Search Results - "Kâafar, Mohamed Ali"

Refine Results
  1. 1

    Reliability of crowdsourced data and patient-reported outcome measures in cough-based COVID-19 screening by Xiong, Hao, Berkovsky, Shlomo, Kâafar, Mohamed Ali, Jaffe, Adam, Coiera, Enrico, Sharan, Roneel V.

    Published in Scientific reports (20-12-2022)
    “…Mass community testing is a critical means for monitoring the spread of the COVID-19 pandemic. Polymerase chain reaction (PCR) is the gold standard for…”
    Get full text
    Journal Article
  2. 2

    Characterizing and Modeling User Behavior in a Large-Scale Mobile Live Streaming System by Zhenyu Li, Kaafar, Mohamed Ali, Salamatian, Kave, Gaogang Xie

    “…In mobile live streaming systems, users have fairly limited interactions with streaming objects due to the constraints coming from mobile devices and the…”
    Get full text
    Journal Article
  3. 3

    Local Differentially Private Fuzzy Counting in Stream Data Using Probabilistic Data Structures by Vatsalan, Dinusha, Bhaskar, Raghav, Kaafar, Mohamed Ali

    “…Privacy-preserving estimation of counts of items in streaming data finds applications in several real-world scenarios including word auto-correction and…”
    Get full text
    Journal Article
  4. 4

    On the Fundamental Characteristics of Ultra-Dense Small Cell Networks by Ming Ding, Lopez-Perez, David, Claussen, Holger, Kaafar, Mohamed Ali

    Published in IEEE network (01-05-2018)
    “…In order to cope with the forecasted 1000× increase in wireless capacity demands by 2030, network operators will aggressively densify their network…”
    Get full text
    Journal Article
  5. 5

    Linking wireless devices using information contained in Wi-Fi probe requests by Cunche, Mathieu, Kaafar, Mohamed-Ali, Boreli, Roksana

    Published in Pervasive and mobile computing (01-04-2014)
    “…Active service discovery in Wi-Fi involves wireless stations broadcasting their Wi-Fi fingerprint, i.e. the SSIDs of their preferred wireless networks. The…”
    Get full text
    Journal Article
  6. 6

    Adwords management for third-parties in SEM: An optimisation model and the potential of Twitter by Dong Wang, Zhenyu Li, Gaogang Xie, Kaafar, Mohamed-Ali, Salamatian, Kave

    “…In Search Engine Marketing (SEM), "third-party" partners play an important intermediate role by bridging the gap between search engines and advertisers in…”
    Get full text
    Conference Proceeding
  7. 7

    The Cost of Privacy in Asynchronous Differentially-Private Machine Learning by Farokhi, Farhad, Wu, Nan, Smith, David, Kaafar, Mohamed Ali

    “…We consider training machine learning models using data located on multiple private and geographically-scattered servers with different privacy settings. Due…”
    Get full text
    Journal Article
  8. 8

    Access Types Effect on Internet Video Services and Its Implications on CDN Caching by Xie, Gaogang, Li, Zhenyu, Kaafar, Mohamed Ali, Wu, Qinghua

    “…Video providers heavily rely on geographically distributed content distribution networks (CDNs) to place video content as close to users as possible, with an…”
    Get full text
    Journal Article
  9. 9

    Fairness and Cost Constrained Privacy-Aware Record Linkage by Wu, Nan, Vatsalan, Dinusha, Verma, Sunny, Kaafar, Mohamed Ali

    “…Record linkage algorithms match and link records from different databases that refer to the same real-world entity based on direct and/or quasi-identifiers,…”
    Get full text
    Journal Article
  10. 10

    P4Mobi: A Probabilistic Privacy-Preserving Framework for Publishing Mobility Datasets by Yang, Qing, Shen, Yiran, Vatsalan, Dinusha, Zhang, Jianpei, Kaafar, Mohamed Ali, Hu, Wen

    Published in IEEE transactions on vehicular technology (01-07-2020)
    “…The large-scale collection of individuals' mobility data poses serious privacy concerns. Instead of perturbing data by adding noise to the raw location data to…”
    Get full text
    Journal Article
  11. 11

    A Differentially Private Framework for Deep Learning With Convexified Loss Functions by Lu, Zhigang, Asghar, Hassan Jameel, Kaafar, Mohamed Ali, Webb, Darren, Dickinson, Peter

    “…Differential privacy (DP) has been applied in deep learning for preserving privacy of the underlying training sets. Existing DP practice falls into three…”
    Get full text
    Journal Article
  12. 12

    Investigating Evasive Techniques in SMS Spam Filtering: A Comparative Analysis of Machine Learning Models by Salman, Muhammad, Ikram, Muhammad, Kaafar, Mohamed Ali

    Published in IEEE access (2024)
    “…The persistence of SMS spam remains a significant challenge, highlighting the need for research aimed at developing systems capable of effectively handling the…”
    Get full text
    Journal Article
  13. 13

    SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation by Jmal, Houssem, Hmida, Firas Ben, Basta, Nardine, Ikram, Muhammad, Kaafar, Mohamed Ali, Walker, Andy

    “…Attack paths are the potential chain of malicious activities an attacker performs to compromise network assets and acquire privileges through exploiting…”
    Get full text
    Journal Article
  14. 14

    Do Auto-Regressive Models Protect Privacy? Inferring Fine-Grained Energy Consumption From Aggregated Model Parameters by Sheikh, Nazim Uddin, Asghar, Hassan Jameel, Farokhi, Farhad, Kaafar, Mohamed Ali

    Published in IEEE transactions on services computing (01-11-2022)
    “…We investigate the extent to which statistical predictive models leak information about their training data. More specifically, based on the use case of…”
    Get full text
    Journal Article
  15. 15

    Privacy-Aware Multipath Video Caching for Content-Centric Networks by Qinghua Wu, Zhenyu Li, Tyson, Gareth, Uhlig, Steve, Kaafar, Mohamed Ali, Gaogang Xie

    “…The prevalence of Internet video streaming challenges the design and operation of modern networks. Content centric networking (CCN) has been proposed to…”
    Get full text
    Journal Article
  16. 16

    Crowd-Cache: Leveraging on spatio-temporal correlation in content popularity for mobile networking in proximity by Thilakarathna, Kanchana, Jiang, Fang-Zhou, Mrabet, Sirine, Ali Kaafar, Mohamed, Seneviratne, Aruna, Xie, Gaogang

    Published in Computer communications (01-03-2017)
    “…Mobile capped plans are being increasingly adopted by mobile operators due to an exponential data traffic growth. Users then often suffer high data consumption…”
    Get full text
    Journal Article
  17. 17

    When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack by Asghar Hassan Jameel, Kaafar Mohamed Ali

    Published in Journal of mathematical cryptology (01-10-2017)
    “…Cryptographic identification protocols enable a prover to prove its identity to a verifier. A subclass of such protocols are shared-secret challenge-response…”
    Get full text
    Journal Article
  18. 18

    On the geographic patterns of a large-scale mobile video-on-demand system by Zhenyu Li, Gaogang Xie, Jiali Lin, Yun Jin, Kaafar, Mohamed-Ali, Salamatian, Kavé

    “…The widespread availability of smart mobile terminals along with the ever increasing bandwidth capabilities has promoted the popularity of mobile Internet…”
    Get full text
    Conference Proceeding
  19. 19

    A genealogy of information spreading on microblogs: A Galton-Watson-based explicative model by Dong Wang, Hosung Park, Gaogang Xie, Sue Moon, Kaafar, Mohamed-Ali, Salamatian, Kave

    Published in 2013 Proceedings IEEE INFOCOM (01-04-2013)
    “…In this paper, we study the process of information diffusion in a microblog service developing Galton-Watson with Killing (GWK) model. Microblog services offer…”
    Get full text
    Conference Proceeding
  20. 20

    Local Differentially Private Fuzzy Counting in Stream Data using Probabilistic Data Structure by Vatsalan, Dinusha, Bhaskar, Raghav, Kaafar, Mohamed Ali

    Published 30-11-2022
    “…Privacy-preserving estimation of counts of items in streaming data finds applications in several real-world scenarios including word auto-correction and…”
    Get full text
    Journal Article