Hassan Khan

Orcid: 0000-0001-6417-1181

According to our database1, Hassan Khan authored at least 49 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SHRIMPS: A framework for evaluating multi-user, multi-modal implicit authentication systems.
Comput. Secur., February, 2024

2023
Revisiting the Security of Biometric Authentication Systems Against Statistical Attacks.
ACM Trans. Priv. Secur., May, 2023

"My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software.
Proceedings of the 32nd USENIX Security Symposium, 2023

No Privacy in the Electronics Repair Industry.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Business Model Evaluation for Peer-to-peer Energy Sharing Systems: Insights from Off-grid DC Microgrid Deployment in Pakistan.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2023

2022
Numerical Simulation of Entropy Optimization in Radiative Hybrid Nanofluid Flow in a Variable Features Darcy-Forchheimer Curved Surface.
Symmetry, 2022

Defect Identification of Adhesive Structure Based on DCGAN and YOLOv5.
IEEE Access, 2022

A Modified Approach of Adomian Decomposition Method to Solve Two-Term Diffusion Wave and Time Fractional Telegraph Equations.
IEEE Access, 2022

Sharing without Scaring: Enabling Smartphones to Become Aware of Temporary Sharing.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

TMorph: A Traffic Morphing Framework to Test Network Defenses Against Adversarial Attacks.
Proceedings of the International Conference on Information Networking, 2022

2021
Concerned but Ineffective: User Perceptions, Methods, and Challenges when Sanitizing Old Devices for Disposal.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

2020
Mimicry Attacks on Smartphone Keystroke Authentication.
ACM Trans. Priv. Secur., 2020

On the Fractional View Analysis of Keller-Segel Equations with Sensitivity Functions.
Complex., 2020

An Approximate-Analytical Solution to Analyze Fractional View of Telegraph Equations.
IEEE Access, 2020

Chaperone: Real-time Locking and Loss Prevention for Smartphones.
Proceedings of the 29th USENIX Security Symposium, 2020

Indoor Mobile Localization Using Wireless Sensor Networks (WSNs).
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
An Investigation of the Third Hankel Determinant Problem for Certain Subfamilies of Univalent Functions Involving the Exponential Function.
Symmetry, 2019

Laplace Adomian Decomposition Method for Multi Dimensional Time Fractional Model of Navier-Stokes Equation.
Symmetry, 2019

Analytical Solutions of Fractional Klein-Gordon and Gas Dynamics Equations, via the (<i>G</i><sup>′</sup>/<i>G</i>)-Expansion Method.
Symmetry, 2019

Analytical Solutions of Fractional-Order Diffusion Equations by Natural Transform Decomposition Method.
Entropy, 2019

Application of Laplace-Adomian Decomposition Method for the Analytical Solution of Third-Order Dispersive Fractional Partial Differential Equations.
Entropy, 2019

Analytical Solutions of Fractional-Order Heat and Wave Equations by the Natural Transform Decomposition Method.
Entropy, 2019

Numerical solutions of fractional delay differential equations using Chebyshev wavelet method.
Comput. Appl. Math., 2019

Fractional Whitham-Broer-Kaup Equations within Modified Analytical Approaches.
Axioms, 2019

A New Analytical Technique to Solve System of Fractional-Order Partial Differential Equations.
IEEE Access, 2019

Families of Travelling Waves Solutions for Fractional-Order Extended Shallow Water Wave Equations, Using an Innovative Analytical Method.
IEEE Access, 2019

2018
Sensitive and Flexible Polymeric Strain Sensor for Accurate Human Motion Monitoring.
Sensors, 2018

Augmented Reality-based Mimicry Attacks on Behaviour-Based Smartphone Authentication.
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018

Evaluating Attack and Defense Strategies for Smartphone PIN Shoulder Surfing.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2016
Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios.
PhD thesis, 2016

Ask Me Again But Don't Annoy Me: Evaluating Re-authentication Strategies for Smartphones.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Targeted Mimicry Attacks on Touch Input Based Implicit Authentication Schemes.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

2015
Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

2014
Towards application-centric implicit authentication on smartphones.
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, 2014

A Comparative Evaluation of Implicit Authentication Schemes.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

Itus: an implicit authentication framework for android.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Traffic Anomaly Detection in the presence of P2P traffic.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

POSTER: When and How to Implicitly Authenticate Smartphone Users.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Automated Anomaly Detector Adaptation using Adaptive Threshold Tuning.
ACM Trans. Inf. Syst. Secur., 2013

2012
Macroflows and Microflows: Enabling Rapid Network Innovation through a Split SDN Data Plane.
Proceedings of the European Workshop on Software Defined Networking, 2012

2011
Determining malicious executable distinguishing attributes and low-complexity detection.
J. Comput. Virol., 2011

Designing a cluster-based covert channel to evade disk investigation and forensics.
Comput. Secur., 2011

Progressive Differential Thresholding for Network Anomaly Detection.
Proceedings of IEEE International Conference on Communications, 2011

Poster: Destabilizing BitTorrent's clusters to attack high bandwidth leechers.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
What Is the Impact of P2P Traffic on Anomaly Detection?
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

2009
Embedding a Covert Channel in Active Network Connections.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Energy efficient video compression for wireless sensor networks.
Proceedings of the 43rd Annual Conference on Information Sciences and Systems, 2009

On achieving good operating points on an ROC plane using stochastic anomaly score prediction.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009


  Loading...