Omar Hasan
Orcid: 0000-0002-9585-7810
  According to our database1,
  Omar Hasan
  authored at least 59 papers
  between 2003 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
Mitigation of Sybil-based Poisoning Attacks in Permissionless Decentralized Learning.
    
  
    Proceedings of the 2025 IEEE International Conference on Blockchain and Cryptocurrency, 2025
    
  
  2024
    Appl. Netw. Sci., December, 2024
    
  
Secure and efficient decentralized machine learning through group-based model aggregation.
    
  
    Clust. Comput., July, 2024
    
  
Decentralized trustworthiness score management with smart contracts on the trustlend platform.
    
  
    IET Blockchain, March, 2024
    
  
    Proceedings of the IEEE International Conference on Web Services, 2024
    
  
    Proceedings of the 6th International Conference on Blockchain Computing and Applications, 2024
    
  
  2023
    Clust. Comput., August, 2023
    
  
Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey.
    
  
    ACM Comput. Surv., 2023
    
  
  2022
    SN Comput. Sci., 2022
    
  
A Bachelor Degree Program in IoT Engineering Accreditation Constraints and Market Demand.
    
  
    Int. J. Eng. Pedagog., 2022
    
  
    Proceedings of the 19th International Conference on Security and Cryptography, 2022
    
  
    Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022
    
  
  2021
Collateral-Free Trustworthiness-based Personal Lending on a Decentralized Application (DApp).
    
  
    Proceedings of the 18th International Conference on Security and Cryptography, 2021
    
  
    Proceedings of the Third International Conference on Blockchain Computing and Applications, 2021
    
  
  2020
GraphSIF: analyzing flow of payments in a Business-to-Business network to detect supplier impersonation.
    
  
    Appl. Netw. Sci., 2020
    
  
    Proceedings of the 2020 IEEE International Conference on Big Data and Smart Computing, 2020
    
  
  2019
A Transparent Referendum Protocol with Immutable Proceedings and Verifiable Outcome for Trustless Networks.
    
  
    Proceedings of the Complex Networks and Their Applications VIII, 2019
    
  
Supplier Impersonation Fraud Detection in Business-To-Business Transaction Networks Using Self-Organizing Maps.
    
  
    Proceedings of the Complex Networks and Their Applications VIII, 2019
    
  
  2018
    Proceedings of the 19th International Middleware Conference, 2018
    
  
  2017
    Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017
    
  
    Proceedings of the Interactive Mobile Communication Technologies and Learning - Proceedings of the 11th IMCL Conference, 30 November, 2017
    
  
    Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017
    
  
    Proceedings of the 7th IEEE International Conference on Control System, 2017
    
  
A reputation system resilient against colluding and malicious adversaries in mobile participatory sensing applications.
    
  
    Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
    
  
  2016
A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval.
    
  
    IACR Cryptol. ePrint Arch., 2016
    
  
    Comput. Networks, 2016
    
  
    Proceedings of the ICT Systems Security and Privacy Protection, 2016
    
  
  2015
Improving the accuracy of Business-to-Business (B2B) reputation systems through rater expertise prediction.
    
  
    Computing, 2015
    
  
Trust management and reputation systems in mobile participatory sensing applications: A survey.
    
  
    Comput. Networks, 2015
    
  
A delay and cost balancing protocol for message routing in mobile delay tolerant networks.
    
  
    Ad Hoc Networks, 2015
    
  
  2014
    J. Am. Medical Informatics Assoc., 2014
    
  
  2013
    Proceedings of the Security and Privacy Preserving in Social Networks, 2013
    
  
A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model.
    
  
    IEEE Trans. Inf. Forensics Secur., 2013
    
  
An investigation on the unwillingness of nodes to participate in mobile delay tolerant network routing.
    
  
    Int. J. Inf. Manag., 2013
    
  
A Discussion of Privacy Challenges in User Profiling with Big Data Techniques: The EEXCESS Use Case.
    
  
    Proceedings of the IEEE International Congress on Big Data, 2013
    
  
The Current Capabilities of Health Information Technology to Support Care Transitions.
    
  
    Proceedings of the AMIA 2013, 2013
    
  
    Proceedings of the AMIA 2013, 2013
    
  
A Privacy Preserving Prediction-based Routing Protocol for Mobile Delay Tolerant Networks.
    
  
    Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
    
  
  2012
    Comput. Secur., 2012
    
  
An Analysis of Strategies for Preventing Selfish Behavior in Mobile Delay Tolerant Networks.
    
  
    Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
    
  
    Proceedings of the IEEE Frontiers in Education Conference, 2012
    
  
    Proceedings of the IEEE Global Engineering Education Conference, 2012
    
  
    Proceedings of the IEEE Global Engineering Education Conference, 2012
    
  
    Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012
    
  
  2011
    Int. J. Online Eng., 2011
    
  
    Proceedings of the 14th International Symposium on Wireless Personal Multimedia Communications, 2011
    
  
Leveraging Node Centrality and Regularity for Efficient Routing in Mobile Peer-to-Peer Networks.
    
  
    Proceedings of the Data Management in Grid and Peer-to-Peer Systems, 2011
    
  
    Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
    
  
  2010
    Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
    
  
    Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010
    
  
  2009
    Proceedings of the Actes des 5èmes journées francophones Mobilité et Ubiquité 2009, 2009
    
  
    Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009
    
  
Evaluation of the iterative multiplication strategy for trust propagation in pervasive environments.
    
  
    Proceedings of the 2009 international conference on Pervasive services, 2009
    
  
  2008
Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation.
    
  
    Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
    
  
  2007
    Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
    
  
  2004
Limiter discriminator detection of narrow-band duobinary FSK in a land mobile channel.
    
  
    Int. J. Commun. Syst., 2004
    
  
  2003