Hassan Jameel Asghar

Orcid: 0000-0001-6168-6497

Affiliations:
  • Macquarie University, Department of Computing, Sydney, NSW, Australia
  • CSIRO, Data61, Sydney, NSW, Australia


According to our database1, Hassan Jameel Asghar authored at least 54 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Use of cryptography in malware obfuscation.
J. Comput. Virol. Hacking Tech., 2024

2023
Unintended Memorization and Timing Attacks in Named Entity Recognition Models.
Proc. Priv. Enhancing Technol., April, 2023

Practical, Private Assurance of the Value of Collaboration.
CoRR, 2023

On the Adversarial Inversion of Deep Biometric Representations.
CoRR, 2023

Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Do Auto-Regressive Models Protect Privacy? Inferring Fine-Grained Energy Consumption From Aggregated Model Parameters.
IEEE Trans. Serv. Comput., 2022

A Differentially Private Framework for Deep Learning With Convexified Loss Functions.
IEEE Trans. Inf. Forensics Secur., 2022

Making the Most of Parallel Composition in Differential Privacy.
Proc. Priv. Enhancing Technol., 2022

SoK: Use of Cryptography in Malware Obfuscation.
IACR Cryptol. ePrint Arch., 2022

Privacy Preserving Release of Mobile Sensor Data.
CoRR, 2022

2021
Sharing in a Trustless World: Privacy-Preserving Data Analytics with Potentially Cheating Participants.
CoRR, 2021

Trace Recovery: Inferring Fine-grained Trace of Energy Data from Aggregates.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics.
Proceedings of the E-Business and Telecommunications - 18th International Conference, 2021

On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

A Blockchain-enabled Anonymous-yet- Traceable Distributed Key Generation.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

2020
Exploiting Behavioral Side Channels in Observation Resilient Cognitive Authentication Schemes.
ACM Trans. Priv. Secur., 2020

Not All Attributes are Created Equal: dX -Private Mechanisms for Linear Queries.
Proc. Priv. Enhancing Technol., 2020

Averaging Attacks on Bounded Noise-based Disclosure Control Algorithms.
Proc. Priv. Enhancing Technol., 2020

Differentially Private Release of Datasets using Gaussian Copula.
J. Priv. Confidentiality, 2020

Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices.
IACR Cryptol. ePrint Arch., 2020

The Topographic Signature (TopoSign) Protocol.
IACR Cryptol. ePrint Arch., 2020

On the Resilience of Biometric Authentication Systems against Random Inputs.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Who Let the<i>DOGS</i>Out: Anonymous but Auditable Communications Using Group Signature Schemes with Distributed Opening.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020

2019
On Inferring Training Data Attributes in Machine Learning Models.
CoRR, 2019

Averaging Attacks on Bounded Perturbation Algorithms.
CoRR, 2019

Differentially Private Release of High-Dimensional Datasets using the Gaussian Copula.
CoRR, 2019

Fast privacy-preserving network function outsourcing.
Comput. Networks, 2019

Private Continual Release of Real-Valued Data Streams.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking.
Proc. Priv. Enhancing Technol., 2018

d<sub>X</sub>-Private Mechanisms for Linear Queries.
CoRR, 2018

2017
Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning.
Proc. Priv. Enhancing Technol., 2017

On the Privacy of the Opal Data Release: A Response.
CoRR, 2017

Differentially Private Release of Public Transport Data: The Opal Use Case.
CoRR, 2017

BehavioCog: An Observation Resistant Authentication Scheme.
Proceedings of the Financial Cryptography and Data Security, 2017

POSTER: TouchTrack: How Unique are your Touch Gestures?
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
SplitBox: Toward Efficient Private Network Function Virtualization.
Proceedings of the ACM SIGCOMM Workshop on Hot topics in Middleboxes and Network Function Virtualization, 2016

Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices.
IEEE Trans. Inf. Forensics Secur., 2015

Private Processing of Outsourced Network Functions: Feasibility and Constructions.
IACR Cryptol. ePrint Arch., 2015

When are Identification Protocols with Sparse Challenges Safe? The Case of the Coskun and Herley Attack.
IACR Cryptol. ePrint Arch., 2015

iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the Channel.
Proceedings of the 10th ACM Symposium on Information, 2015

Mobility Independent Secret Key Generation for Wearable Health-care Devices.
Proceedings of the 10th EAI International Conference on Body Area Networks, 2015

2014
Algebraic Attacks on Human Identification Protocols.
IACR Cryptol. ePrint Arch., 2014

A Subexponential Construction of Graph Coloring for Multiparty Computation.
IACR Cryptol. ePrint Arch., 2014

Gesture-based Continuous Authentication for Wearable Devices: the Google Glass Case.
CoRR, 2014

On the Intrusiveness of JavaScript on the Web.
Proceedings of the 2014 CoNEXT on Student Workshop, 2014

2013
Cryptanalysis of the convex hull click human identification protocol.
Int. J. Inf. Sec., 2013

2012
Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks.
IACR Cryptol. ePrint Arch., 2012

2011
On the Hardness of the Sum of <i>k</i> Mins Problem.
Comput. J., 2011

2010
Achieving Network Level Privacy in Wireless Sensor Networks.
Sensors, 2010

A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm.
IACR Cryptol. ePrint Arch., 2010

2009
Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks.
Sensors, 2009

On the Security of PAS (Predicate-based Authentication Service).
IACR Cryptol. ePrint Arch., 2009


  Loading...