEE} Netw.}, volume = {32}, number = {3}, pages = {92--100}, year = {2018}, url = {https://doi.org/10.1109/MNET.2018.1700096}, doi = {10.1109/MNET.2018.1700096}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/DingLCK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/MasoodZAK18, author = {Rahat Masood and Benjamin Zi Hao Zhao and Hassan Jameel Asghar and Mohamed Ali K{\^{a}}afar}, title = {Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2018}, number = {2}, pages = {122--142}, year = {2018}, url = {https://doi.org/10.1515/popets-2018-0016}, doi = {10.1515/POPETS-2018-0016}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/MasoodZAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/XieLKW18, author = {Gaogang Xie and Zhenyu Li and Mohamed Ali K{\^{a}}afar and Qinghua Wu}, title = {Access Types Effect on Internet Video Services and Its Implications on {CDN} Caching}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {28}, number = {5}, pages = {1183--1196}, year = {2018}, url = {https://doi.org/10.1109/TCSVT.2017.2652487}, doi = {10.1109/TCSVT.2017.2652487}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/XieLKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/ShaghaghiKKBJ18, author = {Arash Shaghaghi and Salil S. Kanhere and Mohamed Ali K{\^{a}}afar and Elisa Bertino and Sanjay Jha}, title = {Gargoyle: {A} Network-based Insider Attack Resilient Framework for Organizations}, booktitle = {43rd {IEEE} Conference on Local Computer Networks, {LCN} 2018, Chicago, IL, USA, October 1-4, 2018}, pages = {553--561}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/LCN.2018.8638245}, doi = {10.1109/LCN.2018.8638245}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/ShaghaghiKKBJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/ShaghaghiKKJ18, author = {Arash Shaghaghi and Salil S. Kanhere and Mohamed Ali K{\^{a}}afar and Sanjay Jha}, title = {Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems}, booktitle = {17th {IEEE} International Symposium on Network Computing and Applications, {NCA} 2018, Cambridge, MA, USA, November 1-3, 2018}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NCA.2018.8548074}, doi = {10.1109/NCA.2018.8548074}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nca/ShaghaghiKKJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/MasoodVIK18, author = {Rahat Masood and Dinusha Vatsalan and Muhammad Ikram and Mohamed Ali K{\^{a}}afar}, editor = {Pierre{-}Antoine Champin and Fabien Gandon and Mounia Lalmas and Panagiotis G. Ipeirotis}, title = {Incognito: {A} Method for Obfuscating Web Data}, booktitle = {Proceedings of the 2018 World Wide Web Conference on World Wide Web, {WWW} 2018, Lyon, France, April 23-27, 2018}, pages = {267--276}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3178876.3186093}, doi = {10.1145/3178876.3186093}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/MasoodVIK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-00262, author = {Arash Shaghaghi and Mohamed Ali K{\^{a}}afar and Rajkumar Buyya and Sanjay Jha}, title = {Software-Defined Network {(SDN)} Data Plane Security: Issues, Solutions and Future Directions}, journal = {CoRR}, volume = {abs/1804.00262}, year = {2018}, url = {http://arxiv.org/abs/1804.00262}, eprinttype = {arXiv}, eprint = {1804.00262}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-00262.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-00676, author = {Loqman Salamatian and Dali Kaafar and Kav{\'{e}} Salamatian}, title = {A Geometric Approach for Real-time Monitoring of Dynamic Large Scale Graphs: AS-level graphs illustrated}, journal = {CoRR}, volume = {abs/1806.00676}, year = {2018}, url = {http://arxiv.org/abs/1806.00676}, eprinttype = {arXiv}, eprint = {1806.00676}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-00676.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-02389, author = {Parameswaran Kamalaruban and Victor Perrier and Hassan Jameel Asghar and Mohamed Ali K{\^{a}}afar}, title = {d\({}_{\mbox{X}}\)-Private Mechanisms for Linear Queries}, journal = {CoRR}, volume = {abs/1806.02389}, year = {2018}, url = {http://arxiv.org/abs/1806.02389}, eprinttype = {arXiv}, eprint = {1806.02389}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-02389.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-02593, author = {Arash Shaghaghi and Salil S. Kanhere and Mohamed Ali K{\^{a}}afar and Elisa Bertino and Sanjay Jha}, title = {Gargoyle: {A} Network-based Insider Attack Resilient Framework for Organizations}, journal = {CoRR}, volume = {abs/1807.02593}, year = {2018}, url = {http://arxiv.org/abs/1807.02593}, eprinttype = {arXiv}, eprint = {1807.02593}, timestamp = {Wed, 15 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-02593.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-06988, author = {Arash Shaghaghi and Salil S. Kanhere and Mohamed Ali K{\^{a}}afar and Sanjay Jha}, title = {Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems}, journal = {CoRR}, volume = {abs/1809.06988}, year = {2018}, url = {http://arxiv.org/abs/1809.06988}, eprinttype = {arXiv}, eprint = {1809.06988}, timestamp = {Wed, 15 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-06988.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-03197, author = {Victor Perrier and Hassan Jameel Asghar and Dali Kaafar}, title = {Private Continual Release of Real-Valued Data Streams}, journal = {CoRR}, volume = {abs/1811.03197}, year = {2018}, url = {http://arxiv.org/abs/1811.03197}, eprinttype = {arXiv}, eprint = {1811.03197}, timestamp = {Thu, 22 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-03197.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-02274, author = {Qingrong Chen and Chong Xiang and Minhui Xue and Bo Li and Nikita Borisov and Dali Kaafar and Haojin Zhu}, title = {Differentially Private Data Generative Models}, journal = {CoRR}, volume = {abs/1812.02274}, year = {2018}, url = {http://arxiv.org/abs/1812.02274}, eprinttype = {arXiv}, eprint = {1812.02274}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-02274.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ThilakarathnaSG17, author = {Kanchana Thilakarathna and Suranga Seneviratne and Kamal Gupta and Mohamed Ali K{\^{a}}afar and Aruna Seneviratne}, title = {A deep dive into location-based communities in social discovery networks}, journal = {Comput. Commun.}, volume = {100}, pages = {78--90}, year = {2017}, url = {https://doi.org/10.1016/j.comcom.2016.11.008}, doi = {10.1016/J.COMCOM.2016.11.008}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/ThilakarathnaSG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ThilakarathnaJM17, author = {Kanchana Thilakarathna and Fangzhou Jiang and Sirine Mrabet and Mohamed Ali K{\^{a}}afar and Aruna Seneviratne and Gaogang Xie}, title = {Crowd-Cache: Leveraging on spatio-temporal correlation in content popularity for mobile networking in proximity}, journal = {Comput. Commun.}, volume = {100}, pages = {104--117}, year = {2017}, url = {https://doi.org/10.1016/j.comcom.2017.01.006}, doi = {10.1016/J.COMCOM.2017.01.006}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ThilakarathnaJM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/AsgharK17, author = {Hassan Jameel Asghar and Mohamed Ali K{\^{a}}afar}, title = {When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack}, journal = {J. Math. Cryptol.}, volume = {11}, number = {3}, pages = {177--194}, year = {2017}, url = {https://doi.org/10.1515/jmc-2015-0059}, doi = {10.1515/JMC-2015-0059}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/AsgharK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/IkramAKMK17, author = {Muhammad Ikram and Hassan Jameel Asghar and Mohamed Ali K{\^{a}}afar and Anirban Mahanti and Balachander Krishnamurthy}, title = {Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {1}, pages = {79--99}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0006}, doi = {10.1515/POPETS-2017-0006}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/IkramAKMK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/LiKSX17, author = {Zhenyu Li and Mohamed Ali K{\^{a}}afar and Kav{\'{e}} Salamatian and Gaogang Xie}, title = {Characterizing and Modeling User Behavior in a Large-Scale Mobile Live Streaming System}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {27}, number = {12}, pages = {2675--2686}, year = {2017}, url = {https://doi.org/10.1109/TCSVT.2016.2595325}, doi = {10.1109/TCSVT.2016.2595325}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/LiKSX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/IkramOFCFJKS17, author = {Muhammad Ikram and Lucky Onwuzurike and Shehroze Farooqi and Emiliano De Cristofaro and Arik Friedman and Guillaume Jourjon and Mohamed Ali K{\^{a}}afar and M. Zubair Shafiq}, title = {Measuring, Characterizing, and Detecting Facebook Like Farms}, journal = {{ACM} Trans. Priv. Secur.}, volume = {20}, number = {4}, pages = {13:1--13:28}, year = {2017}, url = {https://doi.org/10.1145/3121134}, doi = {10.1145/3121134}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/IkramOFCFJKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tweb/SeneviratneSKMM17, author = {Suranga Seneviratne and Aruna Seneviratne and Mohamed Ali K{\^{a}}afar and Anirban Mahanti and Prasant Mohapatra}, title = {Spam Mobile Apps: Characteristics, Detection, and in the Wild Analysis}, journal = {{ACM} Trans. Web}, volume = {11}, number = {1}, pages = {4:1--4:29}, year = {2017}, url = {https://doi.org/10.1145/3007901}, doi = {10.1145/3007901}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tweb/SeneviratneSKMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShaghaghiKJ17, author = {Arash Shaghaghi and Mohamed Ali K{\^{a}}afar and Sanjay Jha}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {849--861}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053039}, doi = {10.1145/3052973.3053039}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShaghaghiKJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MasoodZAK17, author = {Rahat Masood and Benjamin Zi Hao Zhao and Hassan Jameel Asghar and Mohamed Ali K{\^{a}}afar}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} TouchTrack: How Unique are your Touch Gestures?}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2555--2557}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138850}, doi = {10.1145/3133956.3138850}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MasoodZAK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/FarooqiJIKCSFZ17, author = {Shehroze Farooqi and Guillaume Jourjon and Muhammad Ikram and Mohamed Ali K{\^{a}}afar and Emiliano De Cristofaro and Muhammad Zubair Shafiq and Arik Friedman and Fareed Zaffar}, title = {Characterizing key stakeholders in an online black-hat marketplace}, booktitle = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix, AZ, USA, April 25-27, 2017}, pages = {17--27}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ECRIME.2017.7945050}, doi = {10.1109/ECRIME.2017.7945050}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/FarooqiJIKCSFZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChauhanZACK17, author = {Jagmohan Chauhan and Benjamin Zi Hao Zhao and Hassan Jameel Asghar and Jonathan Chan and Mohamed Ali K{\^{a}}afar}, editor = {Aggelos Kiayias}, title = {BehavioCog: An Observation Resistant Authentication Scheme}, booktitle = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10322}, pages = {39--58}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70972-7\_3}, doi = {10.1007/978-3-319-70972-7\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/ChauhanZACK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/IkramK17, author = {Muhammad Ikram and Mohamed Ali K{\^{a}}afar}, editor = {Aris Gkoulalas{-}Divanis and Miguel P. Correia and Dimiter R. Avresky}, title = {A first look at mobile Ad-Blocking apps}, booktitle = {16th {IEEE} International Symposium on Network Computing and Applications, {NCA} 2017, Cambridge, MA, USA, October 30 - November 1, 2017}, pages = {343--350}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/NCA.2017.8171376}, doi = {10.1109/NCA.2017.8171376}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nca/IkramK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/AbaidKJ17, author = {Zainab Abaid and Mohamed Ali K{\^{a}}afar and Sanjay Jha}, editor = {Aris Gkoulalas{-}Divanis and Miguel P. Correia and Dimiter R. Avresky}, title = {Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers}, booktitle = {16th {IEEE} International Symposium on Network Computing and Applications, {NCA} 2017, Cambridge, MA, USA, October 30 - November 1, 2017}, pages = {375--384}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/NCA.2017.8171381}, doi = {10.1109/NCA.2017.8171381}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nca/AbaidKJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/AbaidKJ17, author = {Zainab Abaid and Mohamed Ali K{\^{a}}afar and Sanjay Jha}, title = {Early detection of in-the-wild botnet attacks by exploiting network communication uniformity: An empirical study}, booktitle = {2017 {IFIP} Networking Conference, {IFIP} Networking 2017 and Workshops, Stockholm, Sweden, June 12-16, 2017}, pages = {1--9}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.23919/IFIPNetworking.2017.8264866}, doi = {10.23919/IFIPNETWORKING.2017.8264866}, timestamp = {Tue, 29 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/networking/AbaidKJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/WuLNKH17, author = {Wei Wu and Ren Ping Liu and Wei Ni and Dali Kaafar and Xiaojing Huang}, title = {{AC-PROT:} An Access Control Model to Improve Software-Defined Networking Security}, booktitle = {85th {IEEE} Vehicular Technology Conference, {VTC} Spring 2017, Sydney, Australia, June 4-7, 2017}, pages = {1--5}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/VTCSpring.2017.8108543}, doi = {10.1109/VTCSPRING.2017.8108543}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vtc/WuLNKH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pam/2017, editor = {Mohamed Ali K{\^{a}}afar and Steve Uhlig and Johanna Amann}, title = {Passive and Active Measurement - 18th International Conference, {PAM} 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10176}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-54328-4}, doi = {10.1007/978-3-319-54328-4}, isbn = {978-3-319-54327-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pam/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AsgharTK17, author = {Hassan Jameel Asghar and Paul Tyler and Mohamed Ali K{\^{a}}afar}, title = {Differentially Private Release of Public Transport Data: The Opal Use Case}, journal = {CoRR}, volume = {abs/1705.05957}, year = {2017}, url = {http://arxiv.org/abs/1705.05957}, eprinttype = {arXiv}, eprint = {1705.05957}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AsgharTK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AsgharTK17a, author = {Hassan Jameel Asghar and Paul Tyler and Mohamed Ali K{\^{a}}afar}, title = {On the Privacy of the Opal Data Release: {A} Response}, journal = {CoRR}, volume = {abs/1705.08994}, year = {2017}, url = {http://arxiv.org/abs/1705.08994}, eprinttype = {arXiv}, eprint = {1705.08994}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AsgharTK17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/IkramOFCFJKS17, author = {Muhammad Ikram and Lucky Onwuzurike and Shehroze Farooqi and Emiliano De Cristofaro and Arik Friedman and Guillaume Jourjon and Mohamed Ali K{\^{a}}afar and M. Zubair Shafiq}, title = {Measuring, Characterizing, and Detecting Facebook Like Farms}, journal = {CoRR}, volume = {abs/1707.00190}, year = {2017}, url = {http://arxiv.org/abs/1707.00190}, eprinttype = {arXiv}, eprint = {1707.00190}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/IkramOFCFJKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SmithTK17, author = {David B. Smith and Kanchana Thilakarathna and Mohamed Ali K{\^{a}}afar}, title = {More Flexible Differential Privacy: The Application of Piecewise Mixture Distributions in Query Release}, journal = {CoRR}, volume = {abs/1707.01189}, year = {2017}, url = {http://arxiv.org/abs/1707.01189}, eprinttype = {arXiv}, eprint = {1707.01189}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SmithTK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/TiroshiKBK17, author = {Amit Tiroshi and Tsvi Kuflik and Shlomo Berkovsky and Mohamed Ali K{\^{a}}afar}, title = {Graph Based Recommendations: From Data Representation to Feature Extraction and Application}, journal = {CoRR}, volume = {abs/1707.01250}, year = {2017}, url = {http://arxiv.org/abs/1707.01250}, eprinttype = {arXiv}, eprint = {1707.01250}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/TiroshiKBK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-04078, author = {Fangzhou Jiang and Kanchana Thilakarathna and Sirine Mrabet and Mohamed Ali K{\^{a}}afar and Aruna Seneviratne}, title = {uStash: a Novel Mobile Content Delivery System for Improving User QoE in Public Transport}, journal = {CoRR}, volume = {abs/1708.04078}, year = {2017}, url = {http://arxiv.org/abs/1708.04078}, eprinttype = {arXiv}, eprint = {1708.04078}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-04078.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-05477, author = {Arash Shaghaghi and Mohamed Ali K{\^{a}}afar and Sanjay Jha}, title = {WedgeTail 2.0: An Intrusion Prevention System for the Data Plane of Software Defined Networks}, journal = {CoRR}, volume = {abs/1708.05477}, year = {2017}, url = {http://arxiv.org/abs/1708.05477}, eprinttype = {arXiv}, eprint = {1708.05477}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-05477.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-02901, author = {Muhammad Ikram and Mohamed Ali K{\^{a}}afar}, title = {A First Look at Ad Blocking Apps on Google Play}, journal = {CoRR}, volume = {abs/1709.02901}, year = {2017}, url = {http://arxiv.org/abs/1709.02901}, eprinttype = {arXiv}, eprint = {1709.02901}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-02901.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1710-05297, author = {Ming Ding and David L{\'{o}}pez{-}P{\'{e}}rez and Holger Claussen and Mohamed Ali K{\^{a}}afar}, title = {On the Fundamental Characteristics of Ultra-Dense Small Cell Networks}, journal = {CoRR}, volume = {abs/1710.05297}, year = {2017}, url = {http://arxiv.org/abs/1710.05297}, eprinttype = {arXiv}, eprint = {1710.05297}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1710-05297.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-02124, author = {Hailong Huang and Andrey V. Savkin and Ming Ding and Mohamed Ali K{\^{a}}afar}, title = {Optimized Deployment of Autonomous Drones to Improve User Experience in Cellular Networks}, journal = {CoRR}, volume = {abs/1712.02124}, year = {2017}, url = {http://arxiv.org/abs/1712.02124}, eprinttype = {arXiv}, eprint = {1712.02124}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-02124.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/LiKX16, author = {Zhenyu Li and Mohamed Ali K{\^{a}}afar and Gaogang Xie}, title = {Session Throughput Prediction for Internet Videos}, journal = {{IEEE} Commun. Mag.}, volume = {54}, number = {12}, pages = {152--157}, year = {2016}, url = {https://doi.org/10.1109/MCOM.2016.1600386CM}, doi = {10.1109/MCOM.2016.1600386CM}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/LiKX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/WuLTUKX16, author = {Qinghua Wu and Zhenyu Li and Gareth Tyson and Steve Uhlig and Mohamed Ali K{\^{a}}afar and Gaogang Xie}, title = {Privacy-Aware Multipath Video Caching for Content-Centric Networks}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {34}, number = {8}, pages = {2219--2230}, year = {2016}, url = {https://doi.org/10.1109/JSAC.2016.2577321}, doi = {10.1109/JSAC.2016.2577321}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/WuLTUKX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umuai/FriedmanBK16, author = {Arik Friedman and Shlomo Berkovsky and Mohamed Ali K{\^{a}}afar}, title = {A differential privacy framework for matrix factorization recommender systems}, journal = {User Model. User Adapt. Interact.}, volume = {26}, number = {5}, pages = {425--458}, year = {2016}, url = {https://doi.org/10.1007/s11257-016-9177-7}, doi = {10.1007/S11257-016-9177-7}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umuai/FriedmanBK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChauhanAMK16, author = {Jagmohan Chauhan and Hassan Jameel Asghar and Anirban Mahanti and Mohamed Ali K{\^{a}}afar}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {648--665}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_35}, doi = {10.1007/978-3-319-39555-5\_35}, timestamp = {Fri, 07 Aug 2020 17:57:32 +0200}, biburl = {https://dblp.org/rec/conf/acns/ChauhanAMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/MelisACK16, author = {Luca Melis and Hassan Jameel Asghar and Emiliano De Cristofaro and Mohamed Ali K{\^{a}}afar}, editor = {Gail{-}Joon Ahn and Guofei Gu and Hongxin Hu and Seungwon Shin}, title = {Private Processing of Outsourced Network Functions: Feasibility and Constructions}, booktitle = {Proceedings of the 2016 {ACM} International Workshop on Security in Software Defined Networks {\&} Network Function Virtualization, SDN-NFV@CODASPY 2016, New Orleans, LA, USA, March 11, 2016}, pages = {39--44}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2876019.2876021}, doi = {10.1145/2876019.2876021}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/MelisACK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/LiWHKLZXS16, author = {Zhenyu Li and Xiaohui Wang and Ningjing Huang and Mohamed Ali K{\^{a}}afar and Zhenhua Li and Jianer Zhou and Gaogang Xie and Peter Steenkiste}, editor = {Phillipa Gill and John S. Heidemann and John W. Byers and Ramesh Govindan}, title = {An Empirical Analysis of a Large-scale Mobile Cloud Storage Service}, booktitle = {Proceedings of the 2016 {ACM} on Internet Measurement Conference, {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016}, pages = {287--301}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2987465}, timestamp = {Tue, 21 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/LiWHKLZXS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/IkramVSKP16, author = {Muhammad Ikram and Narseo Vallina{-}Rodriguez and Suranga Seneviratne and Mohamed Ali K{\^{a}}afar and Vern Paxson}, editor = {Phillipa Gill and John S. Heidemann and John W. Byers and Ramesh Govindan}, title = {An Analysis of the Privacy and Security Risks of Android {VPN} Permission-enabled Apps}, booktitle = {Proceedings of the 2016 {ACM} on Internet Measurement Conference, {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016}, pages = {349--364}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2987471}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/IkramVSKP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/WangLXKS16, author = {Dong Wang and Zhenyu Li and Gaogang Xie and Mohamed Ali K{\^{a}}afar and Kav{\'{e}} Salamatian}, title = {Adwords management for third-parties in {SEM:} An optimisation model and the potential of Twitter}, booktitle = {35th Annual {IEEE} International Conference on Computer Communications, {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016}, pages = {1--9}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/INFOCOM.2016.7524581}, doi = {10.1109/INFOCOM.2016.7524581}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/WangLXKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/AbaidSKJ16, author = {Zainab Abaid and Dilip Sarkar and Mohamed Ali K{\^{a}}afar and Sanjay Jha}, title = {The Early Bird Gets the Botnet: {A} Markov Chain Based Early Warning System for Botnet Attacks}, booktitle = {41st {IEEE} Conference on Local Computer Networks, {LCN} 2016, Dubai, United Arab Emirates, November 7-10, 2016}, pages = {61--68}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/LCN.2016.17}, doi = {10.1109/LCN.2016.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/AbaidSKJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/HolzAMKW16, author = {Ralph Holz and Johanna Amann and Olivier Mehani and Mohamed Ali K{\^{a}}afar and Matthias Wachs}, title = {{TLS} in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/tls-wild-internet-wide-analysis-tls-based-protocols-electronic-communication.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/HolzAMKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nfvsdn/ShaghaghiKSKJ16, author = {Arash Shaghaghi and Mohamed Ali K{\^{a}}afar and Sandra Scott{-}Hayward and Salil S. Kanhere and Sanjay K. Jha}, title = {Towards Policy Enforcement Point as a Service {(PEPS)}}, booktitle = {2016 {IEEE} Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Palo Alto, CA, USA, November 7-10, 2016}, pages = {50--55}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NFV-SDN.2016.7919475}, doi = {10.1109/NFV-SDN.2016.7919475}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nfvsdn/ShaghaghiKSKJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/ChauhanSKMS16, author = {Jagmohan Chauhan and Suranga Seneviratne and Mohamed Ali K{\^{a}}afar and Anirban Mahanti and Aruna Seneviratne}, title = {Characterization of early smartwatch apps}, booktitle = {2016 {IEEE} International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016, Sydney, Australia, March 14-18, 2016}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/PERCOMW.2016.7457170}, doi = {10.1109/PERCOMW.2016.7457170}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/ChauhanSKMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/JiangTMK16, author = {Fangzhou Jiang and Kanchana Thilakarathna and Sirine Mrabet and Mohamed Ali K{\^{a}}afar}, title = {uDrop: Pushing drop-box to the edge of mobile network}, booktitle = {2016 {IEEE} International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016, Sydney, Australia, March 14-18, 2016}, pages = {1--3}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/PERCOMW.2016.7457069}, doi = {10.1109/PERCOMW.2016.7457069}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/JiangTMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/AsgharMSCKM16, author = {Hassan Jameel Asghar and Luca Melis and Cyril Soldani and Emiliano De Cristofaro and Mohamed Ali K{\^{a}}afar and Laurent Mathy}, editor = {Dongsu Han and Danny Raz}, title = {SplitBox: Toward Efficient Private Network Function Virtualization}, booktitle = {Proceedings of the {ACM} {SIGCOMM} Workshop on Hot topics in Middleboxes and Network Function Virtualization, HotMiddlebox@SIGCOMM 2016, Florianopolis, Brazil, August, 2016}, pages = {7--13}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2940147.2940150}, doi = {10.1145/2940147.2940150}, timestamp = {Tue, 06 Nov 2018 11:07:11 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/AsgharMSCKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MelisACK16, author = {Luca Melis and Hassan Jameel Asghar and Emiliano De Cristofaro and Mohamed Ali K{\^{a}}afar}, title = {Private Processing of Outsourced Network Functions: Feasibility and Constructions}, journal = {CoRR}, volume = {abs/1601.06454}, year = {2016}, url = {http://arxiv.org/abs/1601.06454}, eprinttype = {arXiv}, eprint = {1601.06454}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MelisACK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/IkramAKKM16, author = {Muhammad Ikram and Hassan Jameel Asghar and Mohamed Ali K{\^{a}}afar and Balachander Krishnamurthy and Anirban Mahanti}, title = {Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning}, journal = {CoRR}, volume = {abs/1603.06289}, year = {2016}, url = {http://arxiv.org/abs/1603.06289}, eprinttype = {arXiv}, eprint = {1603.06289}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/IkramAKKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AsgharMSCKM16, author = {Hassan Jameel Asghar and Luca Melis and Cyril Soldani and Emiliano De Cristofaro and Mohamed Ali K{\^{a}}afar and Laurent Mathy}, title = {SplitBox: Toward Efficient Private Network Function Virtualization}, journal = {CoRR}, volume = {abs/1605.03772}, year = {2016}, url = {http://arxiv.org/abs/1605.03772}, eprinttype = {arXiv}, eprint = {1605.03772}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AsgharMSCKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ShaghaghiKSKJ16, author = {Arash Shaghaghi and Mohamed Ali K{\^{a}}afar and Sandra Scott{-}Hayward and Salil S. Kanhere and Sanjay K. Jha}, title = {Towards Policy Enforcement Point as a Service {(PEPS)}}, journal = {CoRR}, volume = {abs/1610.02526}, year = {2016}, url = {http://arxiv.org/abs/1610.02526}, eprinttype = {arXiv}, eprint = {1610.02526}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ShaghaghiKSKJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChauhanZACK16, author = {Jagmohan Chauhan and Benjamin Zi Hao Zhao and Hassan Jameel Asghar and Jonathan Chan and Mohamed Ali K{\^{a}}afar}, title = {BehavioCog: An Observation Resistant Authentication Scheme}, journal = {CoRR}, volume = {abs/1610.09044}, year = {2016}, url = {http://arxiv.org/abs/1610.09044}, eprinttype = {arXiv}, eprint = {1610.09044}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChauhanZACK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/KaafarS15, author = {Mohamed Ali K{\^{a}}afar and Ross T. Smith}, title = {Small Wearable Internet}, journal = {{IEEE} Internet Comput.}, volume = {19}, number = {5}, pages = {6--7}, year = {2015}, url = {https://doi.org/10.1109/MIC.2015.107}, doi = {10.1109/MIC.2015.107}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/KaafarS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AsgharSLKP15, author = {Hassan Jameel Asghar and Ron Steinfeld and Shujun Li and Mohamed Ali K{\^{a}}afar and Josef Pieprzyk}, title = {On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {8}, pages = {1643--1655}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2421875}, doi = {10.1109/TIFS.2015.2421875}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AsgharSLKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/ValletBAMK15, author = {David Vallet and Shlomo Berkovsky and Sebastien Ardon and Anirban Mahanti and Mohamed Ali K{\^{a}}afar}, editor = {James Bailey and Alistair Moffat and Charu C. Aggarwal and Maarten de Rijke and Ravi Kumar and Vanessa Murdock and Timos K. Sellis and Jeffrey Xu Yu}, title = {Characterizing and Predicting Viral-and-Popular Video Content}, booktitle = {Proceedings of the 24th {ACM} International Conference on Information and Knowledge Management, {CIKM} 2015, Melbourne, VIC, Australia, October 19 - 23, 2015}, pages = {1591--1600}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2806416.2806556}, doi = {10.1145/2806416.2806556}, timestamp = {Mon, 26 Apr 2021 09:27:03 +0200}, biburl = {https://dblp.org/rec/conf/cikm/ValletBAMK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ZhouWLKX15, author = {Jianer Zhou and Qinghua Wu and Zhenyu Li and Mohamed Ali K{\^{a}}afar and Gaogang Xie}, title = {A proactive transport mechanism with Explicit Congestion Notification for {NDN}}, booktitle = {2015 {IEEE} International Conference on Communications, {ICC} 2015, London, United Kingdom, June 8-12, 2015}, pages = {5242--5247}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICC.2015.7249156}, doi = {10.1109/ICC.2015.7249156}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/ZhouWLKX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/JiangTKRS15, author = {Fangzhou Jiang and Kanchana Thilakarathna and Mohamed Ali K{\^{a}}afar and Filip Rosenbaum and Aruna Seneviratne}, editor = {Katia Obraczka and Karin Anna Hummel}, title = {A Spatio-Temporal Analysis of Mobile Internet Traffic in Public Transportation Systems: {A} View of Web Browsing from The Bus}, booktitle = {Proceedings of the 10th {ACM} MobiCom Workshop on Challenged Networks, CHANTS@MobiCom 2015, Paris, France, September 11, 2015}, pages = {37--42}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2799371.2799379}, doi = {10.1145/2799371.2799379}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobicom/JiangTKRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/recsys/BerliozFKBB15, author = {Arnaud Berlioz and Arik Friedman and Mohamed Ali K{\^{a}}afar and Roksana Boreli and Shlomo Berkovsky}, editor = {Hannes Werthner and Markus Zanker and Jennifer Golbeck and Giovanni Semeraro}, title = {Applying Differential Privacy to Matrix Factorization}, booktitle = {Proceedings of the 9th {ACM} Conference on Recommender Systems, RecSys 2015, Vienna, Austria, September 16-20, 2015}, pages = {107--114}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2792838.2800173}, doi = {10.1145/2792838.2800173}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/recsys/BerliozFKBB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sensys/KimJHSK15, author = {Jun Young Kim and Sanjay Jha and Wen Hu and Hossein Shafagh and Mohamed Ali K{\^{a}}afar}, editor = {Junehwa Song and Tarek F. Abdelzaher and Cecilia Mascolo}, title = {Poster: Toward Efficient and Secure Code Dissemination Protocol for the Internet of Things}, booktitle = {Proceedings of the 13th {ACM} Conference on Embedded Networked Sensor Systems, SenSys 2015, Seoul, South Korea, November 1-4, 2015}, pages = {425--426}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2809695.2817896}, doi = {10.1145/2809695.2817896}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sensys/KimJHSK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/LiXKS15, author = {Zhenyu Li and Gaogang Xie and Mohamed Ali K{\^{a}}afar and Kav{\'{e}} Salamatian}, editor = {Aldo Gangemi and Stefano Leonardi and Alessandro Panconesi}, title = {User Behavior Characterization of a Large-scale Mobile Live Streaming System}, booktitle = {Proceedings of the 24th International Conference on World Wide Web Companion, {WWW} 2015, Florence, Italy, May 18-22, 2015 - Companion Volume}, pages = {307--313}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2740908.2743054}, doi = {10.1145/2740908.2743054}, timestamp = {Tue, 27 Dec 2022 09:06:31 +0100}, biburl = {https://dblp.org/rec/conf/www/LiXKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/SeneviratneSKMM15, author = {Suranga Seneviratne and Aruna Seneviratne and Mohamed Ali K{\^{a}}afar and Anirban Mahanti and Prasant Mohapatra}, editor = {Aldo Gangemi and Stefano Leonardi and Alessandro Panconesi}, title = {Early Detection of Spam Mobile Apps}, booktitle = {Proceedings of the 24th International Conference on World Wide Web, {WWW} 2015, Florence, Italy, May 18-22, 2015}, pages = {949--959}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2736277.2741084}, doi = {10.1145/2736277.2741084}, timestamp = {Tue, 27 Dec 2022 09:06:31 +0100}, biburl = {https://dblp.org/rec/conf/www/SeneviratneSKMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/FarooqiIICFJKSZ15, author = {Shehroze Farooqi and Muhammad Ikram and Gohar Irfan and Emiliano De Cristofaro and Arik Friedman and Guillaume Jourjon and Mohamed Ali K{\^{a}}afar and Muhammad Zubair Shafiq and Fareed Zaffar}, title = {Characterizing Seller-Driven Black-Hat Marketplaces}, journal = {CoRR}, volume = {abs/1505.01637}, year = {2015}, url = {http://arxiv.org/abs/1505.01637}, eprinttype = {arXiv}, eprint = {1505.01637}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/FarooqiIICFJKSZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/IkramOCFJKS15, author = {Muhammad Ikram and Lucky Onwuzurike and Emiliano De Cristofaro and Arik Friedman and Guillaume Jourjon and Mohamed Ali K{\^{a}}afar and M. Zubair Shafiq}, title = {Spying on Spammers: Tracking Like Farm Accounts on Facebook}, journal = {CoRR}, volume = {abs/1506.00506}, year = {2015}, url = {http://arxiv.org/abs/1506.00506}, eprinttype = {arXiv}, eprint = {1506.00506}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/IkramOCFJKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChauhanKM15, author = {Jagmohan Chauhan and Mohamed Ali K{\^{a}}afar and Anirban Mahanti}, title = {Web for Wearables: Lessons learned from Google Glass}, journal = {CoRR}, volume = {abs/1507.01677}, year = {2015}, url = {http://arxiv.org/abs/1507.01677}, eprinttype = {arXiv}, eprint = {1507.01677}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChauhanKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HolzAMWK15, author = {Ralph Holz and Johanna Amann and Olivier Mehani and Matthias Wachs and Mohamed Ali K{\^{a}}afar}, title = {{TLS} in the wild: an Internet-wide analysis of TLS-based protocols for electronic communication}, journal = {CoRR}, volume = {abs/1511.00341}, year = {2015}, url = {http://arxiv.org/abs/1511.00341}, eprinttype = {arXiv}, eprint = {1511.00341}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HolzAMWK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MelisACK15, author = {Luca Melis and Hassan Jameel Asghar and Emiliano De Cristofaro and Mohamed Ali K{\^{a}}afar}, title = {Private Processing of Outsourced Network Functions: Feasibility and Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {949}, year = {2015}, url = {http://eprint.iacr.org/2015/949}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MelisACK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsgharK15, author = {Hassan Jameel Asghar and Mohamed Ali K{\^{a}}afar}, title = {When are Identification Protocols with Sparse Challenges Safe? The Case of the Coskun and Herley Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1231}, year = {2015}, url = {http://eprint.iacr.org/2015/1231}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsgharK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/CuncheKB14, author = {Mathieu Cunche and Mohamed Ali K{\^{a}}afar and Roksana Boreli}, title = {Linking wireless devices using information contained in Wi-Fi probe requests}, journal = {Pervasive Mob. Comput.}, volume = {11}, pages = {56--69}, year = {2014}, url = {https://doi.org/10.1016/j.pmcj.2013.04.001}, doi = {10.1016/J.PMCJ.2013.04.001}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/percom/CuncheKB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/ChauhanMK14, author = {Jagmohan Chauhan and Anirban Mahanti and Mohamed Ali K{\^{a}}afar}, editor = {George Iosifidis and Eric Keller and Sun Yi}, title = {Towards the Era of Wearable Computing?}, booktitle = {Proceedings of the 2014 CoNEXT on Student Workshop, CoNEXT Student Workshop '14, Sydney, Australia, December 2, 2014}, pages = {24--25}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2680821.2680833}, doi = {10.1145/2680821.2680833}, timestamp = {Tue, 06 Nov 2018 16:58:31 +0100}, biburl = {https://dblp.org/rec/conf/conext/ChauhanMK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/IkramAKM14, author = {Muhammad Ikram and Hassan Asghar and Mohamed Ali K{\^{a}}afar and Anirban Mahanti}, editor = {George Iosifidis and Eric Keller and Sun Yi}, title = {On the Intrusiveness of JavaScript on the Web}, booktitle = {Proceedings of the 2014 CoNEXT on Student Workshop, CoNEXT Student Workshop '14, Sydney, Australia, December 2, 2014}, pages = {31--33}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2680821.2680837}, doi = {10.1145/2680821.2680837}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/IkramAKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/SunFGSJKU14, author = {Yi Sun and Seyed Kaveh Fayaz and Yang Guo and Vyas Sekar and Yun Jin and Mohamed Ali K{\^{a}}afar and Steve Uhlig}, editor = {Aruna Seneviratne and Christophe Diot and Jim Kurose and Augustin Chaintreau and Luigi Rizzo}, title = {Trace-Driven Analysis of {ICN} Caching Algorithms on Video-on-Demand Workloads}, booktitle = {Proceedings of the 10th {ACM} International on Conference on emerging Networking Experiments and Technologies, CoNEXT 2014, Sydney, Australia, December 2-5, 2014}, pages = {363--376}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2674005.2675003}, doi = {10.1145/2674005.2675003}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/SunFGSJKU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/CuncheKB14, author = {Mathieu Cunche and Mohamed Ali K{\^{a}}afar and Roksana Boreli}, title = {Asynchronous Covert Communication Using BitTorrent Trackers}, booktitle = {2014 {IEEE} International Conference on High Performance Computing and Communications, 6th {IEEE} International Symposium on Cyberspace Safety and Security, 11th {IEEE} International Conference on Embedded Software and Systems, {HPCC/CSS/ICESS} 2014, Paris, France, August 20-22, 2014}, pages = {827--830}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/HPCC.2014.138}, doi = {10.1109/HPCC.2014.138}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/CuncheKB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WangSGKJLL14, author = {Wei Wang and Yi Sun and Yang Guo and Dali Kaafar and Jiong Jin and Jun Li and Zhongcheng Li}, title = {CRCache: Exploiting the correlation between content popularity and network topology information for {ICN} caching}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney, Australia, June 10-14, 2014}, pages = {3191--3196}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICC.2014.6883812}, doi = {10.1109/ICC.2014.6883812}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/WangSGKJLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/WangSZKLL14, author = {Wei Wang and Yi Sun and Kai Zheng and Mohamed Ali K{\^{a}}afar and Dan Li and Zhongcheng Li}, title = {Freeway: Adaptively Isolating the Elephant and Mice Flows on Different Transmission Paths}, booktitle = {22nd {IEEE} International Conference on Network Protocols, {ICNP} 2014, Raleigh, NC, USA, October 21-24, 2014}, pages = {362--367}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICNP.2014.59}, doi = {10.1109/ICNP.2014.59}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/WangSZKLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/CristofaroFJKS14, author = {Emiliano De Cristofaro and Arik Friedman and Guillaume Jourjon and Mohamed Ali K{\^{a}}afar and Muhammad Zubair Shafiq}, editor = {Carey Williamson and Aditya Akella and Nina Taft}, title = {Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots}, booktitle = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014, Vancouver, BC, Canada, November 5-7, 2014}, pages = {129--136}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663716.2663729}, doi = {10.1145/2663716.2663729}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/CristofaroFJKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/AbdelberiCCCFK14, author = {Chaabane Abdelberi and Terence Chen and Mathieu Cunche and Emiliano De Cristofaro and Arik Friedman and Mohamed Ali K{\^{a}}afar}, editor = {Carey Williamson and Aditya Akella and Nina Taft}, title = {Censorship in the Wild: Analyzing Internet Filtering in Syria}, booktitle = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014, Vancouver, BC, Canada, November 5-7, 2014}, pages = {285--298}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663716.2663720}, doi = {10.1145/2663716.2663720}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/AbdelberiCCCFK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiXLJKS14, author = {Zhenyu Li and Gaogang Xie and Jiali Lin and Yun Jin and Mohamed Ali K{\^{a}}afar and Kav{\'{e}} Salamatian}, title = {On the geographic patterns of a large-scale mobile video-on-demand system}, booktitle = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014, Toronto, Canada, April 27 - May 2, 2014}, pages = {397--405}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFOCOM.2014.6847962}, doi = {10.1109/INFOCOM.2014.6847962}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/LiXLJKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/UllahBKK14, author = {Imdad Ullah and Roksana Boreli and Mohamed Ali K{\^{a}}afar and Salil S. Kanhere}, title = {Characterising user targeting for in-App Mobile Ads}, booktitle = {2014 Proceedings {IEEE} {INFOCOM} Workshops, Toronto, ON, Canada, April 27 - May 2, 2014}, pages = {547--552}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFCOMW.2014.6849290}, doi = {10.1109/INFCOMW.2014.6849290}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/UllahBKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iui/TiroshiBKVCK14, author = {Amit Tiroshi and Shlomo Berkovsky and Mohamed Ali K{\^{a}}afar and David Vallet and Terence Chen and Tsvi Kuflik}, editor = {Tsvi Kuflik and Oliviero Stock and Joyce Yue Chai and Antonio Kr{\"{u}}ger}, title = {Improving business rating predictions using graph based features}, booktitle = {19th International Conference on Intelligent User Interfaces, {IUI} 2014, Haifa, Israel, February 24-27, 2014}, pages = {17--26}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2557500.2557526}, doi = {10.1145/2557500.2557526}, timestamp = {Sat, 30 Sep 2023 09:51:13 +0200}, biburl = {https://dblp.org/rec/conf/iui/TiroshiBKVCK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/ThilakarathnaJMKSM14, author = {Kanchana Thilakarathna and Fangzhou Jiang and Sirine Mrabet and Mohamed Ali K{\^{a}}afar and Aruna Seneviratne and Prasant Mohapatra}, editor = {Andrew T. Campbell and David Kotz and Landon P. Cox and Zhuoqing Morley Mao}, title = {Demo: Crowd-cache - popular content for free}, booktitle = {The 12th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys'14, Bretton Woods, NH, USA, June 16-19, 2014}, pages = {358--359}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2594368.2601464}, doi = {10.1145/2594368.2601464}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisys/ThilakarathnaJMKSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/AbdelberiDDKR14, author = {Chaabane Abdelberi and Yuan Ding and Ratan Dey and Mohamed Ali K{\^{a}}afar and Keith W. Ross}, editor = {Michalis Faloutsos and Aleksandar Kuzmanovic}, title = {A Closer Look at Third-Party {OSN} Applications: Are They Leaking Your Personal Information?}, booktitle = {Passive and Active Measurement - 15th International Conference, {PAM} 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8362}, pages = {235--246}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04918-2\_23}, doi = {10.1007/978-3-319-04918-2\_23}, timestamp = {Fri, 04 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pam/AbdelberiDDKR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/ChenBKF14, author = {Terence Chen and Roksana Boreli and Mohamed Ali K{\^{a}}afar and Arik Friedman}, editor = {Emiliano De Cristofaro and Steven J. Murdoch}, title = {On the Effectiveness of Obfuscation Techniques in Online Social Networks}, booktitle = {Privacy Enhancing Technologies - 14th International Symposium, {PETS} 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8555}, pages = {42--62}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08506-7\_3}, doi = {10.1007/978-3-319-08506-7\_3}, timestamp = {Sat, 09 Apr 2022 12:39:29 +0200}, biburl = {https://dblp.org/rec/conf/pet/ChenBKF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/um/TiroshiBKVK14, author = {Amit Tiroshi and Shlomo Berkovsky and Mohamed Ali K{\^{a}}afar and David Vallet and Tsvi Kuflik}, editor = {Vania Dimitrova and Tsvi Kuflik and David Chin and Francesco Ricci and Peter Dolog and Geert{-}Jan Houben}, title = {Graph-Based Recommendations: Make the Most Out of Social Data}, booktitle = {User Modeling, Adaptation, and Personalization - 22nd International Conference, {UMAP} 2014, Aalborg, Denmark, July 7-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8538}, pages = {447--458}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08786-3\_40}, doi = {10.1007/978-3-319-08786-3\_40}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/um/TiroshiBKVK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmcsa/ChenUKB14, author = {Terence Chen and Imdad Ullah and Mohamed Ali K{\^{a}}afar and Roksana Boreli}, title = {Information leakage through mobile analytics services}, booktitle = {15th Workshop on Mobile Computing Systems and Applications, HotMobile '14, Santa Barbara, CA, USA, February 26-27, 2014}, pages = {15:1--15:6}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2565585.2565593}, doi = {10.1145/2565585.2565593}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wmcsa/ChenUKB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/MishariKOT14, author = {Mishari Al Mishari and Dali Kaafar and Ekin Oguz and Gene Tsudik}, editor = {Gail{-}Joon Ahn and Anupam Datta}, title = {Stylometric Linkability of Tweets}, booktitle = {Proceedings of the 13th Workshop on Privacy in the Electronic Society, {WPES} 2014, Scottsdale, AZ, USA, November 3, 2014}, pages = {205--208}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2665943.2665966}, doi = {10.1145/2665943.2665966}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/MishariKOT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mobicom/2014spme, editor = {Ersin Uzun and Mohamed Ali K{\^{a}}afar}, title = {Proceedings of the {ACM} MobiCom Workshop on Security and Privacy in Mobile Environments, SPME@MobiCom 2014, Maui, Hawaii, USA, September 11, 2014}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2646584}, doi = {10.1145/2646584}, isbn = {978-1-4503-3075-6}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobicom/2014spme.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AbdelberiCCFCK14, author = {Chaabane Abdelberi and Mathieu Cunche and Terence Chen and Arik Friedman and Emiliano De Cristofaro and Mohamed Ali K{\^{a}}afar}, title = {Censorship in the Wild: Analyzing Web Filtering in Syria}, journal = {CoRR}, volume = {abs/1402.3401}, year = {2014}, url = {http://arxiv.org/abs/1402.3401}, eprinttype = {arXiv}, eprint = {1402.3401}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AbdelberiCCFCK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MishariKTO14, author = {Mishari Al Mishari and Dali Kaafar and Gene Tsudik and Ekin Oguz}, title = {Are 140 Characters Enough? {A} Large-Scale Linkability Study of Tweets}, journal = {CoRR}, volume = {abs/1406.2746}, year = {2014}, url = {http://arxiv.org/abs/1406.2746}, eprinttype = {arXiv}, eprint = {1406.2746}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MishariKTO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CristofaroFJKS14, author = {Emiliano De Cristofaro and Arik Friedman and Guillaume Jourjon and Mohamed Ali K{\^{a}}afar and M. Zubair Shafiq}, title = {Paying for Likes? Understanding Facebook Like Fraud Using Honeypots}, journal = {CoRR}, volume = {abs/1409.2097}, year = {2014}, url = {http://arxiv.org/abs/1409.2097}, eprinttype = {arXiv}, eprint = {1409.2097}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CristofaroFJKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChauhanAKM14, author = {Jagmohan Chauhan and Hassan Jameel Asghar and Mohamed Ali K{\^{a}}afar and Anirban Mahanti}, title = {Gesture-based Continuous Authentication for Wearable Devices: the Google Glass Case}, journal = {CoRR}, volume = {abs/1412.2855}, year = {2014}, url = {http://arxiv.org/abs/1412.2855}, eprinttype = {arXiv}, eprint = {1412.2855}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChauhanAKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsgharSLKP14, author = {Hassan Jameel Asghar and Ron Steinfeld and Shujun Li and Dali Kaafar and Josef Pieprzyk}, title = {Algebraic Attacks on Human Identification Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {767}, year = {2014}, url = {http://eprint.iacr.org/2014/767}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsgharSLKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/AbdelberiCKU13, author = {Chaabane Abdelberi and Emiliano De Cristofaro and Mohamed Ali K{\^{a}}afar and Ersin Uzun}, title = {Privacy in content-oriented networking: threats and countermeasures}, journal = {Comput. Commun. Rev.}, volume = {43}, number = {3}, pages = {25--33}, year = {2013}, url = {https://doi.org/10.1145/2500098.2500102}, doi = {10.1145/2500098.2500102}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/AbdelberiCKU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/KaafarBD13, author = {Mohamed Ali K{\^{a}}afar and Shlomo Berkovsky and Benoit Donnet}, title = {On the potential of recommendation technologies for efficient content delivery networks}, journal = {Comput. Commun. Rev.}, volume = {43}, number = {3}, pages = {74--77}, year = {2013}, url = {https://doi.org/10.1145/2500098.2500109}, doi = {10.1145/2500098.2500109}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/KaafarBD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/SeneviratneTSKM13, author = {Aruna Seneviratne and Kanchana Thilakarathna and Suranga Seneviratne and Mohamed Ali K{\^{a}}afar and Prasant Mohapatra}, title = {Reconciling bitter rivals: Towards privacy-aware and bandwidth efficient mobile Ads delivery networks}, booktitle = {Fifth International Conference on Communication Systems and Networks, {COMSNETS} 2013, Bangalore, India, January 7-10, 2013}, pages = {1--10}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/COMSNETS.2013.6465567}, doi = {10.1109/COMSNETS.2013.6465567}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/comsnets/SeneviratneTSKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HamedAKK13, author = {Asma Hamed and Hella Kaffel{-}Ben Ayed and Mohamed Ali K{\^{a}}afar and Ahmed Kharraz}, title = {Evaluation of third party tracking on the web}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {471--477}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750244}, doi = {10.1109/ICITST.2013.6750244}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HamedAKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwsm/ChenKB13, author = {Terence Chen and Mohamed Ali K{\^{a}}afar and Roksana Boreli}, editor = {Emre Kiciman and Nicole B. Ellison and Bernie Hogan and Paul Resnick and Ian Soboroff}, title = {The Where and When of Finding New Friends: Analysis of a Location-based Social Discovery Network}, booktitle = {Proceedings of the Seventh International Conference on Weblogs and Social Media, {ICWSM} 2013, Cambridge, Massachusetts, USA, July 8-11, 2013}, publisher = {The {AAAI} Press}, year = {2013}, url = {http://www.aaai.org/ocs/index.php/ICWSM/ICWSM13/paper/view/6095}, timestamp = {Fri, 05 Feb 2021 11:07:18 +0100}, biburl = {https://dblp.org/rec/conf/icwsm/ChenKB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/WangPXMKS13, author = {Dong Wang and Hosung Park and Gaogang Xie and Sue B. Moon and Mohamed Ali K{\^{a}}afar and Kav{\'{e}} Salamatian}, title = {A genealogy of information spreading on microblogs: {A} Galton-Watson-based explicative model}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2013, Turin, Italy, April 14-19, 2013}, pages = {2391--2399}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INFCOM.2013.6567044}, doi = {10.1109/INFCOM.2013.6567044}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/WangPXMKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/WangXKU13, author = {Yonggong Wang and Gaogang Xie and Mohamed Ali K{\^{a}}afar and Steve Uhlig}, title = {{LMD:} {A} local minimum driven and self-organized method to obtain locators}, booktitle = {2013 {IEEE} Symposium on Computers and Communications, {ISCC} 2013, Split, Croatia, 7-10 July, 2013}, pages = {759--764}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ISCC.2013.6755040}, doi = {10.1109/ISCC.2013.6755040}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/WangXKU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/SmithBK13, author = {Guillaume Smith and Roksana Boreli and Mohamed Ali K{\^{a}}afar}, editor = {Ivan Stojmenovic and Zixue Cheng and Song Guo}, title = {A Layered Secret Sharing Scheme for Automated Profile Sharing in {OSN} Groups}, booktitle = {Mobile and Ubiquitous Systems: Computing, Networking, and Services - 10th International Conference, {MOBIQUITOUS} 2013, Tokyo, Japan, December 2-4, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {131}, pages = {487--499}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-11569-6\_38}, doi = {10.1007/978-3-319-11569-6\_38}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobiquitous/SmithBK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/ChenATKB13, author = {Terence Chen and Chaabane Abdelberi and Pierre{-}Ugo Tournoux and Mohamed Ali K{\^{a}}afar and Roksana Boreli}, editor = {Emiliano De Cristofaro and Matthew K. Wright}, title = {How Much Is Too Much? Leveraging Ads Audience Estimation to Evaluate Public Profile Uniqueness}, booktitle = {Privacy Enhancing Technologies - 13th International Symposium, {PETS} 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7981}, pages = {225--244}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39077-7\_12}, doi = {10.1007/978-3-642-39077-7\_12}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/ChenATKB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LauingerOAKRK13, author = {Tobias Lauinger and Kaan Onarlioglu and Chaabane Abdelberi and Engin Kirda and William K. Robertson and Mohamed Ali K{\^{a}}afar}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {369--389}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_19}, doi = {10.1007/978-3-642-41284-4\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/LauingerOAKRK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/recsys/TiroshiBKCK13, author = {Amit Tiroshi and Shlomo Berkovsky and Mohamed Ali K{\^{a}}afar and Terence Chen and Tsvi Kuflik}, editor = {Qiang Yang and Irwin King and Qing Li and Pearl Pu and George Karypis}, title = {Cross social networks interests predictions based ongraph features}, booktitle = {Seventh {ACM} Conference on Recommender Systems, RecSys '13, Hong Kong, China, October 12-16, 2013}, pages = {319--322}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2507157.2507206}, doi = {10.1145/2507157.2507206}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/recsys/TiroshiBKCK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SarwarMBK13, author = {Golam Sarwar and Olivier Mehani and Roksana Boreli and Mohamed Ali K{\^{a}}afar}, editor = {Pierangela Samarati}, title = {On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {461--468}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223198/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SarwarMBK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/CuncheKB13, author = {Mathieu Cunche and Mohamed Ali K{\^{a}}afar and Roksana Boreli}, title = {Revealing Social Links Between Owners of Wi-Fi Enabled Smartphones}, journal = {{ERCIM} News}, volume = {2013}, number = {93}, year = {2013}, url = {http://ercim-news.ercim.eu/en93/special/revealing-social-links-between-owners-of-wi-fi-enabled}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/CuncheKB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/DonnetGK12, author = {Benoit Donnet and Bamba Gueye and Mohamed Ali K{\^{a}}afar}, title = {Path similarity evaluation using Bloom filters}, journal = {Comput. Networks}, volume = {56}, number = {2}, pages = {858--869}, year = {2012}, url = {https://doi.org/10.1016/j.comnet.2011.11.003}, doi = {10.1016/J.COMNET.2011.11.003}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/DonnetGK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/JacquinRKSR12, author = {Ludovic Jacquin and Vincent Roca and Mohamed Ali K{\^{a}}afar and Fabrice Schuler and Jean{-}Louis Roch}, title = {IBTrack: An {ICMP} black holes tracker}, booktitle = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim, CA, USA, December 3-7, 2012}, pages = {2827--2833}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/GLOCOM.2012.6503545}, doi = {10.1109/GLOCOM.2012.6503545}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/JacquinRKSR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/LiLAXKJP12, author = {Zhenyu Li and Jiali Lin and Marc{-}Isma{\"{e}}l Akodj{\`{e}}nou and Gaogang Xie and Mohamed Ali K{\^{a}}afar and Yun Jin and Gang Peng}, editor = {John W. Byers and Jim Kurose and Ratul Mahajan and Alex C. Snoeren}, title = {Watching videos from everywhere: a study of the {PPTV} mobile VoD system}, booktitle = {Proceedings of the 12th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} '12, Boston, MA, USA, November 14-16, 2012}, pages = {185--198}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2398776.2398797}, doi = {10.1145/2398776.2398797}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/LiLAXKJP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/WangXK12, author = {Yonggong Wang and Gaogang Xie and Mohamed Ali K{\^{a}}afar}, title = {{FPC:} {A} self-organized greedy routing in scale-free networks}, booktitle = {2012 {IEEE} Symposium on Computers and Communications, {ISCC} 2012, Cappadocia, Turkey, July 1-4, 2012}, pages = {102--107}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ISCC.2012.6249275}, doi = {10.1109/ISCC.2012.6249275}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/WangXK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/ChengMCKBK12, author = {Ningning Cheng and Prasant Mohapatra and Mathieu Cunche and Mohamed Ali K{\^{a}}afar and Roksana Boreli and Srikanth V. Krishnamurthy}, title = {Inferring user relationship from hidden information in WLANs}, booktitle = {31st {IEEE} Military Communications Conference, {MILCOM} 2012, Orlando, FL, USA, October 29 - November 1, 2012}, pages = {1--6}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/MILCOM.2012.6415713}, doi = {10.1109/MILCOM.2012.6415713}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcom/ChengMCKBK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AbdelberiAK12, author = {Chaabane Abdelberi and Gergely {\'{A}}cs and Mohamed Ali K{\^{a}}afar}, title = {You are what you like! Information leakage through users' Interests}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/you-are-what-you-information-leakage-through-users-interests}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/AbdelberiAK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/CastellucciaKT12, author = {Claude Castelluccia and Mohamed Ali K{\^{a}}afar and Minh{-}Dung Tran}, editor = {Simone Fischer{-}H{\"{u}}bner and Matthew K. Wright}, title = {Betrayed by Your Ads! - Reconstructing User Profiles from Targeted Ads}, booktitle = {Privacy Enhancing Technologies - 12th International Symposium, {PETS} 2012, Vigo, Spain, July 11-13, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7384}, pages = {1--17}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31680-7\_1}, doi = {10.1007/978-3-642-31680-7\_1}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/CastellucciaKT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wosn/AbdelberiKB12, author = {Chaabane Abdelberi and Mohamed Ali K{\^{a}}afar and Roksana Boreli}, editor = {Balachander Krishnamurthy and Stefan Saroiu and Ben Y. Zhao}, title = {Big friend is watching you: analyzing online social networks tracking capabilities}, booktitle = {Proceedings of the 2012 {ACM} workshop on Workshop on Online Social Networks, {WOSN} 2012, Helsinki, Finland, August 17, 2012}, pages = {7--12}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2342549.2342552}, doi = {10.1145/2342549.2342552}, timestamp = {Mon, 26 Jun 2023 08:43:55 +0200}, biburl = {https://dblp.org/rec/conf/wosn/AbdelberiKB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wosn/ChenKFB12, author = {Terence Chen and Mohamed Ali K{\^{a}}afar and Arik Friedman and Roksana Boreli}, editor = {Balachander Krishnamurthy and Stefan Saroiu and Ben Y. Zhao}, title = {Is more always merrier?: a deep dive into online social footprints}, booktitle = {Proceedings of the 2012 {ACM} workshop on Workshop on Online Social Networks, {WOSN} 2012, Helsinki, Finland, August 17, 2012}, pages = {67--72}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2342549.2342565}, doi = {10.1145/2342549.2342565}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wosn/ChenKFB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wowmom/CuncheKB12, author = {Mathieu Cunche and Mohamed Ali K{\^{a}}afar and Roksana Boreli}, title = {I know who you will meet this evening! Linking wireless devices using Wi-Fi probe requests}, booktitle = {2012 {IEEE} International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012, San Francisco, CA, USA, June 25-28, 2012}, pages = {1--9}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/WoWMoM.2012.6263700}, doi = {10.1109/WOWMOM.2012.6263700}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wowmom/CuncheKB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1211-5183, author = {Chaabane Abdelberi and Emiliano De Cristofaro and Mohamed Ali K{\^{a}}afar and Ersin Uzun}, title = {Privacy in Content-Oriented Networking: Threats and Countermeasures}, journal = {CoRR}, volume = {abs/1211.5183}, year = {2012}, url = {http://arxiv.org/abs/1211.5183}, eprinttype = {arXiv}, eprint = {1211.5183}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1211-5183.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/PoeseUKDG11, author = {Ingmar Poese and Steve Uhlig and Mohamed Ali K{\^{a}}afar and Benoit Donnet and Bamba Gueye}, title = {{IP} geolocation databases: unreliable?}, journal = {Comput. Commun. Rev.}, volume = {41}, number = {2}, pages = {53--56}, year = {2011}, url = {https://doi.org/10.1145/1971162.1971171}, doi = {10.1145/1971162.1971171}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/PoeseUKDG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/CastellucciaCFK11, author = {Claude Castelluccia and Emiliano De Cristofaro and Aur{\'{e}}lien Francillon and Mohamed Ali K{\^{a}}afar}, title = {EphPub: Toward robust Ephemeral Publishing}, booktitle = {Proceedings of the 19th annual {IEEE} International Conference on Network Protocols, {ICNP} 2011, Vancouver, BC, Canada, October 17-20, 2011}, pages = {165--175}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICNP.2011.6089048}, doi = {10.1109/ICNP.2011.6089048}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/CastellucciaCFK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/leet/Le-BlondMAKCLD11, author = {Stevens Le Blond and Pere Manils and Chaabane Abdelberi and Mohamed Ali K{\^{a}}afar and Claude Castelluccia and Arnaud Legout and Walid Dabbous}, editor = {Christopher Kruegel}, title = {One Bad Apple Spoils the Bunch: Exploiting {P2P} Applications to Trace and Profile Tor Users}, booktitle = {4th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '11, Boston, MA, USA, March 29, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/leet11/one-bad-apple-spoils-bunch-exploiting-p2p-applications-trace-and-profile-tor-users}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/leet/Le-BlondMAKCLD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/PeritoCKM11, author = {Daniele Perito and Claude Castelluccia and Mohamed Ali K{\^{a}}afar and Pere Manils}, editor = {Simone Fischer{-}H{\"{u}}bner and Nicholas Hopper}, title = {How Unique and Traceable Are Usernames?}, booktitle = {Privacy Enhancing Technologies - 11th International Symposium, {PETS} 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6794}, pages = {1--17}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22263-4\_1}, doi = {10.1007/978-3-642-22263-4\_1}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/PeritoCKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1101-5578, author = {Daniele Perito and Claude Castelluccia and Mohamed Ali K{\^{a}}afar and Pere Manils}, title = {How Unique and Traceable are Usernames?}, journal = {CoRR}, volume = {abs/1101.5578}, year = {2011}, url = {http://arxiv.org/abs/1101.5578}, eprinttype = {arXiv}, eprint = {1101.5578}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1101-5578.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1103-1518, author = {Stevens Le Blond and Pere Manils and Chaabane Abdelberi and Mohamed Ali K{\^{a}}afar and Claude Castelluccia and Arnaud Legout and Walid Dabbous}, title = {One Bad Apple Spoils the Bunch: Exploiting {P2P} Applications to Trace and Profile Tor Users}, journal = {CoRR}, volume = {abs/1103.1518}, year = {2011}, url = {http://arxiv.org/abs/1103.1518}, eprinttype = {arXiv}, eprint = {1103.1518}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1103-1518.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/DonnetGK10, author = {Benoit Donnet and Bamba Gueye and Mohamed Ali K{\^{a}}afar}, title = {A Survey on Network Coordinates Systems, Design, and Security}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {12}, number = {4}, pages = {488--503}, year = {2010}, url = {https://doi.org/10.1109/SURV.2010.032810.00007}, doi = {10.1109/SURV.2010.032810.00007}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/DonnetGK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/leet/Le-BlondLFDK10, author = {Stevens Le Blond and Arnaud Legout and Fabrice Le Fessant and Walid Dabbous and Mohamed Ali K{\^{a}}afar}, editor = {Michael D. Bailey}, title = {Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrent}, booktitle = {3rd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '10, San Jose, CA, USA, April 27, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/leet-10/spying-world-your-laptop-identifying-and-profiling-content-providers-and-big}, timestamp = {Mon, 20 Nov 2023 09:09:49 +0100}, biburl = {https://dblp.org/rec/conf/leet/Le-BlondLFDK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/AbdelberiMK10, author = {Chaabane Abdelberi and Pere Manils and Mohamed Ali K{\^{a}}afar}, editor = {Yang Xiang and Pierangela Samarati and Jiankun Hu and Wanlei Zhou and Ahmad{-}Reza Sadeghi}, title = {Digging into Anonymous Traffic: {A} Deep Analysis of the Tor Anonymizing Network}, booktitle = {Fourth International Conference on Network and System Security, {NSS} 2010, Melbourne, Victoria, Australia, September 1-3, 2010}, pages = {167--174}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/NSS.2010.47}, doi = {10.1109/NSS.2010.47}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/AbdelberiMK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scube/BoucettaKM10, author = {Ch{\'{e}}rifa Boucetta and Mohamed Ali K{\^{a}}afar and Marine Minier}, editor = {Gerard Parr and Philip J. Morrow}, title = {How Secure are Secure Localization Protocols in WSNs?}, booktitle = {Sensor Systems and Software - Second International {ICST} Conference, S-Cube 2010, Miami, FL, USA, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {57}, pages = {164--178}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23583-2\_12}, doi = {10.1007/978-3-642-23583-2\_12}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scube/BoucettaKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sns/KaafarM10, author = {Mohamed Ali K{\^{a}}afar and Pere Manils}, editor = {Eiko Yoneki and Elie Bursztein and Tao Stein}, title = {Why spammers should thank Google?}, booktitle = {Proceedings of the 3rd Workshop on Social Network Systems, Paris, France, April 13, 2010}, pages = {4}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852658.1852662}, doi = {10.1145/1852658.1852662}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sns/KaafarM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1004-0930, author = {Stevens Le Blond and Arnaud Legout and Fabrice Le Fessant and Walid Dabbous and Mohamed Ali K{\^{a}}afar}, title = {Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent}, journal = {CoRR}, volume = {abs/1004.0930}, year = {2010}, url = {http://arxiv.org/abs/1004.0930}, eprinttype = {arXiv}, eprint = {1004.0930}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1004-0930.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1004-1267, author = {Stevens Le Blond and Pere Manils and Chaabane Abdelberi and Mohamed Ali K{\^{a}}afar and Arnaud Legout and Claude Castelluccia and Walid Dabbous}, title = {De-anonymizing BitTorrent Users on Tor}, journal = {CoRR}, volume = {abs/1004.1267}, year = {2010}, url = {http://arxiv.org/abs/1004.1267}, eprinttype = {arXiv}, eprint = {1004.1267}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1004-1267.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1004-1461, author = {Pere Manils and Chaabane Abdelberi and Stevens Le Blond and Mohamed Ali K{\^{a}}afar and Claude Castelluccia and Arnaud Legout and Walid Dabbous}, title = {Compromising Tor Anonymity Exploiting {P2P} Information Leakage}, journal = {CoRR}, volume = {abs/1004.1461}, year = {2010}, url = {http://arxiv.org/abs/1004.1461}, eprinttype = {arXiv}, eprint = {1004.1461}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1004-1461.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/KaafarMBSTD09, author = {Mohamed Ali K{\^{a}}afar and Laurent Mathy and Chadi Barakat and Kav{\'{e}} Salamatian and Thierry Turletti and Walid Dabbous}, title = {Certified Internet Coordinates}, booktitle = {Proceedings of the 18th International Conference on Computer Communications and Networks, {IEEE} {ICCCN} 2009, San Francisco, California, USA, August 3-6, 2009}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICCCN.2009.5235308}, doi = {10.1109/ICCCN.2009.5235308}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccn/KaafarMBSTD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/CastellucciaKMP09, author = {Claude Castelluccia and Mohamed Ali K{\^{a}}afar and Pere Manils and Daniele Perito}, editor = {Anja Feldmann and Laurent Mathy}, title = {Geolocalization of proxied services and its application to fast-flux hidden servers}, booktitle = {Proceedings of the 9th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} 2009, Chicago, Illinois, USA, November 4-6, 2009}, pages = {184--189}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1644893.1644915}, doi = {10.1145/1644893.1644915}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/CastellucciaKMP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/LiaoKGCGL09, author = {Yongjun Liao and Mohamed Ali K{\^{a}}afar and Bamba Gueye and Fran{\c{c}}ois Cantin and Pierre Geurts and Guy Leduc}, editor = {Luigi Fratta and Henning Schulzrinne and Yutaka Takahashi and Otto Spaniol}, title = {Detecting Triangle Inequality Violations in Internet Coordinate Systems by Supervised Learning}, booktitle = {{NETWORKING} 2009, 8th International {IFIP-TC} 6 Networking Conference, Aachen, Germany, May 11-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5550}, pages = {352--363}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01399-7\_28}, doi = {10.1007/978-3-642-01399-7\_28}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/networking/LiaoKGCGL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saint/CastellucciaK09, author = {Claude Castelluccia and Mohamed Ali K{\^{a}}afar}, title = {Owner-Centric Networking {(OCN):} Toward a Data Pollution-Free Internet}, booktitle = {Ninth Annual International Symposium on Applications and the Internet, {SAINT} 2009, Bellevue, Washington, USA, July 20-24, 2009, Proceedings}, pages = {169--172}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SAINT.2009.34}, doi = {10.1109/SAINT.2009.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saint/CastellucciaK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/CastellucciaK09, author = {Claude Castelluccia and Mohamed Ali K{\^{a}}afar}, title = {Owner-Centric Networking: {A} New Architecture for a Pollution-Free Internet}, journal = {{ERCIM} News}, volume = {2009}, number = {77}, year = {2009}, url = {http://ercim-news.ercim.eu/en77/special/owner-centric-networking-a-new-architecture-for-a-pollution-free-internet}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/CastellucciaK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/CantinGKL08, author = {Fran{\c{c}}ois Cantin and Bamba Gueye and Dali Kaafar and Guy Leduc}, editor = {Arturo Azcorra and Gustavo de Veciana and Keith W. Ross and Leandros Tassiulas}, title = {Overlay routing using coordinate systems}, booktitle = {Proceedings of the 2008 {ACM} Conference on Emerging Network Experiment and Technology, CoNEXT 2008, Madrid, Spain, December 9-12, 2008}, pages = {42}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1544012.1544054}, doi = {10.1145/1544012.1544054}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/CantinGKL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsos/CantinGKL08, author = {Fran{\c{c}}ois Cantin and Bamba Gueye and Mohamed Ali K{\^{a}}afar and Guy Leduc}, editor = {Karin Anna Hummel and James P. G. Sterbenz}, title = {A Self-Organized Clustering Scheme for Overlay Networks}, booktitle = {Self-Organizing Systems, Third International Workshop, {IWSOS} 2008, Vienna, Austria, December 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5343}, pages = {59--70}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-92157-8\_6}, doi = {10.1007/978-3-540-92157-8\_6}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/iwsos/CantinGKL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/KaafarGCLM08, author = {Mohamed Ali K{\^{a}}afar and Bamba Gueye and Fran{\c{c}}ois Cantin and Guy Leduc and Laurent Mathy}, editor = {Amitabha Das and Hung Keng Pung and Francis Bu{-}Sung Lee and Lawrence Wai{-}Choong Wong}, title = {Towards a Two-Tier Internet Coordinate System to Mitigate the Impact of Triangle Inequality Violations}, booktitle = {{NETWORKING} 2008, Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet , 7th International {IFIP-TC6} Networking Conference, Singapore, May 5-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4982}, pages = {397--408}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79549-0\_35}, doi = {10.1007/978-3-540-79549-0\_35}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/networking/KaafarGCLM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Kaafar07, author = {Mohamed Ali K{\^{a}}afar}, title = {Securiting Internet coordinates systems. (La s{\'{e}}curit{\'{e}} des syst{\`{e}}mes de coordonn{\'{e}}es Internet)}, school = {University of Nice Sophia Antipolis, France}, year = {2007}, url = {https://tel.archives-ouvertes.fr/tel-00406510}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Kaafar07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aintec/KaafarMSBTD07, author = {Mohamed Ali K{\^{a}}afar and Laurent Mathy and Kav{\'{e}} Salamatian and Chadi Barakat and Thierry Turletti and Walid Dabbous}, editor = {Serge Fdida and Kazunori Sugiura}, title = {Securing Internet Coordinate Systems}, booktitle = {Sustainable Internet, Third Asian Internet Engineering Conference, {AINTEC} 2007, Phuket, Thailand, November 27-29, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4866}, pages = {167--168}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76809-8\_15}, doi = {10.1007/978-3-540-76809-8\_15}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aintec/KaafarMSBTD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/KaafarMBSTD07, author = {Mohamed Ali K{\^{a}}afar and Laurent Mathy and Chadi Barakat and Kav{\'{e}} Salamatian and Thierry Turletti and Walid Dabbous}, editor = {Jun Murai and Kenjiro Cho}, title = {Securing internet coordinate embedding systems}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Kyoto, Japan, August 27-31, 2007}, pages = {61--72}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1282380.1282388}, doi = {10.1145/1282380.1282388}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/KaafarMBSTD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aintec/KaafarMT06, author = {Mohamed Ali K{\^{a}}afar and Cyrine Mrabet and Thierry Turletti}, editor = {Kenjiro Cho and Philippe Jacquet}, title = {A Topology-Aware Overlay Multicast Approach for Mobile Ad-Hoc Networks}, booktitle = {Technologies for Advanced Heterogeneous Networks II, Second Asian Internet Engineering Conference, {AINTEC} 2006, Pathumthani, Thailand, November 28-30, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4311}, pages = {31--47}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11930181\_3}, doi = {10.1007/11930181\_3}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/aintec/KaafarMT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/KaafarMTD06, author = {Mohamed Ali K{\^{a}}afar and Laurent Mathy and Thierry Turletti and Walid Dabbous}, editor = {Christophe Diot and Mostafa H. Ammar}, title = {Virtual networks under attack: disrupting internet coordinate systems}, booktitle = {Proceedings of the 2006 {ACM} Conference on Emerging Network Experiment and Technology, CoNEXT 2006, Lisboa, Portugal, December 4-7, 2006}, pages = {12}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1368436.1368453}, doi = {10.1145/1368436.1368453}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/KaafarMTD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/MrabetKK06, author = {Cyrine Mrabet and Mohamed Ali K{\^{a}}afar and Farouk Kamoun}, editor = {Christophe Diot and Mostafa H. Ammar}, title = {Wireless alternative best effort service: a case study of {ALM}}, booktitle = {Proceedings of the 2006 {ACM} Conference on Emerging Network Experiment and Technology, CoNEXT 2006, Lisboa, Portugal, December 4-7, 2006}, pages = {31}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1368436.1368475}, doi = {10.1145/1368436.1368475}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/MrabetKK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/KaafarTD06, author = {Mohamed Ali K{\^{a}}afar and Thierry Turletti and Walid Dabbous}, title = {A Locating-First Approach for Scalable Overlay Multicast}, booktitle = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 23-29 April 2006, Barcelona, Catalunya, Spain}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/INFOCOM.2006.82}, doi = {10.1109/INFOCOM.2006.82}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/KaafarTD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/KaafarTD06, author = {Mohamed Ali K{\^{a}}afar and Thierry Turletti and Walid Dabbous}, title = {A Locating-First Approach for Scalable Overlay Multicast}, booktitle = {Quality of Service - IWQoS 2006: 14th International Workshop, IWQoS 2006, New Haven, CT, USA, 19-21 June 2006, Proceedings}, pages = {2--11}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/IWQOS.2006.250445}, doi = {10.1109/IWQOS.2006.250445}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/KaafarTD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/KaafarMTD06, author = {Mohamed Ali K{\^{a}}afar and Laurent Mathy and Thierry Turletti and Walid Dabbous}, title = {Real attacks on virtual networks: Vivaldi out of tune}, booktitle = {Proceedings of the 2006 {SIGCOMM} Workshop on Large-Scale Attack Defense, {LSAD} '06, Pisa, Italy, September 11-15, 2006}, pages = {139--146}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1162666.1162672}, doi = {10.1145/1162666.1162672}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/KaafarMTD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0605080, author = {Mohamed Ali K{\^{a}}afar and Thierry Turletti and Walid Dabbous}, title = {A Locating-First Approach for Scalable Overlay Multicast}, journal = {CoRR}, volume = {abs/cs/0605080}, year = {2006}, url = {http://arxiv.org/abs/cs/0605080}, eprinttype = {arXiv}, eprint = {cs/0605080}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0605080.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip6-2/KaafarAK04, author = {Mohamed Ali K{\^{a}}afar and Lamia Ben Azzouz and Farouk Kamoun}, editor = {Dominique Ga{\"{\i}}ti and Sebasti{\`{a}} Galm{\'{e}}s and Ram{\'{o}}n Puigjaner}, title = {A Kerberos-Based Authentication Architecture for {WLANS} - Test beds and experiments}, booktitle = {Network Control and Engineering for QoS, Security and Mobility, {III} - {IFIP} {TC6} / WG6.2, 6.6, 6.7 and 6.8 Third International Conference on Network Control and Engineering for QoS, Security and Mobility, NetCon 2004 on November 2-5, 2004, Palma de Mallorca, Spain}, series = {{IFIP}}, volume = {165}, pages = {43--55}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/0-387-23198-6\_4}, doi = {10.1007/0-387-23198-6\_4}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip6-2/KaafarAK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/KaafarBKM04, author = {Mohamed Ali K{\^{a}}afar and Lamia Ben Azzouz and Farouk Kamoun and Davor Males}, editor = {Nikolas Mitrou and Kimon P. Kontovasilis and George N. Rouskas and Ilias Iliadis and Lazaros F. Merakos}, title = {A Kerberos-Based Authentication Architecture for Wireless LANs}, booktitle = {{NETWORKING} 2004, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication, Third International {IFIP-TC6} Networking Conference, Athens, Greece, May 9-14, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3042}, pages = {1344--1353}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24693-0\_117}, doi = {10.1007/978-3-540-24693-0\_117}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/networking/KaafarBKM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.