Hassan Jameel Asghar
Orcid: 0000-0001-6168-6497Affiliations:
- Macquarie University, Department of Computing, Sydney, NSW, Australia
- CSIRO, Data61, Sydney, NSW, Australia
According to our database1,
Hassan Jameel Asghar
authored at least 62 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2010
2012
2014
2016
2018
2020
2022
2024
0
5
10
8
3
4
1
6
4
2
4
2
3
1
1
3
2
2
1
4
2
2
2
2
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Efficient Verifiable Differential Privacy with Input Authenticity in the Local and Shuffle Model.
IACR Cryptol. ePrint Arch., 2024
CoRR, 2024
Preempting Text Sanitization Utility in Resource-Constrained Privacy-Preserving LLM Interactions.
CoRR, 2024
Efficient Fault-Tolerant Quantum Protocol for Differential Privacy in the Shuffle Model.
CoRR, 2024
More Than Just a Random Number Generator! Unveiling the Security and Privacy Risks of Mobile OTP Authenticator Apps.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Proc. Priv. Enhancing Technol., April, 2023
Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories.
Proceedings of the Applied Cryptography and Network Security, 2023
2022
Do Auto-Regressive Models Protect Privacy? Inferring Fine-Grained Energy Consumption From Aggregated Model Parameters.
IEEE Trans. Serv. Comput., 2022
A Differentially Private Framework for Deep Learning With Convexified Loss Functions.
IEEE Trans. Inf. Forensics Secur., 2022
Proc. Priv. Enhancing Technol., 2022
2021
Sharing in a Trustless World: Privacy-Preserving Data Analytics with Potentially Cheating Participants.
CoRR, 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics.
Proceedings of the E-Business and Telecommunications - 18th International Conference, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
2020
Exploiting Behavioral Side Channels in Observation Resilient Cognitive Authentication Schemes.
ACM Trans. Priv. Secur., 2020
Proc. Priv. Enhancing Technol., 2020
Proc. Priv. Enhancing Technol., 2020
J. Priv. Confidentiality, 2020
Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Who Let the<i>DOGS</i>Out: Anonymous but Auditable Communications Using Group Signature Schemes with Distributed Opening.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020
2019
Differentially Private Release of High-Dimensional Datasets using the Gaussian Copula.
CoRR, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking.
Proc. Priv. Enhancing Technol., 2018
2017
Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning.
Proc. Priv. Enhancing Technol., 2017
When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack.
J. Math. Cryptol., 2017
CoRR, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the ACM SIGCOMM Workshop on Hot topics in Middleboxes and Network Function Virtualization, 2016
Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case.
Proceedings of the Applied Cryptography and Network Security, 2016
2015
On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices.
IEEE Trans. Inf. Forensics Secur., 2015
IACR Cryptol. ePrint Arch., 2015
iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the Channel.
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 10th EAI International Conference on Body Area Networks, 2015
2014
J. Math. Cryptol., 2014
IACR Cryptol. ePrint Arch., 2014
CoRR, 2014
Proceedings of the 2014 CoNEXT on Student Workshop, 2014
2012
Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks.
IACR Cryptol. ePrint Arch., 2012
2011
2010
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
2009
Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks.
Sensors, 2009
IACR Cryptol. ePrint Arch., 2009