default search action
Maryam Mehrnezhad
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Ehsan Toreini, Maryam Mehrnezhad, Aad van Moorsel:
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems. Int. J. Inf. Sec. 23(2): 981-997 (2024) - [j12]Stephen Cook, Maryam Mehrnezhad, Ehsan Toreini:
Bluetooth security analysis of general and intimate health IoT devices and apps: the case of FemTech. Int. J. Inf. Sec. 23(6): 3547-3567 (2024) - [j11]James M. Clarke, Maryam Mehrnezhad, Ehsan Toreini:
Invisible, Unreadable, and Inaudible Cookie Notices: An Evaluation of Cookie Notices for Users with Visual Impairments. ACM Trans. Access. Comput. 17(1): 1-39 (2024) - 2023
- [c22]Ehsan Toreini, Maryam Mehrnezhad, Aad van Moorsel:
Verifiable Fairness: Privacy-preserving Computation of Fairness for Machine Learning Systems. ESORICS Workshops (2) 2023: 569-584 - [c21]Joshua Harrison, Ehsan Toreini, Maryam Mehrnezhad:
A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards. EuroS&P Workshops 2023: 270-280 - [c20]Naoom Abu Abah, Nick Taylor, Charles Morisset, Maryam Mehrnezhad:
U-Sense: Feasibility Study of "Human as a Sensor" in Incident Reporting Systems in a Smart Campus. EuroS&P Workshops 2023: 641-652 - [c19]Maryam Mehrnezhad, Teresa Almeida:
"My sex-related data is more sensitive than my financial data and I want the same level of security and privacy": User Risk Perceptions and Protective Actions in Female-oriented Technologies. EuroUSEC 2023: 1-14 - [c18]Diana P. Moniz, Maryam Mehrnezhad, Teresa Almeida:
Intimate Data: Exploring Perceptions of Privacy and Privacy-Seeking Behaviors Through the Story Completion Method. INTERACT (3) 2023: 533-543 - [i10]Maryam Mehrnezhad, Teresa Almeida:
"My sex-related data is more sensitive than my financial data and I want the same level of security and privacy": User Risk Perceptions and Protective Actions in Female-oriented Technologies. CoRR abs/2306.05956 (2023) - [i9]Joshua Harrison, Ehsan Toreini, Maryam Mehrnezhad:
A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards. CoRR abs/2308.01074 (2023) - [i8]James M. Clarke, Maryam Mehrnezhad, Ehsan Toreini:
Invisible, Unreadable, and Inaudible Cookie Notices: An Evaluation of Cookie Notices for Users with Visual Impairments. CoRR abs/2308.11643 (2023) - [i7]Ehsan Toreini, Maryam Mehrnezhad, Aad van Moorsel:
Verifiable Fairness: Privacy-preserving Computation of Fairness for Machine Learning Systems. CoRR abs/2309.06061 (2023) - [i6]Teresa Almeida, Maryam Mehrnezhad, Stephen Cook:
The Importance of Collective Privacy in Digital Sexual and Reproductive Health. CoRR abs/2311.15432 (2023) - 2022
- [j10]Scott Harper, Maryam Mehrnezhad, John C. Mace:
User Privacy Concerns in Commercial Smart Buildings. J. Comput. Secur. 30(3): 465-497 (2022) - [j9]Maryam Mehrnezhad, Kovila P. L. Coopamootoo, Ehsan Toreini:
How Can and Would People Protect From Online Tracking? Proc. Priv. Enhancing Technol. 2022(1): 105-125 (2022) - [c17]Scott Harper, Maryam Mehrnezhad, Matthew Leach:
Are Our Animals Leaking Information About Us? Security and Privacy Evaluation of Animal-related Apps. EuroS&P Workshops 2022: 38-51 - [c16]Dévanté Gray, Maryam Mehrnezhad, Rishad A. Shafik:
SenSig: Practical IoT Sensor Fingerprinting Using Calibration Data. EuroS&P Workshops 2022: 66-81 - [c15]Maryam Mehrnezhad, Christodoula Makarouna, Dante Gray:
Risks of Mobile Ambient Sensors and User Awareness, Concerns, and Preferences. EuroUSEC 2022: 1-13 - [c14]Maryam Mehrnezhad, Laura Shipp, Teresa Almeida, Ehsan Toreini:
Vision: Too Little too Late? Do the Risks of FemTech already Outweigh the Benefits? EuroUSEC 2022: 145-150 - [c13]Scott Harper, Maryam Mehrnezhad, Matthew Leach:
Security and Privacy Concerns of Pet Tech Users. IOT 2022: 155-162 - [c12]Teresa Almeida, Laura Shipp, Maryam Mehrnezhad, Ehsan Toreini:
Bodies Like Yours: Enquiring Data Privacy in FemTech. NordiCHI (Adjunct) 2022: 54:1-54:5 - [c11]Kovila P. L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini:
"I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country. USENIX Security Symposium 2022: 287-304 - [i5]Kovila P. L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini:
"I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country. CoRR abs/2202.04682 (2022) - 2021
- [j8]Maryam Mehrnezhad, Thyla van der Merwe, Chris J. Mitchell:
Guest Editorial: Security and Privacy. IEEE Commun. Stand. Mag. 5(3): 10-11 (2021) - [j7]Amjad Aldweesh, Maher Alharby, Maryam Mehrnezhad, Aad van Moorsel:
The OpBench Ethereum opcode benchmark framework: Design, implementation, validation and experiments. Perform. Evaluation 146: 102168 (2021) - [c10]Maryam Mehrnezhad, Teresa Almeida:
Caring for Intimate Data in Fertility Technologies. CHI 2021: 409:1-409:11 - 2020
- [j6]Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak F. Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, Lana Y. J. Liu:
End-to-End Verifiable E-Voting Trial for Polling Station Voting. IEEE Secur. Priv. 18(6): 6-13 (2020) - [c9]Maryam Mehrnezhad:
A Cross-Platform Evaluation of Privacy Notices and Tracking Practices. EuroS&P Workshops 2020: 97-106 - [c8]Scott Harper, Maryam Mehrnezhad, John C. Mace:
User Privacy Concerns and Preferences in Smart Buildings. STAST 2020: 85-106 - [e2]Thyla van der Merwe, Chris J. Mitchell, Maryam Mehrnezhad:
Security Standardisation Research - 6th International Conference, SSR 2020, London, UK, November 30 - December 1, 2020, Proceedings. Lecture Notes in Computer Science 12529, Springer 2020, ISBN 978-3-030-64356-0 [contents] - [i4]Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak F. Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, Lana Y. J. Liu:
End-to-End Verifiable E-Voting Trial for Polling Station Voting at Gateshead. IACR Cryptol. ePrint Arch. 2020: 650 (2020)
2010 – 2019
- 2019
- [j5]Ehsan Toreini, Siamak F. Shahandashti, Maryam Mehrnezhad, Feng Hao:
DOMtegrity: ensuring web page integrity against malicious browser extensions. Int. J. Inf. Sec. 18(6): 801-814 (2019) - [j4]Maryam Mehrnezhad, Ehsan Toreini:
What Is This Sensor and Does This App Need Access to It? Informatics 6(1): 7 (2019) - [c7]Amjad Aldweesh, Maher Alharby, Maryam Mehrnezhad, Aad van Moorsel:
OpBench: A CPU Performance Benchmark for Ethereum Smart Contract Operation Code. Blockchain 2019: 274-281 - [c6]Maryam Mehrnezhad, Thyla van der Merwe, Feng Hao:
SSR'19: The 5th Conference on Security Standardisation Research. CCS 2019: 2699-2700 - [e1]Maryam Mehrnezhad, Thyla van der Merwe, Feng Hao:
Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, London, UK, November 11, 2019. ACM 2019, ISBN 978-1-4503-6832-2 [contents] - [i3]Ehsan Toreini, Maryam Mehrnezhad, Siamak F. Shahandashti, Feng Hao:
DOMtegrity: Ensuring Web Page Integrity against Malicious Browser Extensions. CoRR abs/1905.12951 (2019) - 2018
- [j3]Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, Feng Hao:
Stealing PINs via mobile sensors: actual risk versus user perception. Int. J. Inf. Sec. 17(3): 291-313 (2018) - 2017
- [b1]Maryam Mehrnezhad:
On the security of mobile sensors. Newcastle University, Newcastle upon Tyne, UK, 2017 - [j2]Maryam Mehrnezhad, Abbas Ghaemi Bafghi, Ahad Harati, Ehsan Toreini:
PiSHi: click the images and I tell if you are a human. Int. J. Inf. Sec. 16(2): 133-149 (2017) - [c5]Maryam Mehrnezhad, Ehsan Toreini, Sami Alajrami:
Making sense of sensors: mobile sensor security awareness and education. STAST 2017: 40-52 - [c4]Mahshid Mehr Nezhad, Maryam Mehrnezhad:
A child recognition system based on image selection patterns. STAST 2017: 76-81 - 2016
- [j1]Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao:
TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript. J. Inf. Secur. Appl. 26: 23-38 (2016) - [c3]Maryam Mehrnezhad, Mohammed Aamir Ali, Feng Hao, Aad P. A. van Moorsel:
NFC Payment Spy: A Privacy Attack on Contactless Payments. SSR 2016: 92-111 - [i2]Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao:
TouchSignatures: Identification of User Touch Actions and PINs Based on Mobile Sensor Data via JavaScript. CoRR abs/1602.04115 (2016) - [i1]Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao:
Stealing PINs via Mobile Sensors: Actual Risk versus User Perception. CoRR abs/1605.05549 (2016) - 2015
- [c2]Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao:
TouchSignatures: Identification of User Touch Actions based on Mobile Sensors via JavaScript. AsiaCCS 2015: 673 - [c1]Maryam Mehrnezhad, Feng Hao, Siamak Fayyaz Shahandashti:
Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment. SSR 2015: 21-39
Coauthor Index
aka: Siamak Fayyaz Shahandashti
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 20:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint