The relationship between trust in AI and trustworthy machine learning technologies E Toreini, M Aitken, K Coopamootoo, K Elliott, CG Zelaya, A Van Moorsel Proceedings of the 2020 conference on fairness, accountability, and …, 2020 | 303 | 2020 |
Stealing PINs via mobile sensors: actual risk versus user perception M Mehrnezhad, E Toreini, SF Shahandashti, F Hao International Journal of Information Security 17 (3), 291-313, 2018 | 88 | 2018 |
Simulating the effects of social presence on trust, privacy concerns & usage intentions in automated bots for finance M Ng, KPL Coopamootoo, E Toreini, M Aitken, K Elliot, A van Moorsel 2020 IEEE European symposium on security and privacy workshops (EuroS&PW …, 2020 | 74 | 2020 |
On the privacy of private browsing–a forensic approach K Satvat, M Forshaw, F Hao, E Toreini Journal of Information Security and Applications 19 (1), 88-100, 2014 | 74 | 2014 |
Touchsignatures: identification of user touch actions and PINs based on mobile sensor data via javascript M Mehrnezhad, E Toreini, SF Shahandashti, F Hao Journal of Information Security and Applications 26, 23-38, 2016 | 61 | 2016 |
Establishing a social licence for Financial Technology: Reflections on the role of the private sector in pursuing ethical data practices M Aitken, E Toreini, P Carmichael, K Coopamootoo, K Elliott, ... Big Data & Society 7 (1), 2053951720908892, 2020 | 49 | 2020 |
Texture to the rescue: Practical paper fingerprinting based on texture patterns E Toreini, SF Shahandashti, F Hao ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-29, 2017 | 34 | 2017 |
Bodies like yours: Enquiring data privacy in Femtech T Almeida, L Shipp, M Mehrnezhad, E Toreini Adjunct Proceedings of the 2022 Nordic Human-Computer Interaction Conference …, 2022 | 28 | 2022 |
How can and would people protect from online tracking? M Mehrnezhad, K Coopamootoo, E Toreini Proceedings on Privacy Enhancing Technologies 1, 2021 | 25 | 2021 |
Vision: too little too late? Do the risks of Femtech already outweigh the benefits? M Mehrnezhad, L Shipp, T Almeida, E Toreini Proceedings of the 2022 European Symposium on Usable Security, 145-150, 2022 | 23 | 2022 |
" I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country KPL Coopamootoo, M Mehrnezhad, E Toreini 31st USENIX Security Symposium (USENIX Security 22), 287-304, 2022 | 19 | 2022 |
Technologies for trustworthy machine learning: A survey in a socio-technical context E Toreini, M Aitken, KPL Coopamootoo, K Elliott, VG Zelaya, P Missier, ... arXiv preprint arXiv:2007.08911v3, 2020 | 18 | 2020 |
On secure e-voting over blockchain P McCorry, M Mehrnezhad, E Toreini, SF Shahandashti, F Hao Digital Threats: Research and Practice (DTRAP) 2 (4), 1-13, 2021 | 16 | 2021 |
What is this sensor and does this app need access to it? M Mehrnezhad, E Toreini Informatics 6 (1), 7, 2019 | 16 | 2019 |
An acoustic side channel attack on enigma E Toreini, B Randell, F Hao School of Computing Science Technical Report Series, 2015 | 16 | 2015 |
DOMtegrity: ensuring web page integrity against malicious browser extensions E Toreini, SF Shahandashti, M Mehrnezhad, F Hao International Journal of Information Security 18, 801-814, 2019 | 14 | 2019 |
Anti-counterfeiting for polymer banknotes based on polymer substrate fingerprinting S Wang, E Toreini, F Hao IEEE Transactions on Information Forensics and Security 16, 2823-2835, 2021 | 13 | 2021 |
Multiple seimcha: multiple semantic image captcha M Mehrnejad, AG Bafghi, A Harati, E Toreini 2011 International Conference for Internet Technology and Secured …, 2011 | 12* | 2011 |
Touchsignatures: Identification of user touch actions based on mobile sensors via javascript M Mehrnezhad, E Toreini, SF Shahandashti, F Hao Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 11 | 2015 |
SEIMCHA: A New Semantic Image CAPTCHA Using Geometric Transformations. M Mehrnejad, AG Bafghi, A Harati, E Toreini ISeCure 4 (1), 2012 | 11 | 2012 |