Hamed Haddadi

Orcid: 0000-0002-5895-8903

According to our database1, Hamed Haddadi authored at least 181 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
MELTing point: Mobile Evaluation of Language Transformers.
CoRR, 2024

MicroT: Low-Energy and Adaptive Models for MCUs.
CoRR, 2024

Feedback to the European Data Protection Board's Guidelines 2/2023 on Technical Scope of Art. 5(3) of ePrivacy Directive.
CoRR, 2024

The Boomerang protocol: A Decentralised Privacy-Preserving Verifiable Incentive Protocol.
CoRR, 2024

SunBlock: Cloudless Protection for IoT Systems.
Proceedings of the Passive and Active Measurement - 25th International Conference, 2024

GuaranTEE: Towards Attestable and Private ML with CCA.
Proceedings of the 4th Workshop on Machine Learning and Systems, 2024

Towards Low-Energy Adaptive Personalization for Resource-Constrained Devices.
Proceedings of the 4th Workshop on Machine Learning and Systems, 2024

2023
Federated and distributed learning applications for electronic health records and structured medical data: a scoping review.
J. Am. Medical Informatics Assoc., November, 2023

Deep learning-based risk reduction approach using novel banking parameters on a standardized dataset.
Neural Comput. Appl., October, 2023

Paralinguistic Privacy Protection at the Edge.
ACM Trans. Priv. Secur., May, 2023

Privacy-Aware Adversarial Network in Human Mobility Prediction.
Proc. Priv. Enhancing Technol., January, 2023

DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More.
IACR Cryptol. ePrint Arch., 2023

Federated Learning for Clinical Structured Data: A Benchmark Comparison of Engineering and Statistical Approaches.
CoRR, 2023

Boosting Client Selection of Federated Learning under Device and Data Heterogeneity.
CoRR, 2023

A Study on the Reliability of Automatic Dysarthric Speech Assessments.
CoRR, 2023

Evaluating The Robustness of Self-Supervised Representations to Background/Foreground Removal.
CoRR, 2023

Towards Machine Learning and Inference for Resource-constrained MCUs.
CoRR, 2023

Survey of Federated Learning Models for Spatial-Temporal Mobility Applications.
CoRR, 2023

Information Theory Inspired Pattern Analysis for Time-series Data.
CoRR, 2023

Pool-Party: Exploiting Browser Resource Pools for Web Tracking.
Proceedings of the 32nd USENIX Security Symposium, 2023

Detecting IP-tracking proof interfaces by looking for NATs.
Proceedings of the 7th Network Traffic Measurement and Analysis Conference, 2023

Protected or Porous: A Comparative Analysis of Threat Detection Capability of IoT Safeguards.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Poster: Towards Battery-Free Machine Learning Inference and Model Personalization on MCUs.
Proceedings of the 21st Annual International Conference on Mobile Systems, 2023

Effective Abnormal Activity Detection on Multivariate Time Series Healthcare Data.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

PRISM: Privacy Preserving Healthcare Internet of Things Security Management.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

A First Look at the Privacy Harms of the Public Suffix List.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Understanding the Privacy Risks of Popular Search Engine Advertising Systems.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

GT-TSCH: Game-Theoretic Distributed TSCH Scheduler for Low-Power IoT Networks.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

Analysing Fairness of Privacy-Utility Mobility Models.
Proceedings of the Adjunct Proceedings of the 2023 ACM International Joint Conference on Pervasive and Ubiquitous Computing & the 2023 ACM International Symposium on Wearable Computing, 2023

2022
Blocked or Broken? Automatically Detecting When Privacy Interventions Break Websites.
Proc. Priv. Enhancing Technol., 2022

PRISM: Privacy Preserving Internet of Things Security Management.
CoRR, 2022

Tango or Square Dance? How Tightly Should we Integrate Network Functionality in Browsers?
CoRR, 2022

SoK: Machine Learning with Confidential Computing.
CoRR, 2022

FIB: A Method for Evaluation of Feature Impact Balance in Multi-Dimensional Data.
CoRR, 2022

Locally Authenticated Privacy-preserving Voice Input.
CoRR, 2022

Distributed data analytics.
CoRR, 2022

BatteryLab: A Collaborative Platform for Power Monitoring.
CoRR, 2022

Privacy-Aware Human Mobility Prediction via Adversarial Networks.
CoRR, 2022

Towards battery-free machine learning and inference in underwater environments.
Proceedings of the HotMobile '22: The 23rd International Workshop on Mobile Computing Systems and Applications, Tempe, Arizona, USA, March 9, 2022

Using Entropy Measures for Monitoring the Evolution of Activity Patterns.
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022

BatteryLab: A Collaborative Platform for Power Monitoring - https: //batterylab.dev.
Proceedings of the Passive and Active Measurement - 23rd International Conference, 2022

Re-architecting Traffic Analysis with Neural Network Interface Cards.
Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation, 2022

Multimodal Federated Learning on IoT Data.
Proceedings of the Seventh IEEE/ACM International Conference on Internet-of-Things Design and Implementation, 2022

Tango or square dance?: how tightly should we integrate network functionality in browsers?
Proceedings of the 21st ACM Workshop on Hot Topics in Networks, 2022

STAR: Secret Sharing for Private Threshold Aggregation Reporting.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
PPFL: Enhancing Privacy in Federated Learning with Confidential Computing.
GetMobile Mob. Comput. Commun., 2021

Blocking Without Breaking: Identification and Mitigation of Non-Essential IoT Traffic.
Proc. Priv. Enhancing Technol., 2021

DANA: Dimension-Adaptive Neural Architecture for Multivariate Sensor Data.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

Proof of Steak.
CoRR, 2021

Pool-Party: Exploiting Browser Resource Pools as Side-Channels for Web Tracking.
CoRR, 2021

Multimodal Federated Learning.
CoRR, 2021

A Tandem Framework Balancing Privacy and Security for Voice User Interfaces.
CoRR, 2021

Quantifying Information Leakage from Gradients.
CoRR, 2021

MoSen: Activity Modelling in Multiple-Occupancy Smart Homes.
CoRR, 2021

Online Advertising Security: Issues, Taxonomy, and Future Directions.
IEEE Commun. Surv. Tutorials, 2021

Revisiting IoT Device Identification.
Proceedings of the 5th Network Traffic Measurement and Analysis Conference, 2021

Stronger Privacy for Federated Collaborative Filtering With Implicit Feedback.
Proceedings of the RecSys '21: Fifteenth ACM Conference on Recommender Systems, Amsterdam, The Netherlands, 27 September 2021, 2021

MoSen: Sensor Network Optimization in Multiple-Occupancy Smart Homes.
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021

PPFL: privacy-preserving federated learning with trusted execution environments.
Proceedings of the MobiSys '21: The 19th Annual International Conference on Mobile Systems, Applications, and Services, Virtual Event, Wisconsin, USA, 24 June, 2021

EDGY: on-device paralinguistic privacy protection.
Proceedings of the S3@MobiCom 2021: Proceedings of the 12th ACM Wireless of the Students, 2021

Developing a Prognostic Model to Predict Mortality in Patients with Acute Bacterial Meningitis.
Proceedings of the Public Health and Informatics, 2021

Configurable Privacy-Preserving Automatic Speech Recognition.
Proceedings of the Interspeech 2021, 22nd Annual Conference of the International Speech Communication Association, Brno, Czechia, 30 August, 2021

Rapid IoT device identification at the edge.
Proceedings of the DistributedML '21: Proceedings of the 2nd ACM International Workshop on Distributed Machine Learning, 2021

Detecting consumer IoT devices through the lens of an ISP.
Proceedings of the ANRW '21: Applied Networking Research Workshop, 2021

2020
Deep Private-Feature Extraction.
IEEE Trans. Knowl. Data Eng., 2020

PrivEdge: From Local to Distributed Private Training and Prediction.
IEEE Trans. Inf. Forensics Secur., 2020

When Speakers Are All Ears: Characterizing Misactivations of IoT Smart Speakers.
Proc. Priv. Enhancing Technol., 2020

Privacy and utility preserving sensor-data transformations.
Pervasive Mob. Comput., 2020

A Hybrid Deep Learning Architecture for Privacy-Preserving Mobile Analytics.
IEEE Internet Things J., 2020

The Case for Retraining of ML Models for IoT Device Identification at the Edge.
CoRR, 2020

Semi-supervised Federated Learning for Activity Recognition.
CoRR, 2020

Layer-wise Characterization of Latent Information Leakage in Federated Learning.
CoRR, 2020

Running Neural Networks on the NIC.
CoRR, 2020

Towards Automatic Identification and Blocking of Non-Critical IoT Traffic Destinations.
CoRR, 2020

Decentralized Policy-Based Private Analytics.
CoRR, 2020

Update on ACM SIGCOMM CCR reviewing process: towards a more open review process.
Comput. Commun. Rev., 2020

Towards identifying IoT traffic anomalies on the home gateway: poster abstract.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020

DarkneTZ: towards model privacy at the edge using trusted execution environments.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020

Privacy-Preserving Bandits.
Proceedings of Machine Learning and Systems 2020, 2020

A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

Privacy-preserving activity and health monitoring on databox.
Proceedings of the 3rd International Workshop on Edge Systems, Analytics and Networking, 2020

Privacy-preserving Voice Analysis via Disentangled Representations.
Proceedings of the CCSW'20, 2020

2019
Emotionless: Privacy-Preserving Speech Analysis for Voice Assistants.
CoRR, 2019

Towards Characterizing and Limiting Information Exposure in DNN Layers.
CoRR, 2019

Modeling and Forecasting Art Movements with CGANs.
CoRR, 2019

Deep Learning in Mobile and Wireless Networking: A Survey.
IEEE Commun. Surv. Tutorials, 2019

BatteryLab, a distributed power monitoring platform for mobile devices: demo abstract.
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019

"Sensing" the IoT network: Ethical capture of domestic IoT network traffic: poster abstract.
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019

Finding Dory in the Crowd: Detecting Social Interactions using Multi-Modal Mobile Sensing.
Proceedings of the 1st Workshop on Machine Learning on Edge in Sensor Systems, 2019

Privacy preserving speech analysis using emotion filtering at the edge: poster abstract.
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019

Emotion Filtering at the Edge.
Proceedings of the 1st Workshop on Machine Learning on Edge in Sensor Systems, 2019

Zest: REST over ZeroMQ.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Privacy Against Brute-Force Inference Attacks.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Mobile sensor data anonymization.
Proceedings of the International Conference on Internet of Things Design and Implementation, 2019

Information Exposure From Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach.
Proceedings of the Internet Measurement Conference, 2019

Activity prediction for improving well-being of both the elderly and caregivers.
Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019

Towards automating smart homes: contextual and temporal dynamics of activity prediction.
Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019

Activity prediction for mapping contextual-temporal dynamics.
Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019

BatteryLab, A Distributed Power Monitoring Platform For Mobile Devices.
Proceedings of the 18th ACM Workshop on Hot Topics in Networks, 2019

Poster: Towards Characterizing and Limiting Information Exposure in DNN Layers.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Special theme on privacy and the Internet of things.
Pers. Ubiquitous Comput., 2018

Building accountability into the Internet of Things: the IoT Databox model.
J. Reliab. Intell. Environ., 2018

An Analysis of Home IoT Network Traffic and Behaviour.
CoRR, 2018

Private and Scalable Personal Data Analytics Using Hybrid Edge-to-Cloud Deep Learning.
Computer, 2018

Providing Occupancy as a Service with Databox.
Proceedings of the 1st ACM International Workshop on Smart Cities and Fog Computing, 2018

The potential of wearable technology for monitoring social interactions based on interpersonal synchrony.
Proceedings of the 4th ACM Workshop on Wearable Systems and Applications, 2018

Privacy-Preserving Personal Model Training.
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018

Replacement AutoEncoder: A Privacy-Preserving Algorithm for Sensory Data Analysis.
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018

Distributed One-Class Learning.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

Protecting Sensory Data against Sensitive Inferences.
Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems, 2018

An Information-Theoretic Approach to Time-Series Data Privacy.
Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems, 2018

What to Put on the User: Sensing Technologies for Studies and Physiology Aware Systems.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
Valorising the IoT <i>Databox</i>: creating value for everyone.
Trans. Emerg. Telecommun. Technol., 2017

Privacy-Preserving Deep Inference for Rich User Data on The Cloud.
CoRR, 2017

Personal Model Training under Privacy Constraints.
CoRR, 2017

A Hybrid Deep Learning Architecture for Privacy-Preserving Mobile Analytics.
CoRR, 2017

Kissing Cuisines: Exploring Worldwide Culinary Habits on the Web.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Demo: Detecting Group Formations using iBeacon Technology.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Demo: AWSense: A Framework for Collecting Sensing Data from the Apple Watch.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

2016
The Adblocking Tug-of-War.
login Usenix Mag., 2016

Enabling the new economic actor: data protection, the digital economy, and the Databox.
Pers. Ubiquitous Comput., 2016

Challenges with Current Wearable Technology in Monitoring Health Data and Providing Positive Behavioural Support.
EAI Endorsed Trans. Future Intell. Educ. Environ., 2016

Valorising the IoT Databox: Creating Value for Everyone.
CoRR, 2016

Ad-Blocking and Counter Blocking: A Slice of the Arms Race.
CoRR, 2016

Adblocking and Counter Blocking: A Slice of the Arms Race.
Proceedings of the 6th USENIX Workshop on Free and Open Communications on the Internet, 2016

Privacy-Aware Infrastructure for Managing Personal Data.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

Tracking Personal Identifiers Across the Web.
Proceedings of the Passive and Active Measurement - 17th International Conference, 2016

An Exploration of Fetish Social Networks and Communities.
Proceedings of the Advances in Network Science, 2016

SensingKit: Evaluating the Sensor Power Consumption in iOS Devices.
Proceedings of the 12th International Conference on Intelligent Environments, 2016

Fetishizing Food in Digital Age: #foodporn Around the World.
Proceedings of the Tenth International Conference on Web and Social Media, 2016

Detecting group formations using iBeacon technology.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2016 ACM International Symposium on Wearable Computers, 2016

Large scale mood and stress self-assessments on a smartwatch.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2016 ACM International Symposium on Wearable Computers, 2016

Towards Bottom-Up Analysis of Social Food.
Proceedings of the 6th International Conference on Digital Health Conference, 2016

Fruits and Vegetables Calorie Counter Using Convolutional Neural Networks.
Proceedings of the 6th International Conference on Digital Health Conference, 2016

The Effect of Social Feedback in a Reddit Weight Loss Community.
Proceedings of the 6th International Conference on Digital Health Conference, 2016

Personal Data Management with the Databox: What's Inside the Box?
Proceedings of the 2016 ACM Workshop on Cloud-Assisted Networking, 2016

A first look at user activity on tinder.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients.
Proc. Priv. Enhancing Technol., 2015

Wearable Computing for Health and Fitness: Exploring the Relationship between Data and Human Behaviour.
CoRR, 2015

The Distant Heart: Mediating Long-Distance Relationships through Connected Computational Jewelry.
CoRR, 2015

360 Quantified Self.
CoRR, 2015

Personal Data: Thinking Inside the Box.
CoRR, 2015

Walking in Sync: Two is Company, Three's a Crowd.
Proceedings of the 2nd workshop on Workshop on Physical Analytics, 2015

New directions in jewelry: a close look at emerging trends & developments in jewelry-like wearable devices.
Proceedings of the 2015 ACM International Symposium on Wearable Computers, 2015

Dietary Habits of an Expat Nation: Case of Qatar.
Proceedings of the 2015 International Conference on Healthcare Informatics, 2015

360-degree Quantified Self.
Proceedings of the 2015 International Conference on Healthcare Informatics, 2015

#FoodPorn: Obesity Patterns in Culinary Interactions.
Proceedings of the 5th International Conference on Digital Health 2015, 2015

Personal data: thinking inside the box.
Proceedings of The Fifth Decennial Aarhus Conference on Critical Alternatives, 2015

2014
Human-Data Interaction: The Human Face of the Data-Driven Society.
CoRR, 2014

Privacy Leakage in Mobile Computing: Tools, Methods, and Characteristics.
CoRR, 2014

Opportunities in a Federated Cloud Marketplace.
CoRR, 2014

Anatomy of the Third-Party Web Tracking Ecosystem.
CoRR, 2014

The Rise of Panopticons: Examining Region-Specific Third-Party Web Tracking.
Proceedings of the Traffic Monitoring and Analysis - 6th International Workshop, 2014

Poster: SensingKit: a multi-platform mobile sensing framework for large-scale experiments.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

2013
Measuring the likelihood of models for network evolution
CoRR, 2013

Topic and Sentiment Analysis on OSNs: a Case Study of Advertising Strategies on Twitter.
CoRR, 2013

Information bazaar: a contextual evaluation.
Proceedings of the 5th ACM workshop on Hot topics in planet-scale measurement, 2013

2012
The World of Connections and Information Flow in Twitter.
IEEE Trans. Syst. Man Cybern. Part A, 2012

The spread of media content through blogs.
Soc. Netw. Anal. Min., 2012

Privacy analytics.
Comput. Commun. Rev., 2012

Los Twindignados: The Rise of the Indignados Movement on Twitter.
Proceedings of the 2012 International Conference on Privacy, 2012

Breaking for commercials: characterizing mobile advertising.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

2011
Targeted Advertising on the Handset: Privacy and Security Challenges.
Proceedings of the Pervasive Advertising, 2011

Discriminating graphs through spectral projections.
Comput. Networks, 2011

2010
Weighted spectral distribution for internet topology analysis: theory and applications.
IEEE/ACM Trans. Netw., 2010

The ambient Loo: caught short when nature calls?
Comput. Commun. Rev., 2010

Fighting online click-fraud using bluff ads.
Comput. Commun. Rev., 2010

Mixing Biases: Structural Changes in the AS Topology Evolution.
Proceedings of the Traffic Monitoring and Analysis, Second International Workshop, 2010

Measuring User Influence in Twitter: The Million Follower Fallacy.
Proceedings of the Fourth International Conference on Weblogs and Social Media, 2010

2009
A weighted spectrum metric for comparison of internet topologies.
SIGMETRICS Perform. Evaluation Rev., 2009

Challenges in the capture and dissemination of measurements from high-speed networks.
IET Commun., 2009

On the importance of local connectivity for Internet topology models.
Proceedings of the 21st International Teletraffic Congress, 2009

Not All Adware Is Badware: Towards Privacy-Aware Advertising.
Proceedings of the Software Services for e-Business and e-Society, 2009

Serving Ads from localhost for Performance, Privacy, and Profit.
Proceedings of the Eight ACM Workshop on Hot Topics in Networks (HotNets-VIII), 2009

2008
Beyond Node Degree: Evaluating AS Topology Models
CoRR, 2008

Network topologies: Inference, modeling, and generation.
IEEE Commun. Surv. Tutorials, 2008

Modeling internet topology dynamics.
Comput. Commun. Rev., 2008

Tuning Topology Generators Using Spectral Distributions.
Proceedings of the Performance Evaluation: Metrics, 2008

2007
Towards Informative Statistical Flow Inversion
CoRR, 2007

Revisiting the Issues On Netflow Sample and Export Performance
CoRR, 2007

2005
A biologically-inspired approach to designing wireless sensor networks.
Proceedings of the Wireless Sensor Networks, Second European Workshop, 2005


  Loading...