Mohamed Ali Kâafar
Orcid: 0000-0003-2714-0276Affiliations:
- Macquarie University, Faculty of Science and Engineering, Australia
- CSIRO Data61, Sydney, Australia
- NICTA, Australia
According to our database1,
Mohamed Ali Kâafar
authored at least 214 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on nicta.com.au
On csauthors.net:
Bibliography
2024
SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation.
IEEE Trans. Inf. Forensics Secur., 2024
CoRR, 2024
Investigating Evasive Techniques in SMS Spam Filtering: A Comparative Analysis of Machine Learning Models.
IEEE Access, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Local Differentially Private Fuzzy Counting in Stream Data Using Probabilistic Data Structures.
IEEE Trans. Knowl. Data Eng., August, 2023
Proc. Priv. Enhancing Technol., April, 2023
IEEE Pervasive Comput., 2023
An analysis of scam baiting calls: Identifying and extracting scam stages and scripts.
CoRR, 2023
Proceedings of the 15th ACM Web Science Conference 2023, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the IEEE Secure Development Conference, 2023
Proceedings of the IEEE International Conference on Knowledge Graph, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
An Empirical Analysis of Security and Privacy Risks in Android Cryptocurrency Wallet Apps.
Proceedings of the Applied Cryptography and Network Security, 2023
Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories.
Proceedings of the Applied Cryptography and Network Security, 2023
2022
Do Auto-Regressive Models Protect Privacy? Inferring Fine-Grained Energy Consumption From Aggregated Model Parameters.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Inf. Forensics Secur., 2022
A Differentially Private Framework for Deep Learning With Convexified Loss Functions.
IEEE Trans. Inf. Forensics Secur., 2022
DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain.
IEEE Trans. Dependable Secur. Comput., 2022
Proc. Priv. Enhancing Technol., 2022
Local Differentially Private Fuzzy Counting in Stream Data using Probabilistic Data Structure.
CoRR, 2022
CoRR, 2022
Proceedings of the Network and System Security - 16th International Conference, 2022
Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation Framework.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services.
Proc. Priv. Enhancing Technol., 2021
J. Am. Medical Informatics Assoc., 2021
Empirical Security and Privacy Analysis of Mobile Symptom Checking Applications on Google Play.
CoRR, 2021
Sharing in a Trustless World: Privacy-Preserving Data Analytics with Potentially Cheating Participants.
CoRR, 2021
All Infections are Not Created Equal: Time-Sensitive Prediction of Malware Generated Network Attacks.
CoRR, 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Empirical Security and Privacy Analysis of Mobile Symptom Checking Apps on Google Play.
Proceedings of the 18th International Conference on Security and Cryptography, 2021
BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-domain Routing via Blockchain.
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics.
Proceedings of the E-Business and Telecommunications - 18th International Conference, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
2020
P4Mobi: A Probabilistic Privacy-Preserving Framework for Publishing Mobility Datasets.
IEEE Trans. Veh. Technol., 2020
Exploiting Behavioral Side Channels in Observation Resilient Cognitive Authentication Schemes.
ACM Trans. Priv. Secur., 2020
Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading.
ACM Trans. Priv. Secur., 2020
Proc. Priv. Enhancing Technol., 2020
Proc. Priv. Enhancing Technol., 2020
J. Priv. Confidentiality, 2020
Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices.
IACR Cryptol. ePrint Arch., 2020
CoRR, 2020
CoRR, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the 30th International Telecommunication Networks and Applications Conference, 2020
Who Let the<i>DOGS</i>Out: Anonymous but Auditable Communications Using Group Signature Schemes with Distributed Opening.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020
Proceedings of the CoNEXT'20: Proceedings of the Student Workshop, Barcelona, 2020
Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning.
Proceedings of the CCSW'20, 2020
Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future Directions.
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020
2019
The Impact of Adverse Weather Conditions on Autonomous Vehicles: How Rain, Snow, Fog, and Hail Affect the Performance of a Self-Driving Car.
IEEE Veh. Technol. Mag., 2019
uStash: A Novel Mobile Content Delivery System for Improving User QoE in Public Transport.
IEEE Trans. Mob. Comput., 2019
Optimized deployment of drone base station to improve user experience in cellular networks.
J. Netw. Comput. Appl., 2019
CoRR, 2019
Differentially Private Release of High-Dimensional Datasets using the Gaussian Copula.
CoRR, 2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), 2019
DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
IEEE Trans. Circuits Syst. Video Technol., 2018
Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking.
Proc. Priv. Enhancing Technol., 2018
IEEE Netw., 2018
IEEE Internet Comput., 2018
A Geometric Approach for Real-time Monitoring of Dynamic Large Scale Graphs: AS-level graphs illustrated.
CoRR, 2018
Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions.
CoRR, 2018
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018
2017
ACM Trans. Web, 2017
ACM Trans. Priv. Secur., 2017
Characterizing and Modeling User Behavior in a Large-Scale Mobile Live Streaming System.
IEEE Trans. Circuits Syst. Video Technol., 2017
Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning.
Proc. Priv. Enhancing Technol., 2017
When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack.
J. Math. Cryptol., 2017
Optimized Deployment of Autonomous Drones to Improve User Experience in Cellular Networks.
CoRR, 2017
WedgeTail 2.0: An Intrusion Prevention System for the Data Plane of Software Defined Networks.
CoRR, 2017
Graph Based Recommendations: From Data Representation to Feature Extraction and Application.
CoRR, 2017
More Flexible Differential Privacy: The Application of Piecewise Mixture Distributions in Query Release.
CoRR, 2017
CoRR, 2017
Comput. Commun., 2017
Crowd-Cache: Leveraging on spatio-temporal correlation in content popularity for mobile networking in proximity.
Comput. Commun., 2017
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017
Early detection of in-the-wild botnet attacks by exploiting network communication uniformity: An empirical study.
Proceedings of the 2017 IFIP Networking Conference, 2017
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017
Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017
WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
User Model. User Adapt. Interact., 2016
IEEE J. Sel. Areas Commun., 2016
Proceedings of the ACM SIGCOMM Workshop on Hot topics in Middleboxes and Network Function Virtualization, 2016
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016
Proceedings of the 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016
TLS in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
The Early Bird Gets the Botnet: A Markov Chain Based Early Warning System for Botnet Attacks.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
Adwords management for third-parties in SEM: An optimisation model and the potential of Twitter.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016
An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016
Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case.
Proceedings of the Applied Cryptography and Network Security, 2016
2015
On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices.
IEEE Trans. Inf. Forensics Secur., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 24th International Conference on World Wide Web, 2015
Proceedings of the 24th International Conference on World Wide Web Companion, 2015
Poster: Toward Efficient and Secure Code Dissemination Protocol for the Internet of Things.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015
Proceedings of the 9th ACM Conference on Recommender Systems, 2015
A Spatio-Temporal Analysis of Mobile Internet Traffic in Public Transportation Systems: A View of Web Browsing from The Bus.
Proceedings of the 10th ACM MobiCom Workshop on Challenged Networks, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015
2014
Pervasive Mob. Comput., 2014
IACR Cryptol. ePrint Arch., 2014
CoRR, 2014
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, 2014
Proceedings of the User Modeling, Adaptation, and Personalization, 2014
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014
A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information?
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014
Proceedings of the 19th International Conference on Intelligent User Interfaces, 2014
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the 2014 Internet Measurement Conference, 2014
Proceedings of the 2014 Internet Measurement Conference, 2014
Freeway: Adaptively Isolating the Elephant and Mice Flows on Different Transmission Paths.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014
CRCache: Exploiting the correlation between content popularity and network topology information for ICN caching.
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014
Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, 2014
Proceedings of the 2014 CoNEXT on Student Workshop, 2014
Proceedings of the 2014 CoNEXT on Student Workshop, 2014
2013
On the potential of recommendation technologies for efficient content delivery networks.
Comput. Commun. Rev., 2013
Comput. Commun. Rev., 2013
On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices.
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Seventh ACM Conference on Recommender Systems, 2013
Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
How Much Is Too Much? Leveraging Ads Audience Estimation to Evaluate Public Profile Uniqueness.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013
A genealogy of information spreading on microblogs: A Galton-Watson-based explicative model.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
The Where and When of Finding New Friends: Analysis of a Location-based Social Discovery Network.
Proceedings of the Seventh International Conference on Weblogs and Social Media, 2013
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
Reconciling bitter rivals: Towards privacy-aware and bandwidth efficient mobile Ads delivery networks.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013
2012
I know who you will meet this evening! Linking wireless devices using Wi-Fi probe requests.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012
Proceedings of the 2012 ACM workshop on Workshop on Online Social Networks, 2012
Proceedings of the 2012 ACM workshop on Workshop on Online Social Networks, 2012
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 31st IEEE Military Communications Conference, 2012
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
2011
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011
2010
IEEE Commun. Surv. Tutorials, 2010
Proceedings of the 3rd Workshop on Social Network Systems, Paris, France, April 13, 2010, 2010
Proceedings of the Sensor Systems and Software - Second International ICST Conference, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrent.
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010
2009
ERCIM News, 2009
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009
Detecting Triangle Inequality Violations in Internet Coordinate Systems by Supervised Learning.
Proceedings of the NETWORKING 2009, 2009
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009
2008
Towards a Two-Tier Internet Coordinate System to Mitigate the Impact of Triangle Inequality Violations.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008
Proceedings of the Self-Organizing Systems, Third International Workshop, 2008
Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, 2008
2007
Securiting Internet coordinates systems. (La sécurité des systèmes de coordonnées Internet).
PhD thesis, 2007
Proceedings of the ACM SIGCOMM 2007 Conference on Applications, 2007
Proceedings of the Sustainable Internet, Third Asian Internet Engineering Conference, 2007
2006
Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense, 2006
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006
Proceedings of the 2006 ACM Conference on Emerging Network Experiment and Technology, 2006
Proceedings of the 2006 ACM Conference on Emerging Network Experiment and Technology, 2006
Proceedings of the Technologies for Advanced Heterogeneous Networks II, 2006
2004
Proceedings of the NETWORKING 2004, 2004
Proceedings of the Network Control and Engineering for QoS, Security and Mobility, III, 2004