Kaafar, Mohamed Ali
240  Ergebnisse:
Personensuche X
?
2

SPGNN-API: A Transferable Graph Neural Network for Attack P..:

Jmal, Houssem ; Hmida, Firas Ben ; Basta, Nardine...
IEEE Transactions on Information Forensics and Security.  19 (2024)  - p. 1601-1613 , 2024
 
?
4

Distance Maximization and Defences on Deep Hashing Based Im..:

, In: 2023 IEEE International Conference on Knowledge Graph (ICKG),
Lu, Junda ; Miao, Yukai ; Chen, Mingyang... - p. 176-183 , 2023
 
?
5

Those Aren't Your Memories, They're Somebody Else's: Seedin..:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
 
?
6

An Empirical Analysis of Security and Privacy Risks in Andr..:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
 
?
7

Privacy-Preserving Record Linkage for Cardinality Counting:

, In: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security,
 
?
8

On mission Twitter Profiles: A Study of Selective Toxic Beh..:

, In: 2023 IEEE International Conference on Big Data (BigData),
Qayyum, Hina ; Ikram, Muhammad ; Zhao, Benjamin Zi Hao... - p. 3634-3643 , 2023
 
?
9

Trace Recovery: Attacking and Defending the User Privacy in..:

, In: E-Business and Telecommunications; Communications in Computer and Information Science,
 
?
10

Exploring the Distinctive Tweeting Patterns of Toxic Twitte..:

, In: 2023 IEEE International Conference on Big Data (BigData),
Qayyum, Hina ; Ikram, Muhammad ; Zhao, Benjamin Zi Hao... - p. 3624-3633 , 2023
 
?
11

Towards a Zero-Trust Micro-segmentation Network Security St..:

, In: NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium,
 
?
12

Fairness and Cost Constrained Privacy-Aware Record Linkage:

Wu, Nan ; Vatsalan, Dinusha ; Verma, Sunny.
IEEE Transactions on Information Forensics and Security.  17 (2022)  - p. 2644-2656 , 2022
 
?
13

A Differentially Private Framework for Deep Learning With C..:

Lu, Zhigang ; Asghar, Hassan Jameel ; Kaafar, Mohamed Ali..
IEEE Transactions on Information Forensics and Security.  17 (2022)  - p. 2151-2165 , 2022
 
?
14

A First Look at Android Apps' Third-Party Resources Loading:

, In: Network and System Security; Lecture Notes in Computer Science,
 
1-15