Muhammad Naveed

Affiliations:
  • University of Southern California, USA
  • University of Illinois at Urbana-Champaign, USA


According to our database1, Muhammad Naveed authored at least 27 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A federated learning architecture for secure and private neuroimaging analysis.
Patterns, 2024

2022
Secure Federated Learning for Neuroimaging.
CoRR, 2022

Blizzard: a Distributed Consensus Protocol for Mobile Devices.
CoRR, 2022

2021
Secure Publish-Process-Subscribe System for Dispersed Computing.
IACR Cryptol. ePrint Arch., 2021

Secure Neuroimaging Analysis using Federated Learning with Homomorphic Encryption.
CoRR, 2021

Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing Services.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Distributed Consensus for Mobile Devices using Online Brokers.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

2019
GenoPri'17: International Workshop on Genome Privacy and Security.
IEEE ACM Trans. Comput. Biol. Bioinform., 2019

Trinity: A Byzantine Fault-Tolerant Distributed Publish-Subscribe System with Immutable Blockchain-based Persistence.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

A Privacy-Preserving, Accountable and Spam-Resilient Geo-Marketplace.
Proceedings of the 27th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2019

2016
Leakage-Abuse Attacks against Order-Revealing Encryption.
IACR Cryptol. ePrint Arch., 2016

Breaking Web Applications Built On Top of Encrypted Data.
IACR Cryptol. ePrint Arch., 2016

2015
Privacy in the Genomic Era.
ACM Comput. Surv., 2015

Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Inference Attacks on Property-Preserving Encrypted Databases.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Dynamic Searchable Encryption via Blind Storage.
IACR Cryptol. ePrint Arch., 2014

Privacy and Security in the Genomic Era.
CoRR, 2014

The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Hurdles for Genomic Data Usage Management.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Controlled Functional Encryption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Security Concerns in Android mHealth Apps.
Proceedings of the AMIA 2014, 2014

2013
Identity, location, disease and more: inferring your secrets from android public resources.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Reliable and Low Cost RFID Based Authentication System for Large Scale Deployment.
Int. J. Netw. Secur., 2012


  Loading...