Muhammad Ikram

Orcid: 0000-0003-2113-3390

Affiliations:
  • Macquarie University, Data61, CSIRO, NSW, Australia
  • University of Michigan, Ann Arbor, MI, USA
  • Technische Universität Darmstadt, Peer-to-Peer Networks Group, Germany (2010-2013)
  • Ajou University, Department of Computer Engineering, Suwon, Korea (2008-2010)


According to our database1, Muhammad Ikram authored at least 65 papers between 2008 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
On challenges of sixth-generation (6G) wireless networks: A comprehensive survey of requirements, applications, and security issues.
J. Netw. Comput. Appl., 2025

2024
Use of cryptography in malware obfuscation.
J. Comput. Virol. Hacking Tech., 2024

SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation.
IEEE Trans. Inf. Forensics Secur., 2024

On the Robustness of Malware Detectors to Adversarial Samples.
CoRR, 2024

SenTopX: Benchmark for User Sentiment on Various Topics.
CoRR, 2024

GPTs Window Shopping: An analysis of the Landscape of Custom ChatGPT Models.
CoRR, 2024

BotSSCL: Social Bot Detection with Self-Supervised Contrastive Learning.
CoRR, 2024

Investigating Evasive Techniques in SMS Spam Filtering: A Comparative Analysis of Machine Learning Models.
IEEE Access, 2024

On Adversarial Training with Incorrect Labels.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024

More Than Just a Random Number Generator! Unveiling the Security and Privacy Risks of Mobile OTP Authenticator Apps.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024

SoK: False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations.
CoRR, 2023

Don't Be a Victim During a Pandemic! Analysing Security and Privacy Threats in Twitter During COVID-19.
IEEE Access, 2023

A longitudinal study of the top 1% toxic Twitter profiles.
Proceedings of the 15th ACM Web Science Conference 2023, 2023

Towards Automatic Annotation and Detection of Fake News.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023

On mission Twitter Profiles: A Study of Selective Toxic Behavior.
Proceedings of the IEEE International Conference on Big Data, 2023

Exploring the Distinctive Tweeting Patterns of Toxic Twitter Users.
Proceedings of the IEEE International Conference on Big Data, 2023

An Empirical Analysis of Security and Privacy Risks in Android Cryptocurrency Wallet Apps.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
SoK: Use of Cryptography in Malware Obfuscation.
IACR Cryptol. ePrint Arch., 2022

An Empirical Analysis of SMS Scam Detection Systems.
CoRR, 2022

Machine Learning-based Automatic Annotation and Detection of COVID-19 Fake News.
CoRR, 2022

5G-Enabled Pseudonymity for Cooperative Intelligent Transportation System.
CoRR, 2022

A Study of Third-party Resources Loading on Web.
CoRR, 2022

Analysing Security and Privacy Threats in the Lockdown Periods of COVID-19 Pandemic: Twitter Dataset Case Study.
CoRR, 2022

A deep dive into the consistently toxic 1% of Twitter.
CoRR, 2022

An Empirical Assessment of Security and Privacy Risks of Web-Based Chatbots.
Proceedings of the Web Information Systems Engineering - WISE 2022, 2022

A First Look at Android Apps' Third-Party Resources Loading.
Proceedings of the Network and System Security - 16th International Conference, 2022

Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation Framework.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

2021
Analyzing security issues of android mobile health and medical applications.
J. Am. Medical Informatics Assoc., 2021

Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures.
ACM Comput. Surv., 2021

Empirical Security and Privacy Analysis of Mobile Symptom Checking Applications on Google Play.
CoRR, 2021

Longitudinal Compliance Analysis of AndroidApplications with Privacy Policies.
CoRR, 2021

Empirical Security and Privacy Analysis of Mobile Symptom Checking Apps on Google Play.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-domain Routing via Blockchain.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Longitudinal Compliance Analysis of Android Applications with Privacy Policies.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking and Services, 2021

2020
Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading.
ACM Trans. Priv. Secur., 2020

iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications.
Proceedings of the 29th USENIX Security Symposium, 2020

Decentralized Control: A Case Study of Russia.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

BlockJack: Blocking IP Prefix Hijacker in Inter-Domain Routing.
Proceedings of the CoNEXT'20: Proceedings of the Student Workshop, Barcelona, 2020

2019
A Cartography of Web Tracking using DNS Records.
Comput. Commun., 2019

The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading.
Proceedings of the World Wide Web Conference, 2019

On optimization of ad-blocking lists for mobile devices.
Proceedings of the MobiQuitous 2019, 2019

A Longitudinal Analysis of Online Ad-Blocking Blacklists.
Proceedings of the 2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), 2019

DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Analysis and design of secure and privacy preserving systems.
PhD thesis, 2018

Incognito: A Method for Obfuscating Web Data.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Web Tracking Cartography with DNS Records.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

2017
Measuring, Characterizing, and Detecting Facebook Like Farms.
ACM Trans. Priv. Secur., 2017

Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning.
Proc. Priv. Enhancing Technol., 2017

A First Look at Ad Blocking Apps on Google Play.
CoRR, 2017

A first look at mobile Ad-Blocking apps.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Characterizing key stakeholders in an online black-hat marketplace.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017

2016
An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

2015
Spying on Spammers: Tracking Like Farm Accounts on Facebook.
CoRR, 2015

Characterizing Seller-Driven Black-Hat Marketplaces.
CoRR, 2015

2014
Power Efficient Clustering for Wireless Multimedia Sensor Network.
Int. J. Distributed Sens. Networks, 2014

On the Intrusiveness of JavaScript on the Web.
Proceedings of the 2014 CoNEXT on Student Workshop, 2014

2013
Service Overlays.
Proceedings of the Benchmarking Peer-to-Peer Systems, 2013

2012
Smooth Resilient Service Provision in Large Heterogeneous Networks.
Prax. Inf.verarb. Kommun., 2012

2009
A simple lightweight authentic bootstrapping protocol for IPv6-based low rate wireless personal area networks (6LoWPANs).
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

Route-over vs mesh-under routing in 6LoWPAN.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

Image Retrieval in Multimedia Databases: A Survey.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
A Lightweight Mutual Authentication Scheme for Mobile Radio Frequency IDentification (mRFID) Systems.
Proceedings of the 2008 IEEE International Performance, 2008

Secure and Survivable Group Communication over MANET Using CRTDH Based on a Virtual Subnet Model.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008


  Loading...