Search Results - "Kâafar, Mohamed Ali"
-
1
Reliability of crowdsourced data and patient-reported outcome measures in cough-based COVID-19 screening
Published in Scientific reports (20-12-2022)“…Mass community testing is a critical means for monitoring the spread of the COVID-19 pandemic. Polymerase chain reaction (PCR) is the gold standard for…”
Get full text
Journal Article -
2
Characterizing and Modeling User Behavior in a Large-Scale Mobile Live Streaming System
Published in IEEE transactions on circuits and systems for video technology (01-12-2017)“…In mobile live streaming systems, users have fairly limited interactions with streaming objects due to the constraints coming from mobile devices and the…”
Get full text
Journal Article -
3
Local Differentially Private Fuzzy Counting in Stream Data Using Probabilistic Data Structures
Published in IEEE transactions on knowledge and data engineering (01-08-2023)“…Privacy-preserving estimation of counts of items in streaming data finds applications in several real-world scenarios including word auto-correction and…”
Get full text
Journal Article -
4
On the Fundamental Characteristics of Ultra-Dense Small Cell Networks
Published in IEEE network (01-05-2018)“…In order to cope with the forecasted 1000× increase in wireless capacity demands by 2030, network operators will aggressively densify their network…”
Get full text
Journal Article -
5
Linking wireless devices using information contained in Wi-Fi probe requests
Published in Pervasive and mobile computing (01-04-2014)“…Active service discovery in Wi-Fi involves wireless stations broadcasting their Wi-Fi fingerprint, i.e. the SSIDs of their preferred wireless networks. The…”
Get full text
Journal Article -
6
Adwords management for third-parties in SEM: An optimisation model and the potential of Twitter
Published in IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications (01-04-2016)“…In Search Engine Marketing (SEM), "third-party" partners play an important intermediate role by bridging the gap between search engines and advertisers in…”
Get full text
Conference Proceeding -
7
The Cost of Privacy in Asynchronous Differentially-Private Machine Learning
Published in IEEE transactions on information forensics and security (2021)“…We consider training machine learning models using data located on multiple private and geographically-scattered servers with different privacy settings. Due…”
Get full text
Journal Article -
8
Access Types Effect on Internet Video Services and Its Implications on CDN Caching
Published in IEEE transactions on circuits and systems for video technology (01-05-2018)“…Video providers heavily rely on geographically distributed content distribution networks (CDNs) to place video content as close to users as possible, with an…”
Get full text
Journal Article -
9
Fairness and Cost Constrained Privacy-Aware Record Linkage
Published in IEEE transactions on information forensics and security (2022)“…Record linkage algorithms match and link records from different databases that refer to the same real-world entity based on direct and/or quasi-identifiers,…”
Get full text
Journal Article -
10
P4Mobi: A Probabilistic Privacy-Preserving Framework for Publishing Mobility Datasets
Published in IEEE transactions on vehicular technology (01-07-2020)“…The large-scale collection of individuals' mobility data poses serious privacy concerns. Instead of perturbing data by adding noise to the raw location data to…”
Get full text
Journal Article -
11
A Differentially Private Framework for Deep Learning With Convexified Loss Functions
Published in IEEE transactions on information forensics and security (2022)“…Differential privacy (DP) has been applied in deep learning for preserving privacy of the underlying training sets. Existing DP practice falls into three…”
Get full text
Journal Article -
12
Investigating Evasive Techniques in SMS Spam Filtering: A Comparative Analysis of Machine Learning Models
Published in IEEE access (2024)“…The persistence of SMS spam remains a significant challenge, highlighting the need for research aimed at developing systems capable of effectively handling the…”
Get full text
Journal Article -
13
SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation
Published in IEEE transactions on information forensics and security (2024)“…Attack paths are the potential chain of malicious activities an attacker performs to compromise network assets and acquire privileges through exploiting…”
Get full text
Journal Article -
14
Do Auto-Regressive Models Protect Privacy? Inferring Fine-Grained Energy Consumption From Aggregated Model Parameters
Published in IEEE transactions on services computing (01-11-2022)“…We investigate the extent to which statistical predictive models leak information about their training data. More specifically, based on the use case of…”
Get full text
Journal Article -
15
Privacy-Aware Multipath Video Caching for Content-Centric Networks
Published in IEEE journal on selected areas in communications (01-08-2016)“…The prevalence of Internet video streaming challenges the design and operation of modern networks. Content centric networking (CCN) has been proposed to…”
Get full text
Journal Article -
16
Crowd-Cache: Leveraging on spatio-temporal correlation in content popularity for mobile networking in proximity
Published in Computer communications (01-03-2017)“…Mobile capped plans are being increasingly adopted by mobile operators due to an exponential data traffic growth. Users then often suffer high data consumption…”
Get full text
Journal Article -
17
When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack
Published in Journal of mathematical cryptology (01-10-2017)“…Cryptographic identification protocols enable a prover to prove its identity to a verifier. A subclass of such protocols are shared-secret challenge-response…”
Get full text
Journal Article -
18
On the geographic patterns of a large-scale mobile video-on-demand system
Published in IEEE INFOCOM 2014 - IEEE Conference on Computer Communications (01-04-2014)“…The widespread availability of smart mobile terminals along with the ever increasing bandwidth capabilities has promoted the popularity of mobile Internet…”
Get full text
Conference Proceeding -
19
A genealogy of information spreading on microblogs: A Galton-Watson-based explicative model
Published in 2013 Proceedings IEEE INFOCOM (01-04-2013)“…In this paper, we study the process of information diffusion in a microblog service developing Galton-Watson with Killing (GWK) model. Microblog services offer…”
Get full text
Conference Proceeding -
20
Local Differentially Private Fuzzy Counting in Stream Data using Probabilistic Data Structure
Published 30-11-2022“…Privacy-preserving estimation of counts of items in streaming data finds applications in several real-world scenarios including word auto-correction and…”
Get full text
Journal Article