BibTeX records: Mohamed Ali Kâafar

download as .bib file

@article{DBLP:journals/access/Salman0K24,
  author       = {Muhammad Salman and
                  Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Investigating Evasive Techniques in {SMS} Spam Filtering: {A} Comparative
                  Analysis of Machine Learning Models},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {24306--24324},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3364671},
  doi          = {10.1109/ACCESS.2024.3364671},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/Salman0K24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JmalHBIKW24,
  author       = {Houssem Jmal and
                  Firas Ben Hmida and
                  Nardine Basta and
                  Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar and
                  Andy Walker},
  title        = {{SPGNN-API:} {A} Transferable Graph Neural Network for Attack Paths
                  Identification and Autonomous Mitigation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1601--1613},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3338965},
  doi          = {10.1109/TIFS.2023.3338965},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/JmalHBIKW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/AsgharZ0NKLC24,
  author       = {Hassan Jameel Asghar and
                  Benjamin Zi Hao Zhao and
                  Muhammad Ikram and
                  Giang Linh Duc Nguyen and
                  Dali Kaafar and
                  Sean Lamont and
                  Daniel Coscia},
  title        = {Use of cryptography in malware obfuscation},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {20},
  number       = {1},
  pages        = {135--152},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11416-023-00504-y},
  doi          = {10.1007/S11416-023-00504-Y},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/AsgharZ0NKLC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-14141,
  author       = {Hina Qayyum and
                  Muhammad Ikram and
                  Benjamin Zi Hao Zhao and
                  Ian D. Wood and
                  Nicolas Kourtellis and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Exploring the Distinctive Tweeting Patterns of Toxic Twitter Users},
  journal      = {CoRR},
  volume       = {abs/2401.14141},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.14141},
  doi          = {10.48550/ARXIV.2401.14141},
  eprinttype    = {arXiv},
  eprint       = {2401.14141},
  timestamp    = {Tue, 06 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-14141.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-14252,
  author       = {Hina Qayyum and
                  Muhammad Ikram and
                  Benjamin Zi Hao Zhao and
                  Ian D. Wood and
                  Nicolas Kourtellis and
                  Mohamed Ali K{\^{a}}afar},
  title        = {On mission Twitter Profiles: {A} Study of Selective Toxic Behavior},
  journal      = {CoRR},
  volume       = {abs/2401.14252},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.14252},
  doi          = {10.48550/ARXIV.2401.14252},
  eprinttype    = {arXiv},
  eprint       = {2401.14252},
  timestamp    = {Tue, 06 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-14252.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pervasive/TagBVZBKKO23,
  author       = {Benjamin Tag and
                  Niels van Berkel and
                  Sunny Verma and
                  Benjamin Zi Hao Zhao and
                  Shlomo Berkovsky and
                  Dali Kaafar and
                  Vassilis Kostakos and
                  Olga Ohrimenko},
  title        = {DDoD: Dual Denial of Decision Attacks on Human-AI Teams},
  journal      = {{IEEE} Pervasive Comput.},
  volume       = {22},
  number       = {1},
  pages        = {77--84},
  year         = {2023},
  url          = {https://doi.org/10.1109/MPRV.2022.3218773},
  doi          = {10.1109/MPRV.2022.3218773},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pervasive/TagBVZBKKO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/AliZANWK23,
  author       = {Rana Salal Ali and
                  Benjamin Zi Hao Zhao and
                  Hassan Jameel Asghar and
                  Tham Nguyen and
                  Ian David Wood and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Unintended Memorization and Timing Attacks in Named Entity Recognition
                  Models},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2023},
  number       = {2},
  pages        = {329--346},
  year         = {2023},
  url          = {https://doi.org/10.56553/popets-2023-0056},
  doi          = {10.56553/POPETS-2023-0056},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/AliZANWK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/VatsalanBK23,
  author       = {Dinusha Vatsalan and
                  Raghav Bhaskar and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Local Differentially Private Fuzzy Counting in Stream Data Using Probabilistic
                  Data Structures},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {35},
  number       = {8},
  pages        = {8185--8198},
  year         = {2023},
  url          = {https://doi.org/10.1109/TKDE.2022.3198478},
  doi          = {10.1109/TKDE.2022.3198478},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/VatsalanBK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AtkinsZAWK23,
  author       = {Conor Atkins and
                  Benjamin Zi Hao Zhao and
                  Hassan Jameel Asghar and
                  Ian D. Wood and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Mehdi Tibouchi and
                  Xiaofeng Wang},
  title        = {Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation
                  in Chat Bot Memories},
  booktitle    = {Applied Cryptography and Network Security - 21st International Conference,
                  {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13905},
  pages        = {284--308},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-33488-7\_11},
  doi          = {10.1007/978-3-031-33488-7\_11},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/AtkinsZAWK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SentanaIK23,
  author       = {I Wayan Budi Sentana and
                  Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Mehdi Tibouchi and
                  Xiaofeng Wang},
  title        = {An Empirical Analysis of Security and Privacy Risks in Android Cryptocurrency
                  Wallet Apps},
  booktitle    = {Applied Cryptography and Network Security - 21st International Conference,
                  {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13906},
  pages        = {699--725},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-33491-7\_26},
  doi          = {10.1007/978-3-031-33491-7\_26},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/SentanaIK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/WuVKR23,
  author       = {Nan Wu and
                  Dinusha Vatsalan and
                  Mohamed Ali K{\^{a}}afar and
                  Sanath Kumar Ramesh},
  editor       = {Joseph K. Liu and
                  Yang Xiang and
                  Surya Nepal and
                  Gene Tsudik},
  title        = {Privacy-Preserving Record Linkage for Cardinality Counting},
  booktitle    = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
                  2023},
  pages        = {53--64},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579856.3590338},
  doi          = {10.1145/3579856.3590338},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/WuVKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/QayyumIZWKK23,
  author       = {Hina Qayyum and
                  Muhammad Ikram and
                  Benjamin Zi Hao Zhao and
                  Ian D. Wood and
                  Nicolas Kourtellis and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Jingrui He and
                  Themis Palpanas and
                  Xiaohua Hu and
                  Alfredo Cuzzocrea and
                  Dejing Dou and
                  Dominik Slezak and
                  Wei Wang and
                  Aleksandra Gruca and
                  Jerry Chun{-}Wei Lin and
                  Rakesh Agrawal},
  title        = {Exploring the Distinctive Tweeting Patterns of Toxic Twitter Users},
  booktitle    = {{IEEE} International Conference on Big Data, BigData 2023, Sorrento,
                  Italy, December 15-18, 2023},
  pages        = {3624--3633},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/BigData59044.2023.10386402},
  doi          = {10.1109/BIGDATA59044.2023.10386402},
  timestamp    = {Fri, 02 Feb 2024 12:00:39 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/QayyumIZWKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/QayyumIZWKK23a,
  author       = {Hina Qayyum and
                  Muhammad Ikram and
                  Benjamin Zi Hao Zhao and
                  Ian D. Wood and
                  Nicolas Kourtellis and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Jingrui He and
                  Themis Palpanas and
                  Xiaohua Hu and
                  Alfredo Cuzzocrea and
                  Dejing Dou and
                  Dominik Slezak and
                  Wei Wang and
                  Aleksandra Gruca and
                  Jerry Chun{-}Wei Lin and
                  Rakesh Agrawal},
  title        = {On mission Twitter Profiles: {A} Study of Selective Toxic Behavior},
  booktitle    = {{IEEE} International Conference on Big Data, BigData 2023, Sorrento,
                  Italy, December 15-18, 2023},
  pages        = {3634--3643},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/BigData59044.2023.10386248},
  doi          = {10.1109/BIGDATA59044.2023.10386248},
  timestamp    = {Fri, 02 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/QayyumIZWKK23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbk/LuMCHLWVK23,
  author       = {Junda Lu and
                  Yukai Miao and
                  Mingyang Chen and
                  Bo Huang and
                  Bing Li and
                  Wei Wang and
                  Dinusha Vatsalan and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Victor S. Sheng and
                  Chindo Hicks and
                  Charles Ling and
                  Vijay Raghavan and
                  Xindong Wu},
  title        = {Distance Maximization and Defences on Deep Hashing Based Image Retrieval},
  booktitle    = {{IEEE} International Conference on Knowledge Graph, {ICKG} 2023, Shanghai,
                  China, December 1-2, 2023},
  pages        = {176--183},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICKG59574.2023.00027},
  doi          = {10.1109/ICKG59574.2023.00027},
  timestamp    = {Tue, 19 Mar 2024 16:23:25 +0100},
  biburl       = {https://dblp.org/rec/conf/icbk/LuMCHLWVK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/KepkowskiMWK23,
  author       = {Michal Kepkowski and
                  Maciej Machulak and
                  Ian D. Wood and
                  Dali Kaafar},
  title        = {Challenges with Passwordless {FIDO2} in an Enterprise Setting: {A}
                  Usability Study},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {37--48},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00017},
  doi          = {10.1109/SECDEV56634.2023.00017},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/KepkowskiMWK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/YeohKHKH23,
  author       = {Wei{-}Zhu Yeoh and
                  Michal Kepkowski and
                  Gunnar Heide and
                  Dali Kaafar and
                  Lucjan Hanzlik},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Fast IDentity Online with Anonymous Credentials {(FIDO-AC)}},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {3029--3046},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/yeoh},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/YeohKHKH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/websci/QayyumZW0KK23,
  author       = {Hina Qayyum and
                  Benjamin Zi Hao Zhao and
                  Ian D. Wood and
                  Muhammad Ikram and
                  Nicolas Kourtellis and
                  Mohamed Ali K{\^{a}}afar},
  title        = {A longitudinal study of the top 1{\%} toxic Twitter profiles},
  booktitle    = {Proceedings of the 15th {ACM} Web Science Conference 2023, WebSci
                  2023, Austin, TX, USA, 30 April 2023 - 1 May 2023},
  pages        = {292--303},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3578503.3583619},
  doi          = {10.1145/3578503.3583619},
  timestamp    = {Sat, 27 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/websci/QayyumZW0KK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-04000,
  author       = {Nan Wu and
                  Dinusha Vatsalan and
                  Mohamed Ali K{\^{a}}afar and
                  Sanath Kumar Ramesh},
  title        = {Privacy-Preserving Record Linkage for Cardinality Counting},
  journal      = {CoRR},
  volume       = {abs/2301.04000},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.04000},
  doi          = {10.48550/ARXIV.2301.04000},
  eprinttype    = {arXiv},
  eprint       = {2301.04000},
  timestamp    = {Thu, 19 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-04000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-14603,
  author       = {Hina Qayyum and
                  Benjamin Zi Hao Zhao and
                  Ian D. Wood and
                  Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar and
                  Nicolas Kourtellis},
  title        = {A longitudinal study of the top 1{\%} toxic Twitter profiles},
  journal      = {CoRR},
  volume       = {abs/2303.14603},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.14603},
  doi          = {10.48550/ARXIV.2303.14603},
  eprinttype    = {arXiv},
  eprint       = {2303.14603},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-14603.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-05371,
  author       = {Conor Atkins and
                  Benjamin Zi Hao Zhao and
                  Hassan Jameel Asghar and
                  Ian D. Wood and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation
                  in Chat Bot Memories},
  journal      = {CoRR},
  volume       = {abs/2304.05371},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.05371},
  doi          = {10.48550/ARXIV.2304.05371},
  eprinttype    = {arXiv},
  eprint       = {2304.05371},
  timestamp    = {Wed, 19 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-05371.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-05561,
  author       = {Gioacchino Tangari and
                  Shreesh Keskar and
                  Hassan Jameel Asghar and
                  Dali Kaafar},
  title        = {On the Adversarial Inversion of Deep Biometric Representations},
  journal      = {CoRR},
  volume       = {abs/2304.05561},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.05561},
  doi          = {10.48550/ARXIV.2304.05561},
  eprinttype    = {arXiv},
  eprint       = {2304.05561},
  timestamp    = {Wed, 19 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-05561.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-16758,
  author       = {Wei{-}Zhu Yeoh and
                  Michal Kepkowski and
                  Gunnar Heide and
                  Dali Kaafar and
                  Lucjan Hanzlik},
  title        = {Fast IDentity Online with Anonymous Credentials {(FIDO-AC)}},
  journal      = {CoRR},
  volume       = {abs/2305.16758},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.16758},
  doi          = {10.48550/ARXIV.2305.16758},
  eprinttype    = {arXiv},
  eprint       = {2305.16758},
  timestamp    = {Wed, 07 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-16758.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-19487,
  author       = {Houssem Jmal and
                  Firas Ben Hmida and
                  Nardine Basta and
                  Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar and
                  Andy Walker},
  title        = {{SPGNN-API:} {A} Transferable Graph Neural Network for Attack Paths
                  Identification and Autonomous Mitigation},
  journal      = {CoRR},
  volume       = {abs/2305.19487},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.19487},
  doi          = {10.48550/ARXIV.2305.19487},
  eprinttype    = {arXiv},
  eprint       = {2305.19487},
  timestamp    = {Wed, 07 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-19487.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-01965,
  author       = {Ian D. Wood and
                  Michal Kepkowski and
                  Leron Zinatullin and
                  Travis Darnley and
                  Mohamed Ali K{\^{a}}afar},
  title        = {An analysis of scam baiting calls: Identifying and extracting scam
                  stages and scripts},
  journal      = {CoRR},
  volume       = {abs/2307.01965},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.01965},
  doi          = {10.48550/ARXIV.2307.01965},
  eprinttype    = {arXiv},
  eprint       = {2307.01965},
  timestamp    = {Mon, 10 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-01965.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-08096,
  author       = {Michal Kepkowski and
                  Maciej Machulak and
                  Ian D. Wood and
                  Dali Kaafar},
  title        = {Challenges with Passwordless {FIDO2} in an Enterprise Setting: {A}
                  Usability Study},
  journal      = {CoRR},
  volume       = {abs/2308.08096},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.08096},
  doi          = {10.48550/ARXIV.2308.08096},
  eprinttype    = {arXiv},
  eprint       = {2308.08096},
  timestamp    = {Wed, 23 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-08096.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-02563,
  author       = {Hassan Jameel Asghar and
                  Zhigang Lu and
                  Zhongrui Zhao and
                  Dali Kaafar},
  title        = {Practical, Private Assurance of the Value of Collaboration},
  journal      = {CoRR},
  volume       = {abs/2310.02563},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.02563},
  doi          = {10.48550/ARXIV.2310.02563},
  eprinttype    = {arXiv},
  eprint       = {2310.02563},
  timestamp    = {Tue, 27 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-02563.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KepkowskiHWK22,
  author       = {Michal Kepkowski and
                  Lucjan Hanzlik and
                  Ian D. Wood and
                  Mohamed Ali K{\^{a}}afar},
  title        = {How Not to Handle Keys: Timing Attacks on {FIDO} Authenticator Privacy},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {4},
  pages        = {705--726},
  year         = {2022},
  url          = {https://doi.org/10.56553/popets-2022-0129},
  doi          = {10.56553/POPETS-2022-0129},
  timestamp    = {Fri, 30 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/KepkowskiHWK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/00080CHSKZ22,
  author       = {Yi Chen and
                  Hongxia Wang and
                  Kim{-}Kwang Raymond Choo and
                  Peisong He and
                  Zoran Salcic and
                  Dali Kaafar and
                  Xuyun Zhang},
  title        = {{DDCA:} {A} Distortion Drift-Based Cost Assignment Method for Adaptive
                  Video Steganography in the Transform Domain},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {4},
  pages        = {2405--2420},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3058134},
  doi          = {10.1109/TDSC.2021.3058134},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/00080CHSKZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuAKWD22,
  author       = {Zhigang Lu and
                  Hassan Jameel Asghar and
                  Mohamed Ali K{\^{a}}afar and
                  Darren Webb and
                  Peter Dickinson},
  title        = {A Differentially Private Framework for Deep Learning With Convexified
                  Loss Functions},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {2151--2165},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3169911},
  doi          = {10.1109/TIFS.2022.3169911},
  timestamp    = {Tue, 27 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LuAKWD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuVVK22,
  author       = {Nan Wu and
                  Dinusha Vatsalan and
                  Sunny Verma and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Fairness and Cost Constrained Privacy-Aware Record Linkage},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {2644--2656},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3191492},
  doi          = {10.1109/TIFS.2022.3191492},
  timestamp    = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WuVVK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/SheikhAFK22,
  author       = {Nazim Uddin Sheikh and
                  Hassan Jameel Asghar and
                  Farhad Farokhi and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Do Auto-Regressive Models Protect Privacy? Inferring Fine-Grained
                  Energy Consumption From Aggregated Model Parameters},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {15},
  number       = {6},
  pages        = {3198--3209},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSC.2021.3100498},
  doi          = {10.1109/TSC.2021.3100498},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/SheikhAFK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/BastaIKW22,
  author       = {Nardine Basta and
                  Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar and
                  Andy Walker},
  title        = {Towards a Zero-Trust Micro-segmentation Network Security Strategy:
                  An Evaluation Framework},
  booktitle    = {2022 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS}
                  2022, Budapest, Hungary, April 25-29, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/NOMS54207.2022.9789888},
  doi          = {10.1109/NOMS54207.2022.9789888},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/noms/BastaIKW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/QayyumSSNITK22,
  author       = {Hina Qayyum and
                  Muhammad Salman and
                  I Wayan Budi Sentana and
                  Giang Linh Duc Nguyen and
                  Muhammad Ikram and
                  Gareth Tyson and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Xingliang Yuan and
                  Guangdong Bai and
                  Cristina Alcaraz and
                  Suryadipta Majumdar},
  title        = {A First Look at Android Apps' Third-Party Resources Loading},
  booktitle    = {Network and System Security - 16th International Conference, {NSS}
                  2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13787},
  pages        = {193--213},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23020-2\_11},
  doi          = {10.1007/978-3-031-23020-2\_11},
  timestamp    = {Mon, 04 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/QayyumSSNITK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/22/MasoodBK22,
  author       = {Rahat Masood and
                  Shlomo Berkovsky and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Tracking and Personalization},
  booktitle    = {Modern Socio-Technical Perspectives on Privacy},
  pages        = {171--202},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-82786-1\_9},
  doi          = {10.1007/978-3-030-82786-1\_9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/22/MasoodBK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-07853,
  author       = {Hina Qayyum and
                  Benjamin Zi Hao Zhao and
                  Ian D. Wood and
                  Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar and
                  Nicolas Kourtellis},
  title        = {A deep dive into the consistently toxic 1{\%} of Twitter},
  journal      = {CoRR},
  volume       = {abs/2202.07853},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.07853},
  eprinttype    = {arXiv},
  eprint       = {2202.07853},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-07853.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-03077,
  author       = {Muhammad Ikram and
                  Rahat Masood and
                  Gareth Tyson and
                  Mohamed Ali K{\^{a}}afar and
                  Roya Ensafi},
  title        = {A Study of Third-party Resources Loading on Web},
  journal      = {CoRR},
  volume       = {abs/2203.03077},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.03077},
  doi          = {10.48550/ARXIV.2203.03077},
  eprinttype    = {arXiv},
  eprint       = {2203.03077},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-03077.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-10673,
  author       = {Nardine Basta and
                  Ming Ding and
                  Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar},
  title        = {5G-Enabled Pseudonymity for Cooperative Intelligent Transportation
                  System},
  journal      = {CoRR},
  volume       = {abs/2203.10673},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.10673},
  doi          = {10.48550/ARXIV.2203.10673},
  eprinttype    = {arXiv},
  eprint       = {2203.10673},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-10673.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-01049,
  author       = {Zhigang Lu and
                  Hassan Jameel Asghar and
                  Mohamed Ali K{\^{a}}afar and
                  Darren Webb and
                  Peter Dickinson},
  title        = {A Differentially Private Framework for Deep Learning with Convexified
                  Loss Functions},
  journal      = {CoRR},
  volume       = {abs/2204.01049},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.01049},
  doi          = {10.48550/ARXIV.2204.01049},
  eprinttype    = {arXiv},
  eprint       = {2204.01049},
  timestamp    = {Tue, 27 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-01049.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-06641,
  author       = {Rahat Masood and
                  Wing Yan Cheng and
                  Dinusha Vatsalan and
                  Deepak Mishra and
                  Hassan Jameel Asghar and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Privacy Preserving Release of Mobile Sensor Data},
  journal      = {CoRR},
  volume       = {abs/2205.06641},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.06641},
  doi          = {10.48550/ARXIV.2205.06641},
  eprinttype    = {arXiv},
  eprint       = {2205.06641},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-06641.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-08071,
  author       = {Michal Kepkowski and
                  Lucjan Hanzlik and
                  Ian D. Wood and
                  Mohamed Ali K{\^{a}}afar},
  title        = {How Not to Handle Keys: Timing Attacks on {FIDO} Authenticator Privacy},
  journal      = {CoRR},
  volume       = {abs/2205.08071},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.08071},
  doi          = {10.48550/ARXIV.2205.08071},
  eprinttype    = {arXiv},
  eprint       = {2205.08071},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-08071.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-15089,
  author       = {Nan Wu and
                  Dinusha Vatsalan and
                  Sunny Verma and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Fairness and Cost Constrained Privacy-Aware Record Linkage},
  journal      = {CoRR},
  volume       = {abs/2206.15089},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.15089},
  doi          = {10.48550/ARXIV.2206.15089},
  eprinttype    = {arXiv},
  eprint       = {2206.15089},
  timestamp    = {Mon, 04 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-15089.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-05264,
  author       = {Dinusha Vatsalan and
                  Raghav Bhaskar and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Local Differentially Private Fuzzy Counting in Stream Data using Probabilistic
                  Data Structure},
  journal      = {CoRR},
  volume       = {abs/2208.05264},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.05264},
  doi          = {10.48550/ARXIV.2208.05264},
  eprinttype    = {arXiv},
  eprint       = {2208.05264},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-05264.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-10451,
  author       = {Muhammad Salman and
                  Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar},
  title        = {An Empirical Analysis of {SMS} Scam Detection Systems},
  journal      = {CoRR},
  volume       = {abs/2210.10451},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.10451},
  doi          = {10.48550/ARXIV.2210.10451},
  eprinttype    = {arXiv},
  eprint       = {2210.10451},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-10451.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-02245,
  author       = {Rana Salal Ali and
                  Benjamin Zi Hao Zhao and
                  Hassan Jameel Asghar and
                  Tham Nguyen and
                  Ian David Wood and
                  Dali Kaafar},
  title        = {Unintended Memorization and Timing Attacks in Named Entity Recognition
                  Models},
  journal      = {CoRR},
  volume       = {abs/2211.02245},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.02245},
  doi          = {10.48550/ARXIV.2211.02245},
  eprinttype    = {arXiv},
  eprint       = {2211.02245},
  timestamp    = {Wed, 09 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-02245.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-03980,
  author       = {Benjamin Tag and
                  Niels van Berkel and
                  Sunny Verma and
                  Benjamin Zi Hao Zhao and
                  Shlomo Berkovsky and
                  Dali Kaafar and
                  Vassilis Kostakos and
                  Olga Ohrimenko},
  title        = {DDoD: Dual Denial of Decision Attacks on Human-AI Teams},
  journal      = {CoRR},
  volume       = {abs/2212.03980},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.03980},
  doi          = {10.48550/ARXIV.2212.03980},
  eprinttype    = {arXiv},
  eprint       = {2212.03980},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-03980.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-04008,
  author       = {Hassan Jameel Asghar and
                  Benjamin Zi Hao Zhao and
                  Muhammad Ikram and
                  Giang L. D. Nguyen and
                  Dali Kaafar and
                  Sean Lamont and
                  Daniel Coscia},
  title        = {SoK: Use of Cryptography in Malware Obfuscation},
  journal      = {CoRR},
  volume       = {abs/2212.04008},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.04008},
  doi          = {10.48550/ARXIV.2212.04008},
  eprinttype    = {arXiv},
  eprint       = {2212.04008},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-04008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsgharZINKLC22,
  author       = {Hassan Jameel Asghar and
                  Benjamin Zi Hao Zhao and
                  Muhammad Ikram and
                  Giang Linh Duc Nguyen and
                  Dali Kaafar and
                  Sean Lamont and
                  Daniel Coscia},
  title        = {SoK: Use of Cryptography in Malware Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1699},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1699},
  timestamp    = {Mon, 04 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AsgharZINKLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jamia/TangariISIKB21,
  author       = {Gioacchino Tangari and
                  Muhammad Ikram and
                  I Wayan Budi Sentana and
                  Kiran Ijaz and
                  Mohamed Ali K{\^{a}}afar and
                  Shlomo Berkovsky},
  title        = {Analyzing security issues of android mobile health and medical applications},
  journal      = {J. Am. Medical Informatics Assoc.},
  volume       = {28},
  number       = {10},
  pages        = {2074--2084},
  year         = {2021},
  url          = {https://doi.org/10.1093/jamia/ocab131},
  doi          = {10.1093/JAMIA/OCAB131},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jamia/TangariISIKB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MiaoXCPZZKX21,
  author       = {Yuantian Miao and
                  Minhui Xue and
                  Chao Chen and
                  Lei Pan and
                  Jun Zhang and
                  Benjamin Zi Hao Zhao and
                  Dali Kaafar and
                  Yang Xiang},
  title        = {The Audio Auditor: User-Level Membership Inference in Internet of
                  Things Voice Services},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2021},
  number       = {1},
  pages        = {209--228},
  year         = {2021},
  url          = {https://doi.org/10.2478/popets-2021-0012},
  doi          = {10.2478/POPETS-2021-0012},
  timestamp    = {Tue, 19 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/MiaoXCPZZKX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FarokhiWSK21,
  author       = {Farhad Farokhi and
                  Nan Wu and
                  David B. Smith and
                  Mohamed Ali K{\^{a}}afar},
  title        = {The Cost of Privacy in Asynchronous Differentially-Private Machine
                  Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {2118--2129},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3050603},
  doi          = {10.1109/TIFS.2021.3050603},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/FarokhiWSK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/Dehez-ClementiL21,
  author       = {Marina Dehez{-}Clementi and
                  J{\'{e}}r{\^{o}}me Lacan and
                  Jean{-}Christophe Deneuville and
                  Hassan Asghar and
                  Dali Kaafar},
  editor       = {Yang Xiang and
                  Ziyuan Wang and
                  Honggang Wang and
                  Valtteri Niemi},
  title        = {A Blockchain-enabled Anonymous-yet- Traceable Distributed Key Generation},
  booktitle    = {2021 {IEEE} International Conference on Blockchain, Blockchain 2021,
                  Melbourne, Australia, December 6-8, 2021},
  pages        = {257--265},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/Blockchain53845.2021.00042},
  doi          = {10.1109/BLOCKCHAIN53845.2021.00042},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/blockchain2/Dehez-ClementiL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/ZhaoACABKWD21,
  author       = {Benjamin Zi Hao Zhao and
                  Aviral Agrawal and
                  Catisha Coburn and
                  Hassan Jameel Asghar and
                  Raghav Bhaskar and
                  Mohamed Ali K{\^{a}}afar and
                  Darren Webb and
                  Peter Dickinson},
  title        = {On the (In)Feasibility of Attribute Inference Attacks on Machine Learning
                  Models},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2021, Vienna, Austria, September 6-10, 2021},
  pages        = {232--251},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EuroSP51992.2021.00025},
  doi          = {10.1109/EUROSP51992.2021.00025},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/ZhaoACABKWD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/SheikhLAK21,
  author       = {Nazim Uddin Sheikh and
                  Zhigang Lu and
                  Hassan Jameel Asghar and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Pierangela Samarati and
                  Marten van Sinderen and
                  Sabrina De Capitani di Vimercati and
                  Fons Wijnhoven},
  title        = {Trace Recovery: Attacking and Defending the User Privacy in Smart
                  Meter Data Analytics},
  booktitle    = {E-Business and Telecommunications - 18th International Conference,
                  {ICETE} 2021, Virtual Event, July 6-9, 2021, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1795},
  pages        = {305--333},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-36840-0\_14},
  doi          = {10.1007/978-3-031-36840-0\_14},
  timestamp    = {Tue, 27 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icete/SheikhLAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SheikhLAK21,
  author       = {Nazim Uddin Sheikh and
                  Zhigang Lu and
                  Hassan Asghar and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Trace Recovery: Inferring Fine-grained Trace of Energy Data from Aggregates},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {283--294},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010560302830294},
  doi          = {10.5220/0010560302830294},
  timestamp    = {Tue, 27 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SheikhLAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SentanaIKB21,
  author       = {I Wayan Budi Sentana and
                  Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar and
                  Shlomo Berkovsky},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Empirical Security and Privacy Analysis of Mobile Symptom Checking
                  Apps on Google Play},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {665--673},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010520106650673},
  doi          = {10.5220/0010520106650673},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SentanaIKB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SentanaIK21,
  author       = {I Wayan Budi Sentana and
                  Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {BlockJack: Towards Improved Prevention of {IP} Prefix Hijacking Attacks
                  in Inter-domain Routing via Blockchain},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {674--679},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010521106740679},
  doi          = {10.5220/0010521106740679},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SentanaIK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-01944,
  author       = {Zainab Abaid and
                  Dilip Sarkar and
                  Mohamed Ali K{\^{a}}afar and
                  Sanjay K. Jha},
  title        = {All Infections are Not Created Equal: Time-Sensitive Prediction of
                  Malware Generated Network Attacks},
  journal      = {CoRR},
  volume       = {abs/2102.01944},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.01944},
  eprinttype    = {arXiv},
  eprint       = {2102.01944},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-01944.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-07101,
  author       = {Benjamin Zi Hao Zhao and
                  Aviral Agrawal and
                  Catisha Coburn and
                  Hassan Jameel Asghar and
                  Raghav Bhaskar and
                  Mohamed Ali K{\^{a}}afar and
                  Darren Webb and
                  Peter Dickinson},
  title        = {On the (In)Feasibility of Attribute Inference Attacks on Machine Learning
                  Models},
  journal      = {CoRR},
  volume       = {abs/2103.07101},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.07101},
  eprinttype    = {arXiv},
  eprint       = {2103.07101},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-07101.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-09904,
  author       = {Tham Nguyen and
                  Hassan Jameel Asghar and
                  Raghav Bhaskar and
                  Dali Kaafar and
                  Farhad Farokhi},
  title        = {Sharing in a Trustless World: Privacy-Preserving Data Analytics with
                  Potentially Cheating Participants},
  journal      = {CoRR},
  volume       = {abs/2106.09904},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.09904},
  eprinttype    = {arXiv},
  eprint       = {2106.09904},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-09904.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-07063,
  author       = {I Wayan Budi Sentana and
                  Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar},
  title        = {BlockJack: Towards Improved Prevention of {IP} Prefix Hijacking Attacks
                  in Inter-Domain Routing Via Blockchain},
  journal      = {CoRR},
  volume       = {abs/2107.07063},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.07063},
  eprinttype    = {arXiv},
  eprint       = {2107.07063},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-07063.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-13754,
  author       = {I Wayan Budi Sentana and
                  Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar and
                  Shlomo Berkovsky},
  title        = {Empirical Security and Privacy Analysis of Mobile Symptom Checking
                  Applications on Google Play},
  journal      = {CoRR},
  volume       = {abs/2107.13754},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.13754},
  eprinttype    = {arXiv},
  eprint       = {2107.13754},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-13754.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-10967,
  author       = {Nardine Basta and
                  Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar and
                  Andy Walker},
  title        = {Towards a Zero-Trust Micro-segmentation Network Security Strategy:
                  An Evaluation Framework},
  journal      = {CoRR},
  volume       = {abs/2111.10967},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.10967},
  eprinttype    = {arXiv},
  eprint       = {2111.10967},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-10967.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/AsgharDRMK20,
  author       = {Hassan Jameel Asghar and
                  Ming Ding and
                  Thierry Rakotoarivelo and
                  Sirine Mrabet and
                  Dali Kaafar},
  title        = {Differentially Private Release of Datasets using Gaussian Copula},
  journal      = {J. Priv. Confidentiality},
  volume       = {10},
  number       = {2},
  year         = {2020},
  url          = {https://doi.org/10.29012/jpc.686},
  doi          = {10.29012/JPC.686},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/AsgharDRMK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KamalarubanPAK20,
  author       = {Parameswaran Kamalaruban and
                  Victor Perrier and
                  Hassan Jameel Asghar and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Not All Attributes are Created Equal: dX -Private Mechanisms for Linear
                  Queries},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2020},
  number       = {1},
  pages        = {103--125},
  year         = {2020},
  url          = {https://doi.org/10.2478/popets-2020-0007},
  doi          = {10.2478/POPETS-2020-0007},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/KamalarubanPAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/AsgharK20,
  author       = {Hassan Jameel Asghar and
                  Dali Kaafar},
  title        = {Averaging Attacks on Bounded Noise-based Disclosure Control Algorithms},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2020},
  number       = {2},
  pages        = {358--378},
  year         = {2020},
  url          = {https://doi.org/10.2478/popets-2020-0031},
  doi          = {10.2478/POPETS-2020-0031},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/AsgharK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/IkramMTKLE20,
  author       = {Muhammad Ikram and
                  Rahat Masood and
                  Gareth Tyson and
                  Mohamed Ali K{\^{a}}afar and
                  Noha Loizon and
                  Roya Ensafi},
  title        = {Measuring and Analysing the Chain of Implicit Trust: {A} Study of
                  Third-party Resources Loading},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {8:1--8:27},
  year         = {2020},
  url          = {https://doi.org/10.1145/3380466},
  doi          = {10.1145/3380466},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/IkramMTKLE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhaoAKTY20,
  author       = {Benjamin Zi Hao Zhao and
                  Hassan Jameel Asghar and
                  Mohamed Ali K{\^{a}}afar and
                  Francesca Trevisan and
                  Haiyue Yuan},
  title        = {Exploiting Behavioral Side Channels in Observation Resilient Cognitive
                  Authentication Schemes},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {1},
  pages        = {1:1--1:33},
  year         = {2020},
  url          = {https://doi.org/10.1145/3414844},
  doi          = {10.1145/3414844},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhaoAKTY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/Yang0VZKH20,
  author       = {Qing Yang and
                  Yiran Shen and
                  Dinusha Vatsalan and
                  Jianpei Zhang and
                  Mohamed Ali K{\^{a}}afar and
                  Wen Hu},
  title        = {P4Mobi: {A} Probabilistic Privacy-Preserving Framework for Publishing
                  Mobility Datasets},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {69},
  number       = {7},
  pages        = {6987--6999},
  year         = {2020},
  url          = {https://doi.org/10.1109/TVT.2020.2994157},
  doi          = {10.1109/TVT.2020.2994157},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/Yang0VZKH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccsw-ws/ZhaoKK20,
  author       = {Benjamin Zi Hao Zhao and
                  Mohamed Ali K{\^{a}}afar and
                  Nicolas Kourtellis},
  editor       = {Yinqian Zhang and
                  Radu Sion},
  title        = {Not one but many Tradeoffs: Privacy Vs. Utility in Differentially
                  Private Machine Learning},
  booktitle    = {CCSW'20, Proceedings of the 2020 {ACM} {SIGSAC} Conference on Cloud
                  Computing Security Workshop, Virtual Event, USA, November 9, 2020},
  pages        = {15--26},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411495.3421352},
  doi          = {10.1145/3411495.3421352},
  timestamp    = {Thu, 12 Oct 2023 12:32:08 +0200},
  biburl       = {https://dblp.org/rec/conf/ccsw-ws/ZhaoKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/SentanaIK20,
  author       = {I Wayan Budi Sentana and
                  Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar},
  title        = {BlockJack: Blocking {IP} Prefix Hijacker in Inter-Domain Routing},
  booktitle    = {CoNEXT'20: Proceedings of the Student Workshop, Barcelona, Spain,
                  December 1, 2020},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3426746.3434052},
  doi          = {10.1145/3426746.3434052},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/SentanaIK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Dehez-ClementiD20,
  author       = {Marina Dehez{-}Clementi and
                  Jean{-}Christophe Deneuville and
                  J{\'{e}}r{\^{o}}me Lacan and
                  Hassan Asghar and
                  Dali Kaafar},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Jordi Herrera{-}Joancomart{\'{\i}}},
  title        = {Who Let the\emph{DOGS}Out: Anonymous but Auditable Communications
                  Using Group Signature Schemes with Distributed Opening},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2020 International Workshops, {DPM} 2020 and {CBT} 2020,
                  Guildford, UK, September 17-18, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12484},
  pages        = {437--446},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-66172-4\_28},
  doi          = {10.1007/978-3-030-66172-4\_28},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/Dehez-ClementiD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itnac/ShahpasandHKV20,
  author       = {Maryam Shahpasand and
                  Leonard G. C. Hamey and
                  Mohamed Ali K{\^{a}}afar and
                  Dinusha Vatsalan},
  title        = {Feature-Based Adversarial Attacks Against Machine Learnt Mobile Malware
                  Detectors},
  booktitle    = {30th International Telecommunication Networks and Applications Conference,
                  {ITNAC} 2020, Melbourne, Australia, November 25-27, 2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ITNAC50341.2020.9315144},
  doi          = {10.1109/ITNAC50341.2020.9315144},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itnac/ShahpasandHKV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZhaoAK20,
  author       = {Benjamin Zi Hao Zhao and
                  Hassan Jameel Asghar and
                  Mohamed Ali K{\^{a}}afar},
  title        = {On the Resilience of Biometric Authentication Systems against Random
                  Inputs},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/on-the-resilience-of-biometric-authentication-systems-against-random-inputs/},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ZhaoAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WuFSK20,
  author       = {Nan Wu and
                  Farhad Farokhi and
                  David B. Smith and
                  Mohamed Ali K{\^{a}}afar},
  title        = {The Value of Collaboration in Convex Machine Learning with Differential
                  Privacy},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {304--317},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00025},
  doi          = {10.1109/SP40000.2020.00025},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/WuFSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/ShaghaghiKBJ20,
  author       = {Arash Shaghaghi and
                  Mohamed Ali K{\^{a}}afar and
                  Rajkumar Buyya and
                  Sanjay Jha},
  editor       = {Brij B. Gupta and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Dharma P. Agrawal and
                  Deepak Gupta},
  title        = {Software-Defined Network {(SDN)} Data Plane Security: Issues, Solutions,
                  and Future Directions},
  booktitle    = {Handbook of Computer Networks and Cyber Security, Principles and Paradigms},
  pages        = {341--387},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-22277-2\_14},
  doi          = {10.1007/978-3-030-22277-2\_14},
  timestamp    = {Sun, 12 Nov 2023 02:22:31 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/ShaghaghiKBJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-04056,
  author       = {Benjamin Zi Hao Zhao and
                  Hassan Jameel Asghar and
                  Mohamed Ali K{\^{a}}afar},
  title        = {On the Resilience of Biometric Authentication Systems against Random
                  Inputs},
  journal      = {CoRR},
  volume       = {abs/2001.04056},
  year         = {2020},
  url          = {https://arxiv.org/abs/2001.04056},
  eprinttype    = {arXiv},
  eprint       = {2001.04056},
  timestamp    = {Fri, 17 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-04056.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-10648,
  author       = {Farhad Farokhi and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Modelling and Quantifying Membership Information Leakage in Machine
                  Learning},
  journal      = {CoRR},
  volume       = {abs/2001.10648},
  year         = {2020},
  url          = {https://arxiv.org/abs/2001.10648},
  eprinttype    = {arXiv},
  eprint       = {2001.10648},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-10648.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-06856,
  author       = {Shakila Mahjabin Tonni and
                  Farhad Farokhi and
                  Dinusha Vatsalan and
                  Dali Kaafar},
  title        = {Data and Model Dependencies of Membership Inference Attack},
  journal      = {CoRR},
  volume       = {abs/2002.06856},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.06856},
  eprinttype    = {arXiv},
  eprint       = {2002.06856},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-06856.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-08500,
  author       = {Farhad Farokhi and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Predicting Performance of Asynchronous Differentially-Private Learning},
  journal      = {CoRR},
  volume       = {abs/2003.08500},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.08500},
  eprinttype    = {arXiv},
  eprint       = {2003.08500},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-08500.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-11231,
  author       = {Mahmood Yousefi{-}Azar and
                  Mohamed Ali K{\^{a}}afar and
                  Andy Walker},
  title        = {Unsupervised Learning for security of Enterprise networks by micro-segmentation},
  journal      = {CoRR},
  volume       = {abs/2003.11231},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.11231},
  eprinttype    = {arXiv},
  eprint       = {2003.11231},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-11231.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-11210,
  author       = {Benjamin Zi Hao Zhao and
                  Hassan Jameel Asghar and
                  Mohamed Ali K{\^{a}}afar and
                  Francesca Trevisan and
                  Haiyue Yuan},
  title        = {Exploiting Behavioral Side-Channels in Observation Resilient Cognitive
                  Authentication Schemes},
  journal      = {CoRR},
  volume       = {abs/2007.11210},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.11210},
  eprinttype    = {arXiv},
  eprint       = {2007.11210},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-11210.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-08807,
  author       = {Benjamin Zi Hao Zhao and
                  Mohamed Ali K{\^{a}}afar and
                  Nicolas Kourtellis},
  title        = {Not one but many Tradeoffs: Privacy Vs. Utility in Differentially
                  Private Machine Learning},
  journal      = {CoRR},
  volume       = {abs/2008.08807},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.08807},
  eprinttype    = {arXiv},
  eprint       = {2008.08807},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-08807.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MonteiroKATRKLS20,
  author       = {Matthieu Monteiro and
                  Kumara Kahatapitiya and
                  Hassan Jameel Asghar and
                  Kanchana Thilakarathna and
                  Thierry Rakotoarivelo and
                  Dali Kaafar and
                  Shujun Li and
                  Ron Steinfeld and
                  Josef Pieprzyk},
  title        = {Foxtail+: {A} Learning with Errors-based Authentication Protocol for
                  Resource-Constrained Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {261},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/261},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MonteiroKATRKLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AsgharCJKMMRY19,
  author       = {Hassan Jameel Asghar and
                  Emiliano De Cristofaro and
                  Guillaume Jourjon and
                  Mohamed Ali K{\^{a}}afar and
                  Laurent Mathy and
                  Luca Melis and
                  Craig Russell and
                  Mang Yu},
  title        = {Fast privacy-preserving network function outsourcing},
  journal      = {Comput. Networks},
  volume       = {163},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.comnet.2019.106893},
  doi          = {10.1016/J.COMNET.2019.106893},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/AsgharCJKMMRY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/HuangSDK19,
  author       = {Hailong Huang and
                  Andrey V. Savkin and
                  Ming Ding and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Optimized deployment of drone base station to improve user experience
                  in cellular networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {144},
  pages        = {49--58},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jnca.2019.07.002},
  doi          = {10.1016/J.JNCA.2019.07.002},
  timestamp    = {Mon, 11 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/HuangSDK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/JiangTMKS19,
  author       = {Fangzhou Jiang and
                  Kanchana Thilakarathna and
                  Sirine Mrabet and
                  Mohamed Ali K{\^{a}}afar and
                  Aruna Seneviratne},
  title        = {uStash: {A} Novel Mobile Content Delivery System for Improving User
                  QoE in Public Transport},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {18},
  number       = {6},
  pages        = {1447--1460},
  year         = {2019},
  url          = {https://doi.org/10.1109/TMC.2018.2859318},
  doi          = {10.1109/TMC.2018.2859318},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/JiangTMKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vtm/ZangDSTRK19,
  author       = {Shizhe Zang and
                  Ming Ding and
                  David Smith and
                  Paul Tyler and
                  Thierry Rakotoarivelo and
                  Mohamed Ali K{\^{a}}afar},
  title        = {The Impact of Adverse Weather Conditions on Autonomous Vehicles: How
                  Rain, Snow, Fog, and Hail Affect the Performance of a Self-Driving
                  Car},
  journal      = {{IEEE} Veh. Technol. Mag.},
  volume       = {14},
  number       = {2},
  pages        = {103--111},
  year         = {2019},
  url          = {https://doi.org/10.1109/MVT.2019.2892497},
  doi          = {10.1109/MVT.2019.2892497},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vtm/ZangDSTRK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhaoIAKCT19,
  author       = {Benjamin Zi Hao Zhao and
                  Muhammad Ikram and
                  Hassan Jameel Asghar and
                  Mohamed Ali K{\^{a}}afar and
                  Abdelberi Chaabane and
                  Kanchana Thilakarathna},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {A Decade of Mal-Activity Reporting: {A} Retrospective Analysis of
                  Internet Malicious Activity Blacklists},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {193--205},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329834},
  doi          = {10.1145/3321705.3329834},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhaoIAKCT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/IkramBK19,
  author       = {Muhammad Ikram and
                  Pierrick Beaume and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Mohammad S. Obaidat and
                  Pierangela Samarati},
  title        = {DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware
                  via Weighted Directed Call Graph Modelling},
  booktitle    = {Proceedings of the 16th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague,
                  Czech Republic, July 26-28, 2019},
  pages        = {211--219},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007834602110219},
  doi          = {10.5220/0007834602110219},
  timestamp    = {Tue, 06 Jun 2023 14:58:02 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/IkramBK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/HashmiIK19,
  author       = {Saad Sajid Hashmi and
                  Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Soumaya Cherkaoui and
                  Lyes Khoukhi},
  title        = {A Longitudinal Analysis of Online Ad-Blocking Blacklists},
  booktitle    = {2019 {IEEE} 44th {LCN} Symposium on Emerging Topics in Networking
                  {(LCN} Symposium), Osnabr{\"{u}}ck, Germany, October 14-17, 2019},
  pages        = {158--165},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/LCNSymposium47956.2019.9000671},
  doi          = {10.1109/LCNSYMPOSIUM47956.2019.9000671},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/HashmiIK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/PerrierAK19,
  author       = {Victor Perrier and
                  Hassan Jameel Asghar and
                  Dali Kaafar},
  title        = {Private Continual Release of Real-Valued Data Streams},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/private-continual-release-of-real-valued-data-streams/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/PerrierAK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/IkramMTKLE19,
  author       = {Muhammad Ikram and
                  Rahat Masood and
                  Gareth Tyson and
                  Mohamed Ali K{\^{a}}afar and
                  Noha Loizon and
                  Roya Ensafi},
  editor       = {Ling Liu and
                  Ryen W. White and
                  Amin Mantrach and
                  Fabrizio Silvestri and
                  Julian J. McAuley and
                  Ricardo Baeza{-}Yates and
                  Leila Zia},
  title        = {The Chain of Implicit Trust: An Analysis of the Web Third-party Resources
                  Loading},
  booktitle    = {The World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA,
                  May 13-17, 2019},
  pages        = {2851--2857},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3308558.3313521},
  doi          = {10.1145/3308558.3313521},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/IkramMTKLE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-07699,
  author       = {Muhammad Ikram and
                  Rahat Masood and
                  Gareth Tyson and
                  Mohamed Ali K{\^{a}}afar and
                  Noha Loizon and
                  Roya Ensafi},
  title        = {The Chain of Implicit Trust: An Analysis of the Web Third-party Resources
                  Loading},
  journal      = {CoRR},
  volume       = {abs/1901.07699},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.07699},
  eprinttype    = {arXiv},
  eprint       = {1901.07699},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-07699.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-01499,
  author       = {Hassan Jameel Asghar and
                  Ming Ding and
                  Thierry Rakotoarivelo and
                  Sirine Mrabet and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Differentially Private Release of High-Dimensional Datasets using
                  the Gaussian Copula},
  journal      = {CoRR},
  volume       = {abs/1902.01499},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.01499},
  eprinttype    = {arXiv},
  eprint       = {1902.01499},
  timestamp    = {Tue, 09 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-01499.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-06414,
  author       = {Hassan Jameel Asghar and
                  Dali Kaafar},
  title        = {Averaging Attacks on Bounded Perturbation Algorithms},
  journal      = {CoRR},
  volume       = {abs/1902.06414},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.06414},
  eprinttype    = {arXiv},
  eprint       = {1902.06414},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-06414.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-10629,
  author       = {Benjamin Zi Hao Zhao and
                  Muhammad Ikram and
                  Hassan Jameel Asghar and
                  Mohamed Ali K{\^{a}}afar and
                  Abdelberi Chaabane and
                  Kanchana Thilakarathna},
  title        = {A Decade of Mal-Activity Reporting: {A} Retrospective Analysis of
                  Internet Malicious Activity Blacklists},
  journal      = {CoRR},
  volume       = {abs/1904.10629},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.10629},
  eprinttype    = {arXiv},
  eprint       = {1904.10629},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-10629.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-07082,
  author       = {Yuantian Miao and
                  Benjamin Zi Hao Zhao and
                  Minhui Xue and
                  Chao Chen and
                  Lei Pan and
                  Jun Zhang and
                  Dali Kaafar and
                  Yang Xiang},
  title        = {The Audio Auditor: Participant-Level Membership Inference in Voice-Based
                  IoT},
  journal      = {CoRR},
  volume       = {abs/1905.07082},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.07082},
  eprinttype    = {arXiv},
  eprint       = {1905.07082},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-07082.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-09136,
  author       = {Muhammad Ikram and
                  Pierrick Beaume and
                  Mohamed Ali K{\^{a}}afar},
  title        = {DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware
                  via Weighted Directed Call Graph Modelling},
  journal      = {CoRR},
  volume       = {abs/1905.09136},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.09136},
  eprinttype    = {arXiv},
  eprint       = {1905.09136},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-09136.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-00166,
  author       = {Saad Sajid Hashmi and
                  Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar},
  title        = {A Longitudinal Analysis of Online Ad-Blocking Blacklists},
  journal      = {CoRR},
  volume       = {abs/1906.00166},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.00166},
  eprinttype    = {arXiv},
  eprint       = {1906.00166},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-00166.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-09679,
  author       = {Nan Wu and
                  Farhad Farokhi and
                  David B. Smith and
                  Mohamed Ali K{\^{a}}afar},
  title        = {The Value of Collaboration in Convex Machine Learning with Differential
                  Privacy},
  journal      = {CoRR},
  volume       = {abs/1906.09679},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.09679},
  eprinttype    = {arXiv},
  eprint       = {1906.09679},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-09679.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-10558,
  author       = {Benjamin Zi Hao Zhao and
                  Hassan Jameel Asghar and
                  Raghav Bhaskar and
                  Mohamed Ali K{\^{a}}afar},
  title        = {On Inferring Training Data Attributes in Machine Learning Models},
  journal      = {CoRR},
  volume       = {abs/1908.10558},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.10558},
  eprinttype    = {arXiv},
  eprint       = {1908.10558},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-10558.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-02742,
  author       = {Shaofeng Li and
                  Benjamin Zi Hao Zhao and
                  Jiahao Yu and
                  Minhui Xue and
                  Dali Kaafar and
                  Haojin Zhu},
  title        = {Invisible Backdoor Attacks Against Deep Neural Networks},
  journal      = {CoRR},
  volume       = {abs/1909.02742},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.02742},
  eprinttype    = {arXiv},
  eprint       = {1909.02742},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-02742.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/ChauhanKM18,
  author       = {Jagmohan Chauhan and
                  Mohamed Ali K{\^{a}}afar and
                  Anirban Mahanti},
  title        = {The Web for Underpowered Mobile Devices: Lessons Learned from Google
                  Glass},
  journal      = {{IEEE} Internet Comput.},
  volume       = {22},
  number       = {3},
  pages        = {38--47},
  year         = {2018},
  url          = {https://doi.org/10.1109/MIC.2017.3301612},
  doi          = {10.1109/MIC.2017.3301612},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/ChauhanKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/DingLCK18,
  author       = {Ming Ding and
                  David L{\'{o}}pez{-}P{\'{e}}rez and
                  Holger Claussen and
                  Mohamed Ali K{\^{a}}afar},
  title        = {On the Fundamental Characteristics of Ultra-Dense Small Cell Networks},
  journal      = {{IEEE} Netw.},
  volume       = {32},
  number       = {3},
  pages        = {92--100},
  year         = {2018},
  url          = {https://doi.org/10.1109/MNET.2018.1700096},
  doi          = {10.1109/MNET.2018.1700096},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/DingLCK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MasoodZAK18,
  author       = {Rahat Masood and
                  Benjamin Zi Hao Zhao and
                  Hassan Jameel Asghar and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch
                  Gestures for Tracking},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2018},
  number       = {2},
  pages        = {122--142},
  year         = {2018},
  url          = {https://doi.org/10.1515/popets-2018-0016},
  doi          = {10.1515/POPETS-2018-0016},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/MasoodZAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/XieLKW18,
  author       = {Gaogang Xie and
                  Zhenyu Li and
                  Mohamed Ali K{\^{a}}afar and
                  Qinghua Wu},
  title        = {Access Types Effect on Internet Video Services and Its Implications
                  on {CDN} Caching},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {28},
  number       = {5},
  pages        = {1183--1196},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCSVT.2017.2652487},
  doi          = {10.1109/TCSVT.2017.2652487},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/XieLKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/ShaghaghiKKBJ18,
  author       = {Arash Shaghaghi and
                  Salil S. Kanhere and
                  Mohamed Ali K{\^{a}}afar and
                  Elisa Bertino and
                  Sanjay Jha},
  title        = {Gargoyle: {A} Network-based Insider Attack Resilient Framework for
                  Organizations},
  booktitle    = {43rd {IEEE} Conference on Local Computer Networks, {LCN} 2018, Chicago,
                  IL, USA, October 1-4, 2018},
  pages        = {553--561},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/LCN.2018.8638245},
  doi          = {10.1109/LCN.2018.8638245},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/ShaghaghiKKBJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/ShaghaghiKKJ18,
  author       = {Arash Shaghaghi and
                  Salil S. Kanhere and
                  Mohamed Ali K{\^{a}}afar and
                  Sanjay Jha},
  title        = {Gwardar: Towards Protecting a Software-Defined Network from Malicious
                  Network Operating Systems},
  booktitle    = {17th {IEEE} International Symposium on Network Computing and Applications,
                  {NCA} 2018, Cambridge, MA, USA, November 1-3, 2018},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/NCA.2018.8548074},
  doi          = {10.1109/NCA.2018.8548074},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nca/ShaghaghiKKJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/MasoodVIK18,
  author       = {Rahat Masood and
                  Dinusha Vatsalan and
                  Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Pierre{-}Antoine Champin and
                  Fabien Gandon and
                  Mounia Lalmas and
                  Panagiotis G. Ipeirotis},
  title        = {Incognito: {A} Method for Obfuscating Web Data},
  booktitle    = {Proceedings of the 2018 World Wide Web Conference on World Wide Web,
                  {WWW} 2018, Lyon, France, April 23-27, 2018},
  pages        = {267--276},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3178876.3186093},
  doi          = {10.1145/3178876.3186093},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/MasoodVIK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-00262,
  author       = {Arash Shaghaghi and
                  Mohamed Ali K{\^{a}}afar and
                  Rajkumar Buyya and
                  Sanjay Jha},
  title        = {Software-Defined Network {(SDN)} Data Plane Security: Issues, Solutions
                  and Future Directions},
  journal      = {CoRR},
  volume       = {abs/1804.00262},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.00262},
  eprinttype    = {arXiv},
  eprint       = {1804.00262},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-00262.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-00676,
  author       = {Loqman Salamatian and
                  Dali Kaafar and
                  Kav{\'{e}} Salamatian},
  title        = {A Geometric Approach for Real-time Monitoring of Dynamic Large Scale
                  Graphs: AS-level graphs illustrated},
  journal      = {CoRR},
  volume       = {abs/1806.00676},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.00676},
  eprinttype    = {arXiv},
  eprint       = {1806.00676},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-00676.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-02389,
  author       = {Parameswaran Kamalaruban and
                  Victor Perrier and
                  Hassan Jameel Asghar and
                  Mohamed Ali K{\^{a}}afar},
  title        = {d\({}_{\mbox{X}}\)-Private Mechanisms for Linear Queries},
  journal      = {CoRR},
  volume       = {abs/1806.02389},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.02389},
  eprinttype    = {arXiv},
  eprint       = {1806.02389},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-02389.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-02593,
  author       = {Arash Shaghaghi and
                  Salil S. Kanhere and
                  Mohamed Ali K{\^{a}}afar and
                  Elisa Bertino and
                  Sanjay Jha},
  title        = {Gargoyle: {A} Network-based Insider Attack Resilient Framework for
                  Organizations},
  journal      = {CoRR},
  volume       = {abs/1807.02593},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.02593},
  eprinttype    = {arXiv},
  eprint       = {1807.02593},
  timestamp    = {Wed, 15 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-02593.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-06988,
  author       = {Arash Shaghaghi and
                  Salil S. Kanhere and
                  Mohamed Ali K{\^{a}}afar and
                  Sanjay Jha},
  title        = {Gwardar: Towards Protecting a Software-Defined Network from Malicious
                  Network Operating Systems},
  journal      = {CoRR},
  volume       = {abs/1809.06988},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.06988},
  eprinttype    = {arXiv},
  eprint       = {1809.06988},
  timestamp    = {Wed, 15 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-06988.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-03197,
  author       = {Victor Perrier and
                  Hassan Jameel Asghar and
                  Dali Kaafar},
  title        = {Private Continual Release of Real-Valued Data Streams},
  journal      = {CoRR},
  volume       = {abs/1811.03197},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.03197},
  eprinttype    = {arXiv},
  eprint       = {1811.03197},
  timestamp    = {Thu, 22 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-03197.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-02274,
  author       = {Qingrong Chen and
                  Chong Xiang and
                  Minhui Xue and
                  Bo Li and
                  Nikita Borisov and
                  Dali Kaafar and
                  Haojin Zhu},
  title        = {Differentially Private Data Generative Models},
  journal      = {CoRR},
  volume       = {abs/1812.02274},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.02274},
  eprinttype    = {arXiv},
  eprint       = {1812.02274},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-02274.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ThilakarathnaSG17,
  author       = {Kanchana Thilakarathna and
                  Suranga Seneviratne and
                  Kamal Gupta and
                  Mohamed Ali K{\^{a}}afar and
                  Aruna Seneviratne},
  title        = {A deep dive into location-based communities in social discovery networks},
  journal      = {Comput. Commun.},
  volume       = {100},
  pages        = {78--90},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.comcom.2016.11.008},
  doi          = {10.1016/J.COMCOM.2016.11.008},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/ThilakarathnaSG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ThilakarathnaJM17,
  author       = {Kanchana Thilakarathna and
                  Fangzhou Jiang and
                  Sirine Mrabet and
                  Mohamed Ali K{\^{a}}afar and
                  Aruna Seneviratne and
                  Gaogang Xie},
  title        = {Crowd-Cache: Leveraging on spatio-temporal correlation in content
                  popularity for mobile networking in proximity},
  journal      = {Comput. Commun.},
  volume       = {100},
  pages        = {104--117},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.comcom.2017.01.006},
  doi          = {10.1016/J.COMCOM.2017.01.006},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ThilakarathnaJM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/AsgharK17,
  author       = {Hassan Jameel Asghar and
                  Mohamed Ali K{\^{a}}afar},
  title        = {When are identification protocols with sparse challenges safe? The
                  case of the Coskun and Herley attack},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {3},
  pages        = {177--194},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2015-0059},
  doi          = {10.1515/JMC-2015-0059},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/AsgharK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/IkramAKMK17,
  author       = {Muhammad Ikram and
                  Hassan Jameel Asghar and
                  Mohamed Ali K{\^{a}}afar and
                  Anirban Mahanti and
                  Balachander Krishnamurthy},
  title        = {Towards Seamless Tracking-Free Web: Improved Detection of Trackers
                  via One-class Learning},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {1},
  pages        = {79--99},
  year         = {2017},
  url          = {https://doi.org/10.1515/popets-2017-0006},
  doi          = {10.1515/POPETS-2017-0006},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/IkramAKMK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/LiKSX17,
  author       = {Zhenyu Li and
                  Mohamed Ali K{\^{a}}afar and
                  Kav{\'{e}} Salamatian and
                  Gaogang Xie},
  title        = {Characterizing and Modeling User Behavior in a Large-Scale Mobile
                  Live Streaming System},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {27},
  number       = {12},
  pages        = {2675--2686},
  year         = {2017},
  url          = {https://doi.org/10.1109/TCSVT.2016.2595325},
  doi          = {10.1109/TCSVT.2016.2595325},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/LiKSX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/IkramOFCFJKS17,
  author       = {Muhammad Ikram and
                  Lucky Onwuzurike and
                  Shehroze Farooqi and
                  Emiliano De Cristofaro and
                  Arik Friedman and
                  Guillaume Jourjon and
                  Mohamed Ali K{\^{a}}afar and
                  M. Zubair Shafiq},
  title        = {Measuring, Characterizing, and Detecting Facebook Like Farms},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {13:1--13:28},
  year         = {2017},
  url          = {https://doi.org/10.1145/3121134},
  doi          = {10.1145/3121134},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/IkramOFCFJKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tweb/SeneviratneSKMM17,
  author       = {Suranga Seneviratne and
                  Aruna Seneviratne and
                  Mohamed Ali K{\^{a}}afar and
                  Anirban Mahanti and
                  Prasant Mohapatra},
  title        = {Spam Mobile Apps: Characteristics, Detection, and in the Wild Analysis},
  journal      = {{ACM} Trans. Web},
  volume       = {11},
  number       = {1},
  pages        = {4:1--4:29},
  year         = {2017},
  url          = {https://doi.org/10.1145/3007901},
  doi          = {10.1145/3007901},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tweb/SeneviratneSKMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShaghaghiKJ17,
  author       = {Arash Shaghaghi and
                  Mohamed Ali K{\^{a}}afar and
                  Sanjay Jha},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {WedgeTail: An Intrusion Prevention System for the Data Plane of Software
                  Defined Networks},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {849--861},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053039},
  doi          = {10.1145/3052973.3053039},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ShaghaghiKJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MasoodZAK17,
  author       = {Rahat Masood and
                  Benjamin Zi Hao Zhao and
                  Hassan Jameel Asghar and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {{POSTER:} TouchTrack: How Unique are your Touch Gestures?},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2555--2557},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3138850},
  doi          = {10.1145/3133956.3138850},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MasoodZAK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/FarooqiJIKCSFZ17,
  author       = {Shehroze Farooqi and
                  Guillaume Jourjon and
                  Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar and
                  Emiliano De Cristofaro and
                  Muhammad Zubair Shafiq and
                  Arik Friedman and
                  Fareed Zaffar},
  title        = {Characterizing key stakeholders in an online black-hat marketplace},
  booktitle    = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix,
                  AZ, USA, April 25-27, 2017},
  pages        = {17--27},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ECRIME.2017.7945050},
  doi          = {10.1109/ECRIME.2017.7945050},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecrime/FarooqiJIKCSFZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ChauhanZACK17,
  author       = {Jagmohan Chauhan and
                  Benjamin Zi Hao Zhao and
                  Hassan Jameel Asghar and
                  Jonathan Chan and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Aggelos Kiayias},
  title        = {BehavioCog: An Observation Resistant Authentication Scheme},
  booktitle    = {Financial Cryptography and Data Security - 21st International Conference,
                  {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10322},
  pages        = {39--58},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70972-7\_3},
  doi          = {10.1007/978-3-319-70972-7\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ChauhanZACK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/IkramK17,
  author       = {Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Aris Gkoulalas{-}Divanis and
                  Miguel P. Correia and
                  Dimiter R. Avresky},
  title        = {A first look at mobile Ad-Blocking apps},
  booktitle    = {16th {IEEE} International Symposium on Network Computing and Applications,
                  {NCA} 2017, Cambridge, MA, USA, October 30 - November 1, 2017},
  pages        = {343--350},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/NCA.2017.8171376},
  doi          = {10.1109/NCA.2017.8171376},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nca/IkramK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/AbaidKJ17,
  author       = {Zainab Abaid and
                  Mohamed Ali K{\^{a}}afar and
                  Sanjay Jha},
  editor       = {Aris Gkoulalas{-}Divanis and
                  Miguel P. Correia and
                  Dimiter R. Avresky},
  title        = {Quantifying the impact of adversarial evasion attacks on machine learning
                  based android malware classifiers},
  booktitle    = {16th {IEEE} International Symposium on Network Computing and Applications,
                  {NCA} 2017, Cambridge, MA, USA, October 30 - November 1, 2017},
  pages        = {375--384},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/NCA.2017.8171381},
  doi          = {10.1109/NCA.2017.8171381},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nca/AbaidKJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/AbaidKJ17,
  author       = {Zainab Abaid and
                  Mohamed Ali K{\^{a}}afar and
                  Sanjay Jha},
  title        = {Early detection of in-the-wild botnet attacks by exploiting network
                  communication uniformity: An empirical study},
  booktitle    = {2017 {IFIP} Networking Conference, {IFIP} Networking 2017 and Workshops,
                  Stockholm, Sweden, June 12-16, 2017},
  pages        = {1--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.23919/IFIPNetworking.2017.8264866},
  doi          = {10.23919/IFIPNETWORKING.2017.8264866},
  timestamp    = {Tue, 29 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/networking/AbaidKJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/WuLNKH17,
  author       = {Wei Wu and
                  Ren Ping Liu and
                  Wei Ni and
                  Dali Kaafar and
                  Xiaojing Huang},
  title        = {{AC-PROT:} An Access Control Model to Improve Software-Defined Networking
                  Security},
  booktitle    = {85th {IEEE} Vehicular Technology Conference, {VTC} Spring 2017, Sydney,
                  Australia, June 4-7, 2017},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/VTCSpring.2017.8108543},
  doi          = {10.1109/VTCSPRING.2017.8108543},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/WuLNKH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pam/2017,
  editor       = {Mohamed Ali K{\^{a}}afar and
                  Steve Uhlig and
                  Johanna Amann},
  title        = {Passive and Active Measurement - 18th International Conference, {PAM}
                  2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10176},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-54328-4},
  doi          = {10.1007/978-3-319-54328-4},
  isbn         = {978-3-319-54327-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AsgharTK17,
  author       = {Hassan Jameel Asghar and
                  Paul Tyler and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Differentially Private Release of Public Transport Data: The Opal
                  Use Case},
  journal      = {CoRR},
  volume       = {abs/1705.05957},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.05957},
  eprinttype    = {arXiv},
  eprint       = {1705.05957},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AsgharTK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AsgharTK17a,
  author       = {Hassan Jameel Asghar and
                  Paul Tyler and
                  Mohamed Ali K{\^{a}}afar},
  title        = {On the Privacy of the Opal Data Release: {A} Response},
  journal      = {CoRR},
  volume       = {abs/1705.08994},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.08994},
  eprinttype    = {arXiv},
  eprint       = {1705.08994},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AsgharTK17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/IkramOFCFJKS17,
  author       = {Muhammad Ikram and
                  Lucky Onwuzurike and
                  Shehroze Farooqi and
                  Emiliano De Cristofaro and
                  Arik Friedman and
                  Guillaume Jourjon and
                  Mohamed Ali K{\^{a}}afar and
                  M. Zubair Shafiq},
  title        = {Measuring, Characterizing, and Detecting Facebook Like Farms},
  journal      = {CoRR},
  volume       = {abs/1707.00190},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.00190},
  eprinttype    = {arXiv},
  eprint       = {1707.00190},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/IkramOFCFJKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SmithTK17,
  author       = {David B. Smith and
                  Kanchana Thilakarathna and
                  Mohamed Ali K{\^{a}}afar},
  title        = {More Flexible Differential Privacy: The Application of Piecewise Mixture
                  Distributions in Query Release},
  journal      = {CoRR},
  volume       = {abs/1707.01189},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.01189},
  eprinttype    = {arXiv},
  eprint       = {1707.01189},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SmithTK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TiroshiKBK17,
  author       = {Amit Tiroshi and
                  Tsvi Kuflik and
                  Shlomo Berkovsky and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Graph Based Recommendations: From Data Representation to Feature Extraction
                  and Application},
  journal      = {CoRR},
  volume       = {abs/1707.01250},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.01250},
  eprinttype    = {arXiv},
  eprint       = {1707.01250},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/TiroshiKBK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-04078,
  author       = {Fangzhou Jiang and
                  Kanchana Thilakarathna and
                  Sirine Mrabet and
                  Mohamed Ali K{\^{a}}afar and
                  Aruna Seneviratne},
  title        = {uStash: a Novel Mobile Content Delivery System for Improving User
                  QoE in Public Transport},
  journal      = {CoRR},
  volume       = {abs/1708.04078},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.04078},
  eprinttype    = {arXiv},
  eprint       = {1708.04078},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-04078.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-05477,
  author       = {Arash Shaghaghi and
                  Mohamed Ali K{\^{a}}afar and
                  Sanjay Jha},
  title        = {WedgeTail 2.0: An Intrusion Prevention System for the Data Plane of
                  Software Defined Networks},
  journal      = {CoRR},
  volume       = {abs/1708.05477},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.05477},
  eprinttype    = {arXiv},
  eprint       = {1708.05477},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-05477.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-02901,
  author       = {Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar},
  title        = {A First Look at Ad Blocking Apps on Google Play},
  journal      = {CoRR},
  volume       = {abs/1709.02901},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.02901},
  eprinttype    = {arXiv},
  eprint       = {1709.02901},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-02901.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1710-05297,
  author       = {Ming Ding and
                  David L{\'{o}}pez{-}P{\'{e}}rez and
                  Holger Claussen and
                  Mohamed Ali K{\^{a}}afar},
  title        = {On the Fundamental Characteristics of Ultra-Dense Small Cell Networks},
  journal      = {CoRR},
  volume       = {abs/1710.05297},
  year         = {2017},
  url          = {http://arxiv.org/abs/1710.05297},
  eprinttype    = {arXiv},
  eprint       = {1710.05297},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1710-05297.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-02124,
  author       = {Hailong Huang and
                  Andrey V. Savkin and
                  Ming Ding and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Optimized Deployment of Autonomous Drones to Improve User Experience
                  in Cellular Networks},
  journal      = {CoRR},
  volume       = {abs/1712.02124},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.02124},
  eprinttype    = {arXiv},
  eprint       = {1712.02124},
  timestamp    = {Mon, 11 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-02124.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/LiKX16,
  author       = {Zhenyu Li and
                  Mohamed Ali K{\^{a}}afar and
                  Gaogang Xie},
  title        = {Session Throughput Prediction for Internet Videos},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {54},
  number       = {12},
  pages        = {152--157},
  year         = {2016},
  url          = {https://doi.org/10.1109/MCOM.2016.1600386CM},
  doi          = {10.1109/MCOM.2016.1600386CM},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/LiKX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/WuLTUKX16,
  author       = {Qinghua Wu and
                  Zhenyu Li and
                  Gareth Tyson and
                  Steve Uhlig and
                  Mohamed Ali K{\^{a}}afar and
                  Gaogang Xie},
  title        = {Privacy-Aware Multipath Video Caching for Content-Centric Networks},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {34},
  number       = {8},
  pages        = {2219--2230},
  year         = {2016},
  url          = {https://doi.org/10.1109/JSAC.2016.2577321},
  doi          = {10.1109/JSAC.2016.2577321},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/WuLTUKX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umuai/FriedmanBK16,
  author       = {Arik Friedman and
                  Shlomo Berkovsky and
                  Mohamed Ali K{\^{a}}afar},
  title        = {A differential privacy framework for matrix factorization recommender
                  systems},
  journal      = {User Model. User Adapt. Interact.},
  volume       = {26},
  number       = {5},
  pages        = {425--458},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11257-016-9177-7},
  doi          = {10.1007/S11257-016-9177-7},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umuai/FriedmanBK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChauhanAMK16,
  author       = {Jagmohan Chauhan and
                  Hassan Jameel Asghar and
                  Anirban Mahanti and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Gesture-Based Continuous Authentication for Wearable Devices: The
                  Smart Glasses Use Case},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {648--665},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_35},
  doi          = {10.1007/978-3-319-39555-5\_35},
  timestamp    = {Fri, 07 Aug 2020 17:57:32 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ChauhanAMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MelisACK16,
  author       = {Luca Melis and
                  Hassan Jameel Asghar and
                  Emiliano De Cristofaro and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Gail{-}Joon Ahn and
                  Guofei Gu and
                  Hongxin Hu and
                  Seungwon Shin},
  title        = {Private Processing of Outsourced Network Functions: Feasibility and
                  Constructions},
  booktitle    = {Proceedings of the 2016 {ACM} International Workshop on Security in
                  Software Defined Networks {\&} Network Function Virtualization,
                  SDN-NFV@CODASPY 2016, New Orleans, LA, USA, March 11, 2016},
  pages        = {39--44},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2876019.2876021},
  doi          = {10.1145/2876019.2876021},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/MelisACK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/LiWHKLZXS16,
  author       = {Zhenyu Li and
                  Xiaohui Wang and
                  Ningjing Huang and
                  Mohamed Ali K{\^{a}}afar and
                  Zhenhua Li and
                  Jianer Zhou and
                  Gaogang Xie and
                  Peter Steenkiste},
  editor       = {Phillipa Gill and
                  John S. Heidemann and
                  John W. Byers and
                  Ramesh Govindan},
  title        = {An Empirical Analysis of a Large-scale Mobile Cloud Storage Service},
  booktitle    = {Proceedings of the 2016 {ACM} on Internet Measurement Conference,
                  {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016},
  pages        = {287--301},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2987465},
  timestamp    = {Tue, 21 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/LiWHKLZXS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/IkramVSKP16,
  author       = {Muhammad Ikram and
                  Narseo Vallina{-}Rodriguez and
                  Suranga Seneviratne and
                  Mohamed Ali K{\^{a}}afar and
                  Vern Paxson},
  editor       = {Phillipa Gill and
                  John S. Heidemann and
                  John W. Byers and
                  Ramesh Govindan},
  title        = {An Analysis of the Privacy and Security Risks of Android {VPN} Permission-enabled
                  Apps},
  booktitle    = {Proceedings of the 2016 {ACM} on Internet Measurement Conference,
                  {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016},
  pages        = {349--364},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2987471},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/IkramVSKP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/WangLXKS16,
  author       = {Dong Wang and
                  Zhenyu Li and
                  Gaogang Xie and
                  Mohamed Ali K{\^{a}}afar and
                  Kav{\'{e}} Salamatian},
  title        = {Adwords management for third-parties in {SEM:} An optimisation model
                  and the potential of Twitter},
  booktitle    = {35th Annual {IEEE} International Conference on Computer Communications,
                  {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/INFOCOM.2016.7524581},
  doi          = {10.1109/INFOCOM.2016.7524581},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/WangLXKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/AbaidSKJ16,
  author       = {Zainab Abaid and
                  Dilip Sarkar and
                  Mohamed Ali K{\^{a}}afar and
                  Sanjay Jha},
  title        = {The Early Bird Gets the Botnet: {A} Markov Chain Based Early Warning
                  System for Botnet Attacks},
  booktitle    = {41st {IEEE} Conference on Local Computer Networks, {LCN} 2016, Dubai,
                  United Arab Emirates, November 7-10, 2016},
  pages        = {61--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/LCN.2016.17},
  doi          = {10.1109/LCN.2016.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/AbaidSKJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HolzAMKW16,
  author       = {Ralph Holz and
                  Johanna Amann and
                  Olivier Mehani and
                  Mohamed Ali K{\^{a}}afar and
                  Matthias Wachs},
  title        = {{TLS} in the Wild: An Internet-wide Analysis of TLS-based Protocols
                  for Electronic Communication},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/tls-wild-internet-wide-analysis-tls-based-protocols-electronic-communication.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/HolzAMKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nfvsdn/ShaghaghiKSKJ16,
  author       = {Arash Shaghaghi and
                  Mohamed Ali K{\^{a}}afar and
                  Sandra Scott{-}Hayward and
                  Salil S. Kanhere and
                  Sanjay K. Jha},
  title        = {Towards Policy Enforcement Point as a Service {(PEPS)}},
  booktitle    = {2016 {IEEE} Conference on Network Function Virtualization and Software
                  Defined Networks (NFV-SDN), Palo Alto, CA, USA, November 7-10, 2016},
  pages        = {50--55},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NFV-SDN.2016.7919475},
  doi          = {10.1109/NFV-SDN.2016.7919475},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nfvsdn/ShaghaghiKSKJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/ChauhanSKMS16,
  author       = {Jagmohan Chauhan and
                  Suranga Seneviratne and
                  Mohamed Ali K{\^{a}}afar and
                  Anirban Mahanti and
                  Aruna Seneviratne},
  title        = {Characterization of early smartwatch apps},
  booktitle    = {2016 {IEEE} International Conference on Pervasive Computing and Communication
                  Workshops, PerCom Workshops 2016, Sydney, Australia, March 14-18,
                  2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/PERCOMW.2016.7457170},
  doi          = {10.1109/PERCOMW.2016.7457170},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/ChauhanSKMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/JiangTMK16,
  author       = {Fangzhou Jiang and
                  Kanchana Thilakarathna and
                  Sirine Mrabet and
                  Mohamed Ali K{\^{a}}afar},
  title        = {uDrop: Pushing drop-box to the edge of mobile network},
  booktitle    = {2016 {IEEE} International Conference on Pervasive Computing and Communication
                  Workshops, PerCom Workshops 2016, Sydney, Australia, March 14-18,
                  2016},
  pages        = {1--3},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/PERCOMW.2016.7457069},
  doi          = {10.1109/PERCOMW.2016.7457069},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/JiangTMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/AsgharMSCKM16,
  author       = {Hassan Jameel Asghar and
                  Luca Melis and
                  Cyril Soldani and
                  Emiliano De Cristofaro and
                  Mohamed Ali K{\^{a}}afar and
                  Laurent Mathy},
  editor       = {Dongsu Han and
                  Danny Raz},
  title        = {SplitBox: Toward Efficient Private Network Function Virtualization},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} Workshop on Hot topics in Middleboxes
                  and Network Function Virtualization, HotMiddlebox@SIGCOMM 2016, Florianopolis,
                  Brazil, August, 2016},
  pages        = {7--13},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2940147.2940150},
  doi          = {10.1145/2940147.2940150},
  timestamp    = {Tue, 06 Nov 2018 11:07:11 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/AsgharMSCKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MelisACK16,
  author       = {Luca Melis and
                  Hassan Jameel Asghar and
                  Emiliano De Cristofaro and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Private Processing of Outsourced Network Functions: Feasibility and
                  Constructions},
  journal      = {CoRR},
  volume       = {abs/1601.06454},
  year         = {2016},
  url          = {http://arxiv.org/abs/1601.06454},
  eprinttype    = {arXiv},
  eprint       = {1601.06454},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MelisACK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/IkramAKKM16,
  author       = {Muhammad Ikram and
                  Hassan Jameel Asghar and
                  Mohamed Ali K{\^{a}}afar and
                  Balachander Krishnamurthy and
                  Anirban Mahanti},
  title        = {Towards Seamless Tracking-Free Web: Improved Detection of Trackers
                  via One-class Learning},
  journal      = {CoRR},
  volume       = {abs/1603.06289},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.06289},
  eprinttype    = {arXiv},
  eprint       = {1603.06289},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/IkramAKKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AsgharMSCKM16,
  author       = {Hassan Jameel Asghar and
                  Luca Melis and
                  Cyril Soldani and
                  Emiliano De Cristofaro and
                  Mohamed Ali K{\^{a}}afar and
                  Laurent Mathy},
  title        = {SplitBox: Toward Efficient Private Network Function Virtualization},
  journal      = {CoRR},
  volume       = {abs/1605.03772},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.03772},
  eprinttype    = {arXiv},
  eprint       = {1605.03772},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AsgharMSCKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ShaghaghiKSKJ16,
  author       = {Arash Shaghaghi and
                  Mohamed Ali K{\^{a}}afar and
                  Sandra Scott{-}Hayward and
                  Salil S. Kanhere and
                  Sanjay K. Jha},
  title        = {Towards Policy Enforcement Point as a Service {(PEPS)}},
  journal      = {CoRR},
  volume       = {abs/1610.02526},
  year         = {2016},
  url          = {http://arxiv.org/abs/1610.02526},
  eprinttype    = {arXiv},
  eprint       = {1610.02526},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ShaghaghiKSKJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChauhanZACK16,
  author       = {Jagmohan Chauhan and
                  Benjamin Zi Hao Zhao and
                  Hassan Jameel Asghar and
                  Jonathan Chan and
                  Mohamed Ali K{\^{a}}afar},
  title        = {BehavioCog: An Observation Resistant Authentication Scheme},
  journal      = {CoRR},
  volume       = {abs/1610.09044},
  year         = {2016},
  url          = {http://arxiv.org/abs/1610.09044},
  eprinttype    = {arXiv},
  eprint       = {1610.09044},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChauhanZACK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/KaafarS15,
  author       = {Mohamed Ali K{\^{a}}afar and
                  Ross T. Smith},
  title        = {Small Wearable Internet},
  journal      = {{IEEE} Internet Comput.},
  volume       = {19},
  number       = {5},
  pages        = {6--7},
  year         = {2015},
  url          = {https://doi.org/10.1109/MIC.2015.107},
  doi          = {10.1109/MIC.2015.107},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/KaafarS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AsgharSLKP15,
  author       = {Hassan Jameel Asghar and
                  Ron Steinfeld and
                  Shujun Li and
                  Mohamed Ali K{\^{a}}afar and
                  Josef Pieprzyk},
  title        = {On the Linearization of Human Identification Protocols: Attacks Based
                  on Linear Algebra, Coding Theory, and Lattices},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {8},
  pages        = {1643--1655},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2421875},
  doi          = {10.1109/TIFS.2015.2421875},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AsgharSLKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/ValletBAMK15,
  author       = {David Vallet and
                  Shlomo Berkovsky and
                  Sebastien Ardon and
                  Anirban Mahanti and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {James Bailey and
                  Alistair Moffat and
                  Charu C. Aggarwal and
                  Maarten de Rijke and
                  Ravi Kumar and
                  Vanessa Murdock and
                  Timos K. Sellis and
                  Jeffrey Xu Yu},
  title        = {Characterizing and Predicting Viral-and-Popular Video Content},
  booktitle    = {Proceedings of the 24th {ACM} International Conference on Information
                  and Knowledge Management, {CIKM} 2015, Melbourne, VIC, Australia,
                  October 19 - 23, 2015},
  pages        = {1591--1600},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2806416.2806556},
  doi          = {10.1145/2806416.2806556},
  timestamp    = {Mon, 26 Apr 2021 09:27:03 +0200},
  biburl       = {https://dblp.org/rec/conf/cikm/ValletBAMK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZhouWLKX15,
  author       = {Jianer Zhou and
                  Qinghua Wu and
                  Zhenyu Li and
                  Mohamed Ali K{\^{a}}afar and
                  Gaogang Xie},
  title        = {A proactive transport mechanism with Explicit Congestion Notification
                  for {NDN}},
  booktitle    = {2015 {IEEE} International Conference on Communications, {ICC} 2015,
                  London, United Kingdom, June 8-12, 2015},
  pages        = {5242--5247},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICC.2015.7249156},
  doi          = {10.1109/ICC.2015.7249156},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ZhouWLKX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/JiangTKRS15,
  author       = {Fangzhou Jiang and
                  Kanchana Thilakarathna and
                  Mohamed Ali K{\^{a}}afar and
                  Filip Rosenbaum and
                  Aruna Seneviratne},
  editor       = {Katia Obraczka and
                  Karin Anna Hummel},
  title        = {A Spatio-Temporal Analysis of Mobile Internet Traffic in Public Transportation
                  Systems: {A} View of Web Browsing from The Bus},
  booktitle    = {Proceedings of the 10th {ACM} MobiCom Workshop on Challenged Networks,
                  CHANTS@MobiCom 2015, Paris, France, September 11, 2015},
  pages        = {37--42},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2799371.2799379},
  doi          = {10.1145/2799371.2799379},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobicom/JiangTKRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/recsys/BerliozFKBB15,
  author       = {Arnaud Berlioz and
                  Arik Friedman and
                  Mohamed Ali K{\^{a}}afar and
                  Roksana Boreli and
                  Shlomo Berkovsky},
  editor       = {Hannes Werthner and
                  Markus Zanker and
                  Jennifer Golbeck and
                  Giovanni Semeraro},
  title        = {Applying Differential Privacy to Matrix Factorization},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Recommender Systems, RecSys
                  2015, Vienna, Austria, September 16-20, 2015},
  pages        = {107--114},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2792838.2800173},
  doi          = {10.1145/2792838.2800173},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/recsys/BerliozFKBB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sensys/KimJHSK15,
  author       = {Jun Young Kim and
                  Sanjay Jha and
                  Wen Hu and
                  Hossein Shafagh and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Junehwa Song and
                  Tarek F. Abdelzaher and
                  Cecilia Mascolo},
  title        = {Poster: Toward Efficient and Secure Code Dissemination Protocol for
                  the Internet of Things},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Embedded Networked Sensor
                  Systems, SenSys 2015, Seoul, South Korea, November 1-4, 2015},
  pages        = {425--426},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2809695.2817896},
  doi          = {10.1145/2809695.2817896},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sensys/KimJHSK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/LiXKS15,
  author       = {Zhenyu Li and
                  Gaogang Xie and
                  Mohamed Ali K{\^{a}}afar and
                  Kav{\'{e}} Salamatian},
  editor       = {Aldo Gangemi and
                  Stefano Leonardi and
                  Alessandro Panconesi},
  title        = {User Behavior Characterization of a Large-scale Mobile Live Streaming
                  System},
  booktitle    = {Proceedings of the 24th International Conference on World Wide Web
                  Companion, {WWW} 2015, Florence, Italy, May 18-22, 2015 - Companion
                  Volume},
  pages        = {307--313},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2740908.2743054},
  doi          = {10.1145/2740908.2743054},
  timestamp    = {Tue, 27 Dec 2022 09:06:31 +0100},
  biburl       = {https://dblp.org/rec/conf/www/LiXKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/SeneviratneSKMM15,
  author       = {Suranga Seneviratne and
                  Aruna Seneviratne and
                  Mohamed Ali K{\^{a}}afar and
                  Anirban Mahanti and
                  Prasant Mohapatra},
  editor       = {Aldo Gangemi and
                  Stefano Leonardi and
                  Alessandro Panconesi},
  title        = {Early Detection of Spam Mobile Apps},
  booktitle    = {Proceedings of the 24th International Conference on World Wide Web,
                  {WWW} 2015, Florence, Italy, May 18-22, 2015},
  pages        = {949--959},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2736277.2741084},
  doi          = {10.1145/2736277.2741084},
  timestamp    = {Tue, 27 Dec 2022 09:06:31 +0100},
  biburl       = {https://dblp.org/rec/conf/www/SeneviratneSKMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FarooqiIICFJKSZ15,
  author       = {Shehroze Farooqi and
                  Muhammad Ikram and
                  Gohar Irfan and
                  Emiliano De Cristofaro and
                  Arik Friedman and
                  Guillaume Jourjon and
                  Mohamed Ali K{\^{a}}afar and
                  Muhammad Zubair Shafiq and
                  Fareed Zaffar},
  title        = {Characterizing Seller-Driven Black-Hat Marketplaces},
  journal      = {CoRR},
  volume       = {abs/1505.01637},
  year         = {2015},
  url          = {http://arxiv.org/abs/1505.01637},
  eprinttype    = {arXiv},
  eprint       = {1505.01637},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/FarooqiIICFJKSZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/IkramOCFJKS15,
  author       = {Muhammad Ikram and
                  Lucky Onwuzurike and
                  Emiliano De Cristofaro and
                  Arik Friedman and
                  Guillaume Jourjon and
                  Mohamed Ali K{\^{a}}afar and
                  M. Zubair Shafiq},
  title        = {Spying on Spammers: Tracking Like Farm Accounts on Facebook},
  journal      = {CoRR},
  volume       = {abs/1506.00506},
  year         = {2015},
  url          = {http://arxiv.org/abs/1506.00506},
  eprinttype    = {arXiv},
  eprint       = {1506.00506},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/IkramOCFJKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChauhanKM15,
  author       = {Jagmohan Chauhan and
                  Mohamed Ali K{\^{a}}afar and
                  Anirban Mahanti},
  title        = {Web for Wearables: Lessons learned from Google Glass},
  journal      = {CoRR},
  volume       = {abs/1507.01677},
  year         = {2015},
  url          = {http://arxiv.org/abs/1507.01677},
  eprinttype    = {arXiv},
  eprint       = {1507.01677},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChauhanKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HolzAMWK15,
  author       = {Ralph Holz and
                  Johanna Amann and
                  Olivier Mehani and
                  Matthias Wachs and
                  Mohamed Ali K{\^{a}}afar},
  title        = {{TLS} in the wild: an Internet-wide analysis of TLS-based protocols
                  for electronic communication},
  journal      = {CoRR},
  volume       = {abs/1511.00341},
  year         = {2015},
  url          = {http://arxiv.org/abs/1511.00341},
  eprinttype    = {arXiv},
  eprint       = {1511.00341},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HolzAMWK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MelisACK15,
  author       = {Luca Melis and
                  Hassan Jameel Asghar and
                  Emiliano De Cristofaro and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Private Processing of Outsourced Network Functions: Feasibility and
                  Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {949},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/949},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MelisACK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsgharK15,
  author       = {Hassan Jameel Asghar and
                  Mohamed Ali K{\^{a}}afar},
  title        = {When are Identification Protocols with Sparse Challenges Safe? The
                  Case of the Coskun and Herley Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1231},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1231},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsgharK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/CuncheKB14,
  author       = {Mathieu Cunche and
                  Mohamed Ali K{\^{a}}afar and
                  Roksana Boreli},
  title        = {Linking wireless devices using information contained in Wi-Fi probe
                  requests},
  journal      = {Pervasive Mob. Comput.},
  volume       = {11},
  pages        = {56--69},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.pmcj.2013.04.001},
  doi          = {10.1016/J.PMCJ.2013.04.001},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/percom/CuncheKB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/ChauhanMK14,
  author       = {Jagmohan Chauhan and
                  Anirban Mahanti and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {George Iosifidis and
                  Eric Keller and
                  Sun Yi},
  title        = {Towards the Era of Wearable Computing?},
  booktitle    = {Proceedings of the 2014 CoNEXT on Student Workshop, CoNEXT Student
                  Workshop '14, Sydney, Australia, December 2, 2014},
  pages        = {24--25},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2680821.2680833},
  doi          = {10.1145/2680821.2680833},
  timestamp    = {Tue, 06 Nov 2018 16:58:31 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/ChauhanMK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/IkramAKM14,
  author       = {Muhammad Ikram and
                  Hassan Asghar and
                  Mohamed Ali K{\^{a}}afar and
                  Anirban Mahanti},
  editor       = {George Iosifidis and
                  Eric Keller and
                  Sun Yi},
  title        = {On the Intrusiveness of JavaScript on the Web},
  booktitle    = {Proceedings of the 2014 CoNEXT on Student Workshop, CoNEXT Student
                  Workshop '14, Sydney, Australia, December 2, 2014},
  pages        = {31--33},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2680821.2680837},
  doi          = {10.1145/2680821.2680837},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/IkramAKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/SunFGSJKU14,
  author       = {Yi Sun and
                  Seyed Kaveh Fayaz and
                  Yang Guo and
                  Vyas Sekar and
                  Yun Jin and
                  Mohamed Ali K{\^{a}}afar and
                  Steve Uhlig},
  editor       = {Aruna Seneviratne and
                  Christophe Diot and
                  Jim Kurose and
                  Augustin Chaintreau and
                  Luigi Rizzo},
  title        = {Trace-Driven Analysis of {ICN} Caching Algorithms on Video-on-Demand
                  Workloads},
  booktitle    = {Proceedings of the 10th {ACM} International on Conference on emerging
                  Networking Experiments and Technologies, CoNEXT 2014, Sydney, Australia,
                  December 2-5, 2014},
  pages        = {363--376},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2674005.2675003},
  doi          = {10.1145/2674005.2675003},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/SunFGSJKU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/CuncheKB14,
  author       = {Mathieu Cunche and
                  Mohamed Ali K{\^{a}}afar and
                  Roksana Boreli},
  title        = {Asynchronous Covert Communication Using BitTorrent Trackers},
  booktitle    = {2014 {IEEE} International Conference on High Performance Computing
                  and Communications, 6th {IEEE} International Symposium on Cyberspace
                  Safety and Security, 11th {IEEE} International Conference on Embedded
                  Software and Systems, {HPCC/CSS/ICESS} 2014, Paris, France, August
                  20-22, 2014},
  pages        = {827--830},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/HPCC.2014.138},
  doi          = {10.1109/HPCC.2014.138},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/CuncheKB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WangSGKJLL14,
  author       = {Wei Wang and
                  Yi Sun and
                  Yang Guo and
                  Dali Kaafar and
                  Jiong Jin and
                  Jun Li and
                  Zhongcheng Li},
  title        = {CRCache: Exploiting the correlation between content popularity and
                  network topology information for {ICN} caching},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney,
                  Australia, June 10-14, 2014},
  pages        = {3191--3196},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICC.2014.6883812},
  doi          = {10.1109/ICC.2014.6883812},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/WangSGKJLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/WangSZKLL14,
  author       = {Wei Wang and
                  Yi Sun and
                  Kai Zheng and
                  Mohamed Ali K{\^{a}}afar and
                  Dan Li and
                  Zhongcheng Li},
  title        = {Freeway: Adaptively Isolating the Elephant and Mice Flows on Different
                  Transmission Paths},
  booktitle    = {22nd {IEEE} International Conference on Network Protocols, {ICNP}
                  2014, Raleigh, NC, USA, October 21-24, 2014},
  pages        = {362--367},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICNP.2014.59},
  doi          = {10.1109/ICNP.2014.59},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/WangSZKLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/CristofaroFJKS14,
  author       = {Emiliano De Cristofaro and
                  Arik Friedman and
                  Guillaume Jourjon and
                  Mohamed Ali K{\^{a}}afar and
                  Muhammad Zubair Shafiq},
  editor       = {Carey Williamson and
                  Aditya Akella and
                  Nina Taft},
  title        = {Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots},
  booktitle    = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014,
                  Vancouver, BC, Canada, November 5-7, 2014},
  pages        = {129--136},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663716.2663729},
  doi          = {10.1145/2663716.2663729},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/CristofaroFJKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/AbdelberiCCCFK14,
  author       = {Chaabane Abdelberi and
                  Terence Chen and
                  Mathieu Cunche and
                  Emiliano De Cristofaro and
                  Arik Friedman and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Carey Williamson and
                  Aditya Akella and
                  Nina Taft},
  title        = {Censorship in the Wild: Analyzing Internet Filtering in Syria},
  booktitle    = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014,
                  Vancouver, BC, Canada, November 5-7, 2014},
  pages        = {285--298},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663716.2663720},
  doi          = {10.1145/2663716.2663720},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/AbdelberiCCCFK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiXLJKS14,
  author       = {Zhenyu Li and
                  Gaogang Xie and
                  Jiali Lin and
                  Yun Jin and
                  Mohamed Ali K{\^{a}}afar and
                  Kav{\'{e}} Salamatian},
  title        = {On the geographic patterns of a large-scale mobile video-on-demand
                  system},
  booktitle    = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014,
                  Toronto, Canada, April 27 - May 2, 2014},
  pages        = {397--405},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INFOCOM.2014.6847962},
  doi          = {10.1109/INFOCOM.2014.6847962},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/LiXLJKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/UllahBKK14,
  author       = {Imdad Ullah and
                  Roksana Boreli and
                  Mohamed Ali K{\^{a}}afar and
                  Salil S. Kanhere},
  title        = {Characterising user targeting for in-App Mobile Ads},
  booktitle    = {2014 Proceedings {IEEE} {INFOCOM} Workshops, Toronto, ON, Canada,
                  April 27 - May 2, 2014},
  pages        = {547--552},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INFCOMW.2014.6849290},
  doi          = {10.1109/INFCOMW.2014.6849290},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/UllahBKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iui/TiroshiBKVCK14,
  author       = {Amit Tiroshi and
                  Shlomo Berkovsky and
                  Mohamed Ali K{\^{a}}afar and
                  David Vallet and
                  Terence Chen and
                  Tsvi Kuflik},
  editor       = {Tsvi Kuflik and
                  Oliviero Stock and
                  Joyce Yue Chai and
                  Antonio Kr{\"{u}}ger},
  title        = {Improving business rating predictions using graph based features},
  booktitle    = {19th International Conference on Intelligent User Interfaces, {IUI}
                  2014, Haifa, Israel, February 24-27, 2014},
  pages        = {17--26},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2557500.2557526},
  doi          = {10.1145/2557500.2557526},
  timestamp    = {Sat, 30 Sep 2023 09:51:13 +0200},
  biburl       = {https://dblp.org/rec/conf/iui/TiroshiBKVCK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/ThilakarathnaJMKSM14,
  author       = {Kanchana Thilakarathna and
                  Fangzhou Jiang and
                  Sirine Mrabet and
                  Mohamed Ali K{\^{a}}afar and
                  Aruna Seneviratne and
                  Prasant Mohapatra},
  editor       = {Andrew T. Campbell and
                  David Kotz and
                  Landon P. Cox and
                  Zhuoqing Morley Mao},
  title        = {Demo: Crowd-cache - popular content for free},
  booktitle    = {The 12th Annual International Conference on Mobile Systems, Applications,
                  and Services, MobiSys'14, Bretton Woods, NH, USA, June 16-19, 2014},
  pages        = {358--359},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2594368.2601464},
  doi          = {10.1145/2594368.2601464},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisys/ThilakarathnaJMKSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/AbdelberiDDKR14,
  author       = {Chaabane Abdelberi and
                  Yuan Ding and
                  Ratan Dey and
                  Mohamed Ali K{\^{a}}afar and
                  Keith W. Ross},
  editor       = {Michalis Faloutsos and
                  Aleksandar Kuzmanovic},
  title        = {A Closer Look at Third-Party {OSN} Applications: Are They Leaking
                  Your Personal Information?},
  booktitle    = {Passive and Active Measurement - 15th International Conference, {PAM}
                  2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8362},
  pages        = {235--246},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04918-2\_23},
  doi          = {10.1007/978-3-319-04918-2\_23},
  timestamp    = {Fri, 04 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pam/AbdelberiDDKR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/ChenBKF14,
  author       = {Terence Chen and
                  Roksana Boreli and
                  Mohamed Ali K{\^{a}}afar and
                  Arik Friedman},
  editor       = {Emiliano De Cristofaro and
                  Steven J. Murdoch},
  title        = {On the Effectiveness of Obfuscation Techniques in Online Social Networks},
  booktitle    = {Privacy Enhancing Technologies - 14th International Symposium, {PETS}
                  2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8555},
  pages        = {42--62},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08506-7\_3},
  doi          = {10.1007/978-3-319-08506-7\_3},
  timestamp    = {Sat, 09 Apr 2022 12:39:29 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/ChenBKF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/um/TiroshiBKVK14,
  author       = {Amit Tiroshi and
                  Shlomo Berkovsky and
                  Mohamed Ali K{\^{a}}afar and
                  David Vallet and
                  Tsvi Kuflik},
  editor       = {Vania Dimitrova and
                  Tsvi Kuflik and
                  David Chin and
                  Francesco Ricci and
                  Peter Dolog and
                  Geert{-}Jan Houben},
  title        = {Graph-Based Recommendations: Make the Most Out of Social Data},
  booktitle    = {User Modeling, Adaptation, and Personalization - 22nd International
                  Conference, {UMAP} 2014, Aalborg, Denmark, July 7-11, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8538},
  pages        = {447--458},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08786-3\_40},
  doi          = {10.1007/978-3-319-08786-3\_40},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/um/TiroshiBKVK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wmcsa/ChenUKB14,
  author       = {Terence Chen and
                  Imdad Ullah and
                  Mohamed Ali K{\^{a}}afar and
                  Roksana Boreli},
  title        = {Information leakage through mobile analytics services},
  booktitle    = {15th Workshop on Mobile Computing Systems and Applications, HotMobile
                  '14, Santa Barbara, CA, USA, February 26-27, 2014},
  pages        = {15:1--15:6},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2565585.2565593},
  doi          = {10.1145/2565585.2565593},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wmcsa/ChenUKB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/MishariKOT14,
  author       = {Mishari Al Mishari and
                  Dali Kaafar and
                  Ekin Oguz and
                  Gene Tsudik},
  editor       = {Gail{-}Joon Ahn and
                  Anupam Datta},
  title        = {Stylometric Linkability of Tweets},
  booktitle    = {Proceedings of the 13th Workshop on Privacy in the Electronic Society,
                  {WPES} 2014, Scottsdale, AZ, USA, November 3, 2014},
  pages        = {205--208},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2665943.2665966},
  doi          = {10.1145/2665943.2665966},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/MishariKOT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobicom/2014spme,
  editor       = {Ersin Uzun and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Proceedings of the {ACM} MobiCom Workshop on Security and Privacy
                  in Mobile Environments, SPME@MobiCom 2014, Maui, Hawaii, USA, September
                  11, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2646584},
  doi          = {10.1145/2646584},
  isbn         = {978-1-4503-3075-6},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobicom/2014spme.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AbdelberiCCFCK14,
  author       = {Chaabane Abdelberi and
                  Mathieu Cunche and
                  Terence Chen and
                  Arik Friedman and
                  Emiliano De Cristofaro and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Censorship in the Wild: Analyzing Web Filtering in Syria},
  journal      = {CoRR},
  volume       = {abs/1402.3401},
  year         = {2014},
  url          = {http://arxiv.org/abs/1402.3401},
  eprinttype    = {arXiv},
  eprint       = {1402.3401},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AbdelberiCCFCK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MishariKTO14,
  author       = {Mishari Al Mishari and
                  Dali Kaafar and
                  Gene Tsudik and
                  Ekin Oguz},
  title        = {Are 140 Characters Enough? {A} Large-Scale Linkability Study of Tweets},
  journal      = {CoRR},
  volume       = {abs/1406.2746},
  year         = {2014},
  url          = {http://arxiv.org/abs/1406.2746},
  eprinttype    = {arXiv},
  eprint       = {1406.2746},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MishariKTO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CristofaroFJKS14,
  author       = {Emiliano De Cristofaro and
                  Arik Friedman and
                  Guillaume Jourjon and
                  Mohamed Ali K{\^{a}}afar and
                  M. Zubair Shafiq},
  title        = {Paying for Likes? Understanding Facebook Like Fraud Using Honeypots},
  journal      = {CoRR},
  volume       = {abs/1409.2097},
  year         = {2014},
  url          = {http://arxiv.org/abs/1409.2097},
  eprinttype    = {arXiv},
  eprint       = {1409.2097},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CristofaroFJKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChauhanAKM14,
  author       = {Jagmohan Chauhan and
                  Hassan Jameel Asghar and
                  Mohamed Ali K{\^{a}}afar and
                  Anirban Mahanti},
  title        = {Gesture-based Continuous Authentication for Wearable Devices: the
                  Google Glass Case},
  journal      = {CoRR},
  volume       = {abs/1412.2855},
  year         = {2014},
  url          = {http://arxiv.org/abs/1412.2855},
  eprinttype    = {arXiv},
  eprint       = {1412.2855},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChauhanAKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsgharSLKP14,
  author       = {Hassan Jameel Asghar and
                  Ron Steinfeld and
                  Shujun Li and
                  Dali Kaafar and
                  Josef Pieprzyk},
  title        = {Algebraic Attacks on Human Identification Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {767},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/767},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsgharSLKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/AbdelberiCKU13,
  author       = {Chaabane Abdelberi and
                  Emiliano De Cristofaro and
                  Mohamed Ali K{\^{a}}afar and
                  Ersin Uzun},
  title        = {Privacy in content-oriented networking: threats and countermeasures},
  journal      = {Comput. Commun. Rev.},
  volume       = {43},
  number       = {3},
  pages        = {25--33},
  year         = {2013},
  url          = {https://doi.org/10.1145/2500098.2500102},
  doi          = {10.1145/2500098.2500102},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/AbdelberiCKU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/KaafarBD13,
  author       = {Mohamed Ali K{\^{a}}afar and
                  Shlomo Berkovsky and
                  Benoit Donnet},
  title        = {On the potential of recommendation technologies for efficient content
                  delivery networks},
  journal      = {Comput. Commun. Rev.},
  volume       = {43},
  number       = {3},
  pages        = {74--77},
  year         = {2013},
  url          = {https://doi.org/10.1145/2500098.2500109},
  doi          = {10.1145/2500098.2500109},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/KaafarBD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/SeneviratneTSKM13,
  author       = {Aruna Seneviratne and
                  Kanchana Thilakarathna and
                  Suranga Seneviratne and
                  Mohamed Ali K{\^{a}}afar and
                  Prasant Mohapatra},
  title        = {Reconciling bitter rivals: Towards privacy-aware and bandwidth efficient
                  mobile Ads delivery networks},
  booktitle    = {Fifth International Conference on Communication Systems and Networks,
                  {COMSNETS} 2013, Bangalore, India, January 7-10, 2013},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/COMSNETS.2013.6465567},
  doi          = {10.1109/COMSNETS.2013.6465567},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/comsnets/SeneviratneTSKM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HamedAKK13,
  author       = {Asma Hamed and
                  Hella Kaffel{-}Ben Ayed and
                  Mohamed Ali K{\^{a}}afar and
                  Ahmed Kharraz},
  title        = {Evaluation of third party tracking on the web},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {471--477},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750244},
  doi          = {10.1109/ICITST.2013.6750244},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HamedAKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwsm/ChenKB13,
  author       = {Terence Chen and
                  Mohamed Ali K{\^{a}}afar and
                  Roksana Boreli},
  editor       = {Emre Kiciman and
                  Nicole B. Ellison and
                  Bernie Hogan and
                  Paul Resnick and
                  Ian Soboroff},
  title        = {The Where and When of Finding New Friends: Analysis of a Location-based
                  Social Discovery Network},
  booktitle    = {Proceedings of the Seventh International Conference on Weblogs and
                  Social Media, {ICWSM} 2013, Cambridge, Massachusetts, USA, July 8-11,
                  2013},
  publisher    = {The {AAAI} Press},
  year         = {2013},
  url          = {http://www.aaai.org/ocs/index.php/ICWSM/ICWSM13/paper/view/6095},
  timestamp    = {Fri, 05 Feb 2021 11:07:18 +0100},
  biburl       = {https://dblp.org/rec/conf/icwsm/ChenKB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/WangPXMKS13,
  author       = {Dong Wang and
                  Hosung Park and
                  Gaogang Xie and
                  Sue B. Moon and
                  Mohamed Ali K{\^{a}}afar and
                  Kav{\'{e}} Salamatian},
  title        = {A genealogy of information spreading on microblogs: {A} Galton-Watson-based
                  explicative model},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2013, Turin, Italy, April 14-19,
                  2013},
  pages        = {2391--2399},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INFCOM.2013.6567044},
  doi          = {10.1109/INFCOM.2013.6567044},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/WangPXMKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/WangXKU13,
  author       = {Yonggong Wang and
                  Gaogang Xie and
                  Mohamed Ali K{\^{a}}afar and
                  Steve Uhlig},
  title        = {{LMD:} {A} local minimum driven and self-organized method to obtain
                  locators},
  booktitle    = {2013 {IEEE} Symposium on Computers and Communications, {ISCC} 2013,
                  Split, Croatia, 7-10 July, 2013},
  pages        = {759--764},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISCC.2013.6755040},
  doi          = {10.1109/ISCC.2013.6755040},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/WangXKU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/SmithBK13,
  author       = {Guillaume Smith and
                  Roksana Boreli and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Ivan Stojmenovic and
                  Zixue Cheng and
                  Song Guo},
  title        = {A Layered Secret Sharing Scheme for Automated Profile Sharing in {OSN}
                  Groups},
  booktitle    = {Mobile and Ubiquitous Systems: Computing, Networking, and Services
                  - 10th International Conference, {MOBIQUITOUS} 2013, Tokyo, Japan,
                  December 2-4, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {131},
  pages        = {487--499},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-11569-6\_38},
  doi          = {10.1007/978-3-319-11569-6\_38},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/SmithBK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/ChenATKB13,
  author       = {Terence Chen and
                  Chaabane Abdelberi and
                  Pierre{-}Ugo Tournoux and
                  Mohamed Ali K{\^{a}}afar and
                  Roksana Boreli},
  editor       = {Emiliano De Cristofaro and
                  Matthew K. Wright},
  title        = {How Much Is Too Much? Leveraging Ads Audience Estimation to Evaluate
                  Public Profile Uniqueness},
  booktitle    = {Privacy Enhancing Technologies - 13th International Symposium, {PETS}
                  2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7981},
  pages        = {225--244},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39077-7\_12},
  doi          = {10.1007/978-3-642-39077-7\_12},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/ChenATKB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LauingerOAKRK13,
  author       = {Tobias Lauinger and
                  Kaan Onarlioglu and
                  Chaabane Abdelberi and
                  Engin Kirda and
                  William K. Robertson and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement
                  in User Uploads to One-Click File Hosters},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {369--389},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_19},
  doi          = {10.1007/978-3-642-41284-4\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LauingerOAKRK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/recsys/TiroshiBKCK13,
  author       = {Amit Tiroshi and
                  Shlomo Berkovsky and
                  Mohamed Ali K{\^{a}}afar and
                  Terence Chen and
                  Tsvi Kuflik},
  editor       = {Qiang Yang and
                  Irwin King and
                  Qing Li and
                  Pearl Pu and
                  George Karypis},
  title        = {Cross social networks interests predictions based ongraph features},
  booktitle    = {Seventh {ACM} Conference on Recommender Systems, RecSys '13, Hong
                  Kong, China, October 12-16, 2013},
  pages        = {319--322},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2507157.2507206},
  doi          = {10.1145/2507157.2507206},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/recsys/TiroshiBKCK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SarwarMBK13,
  author       = {Golam Sarwar and
                  Olivier Mehani and
                  Roksana Boreli and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Pierangela Samarati},
  title        = {On the Effectiveness of Dynamic Taint Analysis for Protecting against
                  Private Information Leaks on Android-based Devices},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {461--468},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223198/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SarwarMBK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/CuncheKB13,
  author       = {Mathieu Cunche and
                  Mohamed Ali K{\^{a}}afar and
                  Roksana Boreli},
  title        = {Revealing Social Links Between Owners of Wi-Fi Enabled Smartphones},
  journal      = {{ERCIM} News},
  volume       = {2013},
  number       = {93},
  year         = {2013},
  url          = {http://ercim-news.ercim.eu/en93/special/revealing-social-links-between-owners-of-wi-fi-enabled},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/CuncheKB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/DonnetGK12,
  author       = {Benoit Donnet and
                  Bamba Gueye and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Path similarity evaluation using Bloom filters},
  journal      = {Comput. Networks},
  volume       = {56},
  number       = {2},
  pages        = {858--869},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.comnet.2011.11.003},
  doi          = {10.1016/J.COMNET.2011.11.003},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/DonnetGK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/JacquinRKSR12,
  author       = {Ludovic Jacquin and
                  Vincent Roca and
                  Mohamed Ali K{\^{a}}afar and
                  Fabrice Schuler and
                  Jean{-}Louis Roch},
  title        = {IBTrack: An {ICMP} black holes tracker},
  booktitle    = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim,
                  CA, USA, December 3-7, 2012},
  pages        = {2827--2833},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/GLOCOM.2012.6503545},
  doi          = {10.1109/GLOCOM.2012.6503545},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/JacquinRKSR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/LiLAXKJP12,
  author       = {Zhenyu Li and
                  Jiali Lin and
                  Marc{-}Isma{\"{e}}l Akodj{\`{e}}nou and
                  Gaogang Xie and
                  Mohamed Ali K{\^{a}}afar and
                  Yun Jin and
                  Gang Peng},
  editor       = {John W. Byers and
                  Jim Kurose and
                  Ratul Mahajan and
                  Alex C. Snoeren},
  title        = {Watching videos from everywhere: a study of the {PPTV} mobile VoD
                  system},
  booktitle    = {Proceedings of the 12th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} '12, Boston, MA, USA, November 14-16, 2012},
  pages        = {185--198},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2398776.2398797},
  doi          = {10.1145/2398776.2398797},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/LiLAXKJP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/WangXK12,
  author       = {Yonggong Wang and
                  Gaogang Xie and
                  Mohamed Ali K{\^{a}}afar},
  title        = {{FPC:} {A} self-organized greedy routing in scale-free networks},
  booktitle    = {2012 {IEEE} Symposium on Computers and Communications, {ISCC} 2012,
                  Cappadocia, Turkey, July 1-4, 2012},
  pages        = {102--107},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISCC.2012.6249275},
  doi          = {10.1109/ISCC.2012.6249275},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/WangXK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/ChengMCKBK12,
  author       = {Ningning Cheng and
                  Prasant Mohapatra and
                  Mathieu Cunche and
                  Mohamed Ali K{\^{a}}afar and
                  Roksana Boreli and
                  Srikanth V. Krishnamurthy},
  title        = {Inferring user relationship from hidden information in WLANs},
  booktitle    = {31st {IEEE} Military Communications Conference, {MILCOM} 2012, Orlando,
                  FL, USA, October 29 - November 1, 2012},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/MILCOM.2012.6415713},
  doi          = {10.1109/MILCOM.2012.6415713},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/ChengMCKBK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AbdelberiAK12,
  author       = {Chaabane Abdelberi and
                  Gergely {\'{A}}cs and
                  Mohamed Ali K{\^{a}}afar},
  title        = {You are what you like! Information leakage through users' Interests},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/you-are-what-you-information-leakage-through-users-interests},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/AbdelberiAK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/CastellucciaKT12,
  author       = {Claude Castelluccia and
                  Mohamed Ali K{\^{a}}afar and
                  Minh{-}Dung Tran},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Matthew K. Wright},
  title        = {Betrayed by Your Ads! - Reconstructing User Profiles from Targeted
                  Ads},
  booktitle    = {Privacy Enhancing Technologies - 12th International Symposium, {PETS}
                  2012, Vigo, Spain, July 11-13, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7384},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31680-7\_1},
  doi          = {10.1007/978-3-642-31680-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/CastellucciaKT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wosn/AbdelberiKB12,
  author       = {Chaabane Abdelberi and
                  Mohamed Ali K{\^{a}}afar and
                  Roksana Boreli},
  editor       = {Balachander Krishnamurthy and
                  Stefan Saroiu and
                  Ben Y. Zhao},
  title        = {Big friend is watching you: analyzing online social networks tracking
                  capabilities},
  booktitle    = {Proceedings of the 2012 {ACM} workshop on Workshop on Online Social
                  Networks, {WOSN} 2012, Helsinki, Finland, August 17, 2012},
  pages        = {7--12},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2342549.2342552},
  doi          = {10.1145/2342549.2342552},
  timestamp    = {Mon, 26 Jun 2023 08:43:55 +0200},
  biburl       = {https://dblp.org/rec/conf/wosn/AbdelberiKB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wosn/ChenKFB12,
  author       = {Terence Chen and
                  Mohamed Ali K{\^{a}}afar and
                  Arik Friedman and
                  Roksana Boreli},
  editor       = {Balachander Krishnamurthy and
                  Stefan Saroiu and
                  Ben Y. Zhao},
  title        = {Is more always merrier?: a deep dive into online social footprints},
  booktitle    = {Proceedings of the 2012 {ACM} workshop on Workshop on Online Social
                  Networks, {WOSN} 2012, Helsinki, Finland, August 17, 2012},
  pages        = {67--72},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2342549.2342565},
  doi          = {10.1145/2342549.2342565},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wosn/ChenKFB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/CuncheKB12,
  author       = {Mathieu Cunche and
                  Mohamed Ali K{\^{a}}afar and
                  Roksana Boreli},
  title        = {I know who you will meet this evening! Linking wireless devices using
                  Wi-Fi probe requests},
  booktitle    = {2012 {IEEE} International Symposium on a World of Wireless, Mobile
                  and Multimedia Networks, WoWMoM 2012, San Francisco, CA, USA, June
                  25-28, 2012},
  pages        = {1--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/WoWMoM.2012.6263700},
  doi          = {10.1109/WOWMOM.2012.6263700},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wowmom/CuncheKB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1211-5183,
  author       = {Chaabane Abdelberi and
                  Emiliano De Cristofaro and
                  Mohamed Ali K{\^{a}}afar and
                  Ersin Uzun},
  title        = {Privacy in Content-Oriented Networking: Threats and Countermeasures},
  journal      = {CoRR},
  volume       = {abs/1211.5183},
  year         = {2012},
  url          = {http://arxiv.org/abs/1211.5183},
  eprinttype    = {arXiv},
  eprint       = {1211.5183},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1211-5183.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/PoeseUKDG11,
  author       = {Ingmar Poese and
                  Steve Uhlig and
                  Mohamed Ali K{\^{a}}afar and
                  Benoit Donnet and
                  Bamba Gueye},
  title        = {{IP} geolocation databases: unreliable?},
  journal      = {Comput. Commun. Rev.},
  volume       = {41},
  number       = {2},
  pages        = {53--56},
  year         = {2011},
  url          = {https://doi.org/10.1145/1971162.1971171},
  doi          = {10.1145/1971162.1971171},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/PoeseUKDG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/CastellucciaCFK11,
  author       = {Claude Castelluccia and
                  Emiliano De Cristofaro and
                  Aur{\'{e}}lien Francillon and
                  Mohamed Ali K{\^{a}}afar},
  title        = {EphPub: Toward robust Ephemeral Publishing},
  booktitle    = {Proceedings of the 19th annual {IEEE} International Conference on
                  Network Protocols, {ICNP} 2011, Vancouver, BC, Canada, October 17-20,
                  2011},
  pages        = {165--175},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICNP.2011.6089048},
  doi          = {10.1109/ICNP.2011.6089048},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/CastellucciaCFK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/Le-BlondMAKCLD11,
  author       = {Stevens Le Blond and
                  Pere Manils and
                  Chaabane Abdelberi and
                  Mohamed Ali K{\^{a}}afar and
                  Claude Castelluccia and
                  Arnaud Legout and
                  Walid Dabbous},
  editor       = {Christopher Kruegel},
  title        = {One Bad Apple Spoils the Bunch: Exploiting {P2P} Applications to Trace
                  and Profile Tor Users},
  booktitle    = {4th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '11, Boston, MA, USA, March 29, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/leet11/one-bad-apple-spoils-bunch-exploiting-p2p-applications-trace-and-profile-tor-users},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/leet/Le-BlondMAKCLD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/PeritoCKM11,
  author       = {Daniele Perito and
                  Claude Castelluccia and
                  Mohamed Ali K{\^{a}}afar and
                  Pere Manils},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Nicholas Hopper},
  title        = {How Unique and Traceable Are Usernames?},
  booktitle    = {Privacy Enhancing Technologies - 11th International Symposium, {PETS}
                  2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6794},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22263-4\_1},
  doi          = {10.1007/978-3-642-22263-4\_1},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/PeritoCKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1101-5578,
  author       = {Daniele Perito and
                  Claude Castelluccia and
                  Mohamed Ali K{\^{a}}afar and
                  Pere Manils},
  title        = {How Unique and Traceable are Usernames?},
  journal      = {CoRR},
  volume       = {abs/1101.5578},
  year         = {2011},
  url          = {http://arxiv.org/abs/1101.5578},
  eprinttype    = {arXiv},
  eprint       = {1101.5578},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1101-5578.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1103-1518,
  author       = {Stevens Le Blond and
                  Pere Manils and
                  Chaabane Abdelberi and
                  Mohamed Ali K{\^{a}}afar and
                  Claude Castelluccia and
                  Arnaud Legout and
                  Walid Dabbous},
  title        = {One Bad Apple Spoils the Bunch: Exploiting {P2P} Applications to Trace
                  and Profile Tor Users},
  journal      = {CoRR},
  volume       = {abs/1103.1518},
  year         = {2011},
  url          = {http://arxiv.org/abs/1103.1518},
  eprinttype    = {arXiv},
  eprint       = {1103.1518},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1103-1518.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/DonnetGK10,
  author       = {Benoit Donnet and
                  Bamba Gueye and
                  Mohamed Ali K{\^{a}}afar},
  title        = {A Survey on Network Coordinates Systems, Design, and Security},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {12},
  number       = {4},
  pages        = {488--503},
  year         = {2010},
  url          = {https://doi.org/10.1109/SURV.2010.032810.00007},
  doi          = {10.1109/SURV.2010.032810.00007},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/DonnetGK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/Le-BlondLFDK10,
  author       = {Stevens Le Blond and
                  Arnaud Legout and
                  Fabrice Le Fessant and
                  Walid Dabbous and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Michael D. Bailey},
  title        = {Spying the World from Your Laptop: Identifying and Profiling Content
                  Providers and Big Downloaders in BitTorrent},
  booktitle    = {3rd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '10, San Jose, CA, USA, April 27, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/leet-10/spying-world-your-laptop-identifying-and-profiling-content-providers-and-big},
  timestamp    = {Mon, 20 Nov 2023 09:09:49 +0100},
  biburl       = {https://dblp.org/rec/conf/leet/Le-BlondLFDK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/AbdelberiMK10,
  author       = {Chaabane Abdelberi and
                  Pere Manils and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Yang Xiang and
                  Pierangela Samarati and
                  Jiankun Hu and
                  Wanlei Zhou and
                  Ahmad{-}Reza Sadeghi},
  title        = {Digging into Anonymous Traffic: {A} Deep Analysis of the Tor Anonymizing
                  Network},
  booktitle    = {Fourth International Conference on Network and System Security, {NSS}
                  2010, Melbourne, Victoria, Australia, September 1-3, 2010},
  pages        = {167--174},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/NSS.2010.47},
  doi          = {10.1109/NSS.2010.47},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/AbdelberiMK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scube/BoucettaKM10,
  author       = {Ch{\'{e}}rifa Boucetta and
                  Mohamed Ali K{\^{a}}afar and
                  Marine Minier},
  editor       = {Gerard Parr and
                  Philip J. Morrow},
  title        = {How Secure are Secure Localization Protocols in WSNs?},
  booktitle    = {Sensor Systems and Software - Second International {ICST} Conference,
                  S-Cube 2010, Miami, FL, USA, December 13-15, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {57},
  pages        = {164--178},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23583-2\_12},
  doi          = {10.1007/978-3-642-23583-2\_12},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scube/BoucettaKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sns/KaafarM10,
  author       = {Mohamed Ali K{\^{a}}afar and
                  Pere Manils},
  editor       = {Eiko Yoneki and
                  Elie Bursztein and
                  Tao Stein},
  title        = {Why spammers should thank Google?},
  booktitle    = {Proceedings of the 3rd Workshop on Social Network Systems, Paris,
                  France, April 13, 2010},
  pages        = {4},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852658.1852662},
  doi          = {10.1145/1852658.1852662},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sns/KaafarM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1004-0930,
  author       = {Stevens Le Blond and
                  Arnaud Legout and
                  Fabrice Le Fessant and
                  Walid Dabbous and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Spying the World from your Laptop -- Identifying and Profiling Content
                  Providers and Big Downloaders in BitTorrent},
  journal      = {CoRR},
  volume       = {abs/1004.0930},
  year         = {2010},
  url          = {http://arxiv.org/abs/1004.0930},
  eprinttype    = {arXiv},
  eprint       = {1004.0930},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1004-0930.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1004-1267,
  author       = {Stevens Le Blond and
                  Pere Manils and
                  Chaabane Abdelberi and
                  Mohamed Ali K{\^{a}}afar and
                  Arnaud Legout and
                  Claude Castelluccia and
                  Walid Dabbous},
  title        = {De-anonymizing BitTorrent Users on Tor},
  journal      = {CoRR},
  volume       = {abs/1004.1267},
  year         = {2010},
  url          = {http://arxiv.org/abs/1004.1267},
  eprinttype    = {arXiv},
  eprint       = {1004.1267},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1004-1267.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1004-1461,
  author       = {Pere Manils and
                  Chaabane Abdelberi and
                  Stevens Le Blond and
                  Mohamed Ali K{\^{a}}afar and
                  Claude Castelluccia and
                  Arnaud Legout and
                  Walid Dabbous},
  title        = {Compromising Tor Anonymity Exploiting {P2P} Information Leakage},
  journal      = {CoRR},
  volume       = {abs/1004.1461},
  year         = {2010},
  url          = {http://arxiv.org/abs/1004.1461},
  eprinttype    = {arXiv},
  eprint       = {1004.1461},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1004-1461.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/KaafarMBSTD09,
  author       = {Mohamed Ali K{\^{a}}afar and
                  Laurent Mathy and
                  Chadi Barakat and
                  Kav{\'{e}} Salamatian and
                  Thierry Turletti and
                  Walid Dabbous},
  title        = {Certified Internet Coordinates},
  booktitle    = {Proceedings of the 18th International Conference on Computer Communications
                  and Networks, {IEEE} {ICCCN} 2009, San Francisco, California, USA,
                  August 3-6, 2009},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICCCN.2009.5235308},
  doi          = {10.1109/ICCCN.2009.5235308},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccn/KaafarMBSTD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/CastellucciaKMP09,
  author       = {Claude Castelluccia and
                  Mohamed Ali K{\^{a}}afar and
                  Pere Manils and
                  Daniele Perito},
  editor       = {Anja Feldmann and
                  Laurent Mathy},
  title        = {Geolocalization of proxied services and its application to fast-flux
                  hidden servers},
  booktitle    = {Proceedings of the 9th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} 2009, Chicago, Illinois, USA, November 4-6, 2009},
  pages        = {184--189},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1644893.1644915},
  doi          = {10.1145/1644893.1644915},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/CastellucciaKMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/LiaoKGCGL09,
  author       = {Yongjun Liao and
                  Mohamed Ali K{\^{a}}afar and
                  Bamba Gueye and
                  Fran{\c{c}}ois Cantin and
                  Pierre Geurts and
                  Guy Leduc},
  editor       = {Luigi Fratta and
                  Henning Schulzrinne and
                  Yutaka Takahashi and
                  Otto Spaniol},
  title        = {Detecting Triangle Inequality Violations in Internet Coordinate Systems
                  by Supervised Learning},
  booktitle    = {{NETWORKING} 2009, 8th International {IFIP-TC} 6 Networking Conference,
                  Aachen, Germany, May 11-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5550},
  pages        = {352--363},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01399-7\_28},
  doi          = {10.1007/978-3-642-01399-7\_28},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/LiaoKGCGL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saint/CastellucciaK09,
  author       = {Claude Castelluccia and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Owner-Centric Networking {(OCN):} Toward a Data Pollution-Free Internet},
  booktitle    = {Ninth Annual International Symposium on Applications and the Internet,
                  {SAINT} 2009, Bellevue, Washington, USA, July 20-24, 2009, Proceedings},
  pages        = {169--172},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SAINT.2009.34},
  doi          = {10.1109/SAINT.2009.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saint/CastellucciaK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/CastellucciaK09,
  author       = {Claude Castelluccia and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Owner-Centric Networking: {A} New Architecture for a Pollution-Free
                  Internet},
  journal      = {{ERCIM} News},
  volume       = {2009},
  number       = {77},
  year         = {2009},
  url          = {http://ercim-news.ercim.eu/en77/special/owner-centric-networking-a-new-architecture-for-a-pollution-free-internet},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/CastellucciaK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/CantinGKL08,
  author       = {Fran{\c{c}}ois Cantin and
                  Bamba Gueye and
                  Dali Kaafar and
                  Guy Leduc},
  editor       = {Arturo Azcorra and
                  Gustavo de Veciana and
                  Keith W. Ross and
                  Leandros Tassiulas},
  title        = {Overlay routing using coordinate systems},
  booktitle    = {Proceedings of the 2008 {ACM} Conference on Emerging Network Experiment
                  and Technology, CoNEXT 2008, Madrid, Spain, December 9-12, 2008},
  pages        = {42},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1544012.1544054},
  doi          = {10.1145/1544012.1544054},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/CantinGKL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsos/CantinGKL08,
  author       = {Fran{\c{c}}ois Cantin and
                  Bamba Gueye and
                  Mohamed Ali K{\^{a}}afar and
                  Guy Leduc},
  editor       = {Karin Anna Hummel and
                  James P. G. Sterbenz},
  title        = {A Self-Organized Clustering Scheme for Overlay Networks},
  booktitle    = {Self-Organizing Systems, Third International Workshop, {IWSOS} 2008,
                  Vienna, Austria, December 10-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5343},
  pages        = {59--70},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-92157-8\_6},
  doi          = {10.1007/978-3-540-92157-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsos/CantinGKL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/KaafarGCLM08,
  author       = {Mohamed Ali K{\^{a}}afar and
                  Bamba Gueye and
                  Fran{\c{c}}ois Cantin and
                  Guy Leduc and
                  Laurent Mathy},
  editor       = {Amitabha Das and
                  Hung Keng Pung and
                  Francis Bu{-}Sung Lee and
                  Lawrence Wai{-}Choong Wong},
  title        = {Towards a Two-Tier Internet Coordinate System to Mitigate the Impact
                  of Triangle Inequality Violations},
  booktitle    = {{NETWORKING} 2008, Ad Hoc and Sensor Networks, Wireless Networks,
                  Next Generation Internet , 7th International {IFIP-TC6} Networking
                  Conference, Singapore, May 5-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4982},
  pages        = {397--408},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79549-0\_35},
  doi          = {10.1007/978-3-540-79549-0\_35},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/KaafarGCLM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Kaafar07,
  author       = {Mohamed Ali K{\^{a}}afar},
  title        = {Securiting Internet coordinates systems. (La s{\'{e}}curit{\'{e}}
                  des syst{\`{e}}mes de coordonn{\'{e}}es Internet)},
  school       = {University of Nice Sophia Antipolis, France},
  year         = {2007},
  url          = {https://tel.archives-ouvertes.fr/tel-00406510},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Kaafar07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aintec/KaafarMSBTD07,
  author       = {Mohamed Ali K{\^{a}}afar and
                  Laurent Mathy and
                  Kav{\'{e}} Salamatian and
                  Chadi Barakat and
                  Thierry Turletti and
                  Walid Dabbous},
  editor       = {Serge Fdida and
                  Kazunori Sugiura},
  title        = {Securing Internet Coordinate Systems},
  booktitle    = {Sustainable Internet, Third Asian Internet Engineering Conference,
                  {AINTEC} 2007, Phuket, Thailand, November 27-29, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4866},
  pages        = {167--168},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76809-8\_15},
  doi          = {10.1007/978-3-540-76809-8\_15},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aintec/KaafarMSBTD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/KaafarMBSTD07,
  author       = {Mohamed Ali K{\^{a}}afar and
                  Laurent Mathy and
                  Chadi Barakat and
                  Kav{\'{e}} Salamatian and
                  Thierry Turletti and
                  Walid Dabbous},
  editor       = {Jun Murai and
                  Kenjiro Cho},
  title        = {Securing internet coordinate embedding systems},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2007 Conference on Applications,
                  Technologies, Architectures, and Protocols for Computer Communications,
                  Kyoto, Japan, August 27-31, 2007},
  pages        = {61--72},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1282380.1282388},
  doi          = {10.1145/1282380.1282388},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/KaafarMBSTD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aintec/KaafarMT06,
  author       = {Mohamed Ali K{\^{a}}afar and
                  Cyrine Mrabet and
                  Thierry Turletti},
  editor       = {Kenjiro Cho and
                  Philippe Jacquet},
  title        = {A Topology-Aware Overlay Multicast Approach for Mobile Ad-Hoc Networks},
  booktitle    = {Technologies for Advanced Heterogeneous Networks II, Second Asian
                  Internet Engineering Conference, {AINTEC} 2006, Pathumthani, Thailand,
                  November 28-30, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4311},
  pages        = {31--47},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11930181\_3},
  doi          = {10.1007/11930181\_3},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/aintec/KaafarMT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/KaafarMTD06,
  author       = {Mohamed Ali K{\^{a}}afar and
                  Laurent Mathy and
                  Thierry Turletti and
                  Walid Dabbous},
  editor       = {Christophe Diot and
                  Mostafa H. Ammar},
  title        = {Virtual networks under attack: disrupting internet coordinate systems},
  booktitle    = {Proceedings of the 2006 {ACM} Conference on Emerging Network Experiment
                  and Technology, CoNEXT 2006, Lisboa, Portugal, December 4-7, 2006},
  pages        = {12},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1368436.1368453},
  doi          = {10.1145/1368436.1368453},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/KaafarMTD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/MrabetKK06,
  author       = {Cyrine Mrabet and
                  Mohamed Ali K{\^{a}}afar and
                  Farouk Kamoun},
  editor       = {Christophe Diot and
                  Mostafa H. Ammar},
  title        = {Wireless alternative best effort service: a case study of {ALM}},
  booktitle    = {Proceedings of the 2006 {ACM} Conference on Emerging Network Experiment
                  and Technology, CoNEXT 2006, Lisboa, Portugal, December 4-7, 2006},
  pages        = {31},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1368436.1368475},
  doi          = {10.1145/1368436.1368475},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/MrabetKK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/KaafarTD06,
  author       = {Mohamed Ali K{\^{a}}afar and
                  Thierry Turletti and
                  Walid Dabbous},
  title        = {A Locating-First Approach for Scalable Overlay Multicast},
  booktitle    = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  23-29 April 2006, Barcelona, Catalunya, Spain},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/INFOCOM.2006.82},
  doi          = {10.1109/INFOCOM.2006.82},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/KaafarTD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/KaafarTD06,
  author       = {Mohamed Ali K{\^{a}}afar and
                  Thierry Turletti and
                  Walid Dabbous},
  title        = {A Locating-First Approach for Scalable Overlay Multicast},
  booktitle    = {Quality of Service - IWQoS 2006: 14th International Workshop, IWQoS
                  2006, New Haven, CT, USA, 19-21 June 2006, Proceedings},
  pages        = {2--11},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/IWQOS.2006.250445},
  doi          = {10.1109/IWQOS.2006.250445},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/KaafarTD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/KaafarMTD06,
  author       = {Mohamed Ali K{\^{a}}afar and
                  Laurent Mathy and
                  Thierry Turletti and
                  Walid Dabbous},
  title        = {Real attacks on virtual networks: Vivaldi out of tune},
  booktitle    = {Proceedings of the 2006 {SIGCOMM} Workshop on Large-Scale Attack Defense,
                  {LSAD} '06, Pisa, Italy, September 11-15, 2006},
  pages        = {139--146},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1162666.1162672},
  doi          = {10.1145/1162666.1162672},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/KaafarMTD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0605080,
  author       = {Mohamed Ali K{\^{a}}afar and
                  Thierry Turletti and
                  Walid Dabbous},
  title        = {A Locating-First Approach for Scalable Overlay Multicast},
  journal      = {CoRR},
  volume       = {abs/cs/0605080},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0605080},
  eprinttype    = {arXiv},
  eprint       = {cs/0605080},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0605080.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip6-2/KaafarAK04,
  author       = {Mohamed Ali K{\^{a}}afar and
                  Lamia Ben Azzouz and
                  Farouk Kamoun},
  editor       = {Dominique Ga{\"{\i}}ti and
                  Sebasti{\`{a}} Galm{\'{e}}s and
                  Ram{\'{o}}n Puigjaner},
  title        = {A Kerberos-Based Authentication Architecture for {WLANS} - Test beds
                  and experiments},
  booktitle    = {Network Control and Engineering for QoS, Security and Mobility, {III}
                  - {IFIP} {TC6} / WG6.2, 6.6, 6.7 and 6.8 Third International Conference
                  on Network Control and Engineering for QoS, Security and Mobility,
                  NetCon 2004 on November 2-5, 2004, Palma de Mallorca, Spain},
  series       = {{IFIP}},
  volume       = {165},
  pages        = {43--55},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/0-387-23198-6\_4},
  doi          = {10.1007/0-387-23198-6\_4},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip6-2/KaafarAK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/KaafarBKM04,
  author       = {Mohamed Ali K{\^{a}}afar and
                  Lamia Ben Azzouz and
                  Farouk Kamoun and
                  Davor Males},
  editor       = {Nikolas Mitrou and
                  Kimon P. Kontovasilis and
                  George N. Rouskas and
                  Ilias Iliadis and
                  Lazaros F. Merakos},
  title        = {A Kerberos-Based Authentication Architecture for Wireless LANs},
  booktitle    = {{NETWORKING} 2004, Networking Technologies, Services, and Protocols;
                  Performance of Computer and Communication Networks; Mobile and Wireless
                  Communication, Third International {IFIP-TC6} Networking Conference,
                  Athens, Greece, May 9-14, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3042},
  pages        = {1344--1353},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24693-0\_117},
  doi          = {10.1007/978-3-540-24693-0\_117},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/KaafarBKM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics