IP geolocation databases: Unreliable? I Poese, S Uhlig, MA Kaafar, B Donnet, B Gueye ACM SIGCOMM Computer Communication Review 41 (2), 53-56, 2011 | 480 | 2011 |
The impact of adverse weather conditions on autonomous vehicles: How rain, snow, fog, and hail affect the performance of a self-driving car S Zang, M Ding, D Smith, P Tyler, T Rakotoarivelo, MA Kaafar IEEE vehicular technology magazine 14 (2), 103-111, 2019 | 340 | 2019 |
How unique and traceable are usernames? D Perito, C Castelluccia, MA Kaafar, P Manils International Symposium on Privacy Enhancing Technologies Symposium, 1-17, 2011 | 323 | 2011 |
Ephpub: Toward robust ephemeral publishing C Castelluccia, E De Cristofaro, A Francillon, MA Kaafar 2011 19th IEEE International Conference on Network Protocols, 165-175, 2011 | 293 | 2011 |
You Are What You Like! Information leakage through users’ Interests AB Chaabane, G Acs, MA Kaafar Information leakage through users’ Interests, in" proceedings of the The …, 2012 | 208 | 2012 |
An analysis of the privacy and security risks of android vpn permission-enabled apps M Ikram, N Vallina-Rodriguez, S Seneviratne, MA Kaafar, V Paxson Proceedings of the 2016 internet measurement conference, 349-364, 2016 | 182 | 2016 |
Digging into anonymous traffic: A deep analysis of the tor anonymizing network A Chaabane, P Manils, MA Kaafar 2010 fourth international conference on network and system security, 167-174, 2010 | 174 | 2010 |
Paying for likes? understanding facebook like fraud using honeypots E De Cristofaro, A Friedman, G Jourjon, MA Kaafar, MZ Shafiq Proceedings of the 2014 Conference on Internet Measurement Conference, 129-136, 2014 | 169 | 2014 |
Applying differential privacy to matrix factorization A Berlioz, A Friedman, MA Kaafar, R Boreli, S Berkovsky Proceedings of the 9th ACM Conference on Recommender Systems, 107-114, 2015 | 156 | 2015 |
Software-defined network (SDN) data plane security: issues, solutions, and future directions A Shaghaghi, MA Kaafar, R Buyya, S Jha Handbook of Computer Networks and Cyber Security: Principles and Paradigms …, 2020 | 155 | 2020 |
Privacy in content-oriented networking: Threats and countermeasures A Chaabane, E De Cristofaro, MA Kaafar, E Uzun ACM SIGCOMM Computer Communication Review 43 (3), 25-33, 2013 | 152 | 2013 |
On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices. G Sarwar, O Mehani, R Boreli, MA Kaafar SECRYPT 96435, 2013 | 135 | 2013 |
TLS in the wild: an Internet-wide analysis of TLS-based protocols for electronic communication R Holz, J Amann, O Mehani, M Wachs, MA Kaafar The Network and Distributed System Security Symposium 2016, 2015 | 125 | 2015 |
Linking wireless devices using information contained in Wi-Fi probe requests M Cunche, MA Kaafar, R Boreli Pervasive and Mobile Computing 11, 56-69, 2014 | 122 | 2014 |
Censorship in the wild: Analyzing Internet filtering in Syria A Chaabane, T Chen, M Cunche, E De Cristofaro, A Friedman, MA Kaafar Proceedings of the 2014 Conference on Internet Measurement Conference, 285-298, 2014 | 120 | 2014 |
Mobile health and privacy: cross sectional study G Tangari, M Ikram, K Ijaz, MA Kaafar, S Berkovsky bmj 373, 2021 | 115 | 2021 |
I know who you will meet this evening! linking wireless devices using wi-fi probe requests M Cunche, MA Kaafar, R Boreli 2012 IEEE International Symposium on a World of Wireless, Mobile and …, 2012 | 115 | 2012 |
The Value of Collaboration in Convex Machine Learning with Differential Privacy N Wu, F Farokhi, D Smith, MA Kaafar The 41th IEEE Symposium on Security and Privacy (IEEE S&P 2020), 2020 | 108 | 2020 |
A differential privacy framework for matrix factorization recommender systems A Friedman, S Berkovsky, MA Kaafar User Modeling and User-Adapted Interaction 26, 425-458, 2016 | 106 | 2016 |
Watching videos from everywhere: a study of the pptv mobile vod system Z Li, J Lin, MI Akodjenou, G Xie, MA Kaafar, Y Jin, G Peng Proceedings of the 2012 internet measurement conference, 185-198, 2012 | 106 | 2012 |