Mina Alishahi

Orcid: 0000-0002-1159-8832

Affiliations:
  • Eindhoven University of Technology, The Netherlands


According to our database1, Mina Alishahi authored at least 41 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Indoor Geo-Indistinguishability: Adopting Differential Privacy for Indoor Location Data Protection.
IEEE Trans. Emerg. Top. Comput., 2024

2023
Pixels Who Violate Our Privacy! Deep Learning for Identifying Images' Key Pixels.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Feature Selection on Anonymized Datasets.
Proceedings of the IEEE Intl Conf on Dependable, 2023

2022
Privacy preserving data sharing and analysis for edge-based architectures.
Int. J. Inf. Sec., 2022

On the privacy protection of indoor location dataset using anonymization.
Comput. Secur., 2022

Add noise to remove noise: Local differential privacy for feature selection.
Comput. Secur., 2022

Local Differential Privacy for Private Construction of Classification Algorithms.
Proceedings of the Secure IT Systems, 2022

Hide me Behind the Noise: Local Differential Privacy for Indoor Location Privacy.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

2021
Privacy-preserving policy evaluation in multi-party access control.
J. Comput. Secur., 2021

Comparing Classifiers' Performance under Differential Privacy.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Multi-Party Private Set Intersection Protocols for Practical Applications.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Not a Free Lunch, But a Cheap One: On Classifiers Performance on Anonymized Datasets.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

2020
D-BRIDEMAID: A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

Digital Waste Disposal: an automated framework for analysis of spam emails.
Int. J. Inf. Sec., 2020

Privacy Preserving Statistical Detection of Adversarial Instances.
Proceedings of the 29th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2020

On the Comparison of Classifiers' Construction over Private Inputs.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
Privacy-Preserving Multi-Party Access Control.
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019

On the Statistical Detection of Adversarial Instances over Encrypted Data.
Proceedings of the Security and Trust Management - 15th International Workshop, 2019

Privacy-Preserving LDA Classification over Horizontally Distributed Data.
Proceedings of the Intelligent Distributed Computing XIII, 2019

Distributed Data Anonymization.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

2018
Walking Through the Deep: Gait Analysis for User Authentication Through Deep Learning.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

A Secure Distributed Framework for Agglomerative Hierarchical Clustering Construction.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018

Privacy Preserving Collaborative Agglomerative Hierarchical Clustering Construction.
Proceedings of the Information Systems Security and Privacy - 4th International Conference, 2018

Secure Two-party Agglomerative Hierarchical Clustering Construction.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Privacy Preserving Expectation Maximization (EM) Clustering Construction.
Proceedings of the Distributed Computing and Artificial Intelligence, 2018

Privacy Preserving Random Decision Tree Classification Over Horizontally and Vertically Partitioned Data.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
Privacy-Utility Feature Selection as a Privacy Mechanism in Collaborative Data Classification.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

Privacy Preserving Hierarchical Clustering over Multi-party Data Distribution.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Try Walking in My Shoes, if You Can: Accurate Gait Recognition Through Deep Learning.
Proceedings of the Computer Safety, Reliability, and Security, 2017

A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

Privacy preserving clustering over horizontal and vertical partitioned data.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Privacy-preserving text mining as a service.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Privacy-Utility Feature Selection as a tool in Private Data Classification.
Proceedings of the Distributed Computing and Artificial Intelligence, 2017

2016
Modeling Privacy Aware Information Sharing Systems: A Formal and General Approach.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

On the Abstraction of a Categorical Clustering Algorithm.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2016

Privacy-Aware Data Sharing in a Tree-Based Categorical Clustering Algorithm.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

Collaborative Attribute Retrieval in Environment with Faulty Attribute Managers.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015

Clustering Spam Emails into Campaigns.
Proceedings of the ICISSP 2015, 2015

Fast and Effective Clustering of Spam Emails Based on Structural Similarity.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015


  Loading...