Akash Shah
Orcid: 0000-0002-2159-4114
According to our database1,
Akash Shah
authored at least 19 papers
between 2013 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Threats on online social network platforms: classification, detection, and prevention techniques.
Multim. Tools Appl., May, 2025
Evolutionary Strategies Enable Systematic and Reliable Uncertainty Quantification: A Proof-of-Concept Pilot Study on Resting-State Functional MRI Language Lateralization.
J. Imaging Inform. Medicine, 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
2024
Detection of Fake Profiles on Online Social Network Platforms: Performance Evaluation of Artificial Intelligence Techniques.
SN Comput. Sci., June, 2024
DeepMUI: A novel method to identify malicious users on online social network platforms.
Concurr. Comput. Pract. Exp., 2024
2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
2019
Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions.
IACR Cryptol. ePrint Arch., 2019
2013
Proceedings of the 2nd ACM international workshop on Crowdsourcing for multimedia, 2013