Tanveer Khan

Orcid: 0000-0001-7296-2178

According to our database1, Tanveer Khan authored at least 30 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SoK: Wildest Dreams: Reproducible Research in Privacy-preserving Neural Network Training.
Proc. Priv. Enhancing Technol., 2024

Wildest Dreams: Reproducible Research in Privacy-preserving Neural Network Training.
CoRR, 2024

Trustworthiness of X Users: A One-Class Classification Approach.
CoRR, 2024

Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning.
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024

GuardML: Efficient Privacy-Preserving Machine Learning Services Through Hybrid Homomorphic Encryption.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

A Pervasive, Efficient and Private Future: Realizing Privacy-Preserving Machine Learning Through Hybrid Homomorphic Encryption.
Proceedings of the IEEE Conference on Dependable, Autonomic and Secure Computing, 2024

Trustworthiness of $\mathbb {X}$ Users: A One-Class Classification Approach.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Split Without a Leak: Reducing Privacy Leakage in Split Learning.
CoRR, 2023

Learning in the Dark: Privacy-Preserving Machine Learning using Function Approximation.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Love or Hate? Share or Split? Privacy-Preserving Training Using Split Learning and Homomorphic Encryption.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

A More Secure Split: Enhancing the Security of Privacy-Preserving Split Learning.
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023

Split Ways: Privacy-Preserving Training of Encrypted Data Using Split Learning.
Proceedings of the Workshops of the EDBT/ICDT 2023 Joint Conference, 2023

2021
Fake news outbreak 2021: Can we stop the viral spread?
J. Netw. Comput. Appl., 2021

SOK: Fake News Outbreak 2021: Can We Stop the Viral Spread?
CoRR, 2021

Seeing and Believing: Evaluating the Trustworthiness of Twitter Users.
IEEE Access, 2021

Blind Faith: Privacy-Preserving Machine Learning using Function Approximation.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

2020
Trust and Believe - Should We? Evaluating the Trustworthiness of Twitter Users.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
Towards augmented proactive cyberthreat intelligence.
J. Parallel Distributed Comput., 2019

An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments.
Int. J. Inf. Secur. Priv., 2019

Recommendence and Fashionsence: Online Fashion Advisor for Offline Experience.
Proceedings of the ACM India Joint International Conference on Data Science and Management of Data, 2019

2018
Structures and data preserving homomorphic signatures.
J. Netw. Comput. Appl., 2018

Garbled role-based access control in the cloud.
J. Ambient Intell. Humaniz. Comput., 2018

Secure policy execution using reusable garbled circuit in the cloud.
Future Gener. Comput. Syst., 2018

A Scheme for Three-way Secure and Verifiable E-Voting.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018

2017
A high-level domain-specific language for SIEM (design, development and formal verification).
Clust. Comput., 2017

2016
A Reliable and Interference-Aware Routing Protocol for Underwater Wireless Sensor Networks.
Proceedings of the 10th International Conference on Complex, 2016

Avoiding Energy Holes in Underwater Wireless Sensor Networks with Balanced Load Distribution.
Proceedings of the 10th International Conference on Complex, 2016

MobiSink: Cooperative Routing Protocol for Underwater Sensor Networks with Sink Mobility.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

On Utilizing Static Courier Nodes to Achieve Energy Efficiency with Depth Based Routing for Underwater Wireless Sensor Networks.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

Clustering Depth Based Routing for Underwater Wireless Sensor Networks.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016


  Loading...