default search action
Mohamed Ali Kâafar
Person information
- affiliation: Macquarie University, Faculty of Science and Engineering, Australia
- affiliation: CSIRO Data61, Sydney, Australia
- affiliation: NICTA, Australia
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j46]Muhammad Salman, Muhammad Ikram, Mohamed Ali Kâafar:
Investigating Evasive Techniques in SMS Spam Filtering: A Comparative Analysis of Machine Learning Models. IEEE Access 12: 24306-24324 (2024) - [j45]Houssem Jmal, Firas Ben Hmida, Nardine Basta, Muhammad Ikram, Mohamad Ali Kâafar, Andy Walker:
SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation. IEEE Trans. Inf. Forensics Secur. 19: 1601-1613 (2024) - [j44]Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Linh Duc Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia:
Use of cryptography in malware obfuscation. J. Comput. Virol. Hacking Tech. 20(1): 135-152 (2024) - [c118]Rahat Masood, Wing Yan Cheng, Dinusha Vatsalan, Deepak Mishra, Hassan Jameel Asghar, Dali Kaafar:
Privacy Preserving Release of Mobile Sensor Data. ARES 2024: 5:1-5:13 - [i94]Hina Qayyum, Muhammad Ikram, Benjamin Zi Hao Zhao, Ian D. Wood, Nicolas Kourtellis, Mohamed Ali Kâafar:
Exploring the Distinctive Tweeting Patterns of Toxic Twitter Users. CoRR abs/2401.14141 (2024) - [i93]Hina Qayyum, Muhammad Ikram, Benjamin Zi Hao Zhao, Ian D. Wood, Nicolas Kourtellis, Mohamed Ali Kâafar:
On mission Twitter Profiles: A Study of Selective Toxic Behavior. CoRR abs/2401.14252 (2024) - [i92]Benjamin Zi Hao Zhao, Muhammad Ikram, Mohamed Ali Kâafar:
GPTs Window Shopping: An analysis of the Landscape of Custom ChatGPT Models. CoRR abs/2405.10547 (2024) - [i91]Hina Qayyum, Muhammad Ikram, Benjamin Zi Hao Zhao, Ian D. Wood, Mohamad Ali Kâafar, Nicolas Kourtellis:
SenTopX: Benchmark for User Sentiment on Various Topics. CoRR abs/2406.02801 (2024) - [i90]Conor Atkins, Ian D. Wood, Mohamed Ali Kâafar, Hassan Asghar, Nardine Basta, Michal Kepkowski:
ConvoCache: Smart Re-Use of Chatbot Responses. CoRR abs/2406.18133 (2024) - [i89]Muhammad Salman, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Muhammad Ikram, Sidharth Kaushik, Mohamed Ali Kâafar:
On the Robustness of Malware Detectors to Adversarial Samples. CoRR abs/2408.02310 (2024) - 2023
- [j43]Benjamin Tag, Niels van Berkel, Sunny Verma, Benjamin Zi Hao Zhao, Shlomo Berkovsky, Dali Kaafar, Vassilis Kostakos, Olga Ohrimenko:
DDoD: Dual Denial of Decision Attacks on Human-AI Teams. IEEE Pervasive Comput. 22(1): 77-84 (2023) - [j42]Rana Salal Ali, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Tham Nguyen, Ian David Wood, Mohamed Ali Kâafar:
Unintended Memorization and Timing Attacks in Named Entity Recognition Models. Proc. Priv. Enhancing Technol. 2023(2): 329-346 (2023) - [j41]Dinusha Vatsalan, Raghav Bhaskar, Mohamed Ali Kâafar:
Local Differentially Private Fuzzy Counting in Stream Data Using Probabilistic Data Structures. IEEE Trans. Knowl. Data Eng. 35(8): 8185-8198 (2023) - [c117]Conor Atkins, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Ian D. Wood, Mohamed Ali Kâafar:
Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories. ACNS (1) 2023: 284-308 - [c116]I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar:
An Empirical Analysis of Security and Privacy Risks in Android Cryptocurrency Wallet Apps. ACNS 2023: 699-725 - [c115]Nan Wu, Dinusha Vatsalan, Mohamed Ali Kâafar, Sanath Kumar Ramesh:
Privacy-Preserving Record Linkage for Cardinality Counting. AsiaCCS 2023: 53-64 - [c114]Hina Qayyum, Muhammad Ikram, Benjamin Zi Hao Zhao, Ian D. Wood, Nicolas Kourtellis, Mohamed Ali Kâafar:
Exploring the Distinctive Tweeting Patterns of Toxic Twitter Users. IEEE Big Data 2023: 3624-3633 - [c113]Hina Qayyum, Muhammad Ikram, Benjamin Zi Hao Zhao, Ian D. Wood, Nicolas Kourtellis, Mohamed Ali Kâafar:
On mission Twitter Profiles: A Study of Selective Toxic Behavior. IEEE Big Data 2023: 3634-3643 - [c112]Junda Lu, Yukai Miao, Mingyang Chen, Bo Huang, Bing Li, Wei Wang, Dinusha Vatsalan, Mohamed Ali Kâafar:
Distance Maximization and Defences on Deep Hashing Based Image Retrieval. ICKG 2023: 176-183 - [c111]Michal Kepkowski, Maciej Machulak, Ian D. Wood, Dali Kaafar:
Challenges with Passwordless FIDO2 in an Enterprise Setting: A Usability Study. SecDev 2023: 37-48 - [c110]Wei-Zhu Yeoh, Michal Kepkowski, Gunnar Heide, Dali Kaafar, Lucjan Hanzlik:
Fast IDentity Online with Anonymous Credentials (FIDO-AC). USENIX Security Symposium 2023: 3029-3046 - [c109]Hina Qayyum, Benjamin Zi Hao Zhao, Ian D. Wood, Muhammad Ikram, Nicolas Kourtellis, Mohamed Ali Kâafar:
A longitudinal study of the top 1% toxic Twitter profiles. WebSci 2023: 292-303 - [i88]Nan Wu, Dinusha Vatsalan, Mohamed Ali Kâafar, Sanath Kumar Ramesh:
Privacy-Preserving Record Linkage for Cardinality Counting. CoRR abs/2301.04000 (2023) - [i87]Hina Qayyum, Benjamin Zi Hao Zhao, Ian D. Wood, Muhammad Ikram, Mohamed Ali Kâafar, Nicolas Kourtellis:
A longitudinal study of the top 1% toxic Twitter profiles. CoRR abs/2303.14603 (2023) - [i86]Conor Atkins, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Ian D. Wood, Mohamed Ali Kâafar:
Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories. CoRR abs/2304.05371 (2023) - [i85]Gioacchino Tangari, Shreesh Keskar, Hassan Jameel Asghar, Dali Kaafar:
On the Adversarial Inversion of Deep Biometric Representations. CoRR abs/2304.05561 (2023) - [i84]Wei-Zhu Yeoh, Michal Kepkowski, Gunnar Heide, Dali Kaafar, Lucjan Hanzlik:
Fast IDentity Online with Anonymous Credentials (FIDO-AC). CoRR abs/2305.16758 (2023) - [i83]Houssem Jmal, Firas Ben Hmida, Nardine Basta, Muhammad Ikram, Mohamed Ali Kâafar, Andy Walker:
SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation. CoRR abs/2305.19487 (2023) - [i82]Ian D. Wood, Michal Kepkowski, Leron Zinatullin, Travis Darnley, Mohamed Ali Kâafar:
An analysis of scam baiting calls: Identifying and extracting scam stages and scripts. CoRR abs/2307.01965 (2023) - [i81]Michal Kepkowski, Maciej Machulak, Ian D. Wood, Dali Kaafar:
Challenges with Passwordless FIDO2 in an Enterprise Setting: A Usability Study. CoRR abs/2308.08096 (2023) - [i80]Hassan Jameel Asghar, Zhigang Lu, Zhongrui Zhao, Dali Kaafar:
Practical, Private Assurance of the Value of Collaboration. CoRR abs/2310.02563 (2023) - 2022
- [j40]Michal Kepkowski, Lucjan Hanzlik, Ian D. Wood, Mohamed Ali Kâafar:
How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy. Proc. Priv. Enhancing Technol. 2022(4): 705-726 (2022) - [j39]Yi Chen, Hongxia Wang, Kim-Kwang Raymond Choo, Peisong He, Zoran Salcic, Dali Kaafar, Xuyun Zhang:
DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain. IEEE Trans. Dependable Secur. Comput. 19(4): 2405-2420 (2022) - [j38]Zhigang Lu, Hassan Jameel Asghar, Mohamed Ali Kâafar, Darren Webb, Peter Dickinson:
A Differentially Private Framework for Deep Learning With Convexified Loss Functions. IEEE Trans. Inf. Forensics Secur. 17: 2151-2165 (2022) - [j37]Nan Wu, Dinusha Vatsalan, Sunny Verma, Mohamed Ali Kâafar:
Fairness and Cost Constrained Privacy-Aware Record Linkage. IEEE Trans. Inf. Forensics Secur. 17: 2644-2656 (2022) - [j36]Nazim Uddin Sheikh, Hassan Jameel Asghar, Farhad Farokhi, Mohamed Ali Kâafar:
Do Auto-Regressive Models Protect Privacy? Inferring Fine-Grained Energy Consumption From Aggregated Model Parameters. IEEE Trans. Serv. Comput. 15(6): 3198-3209 (2022) - [c108]Nardine Basta, Muhammad Ikram, Mohamed Ali Kâafar, Andy Walker:
Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation Framework. NOMS 2022: 1-7 - [c107]Hina Qayyum, Muhammad Salman, I Wayan Budi Sentana, Giang Linh Duc Nguyen, Muhammad Ikram, Gareth Tyson, Mohamed Ali Kâafar:
A First Look at Android Apps' Third-Party Resources Loading. NSS 2022: 193-213 - [p2]Rahat Masood, Shlomo Berkovsky, Mohamed Ali Kâafar:
Tracking and Personalization. Modern Socio-Technical Perspectives on Privacy 2022: 171-202 - [i79]Hina Qayyum, Benjamin Zi Hao Zhao, Ian D. Wood, Muhammad Ikram, Mohamed Ali Kâafar, Nicolas Kourtellis:
A deep dive into the consistently toxic 1% of Twitter. CoRR abs/2202.07853 (2022) - [i78]Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar, Roya Ensafi:
A Study of Third-party Resources Loading on Web. CoRR abs/2203.03077 (2022) - [i77]Nardine Basta, Ming Ding, Muhammad Ikram, Mohamed Ali Kâafar:
5G-Enabled Pseudonymity for Cooperative Intelligent Transportation System. CoRR abs/2203.10673 (2022) - [i76]Zhigang Lu, Hassan Jameel Asghar, Mohamed Ali Kâafar, Darren Webb, Peter Dickinson:
A Differentially Private Framework for Deep Learning with Convexified Loss Functions. CoRR abs/2204.01049 (2022) - [i75]Rahat Masood, Wing Yan Cheng, Dinusha Vatsalan, Deepak Mishra, Hassan Jameel Asghar, Mohamed Ali Kâafar:
Privacy Preserving Release of Mobile Sensor Data. CoRR abs/2205.06641 (2022) - [i74]Michal Kepkowski, Lucjan Hanzlik, Ian D. Wood, Mohamed Ali Kâafar:
How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy. CoRR abs/2205.08071 (2022) - [i73]Nan Wu, Dinusha Vatsalan, Sunny Verma, Mohamed Ali Kâafar:
Fairness and Cost Constrained Privacy-Aware Record Linkage. CoRR abs/2206.15089 (2022) - [i72]Dinusha Vatsalan, Raghav Bhaskar, Mohamed Ali Kâafar:
Local Differentially Private Fuzzy Counting in Stream Data using Probabilistic Data Structure. CoRR abs/2208.05264 (2022) - [i71]Muhammad Salman, Muhammad Ikram, Mohamed Ali Kâafar:
An Empirical Analysis of SMS Scam Detection Systems. CoRR abs/2210.10451 (2022) - [i70]Rana Salal Ali, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Tham Nguyen, Ian David Wood, Dali Kaafar:
Unintended Memorization and Timing Attacks in Named Entity Recognition Models. CoRR abs/2211.02245 (2022) - [i69]Benjamin Tag, Niels van Berkel, Sunny Verma, Benjamin Zi Hao Zhao, Shlomo Berkovsky, Dali Kaafar, Vassilis Kostakos, Olga Ohrimenko:
DDoD: Dual Denial of Decision Attacks on Human-AI Teams. CoRR abs/2212.03980 (2022) - [i68]Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang L. D. Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia:
SoK: Use of Cryptography in Malware Obfuscation. CoRR abs/2212.04008 (2022) - [i67]Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Linh Duc Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia:
SoK: Use of Cryptography in Malware Obfuscation. IACR Cryptol. ePrint Arch. 2022: 1699 (2022) - 2021
- [j35]Gioacchino Tangari, Muhammad Ikram, I Wayan Budi Sentana, Kiran Ijaz, Mohamed Ali Kâafar, Shlomo Berkovsky:
Analyzing security issues of android mobile health and medical applications. J. Am. Medical Informatics Assoc. 28(10): 2074-2084 (2021) - [j34]Yuantian Miao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Benjamin Zi Hao Zhao, Dali Kaafar, Yang Xiang:
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services. Proc. Priv. Enhancing Technol. 2021(1): 209-228 (2021) - [j33]Farhad Farokhi, Nan Wu, David B. Smith, Mohamed Ali Kâafar:
The Cost of Privacy in Asynchronous Differentially-Private Machine Learning. IEEE Trans. Inf. Forensics Secur. 16: 2118-2129 (2021) - [c106]Marina Dehez-Clementi, Jérôme Lacan, Jean-Christophe Deneuville, Hassan Asghar, Dali Kaafar:
A Blockchain-enabled Anonymous-yet- Traceable Distributed Key Generation. Blockchain 2021: 257-265 - [c105]Benjamin Zi Hao Zhao, Aviral Agrawal, Catisha Coburn, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kâafar, Darren Webb, Peter Dickinson:
On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models. EuroS&P 2021: 232-251 - [c104]Nazim Uddin Sheikh, Zhigang Lu, Hassan Jameel Asghar, Mohamed Ali Kâafar:
Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics. ICETE (Selected Papers) 2021: 305-333 - [c103]Nazim Uddin Sheikh, Zhigang Lu, Hassan Asghar, Mohamed Ali Kâafar:
Trace Recovery: Inferring Fine-grained Trace of Energy Data from Aggregates. SECRYPT 2021: 283-294 - [c102]I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar, Shlomo Berkovsky:
Empirical Security and Privacy Analysis of Mobile Symptom Checking Apps on Google Play. SECRYPT 2021: 665-673 - [c101]I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar:
BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-domain Routing via Blockchain. SECRYPT 2021: 674-679 - [i66]Zainab Abaid, Dilip Sarkar, Mohamed Ali Kâafar, Sanjay K. Jha:
All Infections are Not Created Equal: Time-Sensitive Prediction of Malware Generated Network Attacks. CoRR abs/2102.01944 (2021) - [i65]Benjamin Zi Hao Zhao, Aviral Agrawal, Catisha Coburn, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kâafar, Darren Webb, Peter Dickinson:
On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models. CoRR abs/2103.07101 (2021) - [i64]Tham Nguyen, Hassan Jameel Asghar, Raghav Bhaskar, Dali Kaafar, Farhad Farokhi:
Sharing in a Trustless World: Privacy-Preserving Data Analytics with Potentially Cheating Participants. CoRR abs/2106.09904 (2021) - [i63]I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar:
BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-Domain Routing Via Blockchain. CoRR abs/2107.07063 (2021) - [i62]I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar, Shlomo Berkovsky:
Empirical Security and Privacy Analysis of Mobile Symptom Checking Applications on Google Play. CoRR abs/2107.13754 (2021) - [i61]Nardine Basta, Muhammad Ikram, Mohamed Ali Kâafar, Andy Walker:
Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation Framework. CoRR abs/2111.10967 (2021) - 2020
- [j32]Hassan Jameel Asghar, Ming Ding, Thierry Rakotoarivelo, Sirine Mrabet, Dali Kaafar:
Differentially Private Release of Datasets using Gaussian Copula. J. Priv. Confidentiality 10(2) (2020) - [j31]Parameswaran Kamalaruban, Victor Perrier, Hassan Jameel Asghar, Mohamed Ali Kâafar:
Not All Attributes are Created Equal: dX -Private Mechanisms for Linear Queries. Proc. Priv. Enhancing Technol. 2020(1): 103-125 (2020) - [j30]Hassan Jameel Asghar, Dali Kaafar:
Averaging Attacks on Bounded Noise-based Disclosure Control Algorithms. Proc. Priv. Enhancing Technol. 2020(2): 358-378 (2020) - [j29]Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar, Noha Loizon, Roya Ensafi:
Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading. ACM Trans. Priv. Secur. 23(2): 8:1-8:27 (2020) - [j28]Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar, Francesca Trevisan, Haiyue Yuan:
Exploiting Behavioral Side Channels in Observation Resilient Cognitive Authentication Schemes. ACM Trans. Priv. Secur. 24(1): 1:1-1:33 (2020) - [j27]Qing Yang, Yiran Shen, Dinusha Vatsalan, Jianpei Zhang, Mohamed Ali Kâafar, Wen Hu:
P4Mobi: A Probabilistic Privacy-Preserving Framework for Publishing Mobility Datasets. IEEE Trans. Veh. Technol. 69(7): 6987-6999 (2020) - [c100]Benjamin Zi Hao Zhao, Mohamed Ali Kâafar, Nicolas Kourtellis:
Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning. CCSW 2020: 15-26 - [c99]I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar:
BlockJack: Blocking IP Prefix Hijacker in Inter-Domain Routing. StudentWorkshop@CoNEXT 2020: 1-2 - [c98]Marina Dehez-Clementi, Jean-Christophe Deneuville, Jérôme Lacan, Hassan Asghar, Dali Kaafar:
Who Let theDOGSOut: Anonymous but Auditable Communications Using Group Signature Schemes with Distributed Opening. DPM/CBT@ESORICS 2020: 437-446 - [c97]Maryam Shahpasand, Leonard G. C. Hamey, Mohamed Ali Kâafar, Dinusha Vatsalan:
Feature-Based Adversarial Attacks Against Machine Learnt Mobile Malware Detectors. ITNAC 2020: 1-8 - [c96]Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar:
On the Resilience of Biometric Authentication Systems against Random Inputs. NDSS 2020 - [c95]Nan Wu, Farhad Farokhi, David B. Smith, Mohamed Ali Kâafar:
The Value of Collaboration in Convex Machine Learning with Differential Privacy. SP 2020: 304-317 - [p1]Arash Shaghaghi, Mohamed Ali Kâafar, Rajkumar Buyya, Sanjay Jha:
Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future Directions. Handbook of Computer Networks and Cyber Security 2020: 341-387 - [i60]Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar:
On the Resilience of Biometric Authentication Systems against Random Inputs. CoRR abs/2001.04056 (2020) - [i59]Farhad Farokhi, Mohamed Ali Kâafar:
Modelling and Quantifying Membership Information Leakage in Machine Learning. CoRR abs/2001.10648 (2020) - [i58]Shakila Mahjabin Tonni, Farhad Farokhi, Dinusha Vatsalan, Dali Kaafar:
Data and Model Dependencies of Membership Inference Attack. CoRR abs/2002.06856 (2020) - [i57]Farhad Farokhi, Mohamed Ali Kâafar:
Predicting Performance of Asynchronous Differentially-Private Learning. CoRR abs/2003.08500 (2020) - [i56]Mahmood Yousefi-Azar, Mohamed Ali Kâafar, Andy Walker:
Unsupervised Learning for security of Enterprise networks by micro-segmentation. CoRR abs/2003.11231 (2020) - [i55]Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar, Francesca Trevisan, Haiyue Yuan:
Exploiting Behavioral Side-Channels in Observation Resilient Cognitive Authentication Schemes. CoRR abs/2007.11210 (2020) - [i54]Benjamin Zi Hao Zhao, Mohamed Ali Kâafar, Nicolas Kourtellis:
Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning. CoRR abs/2008.08807 (2020) - [i53]Matthieu Monteiro, Kumara Kahatapitiya, Hassan Jameel Asghar, Kanchana Thilakarathna, Thierry Rakotoarivelo, Dali Kaafar, Shujun Li, Ron Steinfeld, Josef Pieprzyk:
Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices. IACR Cryptol. ePrint Arch. 2020: 261 (2020)
2010 – 2019
- 2019
- [j26]Hassan Jameel Asghar, Emiliano De Cristofaro, Guillaume Jourjon, Mohamed Ali Kâafar, Laurent Mathy, Luca Melis, Craig Russell, Mang Yu:
Fast privacy-preserving network function outsourcing. Comput. Networks 163 (2019) - [j25]Hailong Huang, Andrey V. Savkin, Ming Ding, Mohamed Ali Kâafar:
Optimized deployment of drone base station to improve user experience in cellular networks. J. Netw. Comput. Appl. 144: 49-58 (2019) - [j24]Fangzhou Jiang, Kanchana Thilakarathna, Sirine Mrabet, Mohamed Ali Kâafar, Aruna Seneviratne:
uStash: A Novel Mobile Content Delivery System for Improving User QoE in Public Transport. IEEE Trans. Mob. Comput. 18(6): 1447-1460 (2019) - [j23]Shizhe Zang, Ming Ding, David Smith, Paul Tyler, Thierry Rakotoarivelo, Mohamed Ali Kâafar:
The Impact of Adverse Weather Conditions on Autonomous Vehicles: How Rain, Snow, Fog, and Hail Affect the Performance of a Self-Driving Car. IEEE Veh. Technol. Mag. 14(2): 103-111 (2019) - [c94]Benjamin Zi Hao Zhao, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kâafar, Abdelberi Chaabane, Kanchana Thilakarathna:
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists. AsiaCCS 2019: 193-205 - [c93]Muhammad Ikram, Pierrick Beaume, Mohamed Ali Kâafar:
DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling. ICETE (2) 2019: 211-219 - [c92]Saad Sajid Hashmi, Muhammad Ikram, Mohamed Ali Kâafar:
A Longitudinal Analysis of Online Ad-Blocking Blacklists. LCN Symposium 2019: 158-165 - [c91]Victor Perrier, Hassan Jameel Asghar, Dali Kaafar:
Private Continual Release of Real-Valued Data Streams. NDSS 2019 - [c90]Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar, Noha Loizon, Roya Ensafi:
The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading. WWW 2019: 2851-2857 - [i52]Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar, Noha Loizon, Roya Ensafi:
The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading. CoRR abs/1901.07699 (2019) - [i51]Hassan Jameel Asghar, Ming Ding, Thierry Rakotoarivelo, Sirine Mrabet, Mohamed Ali Kâafar:
Differentially Private Release of High-Dimensional Datasets using the Gaussian Copula. CoRR abs/1902.01499 (2019) - [i50]Hassan Jameel Asghar, Dali Kaafar:
Averaging Attacks on Bounded Perturbation Algorithms. CoRR abs/1902.06414 (2019) - [i49]Benjamin Zi Hao Zhao, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kâafar, Abdelberi Chaabane, Kanchana Thilakarathna:
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists. CoRR abs/1904.10629 (2019) - [i48]Yuantian Miao, Benjamin Zi Hao Zhao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Dali Kaafar, Yang Xiang:
The Audio Auditor: Participant-Level Membership Inference in Voice-Based IoT. CoRR abs/1905.07082 (2019) - [i47]Muhammad Ikram, Pierrick Beaume, Mohamed Ali Kâafar:
DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling. CoRR abs/1905.09136 (2019) - [i46]Saad Sajid Hashmi, Muhammad Ikram, Mohamed Ali Kâafar:
A Longitudinal Analysis of Online Ad-Blocking Blacklists. CoRR abs/1906.00166 (2019) - [i45]Nan Wu, Farhad Farokhi, David B. Smith, Mohamed Ali Kâafar:
The Value of Collaboration in Convex Machine Learning with Differential Privacy. CoRR abs/1906.09679 (2019) - [i44]Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kâafar:
On Inferring Training Data Attributes in Machine Learning Models. CoRR abs/1908.10558 (2019) - [i43]Shaofeng Li, Benjamin Zi Hao Zhao, Jiahao Yu, Minhui Xue, Dali Kaafar, Haojin Zhu:
Invisible Backdoor Attacks Against Deep Neural Networks. CoRR abs/1909.02742 (2019) - 2018
- [j22]Jagmohan Chauhan, Mohamed Ali Kâafar, Anirban Mahanti:
The Web for Underpowered Mobile Devices: Lessons Learned from Google Glass. IEEE Internet Comput. 22(3): 38-47 (2018) - [j21]Ming Ding, David López-Pérez, Holger Claussen, Mohamed Ali Kâafar:
On the Fundamental Characteristics of Ultra-Dense Small Cell Networks. IEEE Netw. 32(3): 92-100 (2018) - [j20]Rahat Masood, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar:
Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking. Proc. Priv. Enhancing Technol. 2018(2): 122-142 (2018) - [j19]Gaogang Xie, Zhenyu Li, Mohamed Ali Kâafar, Qinghua Wu:
Access Types Effect on Internet Video Services and Its Implications on CDN Caching. IEEE Trans. Circuits Syst. Video Technol. 28(5): 1183-1196 (2018) - [c89]Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kâafar, Elisa Bertino, Sanjay Jha:
Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations. LCN 2018: 553-561 - [c88]Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kâafar, Sanjay Jha:
Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems. NCA 2018: 1-5 - [c87]Rahat Masood, Dinusha Vatsalan, Muhammad Ikram, Mohamed Ali Kâafar:
Incognito: A Method for Obfuscating Web Data. WWW 2018: 267-276 - [i42]Arash Shaghaghi, Mohamed Ali Kâafar, Rajkumar Buyya, Sanjay Jha:
Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions. CoRR abs/1804.00262 (2018) - [i41]Loqman Salamatian, Dali Kaafar, Kavé Salamatian:
A Geometric Approach for Real-time Monitoring of Dynamic Large Scale Graphs: AS-level graphs illustrated. CoRR abs/1806.00676 (2018) - [i40]Parameswaran Kamalaruban, Victor Perrier, Hassan Jameel Asghar, Mohamed Ali Kâafar:
dX-Private Mechanisms for Linear Queries. CoRR abs/1806.02389 (2018) - [i39]Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kâafar, Elisa Bertino, Sanjay Jha:
Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations. CoRR abs/1807.02593 (2018) - [i38]Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kâafar, Sanjay Jha:
Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems. CoRR abs/1809.06988 (2018) - [i37]Victor Perrier, Hassan Jameel Asghar, Dali Kaafar:
Private Continual Release of Real-Valued Data Streams. CoRR abs/1811.03197 (2018) - [i36]Qingrong Chen, Chong Xiang, Minhui Xue, Bo Li, Nikita Borisov, Dali Kaafar, Haojin Zhu:
Differentially Private Data Generative Models. CoRR abs/1812.02274 (2018) - 2017
- [j18]Kanchana Thilakarathna, Suranga Seneviratne, Kamal Gupta, Mohamed Ali Kâafar, Aruna Seneviratne:
A deep dive into location-based communities in social discovery networks. Comput. Commun. 100: 78-90 (2017) - [j17]Kanchana Thilakarathna, Fangzhou Jiang, Sirine Mrabet, Mohamed Ali Kâafar, Aruna Seneviratne, Gaogang Xie:
Crowd-Cache: Leveraging on spatio-temporal correlation in content popularity for mobile networking in proximity. Comput. Commun. 100: 104-117 (2017) - [j16]Hassan Jameel Asghar, Mohamed Ali Kâafar:
When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack. J. Math. Cryptol. 11(3): 177-194 (2017) - [j15]Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kâafar, Anirban Mahanti, Balachander Krishnamurthy:
Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning. Proc. Priv. Enhancing Technol. 2017(1): 79-99 (2017) - [j14]Zhenyu Li, Mohamed Ali Kâafar, Kavé Salamatian, Gaogang Xie:
Characterizing and Modeling User Behavior in a Large-Scale Mobile Live Streaming System. IEEE Trans. Circuits Syst. Video Technol. 27(12): 2675-2686 (2017) - [j13]Muhammad Ikram, Lucky Onwuzurike, Shehroze Farooqi, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, M. Zubair Shafiq:
Measuring, Characterizing, and Detecting Facebook Like Farms. ACM Trans. Priv. Secur. 20(4): 13:1-13:28 (2017) - [j12]Suranga Seneviratne, Aruna Seneviratne, Mohamed Ali Kâafar, Anirban Mahanti, Prasant Mohapatra:
Spam Mobile Apps: Characteristics, Detection, and in the Wild Analysis. ACM Trans. Web 11(1): 4:1-4:29 (2017) - [c86]Arash Shaghaghi, Mohamed Ali Kâafar, Sanjay Jha:
WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks. AsiaCCS 2017: 849-861 - [c85]Rahat Masood, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar:
POSTER: TouchTrack: How Unique are your Touch Gestures? CCS 2017: 2555-2557 - [c84]Shehroze Farooqi, Guillaume Jourjon, Muhammad Ikram, Mohamed Ali Kâafar, Emiliano De Cristofaro, Muhammad Zubair Shafiq, Arik Friedman, Fareed Zaffar:
Characterizing key stakeholders in an online black-hat marketplace. eCrime 2017: 17-27 - [c83]Jagmohan Chauhan, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Jonathan Chan, Mohamed Ali Kâafar:
BehavioCog: An Observation Resistant Authentication Scheme. Financial Cryptography 2017: 39-58 - [c82]Muhammad Ikram, Mohamed Ali Kâafar:
A first look at mobile Ad-Blocking apps. NCA 2017: 343-350 - [c81]Zainab Abaid, Mohamed Ali Kâafar, Sanjay Jha:
Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers. NCA 2017: 375-384 - [c80]Zainab Abaid, Mohamed Ali Kâafar, Sanjay Jha:
Early detection of in-the-wild botnet attacks by exploiting network communication uniformity: An empirical study. Networking 2017: 1-9 - [c79]Wei Wu, Ren Ping Liu, Wei Ni, Dali Kaafar, Xiaojing Huang:
AC-PROT: An Access Control Model to Improve Software-Defined Networking Security. VTC Spring 2017: 1-5 - [e2]Mohamed Ali Kâafar, Steve Uhlig, Johanna Amann:
Passive and Active Measurement - 18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings. Lecture Notes in Computer Science 10176, Springer 2017, ISBN 978-3-319-54327-7 [contents] - [i35]Hassan Jameel Asghar, Paul Tyler, Mohamed Ali Kâafar:
Differentially Private Release of Public Transport Data: The Opal Use Case. CoRR abs/1705.05957 (2017) - [i34]Hassan Jameel Asghar, Paul Tyler, Mohamed Ali Kâafar:
On the Privacy of the Opal Data Release: A Response. CoRR abs/1705.08994 (2017) - [i33]Muhammad Ikram, Lucky Onwuzurike, Shehroze Farooqi, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, M. Zubair Shafiq:
Measuring, Characterizing, and Detecting Facebook Like Farms. CoRR abs/1707.00190 (2017) - [i32]David B. Smith, Kanchana Thilakarathna, Mohamed Ali Kâafar:
More Flexible Differential Privacy: The Application of Piecewise Mixture Distributions in Query Release. CoRR abs/1707.01189 (2017) - [i31]Amit Tiroshi, Tsvi Kuflik, Shlomo Berkovsky, Mohamed Ali Kâafar:
Graph Based Recommendations: From Data Representation to Feature Extraction and Application. CoRR abs/1707.01250 (2017) - [i30]Fangzhou Jiang, Kanchana Thilakarathna, Sirine Mrabet, Mohamed Ali Kâafar, Aruna Seneviratne:
uStash: a Novel Mobile Content Delivery System for Improving User QoE in Public Transport. CoRR abs/1708.04078 (2017) - [i29]Arash Shaghaghi, Mohamed Ali Kâafar, Sanjay Jha:
WedgeTail 2.0: An Intrusion Prevention System for the Data Plane of Software Defined Networks. CoRR abs/1708.05477 (2017) - [i28]Muhammad Ikram, Mohamed Ali Kâafar:
A First Look at Ad Blocking Apps on Google Play. CoRR abs/1709.02901 (2017) - [i27]Ming Ding, David López-Pérez, Holger Claussen, Mohamed Ali Kâafar:
On the Fundamental Characteristics of Ultra-Dense Small Cell Networks. CoRR abs/1710.05297 (2017) - [i26]Hailong Huang, Andrey V. Savkin, Ming Ding, Mohamed Ali Kâafar:
Optimized Deployment of Autonomous Drones to Improve User Experience in Cellular Networks. CoRR abs/1712.02124 (2017) - 2016
- [j11]Zhenyu Li, Mohamed Ali Kâafar, Gaogang Xie:
Session Throughput Prediction for Internet Videos. IEEE Commun. Mag. 54(12): 152-157 (2016) - [j10]Qinghua Wu, Zhenyu Li, Gareth Tyson, Steve Uhlig, Mohamed Ali Kâafar, Gaogang Xie:
Privacy-Aware Multipath Video Caching for Content-Centric Networks. IEEE J. Sel. Areas Commun. 34(8): 2219-2230 (2016) - [j9]Arik Friedman, Shlomo Berkovsky, Mohamed Ali Kâafar:
A differential privacy framework for matrix factorization recommender systems. User Model. User Adapt. Interact. 26(5): 425-458 (2016) - [c78]Jagmohan Chauhan, Hassan Jameel Asghar, Anirban Mahanti, Mohamed Ali Kâafar:
Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case. ACNS 2016: 648-665 - [c77]Luca Melis, Hassan Jameel Asghar, Emiliano De Cristofaro, Mohamed Ali Kâafar:
Private Processing of Outsourced Network Functions: Feasibility and Constructions. SDN-NFV@CODASPY 2016: 39-44 - [c76]Zhenyu Li, Xiaohui Wang, Ningjing Huang, Mohamed Ali Kâafar, Zhenhua Li, Jianer Zhou, Gaogang Xie, Peter Steenkiste:
An Empirical Analysis of a Large-scale Mobile Cloud Storage Service. Internet Measurement Conference 2016: 287-301 - [c75]Muhammad Ikram, Narseo Vallina-Rodriguez, Suranga Seneviratne, Mohamed Ali Kâafar, Vern Paxson:
An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps. Internet Measurement Conference 2016: 349-364 - [c74]Dong Wang, Zhenyu Li, Gaogang Xie, Mohamed Ali Kâafar, Kavé Salamatian:
Adwords management for third-parties in SEM: An optimisation model and the potential of Twitter. INFOCOM 2016: 1-9 - [c73]Zainab Abaid, Dilip Sarkar, Mohamed Ali Kâafar, Sanjay Jha:
The Early Bird Gets the Botnet: A Markov Chain Based Early Warning System for Botnet Attacks. LCN 2016: 61-68 - [c72]Ralph Holz, Johanna Amann, Olivier Mehani, Mohamed Ali Kâafar, Matthias Wachs:
TLS in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication. NDSS 2016 - [c71]Arash Shaghaghi, Mohamed Ali Kâafar, Sandra Scott-Hayward, Salil S. Kanhere, Sanjay K. Jha:
Towards Policy Enforcement Point as a Service (PEPS). NFV-SDN 2016: 50-55 - [c70]Jagmohan Chauhan, Suranga Seneviratne, Mohamed Ali Kâafar, Anirban Mahanti, Aruna Seneviratne:
Characterization of early smartwatch apps. PerCom Workshops 2016: 1-6 - [c69]Fangzhou Jiang, Kanchana Thilakarathna, Sirine Mrabet, Mohamed Ali Kâafar:
uDrop: Pushing drop-box to the edge of mobile network. PerCom Workshops 2016: 1-3 - [c68]Hassan Jameel Asghar, Luca Melis, Cyril Soldani, Emiliano De Cristofaro, Mohamed Ali Kâafar, Laurent Mathy:
SplitBox: Toward Efficient Private Network Function Virtualization. HotMiddlebox@SIGCOMM 2016: 7-13 - [i25]Luca Melis, Hassan Jameel Asghar, Emiliano De Cristofaro, Mohamed Ali Kâafar:
Private Processing of Outsourced Network Functions: Feasibility and Constructions. CoRR abs/1601.06454 (2016) - [i24]Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kâafar, Balachander Krishnamurthy, Anirban Mahanti:
Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning. CoRR abs/1603.06289 (2016) - [i23]Hassan Jameel Asghar, Luca Melis, Cyril Soldani, Emiliano De Cristofaro, Mohamed Ali Kâafar, Laurent Mathy:
SplitBox: Toward Efficient Private Network Function Virtualization. CoRR abs/1605.03772 (2016) - [i22]Arash Shaghaghi, Mohamed Ali Kâafar, Sandra Scott-Hayward, Salil S. Kanhere, Sanjay K. Jha:
Towards Policy Enforcement Point as a Service (PEPS). CoRR abs/1610.02526 (2016) - [i21]Jagmohan Chauhan, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Jonathan Chan, Mohamed Ali Kâafar:
BehavioCog: An Observation Resistant Authentication Scheme. CoRR abs/1610.09044 (2016) - 2015
- [j8]Mohamed Ali Kâafar, Ross T. Smith:
Small Wearable Internet. IEEE Internet Comput. 19(5): 6-7 (2015) - [j7]Hassan Jameel Asghar, Ron Steinfeld, Shujun Li, Mohamed Ali Kâafar, Josef Pieprzyk:
On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices. IEEE Trans. Inf. Forensics Secur. 10(8): 1643-1655 (2015) - [c67]David Vallet, Shlomo Berkovsky, Sebastien Ardon, Anirban Mahanti, Mohamed Ali Kâafar:
Characterizing and Predicting Viral-and-Popular Video Content. CIKM 2015: 1591-1600 - [c66]Jianer Zhou, Qinghua Wu, Zhenyu Li, Mohamed Ali Kâafar, Gaogang Xie:
A proactive transport mechanism with Explicit Congestion Notification for NDN. ICC 2015: 5242-5247 - [c65]Fangzhou Jiang, Kanchana Thilakarathna, Mohamed Ali Kâafar, Filip Rosenbaum, Aruna Seneviratne:
A Spatio-Temporal Analysis of Mobile Internet Traffic in Public Transportation Systems: A View of Web Browsing from The Bus. CHANTS@MobiCom 2015: 37-42 - [c64]Arnaud Berlioz, Arik Friedman, Mohamed Ali Kâafar, Roksana Boreli, Shlomo Berkovsky:
Applying Differential Privacy to Matrix Factorization. RecSys 2015: 107-114 - [c63]Jun Young Kim, Sanjay Jha, Wen Hu, Hossein Shafagh, Mohamed Ali Kâafar:
Poster: Toward Efficient and Secure Code Dissemination Protocol for the Internet of Things. SenSys 2015: 425-426 - [c62]Zhenyu Li, Gaogang Xie, Mohamed Ali Kâafar, Kavé Salamatian:
User Behavior Characterization of a Large-scale Mobile Live Streaming System. WWW (Companion Volume) 2015: 307-313 - [c61]Suranga Seneviratne, Aruna Seneviratne, Mohamed Ali Kâafar, Anirban Mahanti, Prasant Mohapatra:
Early Detection of Spam Mobile Apps. WWW 2015: 949-959 - [i20]Shehroze Farooqi, Muhammad Ikram, Gohar Irfan, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, Muhammad Zubair Shafiq, Fareed Zaffar:
Characterizing Seller-Driven Black-Hat Marketplaces. CoRR abs/1505.01637 (2015) - [i19]Muhammad Ikram, Lucky Onwuzurike, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, M. Zubair Shafiq:
Spying on Spammers: Tracking Like Farm Accounts on Facebook. CoRR abs/1506.00506 (2015) - [i18]Jagmohan Chauhan, Mohamed Ali Kâafar, Anirban Mahanti:
Web for Wearables: Lessons learned from Google Glass. CoRR abs/1507.01677 (2015) - [i17]Ralph Holz, Johanna Amann, Olivier Mehani, Matthias Wachs, Mohamed Ali Kâafar:
TLS in the wild: an Internet-wide analysis of TLS-based protocols for electronic communication. CoRR abs/1511.00341 (2015) - [i16]Luca Melis, Hassan Jameel Asghar, Emiliano De Cristofaro, Mohamed Ali Kâafar:
Private Processing of Outsourced Network Functions: Feasibility and Constructions. IACR Cryptol. ePrint Arch. 2015: 949 (2015) - [i15]Hassan Jameel Asghar, Mohamed Ali Kâafar:
When are Identification Protocols with Sparse Challenges Safe? The Case of the Coskun and Herley Attack. IACR Cryptol. ePrint Arch. 2015: 1231 (2015) - 2014
- [j6]Mathieu Cunche, Mohamed Ali Kâafar, Roksana Boreli:
Linking wireless devices using information contained in Wi-Fi probe requests. Pervasive Mob. Comput. 11: 56-69 (2014) - [c60]Jagmohan Chauhan, Anirban Mahanti, Mohamed Ali Kâafar:
Towards the Era of Wearable Computing? CoNEXT Student Workshop 2014: 24-25 - [c59]Muhammad Ikram, Hassan Asghar, Mohamed Ali Kâafar, Anirban Mahanti:
On the Intrusiveness of JavaScript on the Web. CoNEXT Student Workshop 2014: 31-33 - [c58]Yi Sun, Seyed Kaveh Fayaz, Yang Guo, Vyas Sekar, Yun Jin, Mohamed Ali Kâafar, Steve Uhlig:
Trace-Driven Analysis of ICN Caching Algorithms on Video-on-Demand Workloads. CoNEXT 2014: 363-376 - [c57]Mathieu Cunche, Mohamed Ali Kâafar, Roksana Boreli:
Asynchronous Covert Communication Using BitTorrent Trackers. HPCC/CSS/ICESS 2014: 827-830 - [c56]Wei Wang, Yi Sun, Yang Guo, Dali Kaafar, Jiong Jin, Jun Li, Zhongcheng Li:
CRCache: Exploiting the correlation between content popularity and network topology information for ICN caching. ICC 2014: 3191-3196 - [c55]Wei Wang, Yi Sun, Kai Zheng, Mohamed Ali Kâafar, Dan Li, Zhongcheng Li:
Freeway: Adaptively Isolating the Elephant and Mice Flows on Different Transmission Paths. ICNP 2014: 362-367 - [c54]Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, Muhammad Zubair Shafiq:
Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots. Internet Measurement Conference 2014: 129-136 - [c53]Chaabane Abdelberi, Terence Chen, Mathieu Cunche, Emiliano De Cristofaro, Arik Friedman, Mohamed Ali Kâafar:
Censorship in the Wild: Analyzing Internet Filtering in Syria. Internet Measurement Conference 2014: 285-298 - [c52]Zhenyu Li, Gaogang Xie, Jiali Lin, Yun Jin, Mohamed Ali Kâafar, Kavé Salamatian:
On the geographic patterns of a large-scale mobile video-on-demand system. INFOCOM 2014: 397-405 - [c51]Imdad Ullah, Roksana Boreli, Mohamed Ali Kâafar, Salil S. Kanhere:
Characterising user targeting for in-App Mobile Ads. INFOCOM Workshops 2014: 547-552 - [c50]Amit Tiroshi, Shlomo Berkovsky, Mohamed Ali Kâafar, David Vallet, Terence Chen, Tsvi Kuflik:
Improving business rating predictions using graph based features. IUI 2014: 17-26 - [c49]Kanchana Thilakarathna, Fangzhou Jiang, Sirine Mrabet, Mohamed Ali Kâafar, Aruna Seneviratne, Prasant Mohapatra:
Demo: Crowd-cache - popular content for free. MobiSys 2014: 358-359 - [c48]Chaabane Abdelberi, Yuan Ding, Ratan Dey, Mohamed Ali Kâafar, Keith W. Ross:
A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information? PAM 2014: 235-246 - [c47]Terence Chen, Roksana Boreli, Mohamed Ali Kâafar, Arik Friedman:
On the Effectiveness of Obfuscation Techniques in Online Social Networks. Privacy Enhancing Technologies 2014: 42-62 - [c46]Amit Tiroshi, Shlomo Berkovsky, Mohamed Ali Kâafar, David Vallet, Tsvi Kuflik:
Graph-Based Recommendations: Make the Most Out of Social Data. UMAP 2014: 447-458 - [c45]Terence Chen, Imdad Ullah, Mohamed Ali Kâafar, Roksana Boreli:
Information leakage through mobile analytics services. HotMobile 2014: 15:1-15:6 - [c44]Mishari Al Mishari, Dali Kaafar, Ekin Oguz, Gene Tsudik:
Stylometric Linkability of Tweets. WPES 2014: 205-208 - [e1]Ersin Uzun, Mohamed Ali Kâafar:
Proceedings of the ACM MobiCom Workshop on Security and Privacy in Mobile Environments, SPME@MobiCom 2014, Maui, Hawaii, USA, September 11, 2014. ACM 2014, ISBN 978-1-4503-3075-6 [contents] - [i14]Chaabane Abdelberi, Mathieu Cunche, Terence Chen, Arik Friedman, Emiliano De Cristofaro, Mohamed Ali Kâafar:
Censorship in the Wild: Analyzing Web Filtering in Syria. CoRR abs/1402.3401 (2014) - [i13]Mishari Al Mishari, Dali Kaafar, Gene Tsudik, Ekin Oguz:
Are 140 Characters Enough? A Large-Scale Linkability Study of Tweets. CoRR abs/1406.2746 (2014) - [i12]Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, M. Zubair Shafiq:
Paying for Likes? Understanding Facebook Like Fraud Using Honeypots. CoRR abs/1409.2097 (2014) - [i11]Jagmohan Chauhan, Hassan Jameel Asghar, Mohamed Ali Kâafar, Anirban Mahanti:
Gesture-based Continuous Authentication for Wearable Devices: the Google Glass Case. CoRR abs/1412.2855 (2014) - [i10]Hassan Jameel Asghar, Ron Steinfeld, Shujun Li, Dali Kaafar, Josef Pieprzyk:
Algebraic Attacks on Human Identification Protocols. IACR Cryptol. ePrint Arch. 2014: 767 (2014) - 2013
- [j5]Chaabane Abdelberi, Emiliano De Cristofaro, Mohamed Ali Kâafar, Ersin Uzun:
Privacy in content-oriented networking: threats and countermeasures. Comput. Commun. Rev. 43(3): 25-33 (2013) - [j4]Mohamed Ali Kâafar, Shlomo Berkovsky, Benoit Donnet:
On the potential of recommendation technologies for efficient content delivery networks. Comput. Commun. Rev. 43(3): 74-77 (2013) - [c43]Aruna Seneviratne, Kanchana Thilakarathna, Suranga Seneviratne, Mohamed Ali Kâafar, Prasant Mohapatra:
Reconciling bitter rivals: Towards privacy-aware and bandwidth efficient mobile Ads delivery networks. COMSNETS 2013: 1-10 - [c42]Asma Hamed, Hella Kaffel-Ben Ayed, Mohamed Ali Kâafar, Ahmed Kharraz:
Evaluation of third party tracking on the web. ICITST 2013: 471-477 - [c41]Terence Chen, Mohamed Ali Kâafar, Roksana Boreli:
The Where and When of Finding New Friends: Analysis of a Location-based Social Discovery Network. ICWSM 2013 - [c40]Dong Wang, Hosung Park, Gaogang Xie, Sue B. Moon, Mohamed Ali Kâafar, Kavé Salamatian:
A genealogy of information spreading on microblogs: A Galton-Watson-based explicative model. INFOCOM 2013: 2391-2399 - [c39]Yonggong Wang, Gaogang Xie, Mohamed Ali Kâafar, Steve Uhlig:
LMD: A local minimum driven and self-organized method to obtain locators. ISCC 2013: 759-764 - [c38]Guillaume Smith, Roksana Boreli, Mohamed Ali Kâafar:
A Layered Secret Sharing Scheme for Automated Profile Sharing in OSN Groups. MobiQuitous 2013: 487-499 - [c37]Terence Chen, Chaabane Abdelberi, Pierre-Ugo Tournoux, Mohamed Ali Kâafar, Roksana Boreli:
How Much Is Too Much? Leveraging Ads Audience Estimation to Evaluate Public Profile Uniqueness. Privacy Enhancing Technologies 2013: 225-244 - [c36]Tobias Lauinger, Kaan Onarlioglu, Chaabane Abdelberi, Engin Kirda, William K. Robertson, Mohamed Ali Kâafar:
Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters. RAID 2013: 369-389 - [c35]Amit Tiroshi, Shlomo Berkovsky, Mohamed Ali Kâafar, Terence Chen, Tsvi Kuflik:
Cross social networks interests predictions based ongraph features. RecSys 2013: 319-322 - [c34]Golam Sarwar, Olivier Mehani, Roksana Boreli, Mohamed Ali Kâafar:
On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices. SECRYPT 2013: 461-468 - [i9]Mathieu Cunche, Mohamed Ali Kâafar, Roksana Boreli:
Revealing Social Links Between Owners of Wi-Fi Enabled Smartphones. ERCIM News 2013(93) (2013) - 2012
- [j3]Benoit Donnet, Bamba Gueye, Mohamed Ali Kâafar:
Path similarity evaluation using Bloom filters. Comput. Networks 56(2): 858-869 (2012) - [c33]Ludovic Jacquin, Vincent Roca, Mohamed Ali Kâafar, Fabrice Schuler, Jean-Louis Roch:
IBTrack: An ICMP black holes tracker. GLOBECOM 2012: 2827-2833 - [c32]Zhenyu Li, Jiali Lin, Marc-Ismaël Akodjènou, Gaogang Xie, Mohamed Ali Kâafar, Yun Jin, Gang Peng:
Watching videos from everywhere: a study of the PPTV mobile VoD system. Internet Measurement Conference 2012: 185-198 - [c31]Yonggong Wang, Gaogang Xie, Mohamed Ali Kâafar:
FPC: A self-organized greedy routing in scale-free networks. ISCC 2012: 102-107 - [c30]Ningning Cheng, Prasant Mohapatra, Mathieu Cunche, Mohamed Ali Kâafar, Roksana Boreli, Srikanth V. Krishnamurthy:
Inferring user relationship from hidden information in WLANs. MILCOM 2012: 1-6 - [c29]Chaabane Abdelberi, Gergely Ács, Mohamed Ali Kâafar:
You are what you like! Information leakage through users' Interests. NDSS 2012 - [c28]Claude Castelluccia, Mohamed Ali Kâafar, Minh-Dung Tran:
Betrayed by Your Ads! - Reconstructing User Profiles from Targeted Ads. Privacy Enhancing Technologies 2012: 1-17 - [c27]Chaabane Abdelberi, Mohamed Ali Kâafar, Roksana Boreli:
Big friend is watching you: analyzing online social networks tracking capabilities. WOSN 2012: 7-12 - [c26]Terence Chen, Mohamed Ali Kâafar, Arik Friedman, Roksana Boreli:
Is more always merrier?: a deep dive into online social footprints. WOSN 2012: 67-72 - [c25]Mathieu Cunche, Mohamed Ali Kâafar, Roksana Boreli:
I know who you will meet this evening! Linking wireless devices using Wi-Fi probe requests. WOWMOM 2012: 1-9 - [i8]Chaabane Abdelberi, Emiliano De Cristofaro, Mohamed Ali Kâafar, Ersin Uzun:
Privacy in Content-Oriented Networking: Threats and Countermeasures. CoRR abs/1211.5183 (2012) - 2011
- [j2]Ingmar Poese, Steve Uhlig, Mohamed Ali Kâafar, Benoit Donnet, Bamba Gueye:
IP geolocation databases: unreliable? Comput. Commun. Rev. 41(2): 53-56 (2011) - [c24]Claude Castelluccia, Emiliano De Cristofaro, Aurélien Francillon, Mohamed Ali Kâafar:
EphPub: Toward robust Ephemeral Publishing. ICNP 2011: 165-175 - [c23]Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Kâafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous:
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. LEET 2011 - [c22]Daniele Perito, Claude Castelluccia, Mohamed Ali Kâafar, Pere Manils:
How Unique and Traceable Are Usernames? PETS 2011: 1-17 - [i7]Daniele Perito, Claude Castelluccia, Mohamed Ali Kâafar, Pere Manils:
How Unique and Traceable are Usernames? CoRR abs/1101.5578 (2011) - [i6]Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Kâafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous:
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. CoRR abs/1103.1518 (2011) - 2010
- [j1]Benoit Donnet, Bamba Gueye, Mohamed Ali Kâafar:
A Survey on Network Coordinates Systems, Design, and Security. IEEE Commun. Surv. Tutorials 12(4): 488-503 (2010) - [c21]Stevens Le Blond, Arnaud Legout, Fabrice Le Fessant, Walid Dabbous, Mohamed Ali Kâafar:
Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrent. LEET 2010 - [c20]Chaabane Abdelberi, Pere Manils, Mohamed Ali Kâafar:
Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network. NSS 2010: 167-174 - [c19]Chérifa Boucetta, Mohamed Ali Kâafar, Marine Minier:
How Secure are Secure Localization Protocols in WSNs? S-CUBE 2010: 164-178 - [c18]Mohamed Ali Kâafar, Pere Manils:
Why spammers should thank Google? SNS 2010: 4 - [i5]Stevens Le Blond, Arnaud Legout, Fabrice Le Fessant, Walid Dabbous, Mohamed Ali Kâafar:
Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent. CoRR abs/1004.0930 (2010) - [i4]Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Kâafar, Arnaud Legout, Claude Castelluccia, Walid Dabbous:
De-anonymizing BitTorrent Users on Tor. CoRR abs/1004.1267 (2010) - [i3]Pere Manils, Chaabane Abdelberi, Stevens Le Blond, Mohamed Ali Kâafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous:
Compromising Tor Anonymity Exploiting P2P Information Leakage. CoRR abs/1004.1461 (2010)
2000 – 2009
- 2009
- [c17]Mohamed Ali Kâafar, Laurent Mathy, Chadi Barakat, Kavé Salamatian, Thierry Turletti, Walid Dabbous:
Certified Internet Coordinates. ICCCN 2009: 1-8 - [c16]Claude Castelluccia, Mohamed Ali Kâafar, Pere Manils, Daniele Perito:
Geolocalization of proxied services and its application to fast-flux hidden servers. Internet Measurement Conference 2009: 184-189 - [c15]Yongjun Liao, Mohamed Ali Kâafar, Bamba Gueye, François Cantin, Pierre Geurts, Guy Leduc:
Detecting Triangle Inequality Violations in Internet Coordinate Systems by Supervised Learning. Networking 2009: 352-363 - [c14]Claude Castelluccia, Mohamed Ali Kâafar:
Owner-Centric Networking (OCN): Toward a Data Pollution-Free Internet. SAINT 2009: 169-172 - [i2]Claude Castelluccia, Mohamed Ali Kâafar:
Owner-Centric Networking: A New Architecture for a Pollution-Free Internet. ERCIM News 2009(77) (2009) - 2008
- [c13]François Cantin, Bamba Gueye, Dali Kaafar, Guy Leduc:
Overlay routing using coordinate systems. CoNEXT 2008: 42 - [c12]François Cantin, Bamba Gueye, Mohamed Ali Kâafar, Guy Leduc:
A Self-Organized Clustering Scheme for Overlay Networks. IWSOS 2008: 59-70 - [c11]Mohamed Ali Kâafar, Bamba Gueye, François Cantin, Guy Leduc, Laurent Mathy:
Towards a Two-Tier Internet Coordinate System to Mitigate the Impact of Triangle Inequality Violations. Networking 2008: 397-408 - 2007
- [b1]Mohamed Ali Kâafar:
Securiting Internet coordinates systems. (La sécurité des systèmes de coordonnées Internet). University of Nice Sophia Antipolis, France, 2007 - [c10]Mohamed Ali Kâafar, Laurent Mathy, Kavé Salamatian, Chadi Barakat, Thierry Turletti, Walid Dabbous:
Securing Internet Coordinate Systems. AINTEC 2007: 167-168 - [c9]Mohamed Ali Kâafar, Laurent Mathy, Chadi Barakat, Kavé Salamatian, Thierry Turletti, Walid Dabbous:
Securing internet coordinate embedding systems. SIGCOMM 2007: 61-72 - 2006
- [c8]Mohamed Ali Kâafar, Cyrine Mrabet, Thierry Turletti:
A Topology-Aware Overlay Multicast Approach for Mobile Ad-Hoc Networks. AINTEC 2006: 31-47 - [c7]Mohamed Ali Kâafar, Laurent Mathy, Thierry Turletti, Walid Dabbous:
Virtual networks under attack: disrupting internet coordinate systems. CoNEXT 2006: 12 - [c6]Cyrine Mrabet, Mohamed Ali Kâafar, Farouk Kamoun:
Wireless alternative best effort service: a case study of ALM. CoNEXT 2006: 31 - [c5]Mohamed Ali Kâafar, Thierry Turletti, Walid Dabbous:
A Locating-First Approach for Scalable Overlay Multicast. INFOCOM 2006 - [c4]Mohamed Ali Kâafar, Thierry Turletti, Walid Dabbous:
A Locating-First Approach for Scalable Overlay Multicast. IWQoS 2006: 2-11 - [c3]Mohamed Ali Kâafar, Laurent Mathy, Thierry Turletti, Walid Dabbous:
Real attacks on virtual networks: Vivaldi out of tune. LSAD@SIGCOMM 2006: 139-146 - [i1]Mohamed Ali Kâafar, Thierry Turletti, Walid Dabbous:
A Locating-First Approach for Scalable Overlay Multicast. CoRR abs/cs/0605080 (2006) - 2004
- [c2]Mohamed Ali Kâafar, Lamia Ben Azzouz, Farouk Kamoun:
A Kerberos-Based Authentication Architecture for WLANS - Test beds and experiments. Net-Con 2004: 43-55 - [c1]Mohamed Ali Kâafar, Lamia Ben Azzouz, Farouk Kamoun, Davor Males:
A Kerberos-Based Authentication Architecture for Wireless LANs. NETWORKING 2004: 1344-1353
Coauthor Index
aka: Chaabane Abdelberi
aka: Ian David Wood
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-17 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint