Macquarie University NSW 2109
Cyber Security Hub publications
Publications from the Macquarie University Cyber Security Hub addressing issues and risks in the cyber security field.
- Hina Qayyum, Muhammad Ikram, Mohamed Ali Kaafar, Gareth Tyson. Measuring Characterizing, and Analyzing the Free Web Games Ecosystem. IEEE Transactions on Games. 2024 Apr 2. Epub 2024
- Muhammad Salman, Muhammad Ikram, Mohamed Ali Kaafar. Investigating Evasive Techniques in SMS Spam Filtering: A Comparative Analysis of Machine Learning Models. IEEE Access, vol. 12, pp. 24306-24324, 2024
- Benjamin Zhao, Junda Lu, Xiaowei Zhou, Dinusha Vatsalan, Muhammad Ikram, Dali Kaafar. On adversarial training with incorrect labels. Web Information Systems Engineering – WISE 2024. WISE 2024. Lecture Notes in Computer Science, vol 15439. Springer, Singapore
- Muhammad Ikram, I Wayan Budi Sentana, Hassan Asghar, Mohamed Ali Kaafar, and Michal Kepkowski. More Than Just a Random Number Generator! Unveiling the Security and Privacy Risks of Mobile OTP Authenticator Apps. In Web Information Systems Engineering – WISE 2024: 25th International Conference, Doha, Qatar, December 2–5, 2024, Proceedings, Part V. Springer-Verlag, Berlin, Heidelberg, 177–192.
- Muhammad Salman, I Wayan Budi Sentana, Muhammad Ikram, Dali Kaafar. Auditing and Attributing Behaviours of Suspicious Android Health Applications. 2024. Paper presented at 18th International Conference on Network and System Security, Abu Dhabi, United Arab Emirates.
- Rahat Masood, Wing Yan Cheng, Dinusha Vatsalan, Deepak Mishra, Hassan Jameel Asghar, Dali Kaafar. Privacy Preserving Release of Mobile Sensor Data. Proceedings of the 19th International Conference on Availability, Reliability and Security, Vienna.
- Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia. Use of cryptography in malware obfuscation. In Journal of Computer Virology and Hacking Techniques, Vol. 20, No. 1, 03.2024, p. 135-152
- Conor Atkins, Ian Wood, Mohamed Ali Kaafar, Hassan Asghar, Nardine Basta, Michal Kepkowski. ConvoCache: Smart Re-Use of Chatbot Response. In Interspeech 2024. Online: International Speech Communication Association (ISCA). 2024. p. 2950-2954 doi: 10.21437/Interspeech.2024-2402
- Hassan Jameel Asghar, Zhigang Lu, Zhongrui Zhao, Dali Kaafar. Practical, Private Assurance of the Value of Collaboration via Fully Homomorphic Encryption. Proceedings on the 25th Privacy Enhancing Technologies Symposium (PoPETs) 2025.
- Robin Carpentier, Iulian Sandu Popa, Nicolas Anciaux. Enabling Secure Data-Driven Applications: An Approach to Personal Data Management using Trusted Execution Environments. Distrib Parallel Databases 43, 5 (2025). https://doi.org/10.1007/s10619-024-07449-1.
- Muhammad Sajjad Akbar, Zawar Hussain, Muhammad Ikram, Quan Z Sheng, Subhas Mukhopadhyay. On challenges of sixth-generation (6G) wireless networks: A comprehensive survey of requirements, applications, and security issues. In Journal of Network and Computer Applications, Vol. 233, 104040, 01.2025, p. 1-24.
- Muhammad Salman, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Muhammad Ikram, Sidharth Kaushik, Mohamed Ali Kaafar. On the Robustness of Malware Detectors to Adversarial Samples. Workshop on Security and Artificial Intelligence (SECAI 2024).
- Maisha Boteju, Thilina Ranbaduge, Dinusha Vatsalan, Nalin Arachchilage. Integrating PETs into Software Applications: A Game-Based Learning Approach. 45th International Conference on Information Systems, Bangkok, Thailand 2024.
- Ming Ding, Dinusha Vatsalan, Ignacio Gonzalez-Alvarez, Sirine M’rabet, Paul Tyler, Jens Klump. Trusted Data Sharing for Mineral Exploration and Mining Tenements". Journal of Geochemical Exploration Volume 267, December 2024.
- Hassan Jameel Asghar, Zhigang Lu, Zhongrui Zhao, Dali Kaafar."Practical, Private Assurance of the Value of Collaboration via Fully Homomorphic Encryption." In 25th Privacy Enhancing Technologies Symposium, PETS 2025.
- Junda Lu, Yukai Miao, Mingyang Chen, Bo Huang, Bing Li, Wei Wang, Dinusha Vatsalan, Mohamed Ali Kaafar, IEEE Transactions on Knowledge and Data Engineering (TKDE), Distance Maximization and Defences on Deep Hashing Based Image Retrieval
- Thilina Ranbaduge, Dinusha Vatsalan, and Ming Ding, IEEE International Conference on Knowledge Graph (ICKG), Privacy-preserving deep learning based record linkage
- Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia, Journal of Computer Virology and Hacking Techniques 20 (1), 135-152, Use of cryptography in malware obfuscation
- Hassan Jameel Asghar, Zhigang Lu, Zhongrui Zhao, Dali Kaafar, arXiv preprint arXiv:2310.02563, Practical, Private Assurance of the Value of Collaboration
- Michal Kepkowski, Maciej Machulak, Ian Wood, Dali Kaafar, EEE Secure Development Conference 2023, Challenges with Passwordless FIDO2 in an Enterprise Setting: A Usability Study
- Wei-Zhu Yeoh, Michal Kepkowski, Gunnar Heide, Dali Kaafar, Lucjan Hanzlik, The 32nd USENIX Security Symposium 2023, Fast IDentity Online with Anonymous Credentials (FIDO-AC)
- Gioacchino Tangari, Shreesh Keskar, Hassan Jameel Asghar, Dali Kaafar, arXiv preprint arXiv:2304.05561, On the Adversarial Inversion of Deep Biometric Representations
- Houssem Jmal, Firas Ben Hmida, Nardine Basta, Muhammad Ikram, Mohamed Ali Kaafar, Andy Walker, IEEE Transactions on Information Forensics and Security, Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation
- Dali Kaafar, Niloufer Selvadurai, Babak Abedin, Dinusha Vatsalan, Hassan Asghar, Muhammad Ikram, Benjamin Zhao, Michael Chen. Discussion submission to the 2023-2030 Australian Cyber Security Strategy
- Rana Salal Ali, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Tham Nguyen, Ian David Wood, Mohamed Ali Kaafar, Proceedings on Privacy Enhancing Technologies (PoPETs), Unintended Memorization and Timing Attacks in Named Entity Recognition Models
- Benjamin Tag, Niels van Berkel, Sunny Verma, Benjamin Zi Hao Zhao, Shlomo Berkovsky, Dali Kaafar, Vassilis Kostakos, Olga Ohrimenko, IEEE Pervasive Computing 2023, DDoD: Dual Denial of Decision Attacks on Human-AI Teams
- Conor Atkins, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Ian Wood, Mohamed Ali Kaafar, International Conference on Applied Cryptography and Network Security 2023, Those Aren’t Your Memories, They’re Somebody Else’s: Seeding Misinformation in Chat Bot Memories
- Hina Qayyum, Benjamin Zi Hao Zhao, Ian D. Wood, Muhammad Ikram, Mohamed Ali Kaafar, Nicolas Kourtellis, ACM Web Science Conference 2023, A longitudinal study of the top 1% toxic Twitter profiles
- Nan Wu, Dinusha Vatsalan, Mohamed Ali Kaafar, and Sanath Kumar Ramesh, Proceedings of AsiaCCS 2023, Privacy-Preserving Record Linkage for Cardinality Counting
- Johnathan Leung, Dinusha Vatsalan, and Nalin Arachchilage, Journal of Cyber Security Technology 2023, Feature analysis of fake news: improving fake news detection in social media
- I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kaafar, 21st International Conference on Applied Cryptography and Network Security, An Empirical Analysis of Security and Privacy Risks in Android Cryptocurrency Wallet Apps
- Bibhas Sharma, Ishan Karunanayake, Rahat Masood, Muhammad Ikram, IEEE Access, Don’t Be a Victim During a Pandemic! Analysing Security and Privacy Threats in Twitter During COVID-19
- Mohammad Majid Akhtar, Ishan Karunanayake, Bibhas Sharma, Rahat Masood, Muhammad Ikram, Salil S Kanhere, 2023 IEEE 48th Conference on Local Computer Networks (LCN), Towards Automatic Annotation and Detection of Fake News
- Hina Qayyum, Muhammad Salman, I Wayan Budi Sentana, Duc Linh Giang Nguyen, Muhammad Ikram, Gareth Tyson, Mohamed Ali Kaafar, 16th International Conference on Network and System Security, A First Look at Android Apps’ Third-Party Resources Loading
- Dinusha Vatsalan, Raghav Bhaskar, Mohamed Ali Kaafar, IEEE Transactions on Data and Knowledge Engineering, Local Differentially Private Fuzzy Counting in Stream Data using Probabilistic Data Structures
- Zhigang Lu and Hong Shen, IEEE Transactions on Network and Service Management. Augmentation based edge differentially private path publishing in networks
- Nan Wu, Dinusha Vatsalan, Sunny Verma, Mohamed Ali Kaafar, IEEE Transactions on Information and Forensics Security Fairness and Cost Constrained Privacy-Aware Record Linkage
- Zhigang Lu, Hassan Jameel Asghar, Mohamed Ali Kaafar, Darren Webb, and Peter Dickinson, IEEE Transactions on Information Forensics and Security. "A Differentially Private Framework for Deep Learning with Surrogate Loss Functions"
- Nardine Basta, Muhammad Ikram, Mohamed Ali Kaafar, Andy Walker Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation Framework
- Nazar Waheed, Muhammad Ikram, Saad Sajid Hashmi, Xiangjian He, Priyadarsi Nanda, 23rd Web Information Systems Engineering Society (WISE), An Empirical Assessment of Security and Privacy Risks of Web based-Chatbots
- Michal Kepkowski, Lucjan Hanzlik, Ian Wood, Mohamed Ali Kaafar, 22nd Privacy Enhancing Technologies Symposium How Not to Handle Keys: Timing Attacks on FIDO Authenticator
- Josh Smith, Hassan Jameel Asghar, Gianpaolo Gioiosa, Sirine Mrabet, Serge Gaspers, Paul Tyler, 22nd Privacy Enhancing Technologies Symposium, Making the Most of Parallel Composition in Differential Privacy
- Rana Sala, Benjamin Zi Zhao, Hassan Jameel Asghar, Tham Nguyen, Ian David Wood, Mohamed Ali Kaafar, 23rd Privacy Enhancing Technologies Symposium, Unintended Memorization and Timing Attacks in Named Entity Recognition Models
- Hina Qayyum, Muhammad Salman,I Wayan Budi Sentana, Muhammad Ikram, Gareth Tyson, Mohamed Ali Kaafar, Network and System Security, A First Look at Android Apps’ Third-Party Resources Loading
- Piers Bayl-Smith, Siva Sivasubramanian, Mark Wiggins, Leadership in Cybersecurity
- Doron Goldbarsht, New Payment Products and Services – Potential anti-money laundering and counter-terrorist financing risks
- Josh Selby, Online Browser Privacy
- Josh Selby, How Can Company Boards Build Trust When Faced By Cybersecurity Risks?
- Vincent McGrath, Elizabeth Sheedy, Fan Yu, Governance of cyber security: STATE OF PLAY
- Z Abaid, D Sarkar, MA Kaafar, S Jha All Infections are Not Created Equal: Time-Sensitive Prediction of Malware Generated Network Attacks
- Josh Smith, Hassan Jameel Asghar, Gianpaolo Gioiosa, Sirine Mrabet, Serge Gaspers, Paul Tyler, Making the Most of Parallel Composition in Differential Privacy. In PETS 2022
- Aoting Hu, Renjie Xie, Zhigang Lu, Aiqun Hu, Minhui Xue. 2021. TableGAN-MCA: Evaluating Membership Collisions of GAN-Synthesized Tabular Data Releasing. In Proceedings of the 28th International Conference on Computer and Communications Security (CCS-2021). ACM, pp. 2096-2112.
- M Shahpasand, L Hamey, MA Kaafar, D Vatsalan Feature-Based Adversarial Attacks Against Machine Learnt Mobile Malware Detectors 2020 30th International Telecommunication Networks and Applications
- Gioacchino Tangari, Muhammad Ikram, Kiran Ijaz, Mohamed Ali Kaafar, Shlomo Berkovsky, British Medical Journal (BMJ) Mobile health and privacy: cross sectional study
- F. Farokhi, N. Wu, D. Smith, M.A. Kaafar, “The Cost of Privacy in Asynchronous Differentially-Private Machine Learning”, In IEEE Transactions on Information Forensics and Security (IEEE T-IFS). Pages, 1-12, ISSN: 1556-6013, Online ISSN: 1556-6021, Digital Object Identifier: 10.1109/TIFS.2021.3050603 2021.
- Y. Chen, H. Wang, KKR. Choo, P. He, Z. Salcic, M.A. Kaafar, X. Zhang, “DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain”, in IEEE Transactions on Dependable and Secure Computing, 2021.
- Y. Miao, M. Xue, C. Chen, L. Pan, J. Zhang, B. Zhao, M.A. Kaafar and Y. Xiang “The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services”, in Privacy Preserving Technologies Symposium (PETS 2021)
- George Milunovich, Seung Ah Lee 2021 Cryptocurrency Exchanges: Predicting which Markets will Remain Active\
- Liuqiao Chen, Hu Wang, Benjamin Zi Hao Zhao, Minhui Xue, Haifeng Qian Oriole: Thwarting Privacy against Trustworthy Deep Learning Models ACISP 2021
- Benjamin Zi Hao Zhao, Aviral Agrawal, Catisha Coburn, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kaafar, Darren Webb, Peter Dickinson On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models IEEE Euro S&P 2021
- Nazar Waheed, Xiangjian He*, Muhammad Ikram, Muhammad Usman, Saad Sajid Hashmi, Muhammad Usman Security and privacy in IoT using machine learning and blockchain: threats and countermeasures
- Nazim Uddin Sheikh, Zhigang Lu, Hassan Jameel Asghar, Mohamed Ali Kaafar, 'Trace Recovery: Inferring Fine-grained Trace of Energy Data from Aggregates' Conference: SECRYPT-2021 Link: Available soon
- Jialin Wen, Benjamin Zi Hao Zhao, Minhui Xue, Alina Oprea, Haifeng Qian With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Linear Regression Models IEEE TIFS 2021
- Shaofeng Li, Hui Liu, Tian Dong, Benjamin Zi Hao Zhao, Minhui Xue, Haojin Zhu, Jialiang Lu Hidden Backdoors in Human-Centric Language Models – ACM CCS 2021
- Sentana, I. W. B.; Ikram, M.; Kaafar, M. and Berkovsky, S. (2021). Empirical Security and Privacy Analysis of Mobile Symptom Checking Apps on Google Play. In Proceedings of the 18th International Conference on Security and Cryptography, ISBN 978-989-758-524-1, ISSN 2184-7711, pages 665-673.
- Sentana, I.; Ikram, M. and Kaafar, M. (2021). BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-domain Routing via Blockchain. In Proceedings of the 18th International Conference on Security and Cryptography, ISBN 978-989-758-524-1, ISSN 2184-7711, pages 674-679.
- Nazim Uddin Sheikh, Hassan Asghar; Farhad Farokhi; Dali Kaafar. 2021 Do Auto-regressive Models Protect Privacy Inferring Fine-grained Energy Consumption from Aggregated Model Parameters IEEE Transactions on Services Computing, Q1/A* Journal.
- Pavel Shevchenko, Jiwook Jang, Matteo Malavasi, Gareth W. Peters, Georgy Sofronov, Stefan Trück, Quantification of Cyber Risk – Risk Categories and Business Sectors
- D Kaafar, G Tangari, M Ikram, 2020 A Security Audit of Australian Government Websites.
- Zhao, B.Z.H., Asghar, H.J. and Kaafar, M.A., 2020. On the Resilience of Biometric Authentication Systems against Random Inputs. In Network and Distributed System Security Symposium (NDSS) 2020.
- Asghar, H.J. and Kaafar, D., 2020. Averaging Attacks on Bounded-noise Based Disclosure Control Algorithms. Proceedings on Privacy Enhancing Technologies 2020.
- B.Zhao, H. Asghar, M.A. Kaafar, F. Trevisan, H. Yuan, Exploiting Behavioral Side-Channels in Observation Resilient Cognitive Authentication Schemes, ACM Transaction of Privacy and Security (TOPS), 2020
- B. Zhao, M.A. Kaafar, N Kourtellis, Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning, in ACM CCSW 2020: The ACM CCS Cloud Computing Security Workshop 2020
- Kamalaruban, P., Perrier, V., Asghar, H.J. and Kaafar, M.A., 2020. Not All Attributes are Created Equal: dX-Private Mechanisms for Linear Queries. Proceedings on Privacy Enhancing Technologies, 2020(1), pp.103-125.
- Zhushou Tang, Ke Tang, Minhui Xue, Yuan Tian, Sen Chen, Muhammad Ikram, Tielei Wang, Haojin Zhu, iOS, Your OS, Everybody’s OS: Vetting and Analyzing Network Services of iOS Apps, The 29th Usenix Security Symposium (Usenix Security), 2020. (Core Ranking: A*)
- Asghar, Hassan Jameel, Ming Ding, Thierry Rakotoarivelo, Sirine Mrabet, and Dali Kaafar. Differentially Private Release of Datasets using Gaussian Copula. Journal of Privacy and Confidentiality 10, no. 2 (2020).
- Tangari, Gioacchino, Marinos Charalambides, Daphne Tuncer, George Pavlou, Accuracy-Aware Adaptive Traffic Monitoring for Software Dataplanes, IEEE/ACM Transactions on Networking, 2020. (Core Ranking: A*)
- Yang, Qing, Yiran Shen, Dinusha Vatsalan, Jianpei Zhang, Mohamed Ali Kaafar, and Wen Hu. P4Mobi: A Probabilistic Privacy-Preserving Framework for Publishing Mobility Datasets. IEEE Transactions on Vehicular Technology (2020).
- Ikram, Muhammad, Rahat Masood, Gareth Tyson, Mohamed Ali Kaafar, Noha Loizon, and Roya Ensafi. Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading. ACM Transactions on Privacy and Security (TOPS) 23, no. 2 (2020): 1-27. (Core Ranking: A)
- Yousefi-Azar, Mahmood, Mohamed Ali Kaafar, and Andy Walker. Unsupervised Learning for security of Enterprise networks by micro-segmentation. (2020).
- Farokhi, Farhad, and Mohamed Ali Kaafar. Predicting Performance of Asynchronous Differentially-Private Learning. (2020).
- Monteiro, Matthieu, Kumara Kahatapitiya, Hassan Jameel Asghar, Kanchana Thilakarathna, Thierry Rakotoarivelo, Dali Kaafar, Shujun Li, Ron Steinfeld, and Josef Pieprzyk. Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices. 2020 (2020): 261.
- Tonni, Shakila Mahjabin, Farhad Farokhi, Dinusha Vatsalan, and Dali Kaafar. Data and Model Dependencies of Membership Inference Attack. (2020).
- Farokhi, Farhad, and Mohamed Ali Kaafar. Modelling and Quantifying Membership Information Leakage in Machine Learning. (2020).
- Ramesh, Reethika, Ram Sundara Raman, Matthew Bernhard, Victor Ongkowijaya, Leonid Evdokimov, Anne Edmundson, Steven Sprecher, Muhammad Ikram, and Roya Ensafi. Decentralized Control: A Case Study of Russia. In Network and Distributed Systems Security (NDSS) Symposium, 2020. (Core Ranking: A*)
- Kamalaruban, Parameswaran, Victor Perrier, Hassan Jameel Asghar, and Mohamed Ali Kaafar. Not All Attributes are Created Equal: dX-Private Mechanisms for Linear Queries. Proceedings on Privacy Enhancing Technologies 2020. (Core Ranking: B)
- Wu, Nan, Farhad Farokhi, David Smith, and Mohamed Ali Kaafar. The value of collaboration in convex machine learning with differential privacy, The 41th IEEE Symposium on Security and Privacy (IEEE S&P 2020), 2020. (Core Ranking: A*)
- Shaghaghi, Arash, Mohamed Ali Kaafar, Rajkumar Buyya, and Sanjay Jha. Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future Directions. In Handbook of Computer Networks and Cyber Security, pp. 341-387. Springer, Cham, 2020.
- Gacutan, J and Selvadurai, N, A statutory right of explanation for decisions generated using artificial intelligence, International Journal of Law and Information Technology. Forthcoming 2020. Oxford University Press.
- Selvadurai, N, Digital privacy, in Internet and E-Commerce Law, 2021, Forthcoming. Thomson Legal & Regulatory.
- Selvadurai, N, (ed), Raiche, H, The Digital Platforms Inquiry, Final Report: An analysis of the proposed reforms to competition law, (2020) 28 Australian Journal of Competition and Consumer Law 42-45.
- Jang, J and Oh, R. A bivariate compound dynamic contagion process for cyber insurance 2020
- Ikram M., Masood R., Tyson G., Kaafar M., Loizon N., and Ensafi R., May 2019. The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading.The Web Conference, WWW 2019
- Zhao, B.Z.H., Asghar, H.J., Bhaskar, R. and Kaafar, M.A., 2019. On Inferring Training Data Attributes in Machine Learning Models. In Privacy-Preserving Machine Learning (PPML), a CCS 2019 Workshop.
- Asghar, H.J., De Cristofaro, E., Jourjon, G., Kaafar, M.A., Mathy, L., Melis, L., Russell, C. and Yu, M., 2019. Fast privacy-preserving network function outsourcing. Computer Networks, 163, p.106893.
- J. Su, Zhenyu Li, S. Grumbach, M. Ikram, K. Salamatiane, X. Gaogang, A Cartography of Web Tracking Using DNS Records, Computer Communications, Volume 134, 15 January 2019, Pages 83-95.
- M. Joslin, N. Li, S. Hao, M. Xue and H. Zhu, Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions, 2019 IEEE Symposium on Security and Privacy (SP), San Fransisco, CA, US, pp. 415-429.
- Benjamin Zi Hao Zhao, Muhammad Ikram, Hassan Asghar, Mohamed Ali Kaafar, Abdelberi Chaabane, and Kanchana Thilakarathna, A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists, in the 14th ACM Asia Computer Communication and Security (AsiaCCS) 2019.
- Hashmi, Saad Sajid, Muhammad Ikram, and Stephen Smith. On optimization of ad-blocking lists for mobile devices. In Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp. 220-227. 2019. (Core Ranking: A)
- Huang, Hailong, Andrey V. Savkin, Ming Ding, and Mohamed Ali Kaafar. Optimized deployment of drone base station to improve user experience in cellular networks. Journal of Network and Computer Applications 144 (2019): 49-58. (Core Ranking: A)
- Clementi, Marina Dehez, Nicolas Larrieu, Emmanuel Lochin, Mohamed Ali Kaafar, and Hassan Asghar. When Air Traffic Management Meets Blockchain Technology: a Blockchain-based concept for securing the sharing of Flight Data. In 2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC), pp. 1-10. IEEE, 2019.
- Li, Shaofeng, Benjamin Zi Hao Zhao, Jiahao Yu, Minhui Xue, Dali Kaafar, and Haojin Zhu. Invisible backdoor attacks against deep neural networks. (2019).
- Hashmi, Saad Sajid, Muhammad Ikram, and Mohamed Ali Kaafar. A longitudinal analysis of online ad-blocking blacklists. In 2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), pp. 158-165. IEEE, 2019. (Core Ranking: A)
- Ikram, Muhammad, Pierrick Beaume, and Mohamed Ali Kâafar. DaDiDroid: an obfuscation resilient tool for detecting android malware via weighted directed call graph modelling, SECRYPT 2019 : International Conference on Security and Cryptography, 2019. (Core Ranking: B)
- Miao, Yuantian, Ben Zi Hao Zhao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Dali Kaafar, and Yang Xiang. The Audio Auditor: Participant-Level Membership Inference in Internet of Things Voice Services. (2019).
- Ikram, Muhammad, Rahat Masood, Gareth Tyson, Mohamed Ali Kaafar, Noha Loizon, and Roya Ensafi. The chain of implicit trust: An analysis of the web third-party resources loading. In The World Wide Web Conference, 2019. (Core Ranking: A*)
- Zang, Shizhe, Ming Ding, David Smith, Paul Tyler, Thierry Rakotoarivelo, and Mohamed Ali Kaafar. The impact of adverse weather conditions on autonomous vehicles: how rain, snow, fog, and hail affect the performance of a self-driving car. IEEE vehicular technology magazine 14, no. 2 (2019): 103-111.
- Asghar, Hassan Jameel, Ming Ding, Thierry Rakotoarivelo, Sirine Mrabet, and Mohamed Ali Kaafar. Differentially Private Release of High-Dimensional Datasets using the Gaussian Copula. (2019).
- Asghar, Hassan Jameel, and Dali Kaafar. Averaging Attacks on Bounded Noise-based Disclosure Control Algorithms. Proceedings on Privacy Enhancing Technologies 2020, no. 2 (2020): 358-378.
- Miao, Yuantian, Ben Zi Hao Zhao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Dali Kaafar, and Yang Xiang. The audio auditor: Participant-level membership inference in voice-based iot. (2019).
- Kun Yu, Shlomo Berkovsky, Ronnie Taib, Jianlong Zhou, Fang Chen, Do I Trust My Machine Teammate? An Investigation from Perception to Decision, International Conference on Intelligent User Interfaces (IUI), pp. 460-468, 2019.
- Selvadurai, N, Internet Law in The Law Handbook, 15th Edition, Thomson Legal & Regulatory, 2019.
- Selvadurai, N, FinTech governance: Developing laws that calibrate innovation and efficiency with consumer welfare and financial market stability, (2019) 25(5) Computer and Telecommunications Law Review 141-148.
- Li, J and Selvadurai, N, Amending Chinese copyright law to fulfil obligations under the Marrakesh Treaty, (2019) The China Quarterly 1-21. Cambridge University Press.
- Selvadurai, N, Swinn, M, Treloar, P, and Franke, P, Copyright in artificially-generated works, Australian Group’s Submission to the AIPPI World Congress, AIPPI World Congress, London, December 2019.
- Selvadurai, N, (ed), Raiche, H, The ACCC’s Digital Platforms Inquiry: Government’s concerns and industry’s response, (2019) 27 Australian Journal of Competition and Consumer Law 39-41.
- Doche, C, Selby, J, Selvadurai, N, and Jones, T, Submission on the Australian Cyber Security Strategy 2020, Australian Government Inquiry into the Development of a Cyber Security Strategy, Macquarie Cyber Security Hub, November 2019.
- Cai, C. W. In : Accounting and Finance. 23 p (2019)
- Cynthia Weiyi Cai, Triple‐entry accounting with blockchain: How far have we come?
- J. Su, Z. Li, S. Grumbach, M. Ikram, K. Salamatian, G. Xie, Web Tracking Cartography with DNS Records, The 37th IEEE International Performance Computing and Communications Conference (IPCCC 2018), Orlando, Florida, USA.
- R. Masood, B. Zhao, H. Asghar, M.A. Kaafar, Touch and You’re Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking, in Privacy-Enhancing Technologies Symposium (PETS 2018), Barcelona, Spain July 24–27, 2018.
- R. Masood, M. Ikram, D. Vatsalan, M.A. Kaafar, Incognito: A Method for Obfuscating Web Data In Proceedings of WWW 2018 (Research Track), Lyon, April 2018.
- Young Lee & Hanyang University, Korea SAMD Mobile Collaboration - Fine-Grained Application Sharing In IEEE International Conference on Pervasive Computing and Communications (PerCom 2018), Athens, Greece, Mar 19-23 2018.
- Perrier, Victor, Hassan Jameel Asghar, and Dali Kaafar. Private continual release of real-valued data streams, The Network and Distributed System Security Symposium (NDSS), 2018. (Core Ranking: A*)
- Shaghaghi, Arash, Salil S. Kanhere, Mohamed Ali Kaafar, and Sanjay Jha. Gwardar: Towards protecting a software-defined network from malicious network operating systems. In 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA), pp. 1-5. IEEE, 2018. (Core Ranking: A)
- Shaghaghi, Arash, Salil S. Kanhere, Mohamed Ali Kaafar, Elisa Bertino, and Sanjay Jha. Gargoyle: A network-based insider attack resilient framework for organizations. In 2018 IEEE 43rd Conference on Local Computer Networks (LCN), IEEE, 2018. (Core Ranking: A)
- Huang, Hailong, Andrey V. Savkin, Ming Ding, Mohamed Ali Kaafar, and Chao Huang. On the problem of flying robots deployment to improve cellular user experience. In 2018 37th Chinese Control Conference (CCC), pp. 6356-6359. IEEE, 2018.
- Jiang, Fang-Zhou, Kanchana Thilakarathna, Sirine Mrabet, Mohamed Ali Kaafar, and Aruna Seneviratne. uStash: A novel mobile content delivery system for improving user QoE in public transport. IEEE Transactions on Mobile Computing 18, no. 6 (2018): 1447-1460. (Core Ranking: A*)
- Chauhan, Jagmohan, Mohamed Ali Kaafar, and Anirban Mahanti. The Web for Underpowered Mobile Devices: Lessons Learned from Google Glass. IEEE Internet Computing 22, no. 3 (2018): 38-47. (Core Ranking: B)
- Ding, Ming, David Lopez-Perez, Holger Claussen, and Mohamed Ali Kaafar. On the fundamental characteristics of ultra-dense small cell networks. IEEE Network 32, no. 3 (2018): 92-100.
- Su, Jingxiu, Zhenyu Li, Stephane Grumbach, Muhammad Ikram, Kave Salamatian, and Gaogang Xie. A cartography of web tracking using dns records. Computer Communications 134 (2019): 83-95. (Core Ranking: C)
- Salamatian, Loqman, Dali Kaafar, and Kavé Salamatian. A Geometric Approach for Real-time Monitoring of Dynamic Large Scale Graphs: AS-level graphs illustrated. arXiv preprint arXiv:1806.00676 (2018).
- Kun Yu, Shlomo Berkovsky, Dan Conway, Ronnie Taib, Jianlong Zhou, Fang Chen, Do I Trust a Machine? Differences in User Trust Based on System Performance, in J.Zhou, F.Chen (eds.): Human and Machine Learning: Visible, Explainable, Trustworthy and Transparent, pp. 245-264, Springer, 2018.
- Shlomo Berkovsky, Ronnie Taib, Yoshinori Hijikata, Pavel Braslavski, Bart Knijnenburg, A Cross-Cultural Analysis of Trust in Recommender Systems, International Conference on User Modeling, Adaptation, and Personalization (UMAP), pp. 285-289, 2018.
- Selvadurai, N, The relevance of technology neutrality to the design of laws to criminalise cyberbullying, (2018) 1(2) International Journal of Law and Public Administration 1-12.
- Selvadurai, N, (Telecommunications Editor), Raiche, H, Part XIB: The survivor, (2018) 26 Australian Journal of Competition and Consumer Law 51.
- Peters, Gareth William and Shevchenko, Pavel V. and Cohen, Ruben D. and Maurice Diane R. Statistical Machine Learning Analysis of Cyber Risk Data: Event Case Studies. Chapter 3 pages 75-99 in FinTech: Growth and Deregulation, RiskBooks, edited by Diane Maurice David Fairman and Jack Freund
- Sheedy, E., & Griffin, B. (2018). Risk governance, structures, culture and behaviour: A view from the inside. Corporate Governance: An International Review, 26(1), 4-22
- Peters, Gareth William, Shevchenko, Pavel V. and Cohen, Ruben D. Understanding Cyber-Risk and Cyber-Insurance. Chapter 12, pages 303-330 in FinTech: Growth and Deregulation, RiskBooks, edited by Diane Maurice, David Fairman and Jack Freund. (2018)
- Huang, Hailong, Andrey V. Savkin, Ming Ding, and Mohamed Ali Kaafar. Optimized deployment of autonomous drones to improve user experience in cellular networks. (2017).
- Abaid, Zainab, Mohamed Ali Kaafar, and Sanjay Jha. Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers. In 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA), pp. 1-10. IEEE, 2017. (Core Ranking: A)
- Ikram, Muhammad, and Mohamed Ali Kaafar. A first look at mobile ad-blocking apps. In 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA), pp. 1-8. IEEE, 2017. (Core Ranking: A)
- Asghar, Hassan Jameel, and Mohamed Ali Kaafar. When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack. Journal of Mathematical Cryptology 11, no. 3 (2017): 177-194. (Core Ranking: C)
- Ikram, Muhammad, Lucky Onwuzurike, Shehroze Farooqi, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohammed Ali Kaafar, and M. Zubair Shafiq. Measuring, characterizing, and detecting Facebook like farms. ACM Transactions on Privacy and Security (TOPS) 20, no. 4 (2017): 1-28. (Core Ranking: A)
- Smith, David B., Kanchana Thilakarathna, and Mohamed Ali Kaafar. More Flexible Differential Privacy: The Application of Piecewise Mixture Distributions in Query Release. (2017).
- Tiroshi, Amit, Tsvi Kuflik, Shlomo Berkovsky, and Mohamed Ali Kaafar. Graph based recommendations: from data representation to feature extraction and application. (2017).
- Abaid, Zainab, Mohamed Ali Kaafar, and Sanjay Jha. Early detection of in-the-wild botnet attacks by exploiting network communication uniformity: An empirical study. In 2017 IFIP Networking Conference (IFIP Networking) and Workshops, pp. 1-9. IEEE, 2017. (Core Ranking: A)
- Wu, Wei, Renping Liu, Wei Ni, Dali Kaafar, and Xiaojing Huang. Ac-prot: An access control model to improve software-defined networking security. In 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), pp. 1-5. IEEE, 2017. (Core Ranking: B)
- Farooqi, Shehroze, Guillaume Jourjon, Muhammad Ikram, Mohamed Ali Kaafar, Emiliano De Cristofaro, Zubair Shafiq, Arik Friedman, and Fareed Zaffar. Characterizing key stakeholders in an online black-hat marketplace. In 2017 APWG Symposium on Electronic Crime Research (eCrime), pp. 17-27. IEEE, 2017.
- Seneviratne, Suranga, Aruna Seneviratne, Mohamed Ali Kaafar, Anirban Mahanti, and Prasant Mohapatra. Spam mobile apps: Characteristics, detection, and in the wild analysis. ACM Transactions on the Web (TWEB) 11, no. 1 (2017): 1-29. (Core Ranking: B)
- Chauhan, Jagmohan, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Jonathan Chan, and Mohamed Ali Kaafar. BehavioCog: An Observation Resistant Authentication Scheme. In International Conference on Financial Cryptography and Data Security, pp. 39-58. Springer, Cham, 2017. (Core Ranking: B)
- Shaghaghi, Arash, Mohamed Ali Kaafar, and Sanjay Jha. Wedgetail: An intrusion prevention system for the data plane of software defined networks. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 849-861. 2017. (Core Ranking: B)
- Thilakarathna, Kanchana, Fang-Zhou Jiang, Sirine Mrabet, Mohamed Ali Kaafar, Aruna Seneviratne, and Gaogang Xie. Crowd-cache: Leveraging on spatio-temporal correlation in content popularity for mobile networking in proximity. Computer Communications 100 (2017): 104-117. (Core Ranking: C)
- Thilakarathna, Kanchana, Suranga Seneviratne, Kamal Gupta, Mohamed Ali Kaafar, and Aruna Seneviratne. A deep dive into location-based communities in social discovery networks. Computer Communications 100 (2017): 78-90. (Core Ranking: C)
- Xie, Gaogang, Zhenyu Li, Mohamed Ali Kaafar, and Qinghua Wu. Access types effect on Internet video services and its implications on CDN caching. IEEE Transactions on Circuits and Systems for Video Technology 28, no. 5 (2017): 1183-1196.
- Ikram, Muhammad, Hassan Jameel Asghar, Mohamed Ali Kaafar, Anirban Mahanti, and Balachandar Krishnamurthy. Towards seamless tracking-free web: Improved detection of trackers via one-class learning. Proceedings on Privacy Enhancing Technologies 2017, no. 1 (2017): 79-99. (Core Ranking: B)
- Shlomo Berkovsky, Ronnie Taib, Dan Conway, How to Recommend? User Trust Factors in Movie Recommender Systems, International Conference on Intelligent User Interfaces (IUI), pp. 287-300, 2017.
- Kun Yu, Shlomo Berkovsky, Ronnie Taib, Dan Conway, Jianlong Zhou, Fang Chen, User Trust Dynamics: An Investigation Driven by Differences in System Performance, International Conference on Intelligent User Interfaces (IUI), pp. 307-317, 2017.
- Internet Law in The Law Handbook, 14th Edition, Thomson Legal & Regulatory, 2017.
- Selvadurai, N, Kisswani, N and Khalaileh, Y, Strengthening data privacy: The obligation of organisations to notify affected individuals of data breaches, (2017) 31(3) International Review of Law, Computers & Technology 1-14. Taylor & Francis, United Kingdom.
- Selvadurai, N, The retention of telecommunications metadata: A necessary national security initiative or a disproportionate interference with personal privacy? (2017) 23(2) Computer and Telecommunications Law Review 35-41. Sweet & Maxwell, United Kingdom.
- Selvadurai, N, (ed), Lee, K, Telecommunications: ACMA varies compliance and monitoring arrangements for the Telecommunications Consumer Protections Code, (2017) 25 Australian Journal of Competition and Consumer Law 62-65.
- Sheedy, E. A., Griffin, B., & Barbour, J. P. (2017). A framework and measure for examining risk climate in financial institutions. Journal of Business and Psychology, 32(1), 101-116
- Blount, Y. (ed.) & Gloet, M. (ed.), 18 Jan 2017, Hershey, PA: Business Science Reference.
- R.S. Targino, G.W. Peters, G. Sofronov and P.V. Shevchenko Optimal Exercise Strategies for Operational Risk Insurance via Multiple Stopping Times. Methodology and Computing in Applied Probability19(2), (2017).
- Yvette Blount* (Editor), Marianne Gloet (Editor) Anywhere working and the new era of telecommuting.