Ehsan Toreini

Orcid: 0000-0002-5172-2957

According to our database1, Ehsan Toreini authored at least 32 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Bluetooth security analysis of general and intimate health IoT devices and apps: the case of FemTech.
Int. J. Inf. Sec., December, 2024

Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems.
Int. J. Inf. Sec., April, 2024

Invisible, Unreadable, and Inaudible Cookie Notices: An Evaluation of Cookie Notices for Users with Visual Impairments.
ACM Trans. Access. Comput., 2024

2023
A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

Verifiable Fairness: Privacy-preserving Computation of Fairness for Machine Learning Systems.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

2022
How Can and Would People Protect From Online Tracking?
Proc. Priv. Enhancing Technol., 2022

In Private, Secure, Conversational FinBots We Trust.
CoRR, 2022

"I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country.
Proceedings of the 31st USENIX Security Symposium, 2022

Bodies Like Yours: Enquiring Data Privacy in FemTech.
Proceedings of the NordiCHI '22: Adjunct Proceedings of the Nordic Human-Computer Interaction Conference, Aarhus, Denmark, October 8, 2022

Vision: Too Little too Late? Do the Risks of FemTech already Outweigh the Benefits?
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022

2021
Anti-Counterfeiting for Polymer Banknotes Based on Polymer Substrate Fingerprinting.
IEEE Trans. Inf. Forensics Secur., 2021

2020
Establishing a social licence for Financial Technology: Reflections on the role of the private sector in pursuing ethical data practices.
Big Data Soc., January, 2020

End-to-End Verifiable E-Voting Trial for Polling Station Voting.
IEEE Secur. Priv., 2020

End-to-End Verifiable E-Voting Trial for Polling Station Voting at Gateshead.
IACR Cryptol. ePrint Arch., 2020

Technologies for Trustworthy Machine Learning: A Survey in a Socio-Technical Context.
CoRR, 2020

The relationship between trust in AI and trustworthy machine learning technologies.
Proceedings of the FAT* '20: Conference on Fairness, 2020

Simulating the Effects of Social Presence on Trust, Privacy Concerns & Usage Intentions in Automated Bots for Finance.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Keeping it Human: A Focus Group Study of Public Attitudes Towards AI in Banking.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

2019
What Is This Sensor and Does This App Need Access to It?
Informatics, 2019

DOMtegrity: ensuring web page integrity against malicious browser extensions.
Int. J. Inf. Sec., 2019

2018
New advances in tamper evident technologies.
PhD thesis, 2018

Stealing PINs via mobile sensors: actual risk versus user perception.
Int. J. Inf. Sec., 2018

2017
Texture to the Rescue: Practical Paper Fingerprinting Based on Texture Patterns.
ACM Trans. Priv. Secur., 2017

Erratum to "On the Privacy of Private Browsing - A Forensic Approach" [JISA 19/1(2014), 88-100].
J. Inf. Secur. Appl., 2017

PiSHi: click the images and I tell if you are a human.
Int. J. Inf. Sec., 2017

Making sense of sensors: mobile sensor security awareness and education.
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust, 2017

2016
TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript.
J. Inf. Secur. Appl., 2016

2015
TouchSignatures: Identification of User Touch Actions based on Mobile Sensors via JavaScript.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
On the privacy of private browsing - A forensic approach.
J. Inf. Secur. Appl., 2014

2012
SEIMCHA: a new semantic image CAPTCHA using geometric transformations.
ISC Int. J. Inf. Secur., 2012

2011
A novel method in fuzzy data clustering based on chaotic PSO.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Multiple SEIMCHA: Multiple semantic image CAPTCHA.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011


  Loading...