What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Mohamed Ali Kâafar
Google Scholar
ORCID:
0000-0003-2714-0276
25
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sec
Facing the Challenge of Leveraging Untrained Humans in Malware Analysis.
Benjamin Zi Hao Zhao
Hassan Jameel Asghar
Muhammad Ikram
Mohamed Ali Kâafar
Sean Lamont
Daniel Coscia
2024
conf/esorics
On the Robustness of Malware Detectors to Adversarial Samples.
Muhammad Salman
Benjamin Zi Hao Zhao
Hassan Jameel Asghar
Muhammad Ikram
Sidharth Kaushik
Mohamed Ali Kâafar
2023
journals/popets
Unintended Memorization and Timing Attacks in Named Entity Recognition Models.
Rana Salal Ali
Benjamin Zi Hao Zhao
Hassan Jameel Asghar
Tham Nguyen
Ian David Wood
Mohamed Ali Kâafar
2023
conf/acns
Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories.
Conor Atkins
Benjamin Zi Hao Zhao
Hassan Jameel Asghar
Ian D. Wood
Mohamed Ali Kâafar
2023
conf/acns
An Empirical Analysis of Security and Privacy Risks in Android Cryptocurrency Wallet Apps.
I Wayan Budi Sentana
Muhammad Ikram
Mohamed Ali Kâafar
2023
conf/asiaccs
Privacy-Preserving Record Linkage for Cardinality Counting.
Nan Wu
Dinusha Vatsalan
Mohamed Ali Kâafar
Sanath Kumar Ramesh
2022
journals/tifs
Fairness and Cost Constrained Privacy-Aware Record Linkage.
Nan Wu
Dinusha Vatsalan
Sunny Verma
Mohamed Ali Kâafar
2022
journals/tifs
A Differentially Private Framework for Deep Learning With Convexified Loss Functions.
Zhigang Lu
Hassan Jameel Asghar
Mohamed Ali Kâafar
Darren Webb
Peter Dickinson
2022
journals/popets
How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy.
Michal Kepkowski
Lucjan Hanzlik
Ian D. Wood
Mohamed Ali Kâafar
2021
journals/tifs
The Cost of Privacy in Asynchronous Differentially-Private Machine Learning.
Farhad Farokhi
Nan Wu
David B. Smith
Mohamed Ali Kâafar
2021
conf/eurosp
On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models.
Benjamin Zi Hao Zhao
Aviral Agrawal
Catisha Coburn
Hassan Jameel Asghar
Raghav Bhaskar
Mohamed Ali Kâafar
Darren Webb
Peter Dickinson
2020
journals/popets
Not All Attributes are Created Equal: dX -Private Mechanisms for Linear Queries.
Parameswaran Kamalaruban
Victor Perrier
Hassan Jameel Asghar
Mohamed Ali Kâafar
2020
conf/sp
The Value of Collaboration in Convex Machine Learning with Differential Privacy.
Nan Wu
Farhad Farokhi
David B. Smith
Mohamed Ali Kâafar
2020
conf/ccsw-ws
Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning.
Benjamin Zi Hao Zhao
Mohamed Ali Kâafar
Nicolas Kourtellis
2020
conf/ndss
On the Resilience of Biometric Authentication Systems against Random Inputs.
Benjamin Zi Hao Zhao
Hassan Jameel Asghar
Mohamed Ali Kâafar
2019
conf/ccs
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists.
Benjamin Zi Hao Zhao
Muhammad Ikram
Hassan Jameel Asghar
Mohamed Ali Kâafar
Abdelberi Chaabane
Kanchana Thilakarathna
2018
journals/popets
Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking.
Rahat Masood
Benjamin Zi Hao Zhao
Hassan Jameel Asghar
Mohamed Ali Kâafar
2017
journals/popets
Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning.
Muhammad Ikram
Hassan Jameel Asghar
Mohamed Ali Kâafar
Anirban Mahanti
Balachander Krishnamurthy
2017
conf/ccs
WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks.
Arash Shaghaghi
Mohamed Ali Kâafar
Sanjay Jha
2017
conf/ccs
POSTER: TouchTrack: How Unique are your Touch Gestures?
Rahat Masood
Benjamin Zi Hao Zhao
Hassan Jameel Asghar
Mohamed Ali Kâafar
2017
conf/fc
BehavioCog: An Observation Resistant Authentication Scheme.
Jagmohan Chauhan
Benjamin Zi Hao Zhao
Hassan Jameel Asghar
Jonathan Chan
Mohamed Ali Kâafar
2016
conf/acns
Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case.
Jagmohan Chauhan
Hassan Jameel Asghar
Anirban Mahanti
Mohamed Ali Kâafar
2016
conf/ndss
TLS in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication.
Ralph Holz
Johanna Amann
Olivier Mehani
Mohamed Ali Kâafar
Matthias Wachs
2015
journals/tifs
On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices.
Hassan Jameel Asghar
Ron Steinfeld
Shujun Li
Mohamed Ali Kâafar
Josef Pieprzyk
2012
conf/ndss
You are what you like! Information leakage through users' Interests.
Chaabane Abdelberi
Gergely Ács
Mohamed Ali Kâafar
Coauthors
Abdelberi Chaabane
(1)
Anirban Mahanti
(2)
Arash Shaghaghi
(1)
Aviral Agrawal
(1)
Balachander Krishnamurthy
(1)
Benjamin Zi Hao Zhao
(11)
Catisha Coburn
(1)
Chaabane Abdelberi
(1)
Conor Atkins
(1)
Daniel Coscia
(1)
Darren Webb
(2)
David B. Smith
(2)
Dinusha Vatsalan
(2)
Farhad Farokhi
(2)
Gergely Ács
(1)
Hassan Jameel Asghar
(15)
I Wayan Budi Sentana
(1)
Ian D. Wood
(2)
Ian David Wood
(1)
Jagmohan Chauhan
(2)
Johanna Amann
(1)
Jonathan Chan
(1)
Josef Pieprzyk
(1)
Kanchana Thilakarathna
(1)
Lucjan Hanzlik
(1)
Matthias Wachs
(1)
Michal Kepkowski
(1)
Mohamed Ali Kâafar
(25)
Muhammad Ikram
(5)
Muhammad Salman
(1)
Nan Wu
(4)
Nicolas Kourtellis
(1)
Olivier Mehani
(1)
Parameswaran Kamalaruban
(1)
Peter Dickinson
(2)
Raghav Bhaskar
(1)
Rahat Masood
(2)
Ralph Holz
(1)
Rana Salal Ali
(1)
Ron Steinfeld
(1)
Sanath Kumar Ramesh
(1)
Sanjay Jha
(1)
Sean Lamont
(1)
Shujun Li
(1)
Sidharth Kaushik
(1)
Sunny Verma
(1)
Tham Nguyen
(1)
Victor Perrier
(1)
Zhigang Lu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to