Inference attacks on property-preserving encrypted databases M Naveed, S Kamara, CV Wright Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 658 | 2015 |
Dynamic searchable encryption via blind storage M Naveed, M Prabhakaran, CA Gunter 2014 IEEE Symposium on Security and Privacy (SP), 639-654, 2014 | 401 | 2014 |
Privacy in the Genomic Era M Naveed, E Ayday, EW Clayton, J Fellay, CA Gunter, JP Hubaux, ... ACM Computing Surveys (CSUR), 2015, 2015 | 331 | 2015 |
Identity, location, disease and more: Inferring your secrets from android public resources X Zhou, S Demetriou, D He, M Naveed, X Pan, XF Wang, CA Gunter, ... Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 249 | 2013 |
Leakage-Abuse Attacks against Order-Revealing Encryption P Grubbs, K Sekniqi, V Bindschaedler, M Naveed, T Ristenpart 2017 IEEE Symposium on Security and Privacy (SP), 2017 | 248 | 2017 |
The peril of fragmentation: Security hazards in android device driver customizations X Zhou, Y Lee, N Zhang, M Naveed, XF Wang 2014 IEEE Symposium on Security and Privacy (SP), 409-423, 2014 | 176 | 2014 |
Security Concerns in Android mHealth Apps D He, M Naveed, CA Gunter, K Nahrstedt AMIA 2014 Annual Symposium, 2014 | 160 | 2014 |
Practicing oblivious access on cloud storage: the gap, the fallacy, and the new way forward V Bindschaedler, M Naveed, X Pan, XF Wang, Y Huang Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 135 | 2015 |
The Fallacy of Composition of Oblivious RAM and Searchable Encryption M Naveed | 134 | 2015 |
Breaking Web Applications Built On Top of Encrypted Data P Grubbs, R McPherson, M Naveed, T Ristenpart, V Shmatikov ACM SIGSAC Conference on Computer and Communications Security, 2016 | 122 | 2016 |
Leave Me Alone: App-level Protection Against Runtime Information Gathering on Android N Zhang, K Yuan, M Naveed, X Zhou, XF Wang 2015 IEEE Symposium on Security and Privacy (SP), 2015 | 110 | 2015 |
Inside Job: Understanding and Mitigating the Threat of External Device Mis-Bonding on Android M Naveed, X Zhou, S Demetriou, XF Wang, CA Gunter Proceedings of the 21st Annual Network and Distributed System Security …, 2014 | 103 | 2014 |
Controlled functional encryption M Naveed, S Agrawal, M Prabhakaran, XF Wang, E Ayday, JP Hubaux, ... Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 77 | 2014 |
Exacerbating Algorithmic Bias through Fairness Attacks N Mehrabi, M Naveed, F Morstatter, A Galstyan Proceedings of the AAAI Conference on Artificial Intelligence 35 (10), 8930-8938, 2020 | 75 | 2020 |
Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM C Fletcher, M Naveed, L Ren, E Shi, E Stefanov | 73 | 2015 |
Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services T Li, X Zhou, L Xing, Y Lee, M Naveed, XF Wang, X Han Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 58 | 2014 |
Trinity: A byzantine fault-tolerant distributed publish-subscribe system with immutable blockchain-based persistence GS Ramachandran, KL Wright, L Zheng, P Navaney, M Naveed, ... 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC …, 2019 | 49 | 2019 |
Secure neuroimaging analysis using federated learning with homomorphic encryption D Stripelis, H Saleem, T Ghai, N Dhinagar, U Gupta, C Anastasiou, ... 17th International Symposium on Medical Information Processing and Analysis …, 2021 | 43 | 2021 |
Sok: Anatomy of data breaches H Saleem, M Naveed Proceedings on Privacy Enhancing Technologies, 2020 | 42 | 2020 |
Network intrusion prevention by configuring acls on the routers, based on snort ids alerts M Naveed, S un Nihar, MI Babar 2010 6th International Conference on Emerging Technologies (ICET), 234-239, 2010 | 23 | 2010 |