Follow
Hassan Jameel Asghar
Hassan Jameel Asghar
Verified email at mq.edu.au - Homepage
Title
Cited by
Cited by
Year
Group-based trust management scheme for clustered wireless sensor networks
RA Shaikh, H Jameel, BJ d'Auriol, H Lee, S Lee, YJ Song
IEEE transactions on parallel and distributed systems 20 (11), 1698-1712, 2008
4562008
A trust model for ubiquitous systems based on vectors of trust values
H Jameel, LX Hung, U Kalim, A Sajjad, S Lee, YK Lee
Seventh IEEE International Symposium on Multimedia (ISM'05), 6 pp., 2005
1232005
Towards seamless tracking-free web: Improved detection of trackers via one-class learning
M Ikram, HJ Asghar, MA Kaafar, B Krishnamurthy, A Mahanti
arXiv preprint arXiv:1603.06289, 2016
1072016
Trust management problem in distributed wireless sensor networks
RA Shaikh, H Jameel, S Lee, S Rajput, YJ Song
12th IEEE International Conference on Embedded and Real-Time Computing …, 2006
992006
Achieving network level privacy in wireless sensor networks
RA Shaikh, H Jameel, BJ d’Auriol, H Lee, S Lee, YJ Song
Sensors 10 (3), 1447-1472, 2010
632010
Splitbox: Toward efficient private network function virtualization
HJ Asghar, L Melis, C Soldani, E De Cristofaro, MA Kaafar, L Mathy
Proceedings of the 2016 workshop on Hot topics in Middleboxes and Network …, 2016
532016
Mobile-To-Grid Middleware: Bridging the gap between mobile and Grid environments
H Jameel, U Kalim, A Sajjad, S Lee, T Jeon
Advances in Grid Computing-EGC 2005: European Grid Conference, Amsterdam …, 2005
462005
On the (In) Feasibility of Attribute Inference Attacks on Machine Learning Models
BZH Zhao, A Agrawal, C Coburn, HJ Asghar, R Bhaskar, MA Kaafar, ...
IEEE European Symposium on Security and Privacy, 2021
452021
Cryptanalysis of the convex hull click human identification protocol
HJ Asghar, S Li, J Pieprzyk, H Wang
International Journal of Information Security 12, 83-96, 2013
432013
Gesture-based continuous authentication for wearable devices: The smart glasses use case
J Chauhan, HJ Asghar, A Mahanti, MA Kaafar
Applied Cryptography and Network Security: 14th International Conference …, 2016
42*2016
Private processing of outsourced network functions: Feasibility and constructions
L Melis, HJ Asghar, E De Cristofaro, MA Kaafar
Proceedings of the 2016 ACM International Workshop on Security in Software …, 2016
392016
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists
BZH Zhao, M Ikram, HJ Asghar, MA Kaafar, A Chaabane, K Thilakarathna
14th ACM ASIA Conference on Computer and Communications Security, ASIACCS …, 2019
372019
Mobility independent secret key generation for wearable health-care devices
G Revadigar, C Javali, HJ Asghar, KB Rasmussen, S Jha
Proceedings of the 10th EAI International Conference on Body Area Networks …, 2015
372015
Human identification through image evaluation using secret predicates
H Jameel, RA Shaikh, H Lee, S Lee
Cryptographers’ Track at the RSA Conference, 67-84, 2007
362007
A new human identification protocol and coppersmith’s baby-step giant-step algorithm
HJ Asghar, J Pieprzyk, H Wang
Applied Cryptography and Network Security: 8th International Conference …, 2010
332010
Private Continual Release of Real-Valued Data Streams
V Perrier, HJ Asghar, D Kaafar
Network and Distributed Systems Security (NDSS) Symposium 2019, 2019
312019
When air traffic management meets blockchain technology: a blockchain-based concept for securing the sharing of flight data
MD Clementi, N Larrieu, E Lochin, MA Kaafar, H Asghar
2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC), 1-10, 2019
292019
On the security of PAS (predicate-based authentication service)
S Li, HJ Asghar, J Pieprzyk, AR Sadeghi, R Schmitz, H Wang
2009 Annual Computer Security Applications Conference, 209-218, 2009
292009
On the Resilience of Biometric Authentication Systems against Random Inputs
BZH Zhao, HJ Asghar, MA Kaafar
Network and Distributed Systems Security (NDSS) Symposium 2020, 2020
262020
Touch and you’re trapp (ck) ed: Quantifying the uniqueness of touch gestures for tracking
R Masood, BZH Zhao, HJ Asghar, MA Kaafar
Proceedings on Privacy Enhancing Technologies, 2018
222018
The system can't perform the operation now. Try again later.
Articles 1–20