Amirali Salehi-Abari

Orcid: 0000-0001-8053-7710

According to our database1, Amirali Salehi-Abari authored at least 48 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Simplifying Subgraph Representation Learning for Scalable Link Prediction.
CoRR, 2023

Dissecting Nudges in Password Managers: Simple Defaults are Powerful.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

PiXi: Password Inspiration by Exploring Information.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Stochastic Subgraph Neighborhood Pooling for Subgraph Classification.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

2022
Password guessers under a microscope: an in-depth analysis to inform deployments.
Int. J. Inf. Sec., 2022

Do Password Managers Nudge Secure (Random) Passwords?
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Improving Peer Assessment with Graph Neural Networks.
Proceedings of the 15th International Conference on Educational Data Mining, 2022

Sampling Enclosing Subgraphs for Link Prediction.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

2021
A study on priming methods for graphical passwords.
J. Inf. Secur. Appl., 2021

Improving Peer Assessment with Graph Convolutional Networks.
CoRR, 2021

DeepGroup: Representation Learning for Group Recommendation with Implicit Feedback.
CoRR, 2021

Distilling Knowledge via Intermediate Classifier Heads.
CoRR, 2021

Group recommendation with noisy subjective preferences.
Comput. Intell., 2021

Variational Autoencoders for Top-K Recommendation with Implicit Feedback.
Proceedings of the SIGIR '21: The 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2021

Long Passphrases: Potentials and Limits.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

DeepGroup: Group Recommendation with Implicit Feedback.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

2020
Joint Variational Autoencoders for Recommendation with Implicit Feedback.
CoRR, 2020

2019
On Conceptually Simple Algorithms for Variants of Online Bipartite Matching.
Theory Comput. Syst., 2019

Empathetic decision making in social networks.
Artif. Intell., 2019

Geographic Hints for Passphrase Authentication.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Geographical Security Questions for Fallback Authentication.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Towards models for quantifying the known adversary.
Proceedings of the NSPW '19: New Security Paradigms Workshop, 2019

2018
A Simple PTAS for the Dual Bin Packing Problem and Advice Complexity of Its Online Version.
Proceedings of the 1st Symposium on Simplicity in Algorithms, 2018

Boundedly Rational Voters in Large(r) Networks.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

2017
Group Decision Making and Preference Learning on Social Networks.
PhD thesis, 2017

2016
An Exploration of Geographic Authentication Schemes.
IEEE Trans. Inf. Forensics Secur., 2016

2015
Preference-oriented Social Networks: Group Recommendation and Inference.
Proceedings of the 9th ACM Conference on Recommender Systems, 2015

2014
The presentation effect on graphical passwords.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

Empathetic social choice on social networks.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

2013
Usability and security evaluation of GeoPass: a geographic location-password scheme.
Proceedings of the Symposium On Usable Privacy and Security, 2013

2012
Dart: a Distributed Analysis of Reputation and Trust Framework.
Comput. Intell., 2012

Video-passwords: advertising while authenticating.
Proceedings of the New Security Paradigms Workshop, 2012

2010
Purely automated attacks on passpoints-style graphical passwords.
IEEE Trans. Inf. Forensics Secur., 2010

Media Monitoring Using Social Networks.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

The relationship of trust, demand, and utility: Be more trustworthy, then i will buy more.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

On How Ants Put Advertisements on the Web.
Proceedings of the Trends in Applied Intelligent Systems, 2010

Trust Models and Con-Man Agents: From Mathematical to Empirical Analysis.
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010

2009
On the Impact of Witness-Based Collusion in Agent Societies.
Proceedings of the Principles of Practice in Multi-Agent Systems, 2009

The Impact of Naive Agents in Heterogeneous Trust-Aware Societies.
Proceedings of the Multi-Agent-Based Simulation X, International Workshop, 2009

An Adaptive Swarm-based Algorithm for Resource Allocation in Dynamic Environments.
Proceedings of the IJCCI 2009, 2009

The Uphill Battle of Ant Programming Vs. Genetic Programming.
Proceedings of the IJCCI 2009, 2009

Towards Con-Resistant Trust Models for Distributed Agent Systems.
Proceedings of the IJCAI 2009, 2009

Witness-Based Collusion and Trust-Aware Societies.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Using relational concept knowledge to improve search in referral networks.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

2008
On the importance of relational concept knowledge in referral networks.
Artif. Intell. Rev., 2008

A swarm-based crossover operator for genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

Enhanced generalized ant programming (EGAP).
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

On Purely Automated Attacks and Click-Based Graphical Passwords.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008


  Loading...