| Group-based trust management scheme for clustered wireless sensor networks RA Shaikh, H Jameel, BJ d'Auriol, H Lee, S Lee, YJ Song IEEE transactions on parallel and distributed systems 20 (11), 1698-1712, 2008 | 465 | 2008 |
| Towards seamless tracking-free web: Improved detection of trackers via one-class learning M Ikram, HJ Asghar, MA Kaafar, B Krishnamurthy, A Mahanti arXiv preprint arXiv:1603.06289, 2016 | 122 | 2016 |
| A trust model for ubiquitous systems based on vectors of trust values H Jameel, LX Hung, U Kalim, A Sajjad, S Lee, YK Lee Seventh IEEE International Symposium on Multimedia (ISM'05), 6 pp., 2005 | 119 | 2005 |
| Trust management problem in distributed wireless sensor networks RA Shaikh, H Jameel, S Lee, S Rajput, YJ Song 12th IEEE International Conference on Embedded and Real-Time Computing …, 2006 | 100 | 2006 |
| On the (In) Feasibility of Attribute Inference Attacks on Machine Learning Models BZH Zhao, A Agrawal, C Coburn, HJ Asghar, R Bhaskar, MA Kaafar, ... IEEE European Symposium on Security and Privacy, 2021 | 77 | 2021 |
| Achieving network level privacy in wireless sensor networks RA Shaikh, H Jameel, BJ d’Auriol, H Lee, S Lee, YJ Song Sensors 10 (3), 1447-1472, 2010 | 64 | 2010 |
| Splitbox: Toward efficient private network function virtualization HJ Asghar, L Melis, C Soldani, E De Cristofaro, MA Kaafar, L Mathy Proceedings of the 2016 workshop on Hot topics in Middleboxes and Network …, 2016 | 55 | 2016 |
| Gesture-based continuous authentication for wearable devices: The smart glasses use case J Chauhan, HJ Asghar, A Mahanti, MA Kaafar International Conference on Applied Cryptography and Network Security, 648-665, 2016 | 52* | 2016 |
| Mobile-To-Grid Middleware: Bridging the gap between mobile and Grid environments H Jameel, U Kalim, A Sajjad, S Lee, T Jeon European Grid Conference, 932-941, 2005 | 46 | 2005 |
| Private Continual Release of Real-Valued Data Streams V Perrier, HJ Asghar, D Kaafar Network and Distributed Systems Security (NDSS) Symposium 2019, 2019 | 45 | 2019 |
| Cryptanalysis of the convex hull click human identification protocol HJ Asghar, S Li, J Pieprzyk, H Wang International Journal of Information Security 12 (2), 83-96, 2013 | 45 | 2013 |
| A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists BZH Zhao, M Ikram, HJ Asghar, MA Kaafar, A Chaabane, K Thilakarathna 14th ACM ASIA Conference on Computer and Communications Security, ASIACCS …, 2019 | 42 | 2019 |
| Private processing of outsourced network functions: Feasibility and constructions L Melis, HJ Asghar, E De Cristofaro, MA Kaafar Proceedings of the 2016 ACM International Workshop on Security in Software …, 2016 | 41 | 2016 |
| When air traffic management meets blockchain technology: a blockchain-based concept for securing the sharing of flight data MD Clementi, N Larrieu, E Lochin, MA Kaafar, H Asghar 2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC), 1-10, 2019 | 38 | 2019 |
| Mobility independent secret key generation for wearable health-care devices G Revadigar, C Javali, HJ Asghar, KB Rasmussen, S Jha Proceedings of the 10th EAI International Conference on Body Area Networks …, 2015 | 38 | 2015 |
| Human identification through image evaluation using secret predicates H Jameel, RA Shaikh, H Lee, S Lee Cryptographers’ Track at the RSA Conference, 67-84, 2007 | 37 | 2007 |
| A new human identification protocol and coppersmith’s baby-step giant-step algorithm HJ Asghar, J Pieprzyk, H Wang International Conference on Applied Cryptography and Network Security, 349-366, 2010 | 33 | 2010 |
| Differentially Private Release of Datasets using Gaussian Copula HJ Asghar, M Ding, T Rakotoarivelo, S Mrabet, D Kaafar Journal of Privacy and Confidentiality 10 (2), 2020 | 32* | 2020 |
| On the Resilience of Biometric Authentication Systems against Random Inputs BZH Zhao, HJ Asghar, MA Kaafar Network and Distributed Systems Security (NDSS) Symposium 2020, 2020 | 32 | 2020 |
| On the security of PAS (predicate-based authentication service) S Li, HJ Asghar, J Pieprzyk, AR Sadeghi, R Schmitz, H Wang 2009 Annual Computer Security Applications Conference, 209-218, 2009 | 27 | 2009 |