ORCID as entered in ROS

Select Publications
2025, 'BeyondLife: Third-Party Digital Will Application', in Companion Proceedings of the ACM on Web Conference 2025, ACM, pp. 2811 - 2814, presented at WWW '25: The ACM Web Conference 2025, http://dx.doi.org/10.1145/3701716.3715168
,2025, 'Navigating the Gray Interventions: The Impact of Soft Moderation Techniques Across Social Media Platforms', in Companion Proceedings of the ACM on Web Conference 2025, ACM, pp. 1067 - 1071, presented at WWW '25: The ACM Web Conference 2025, http://dx.doi.org/10.1145/3701716.3715511
,2025, 'Evaluating Large Language Models on Health-Related Claims Across Arabic Dialects', in Proceedings International Conference on Computational Linguistics Coling, pp. 95 - 103
,2024, 'DEMO : Passive Identification of WiFi Devices in Real-Time', in SIGCOMM Posters and Demos 2024 Proceedings of the 2024 SIGCOMM Poster and Demo Sessions Part of SIGCOMM 2024, pp. 92 - 94, http://dx.doi.org/10.1145/3672202.3673716
,2024, 'Demo: P4Xtnd: P4 Programmability on Resource Constrained Environments with Extended Network Functionalities', in SIGCOMM Posters and Demos 2024 Proceedings of the 2024 SIGCOMM Poster and Demo Sessions Part of SIGCOMM 2024, pp. 104 - 106, http://dx.doi.org/10.1145/3672202.3673731
,2024, 'Poster: Zero Trust Driven Architecture for Blockchain-Based Access Control Delegation', in SIGCOMM Posters and Demos 2024 Proceedings of the 2024 SIGCOMM Poster and Demo Sessions Part of SIGCOMM 2024, pp. 48 - 50, http://dx.doi.org/10.1145/3672202.3673737
,2024, 'Honeyfile Camouflage: Hiding Fake Files in Plain Sight', in ACM Wdc 2024 Proceedings of the 3rd ACM Workshop on Security Implications of Deepfakes and Cheapfakes, pp. 1 - 7, http://dx.doi.org/10.1145/3660354.3660355
,2024, 'Make out like a (Multi-Armed) Bandit: Improving the Odds of Fuzzer Seed Scheduling with T-Scheduler', in ACM Asiaccs 2024 Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, pp. 1463 - 1479, http://dx.doi.org/10.1145/3634737.3637639
,2024, 'Mitigating Distributed Backdoor Attack in Federated Learning Through Mode Connectivity', in ACM Asiaccs 2024 Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, pp. 1287 - 1298, http://dx.doi.org/10.1145/3634737.3637682
,2024, 'SoK: False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations', in ACM Asiaccs 2024 Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, pp. 1784 - 1800, http://dx.doi.org/10.1145/3634737.3644998
,2024, 'VLIA: Navigating Shadows with Proximity for Highly Accurate Visited Location Inference Attack against Federated Recommendation Models', in ACM Asiaccs 2024 Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, pp. 1261 - 1271, http://dx.doi.org/10.1145/3634737.3657019
,2024, 'Multiple Hypothesis Dropout: Estimating the Parameters of Multi-Modal Output Distributions', in Proceedings of the Aaai Conference on Artificial Intelligence, pp. 14440 - 14448, http://dx.doi.org/10.1609/aaai.v38i13.29358
,2024, 'Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning', in Proceedings Annual Computer Security Applications Conference Acsac, pp. 794 - 809, http://dx.doi.org/10.1109/ACSAC63791.2024.00070
,2024, 'BRAIN 2024: Fifth Workshop on Blockchain theoRy and ApplicatIoNs - Welcome and Committees', in 2024 IEEE International Conference on Pervasive Computing and Communications Workshops and Other Affiliated Events Percom Workshops 2024, pp. 12 - 13, http://dx.doi.org/10.1109/PerComWorkshops59983.2024.10502510
,2024, 'Comparison of Multilingual and Bilingual Models for Satirical News Detection of Arabic and English', in Alta 2024 Proceedings of the 22nd Annual Workshop of the Australasian Language Technology Association, pp. 173 - 178
,2024, 'Comparison of Multilingual and Bilingual Models for Satirical News Detection of Arabic and English', in Proceedings of the Australasian Language Technology Workshop, pp. 173 - 178
,2024, 'Cost-aware Blockchain Mining Strategy: Dynamic Energy Pricing (DEP) Model', in 2024 6th Conference on Blockchain Research and Applications for Innovative Networks and Services Brains 2024, http://dx.doi.org/10.1109/BRAINS63024.2024.10732382
,2024, 'CredAct: Privacy-Preserving Activity Verification for Benefits Schemes in Self-Sovereign Identity', in 2024 IEEE International Conference on Blockchain and Cryptocurrency Icbc 2024, pp. 425 - 433, http://dx.doi.org/10.1109/ICBC59979.2024.10634429
,2024, 'CypherChain: A Privacy-Preserving Data Aggregation Framework for Blockchain-Based DR Programs', in 2024 IEEE International Conference on Blockchain and Cryptocurrency Icbc 2024, pp. 362 - 364, http://dx.doi.org/10.1109/ICBC59979.2024.10634420
,2024, 'Demo: P4 Based In-network ML with Federated Learning to Secure and Slice IoT Networks', in Proceedings 2024 IEEE 25th International Symposium on A World of Wireless Mobile and Multimedia Networks Wowmom 2024, pp. 304 - 306, http://dx.doi.org/10.1109/WoWMoM60985.2024.00056
,2024, 'Demystifying Trajectory Recovery from Ash: An Open-Source Evaluation and Enhancement', in 2024 17th International Conference on Security of Information and Networks Sin 2024, http://dx.doi.org/10.1109/SIN63213.2024.10871881
,2024, 'Discretization-Based Ensemble Model for Robust Learning in IoT', in Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering Lnicst, pp. 353 - 367, http://dx.doi.org/10.1007/978-3-031-63992-0_23
,2024, 'Domain Invariant Driving Behaviour Prediction Based on Autoencoder Anomaly Detection', in 2024 IEEE International Conference on Pervasive Computing and Communications Workshops and Other Affiliated Events Percom Workshops 2024, pp. 449 - 452, http://dx.doi.org/10.1109/PerComWorkshops59983.2024.10502834
,2024, 'Local Differential Privacy for Smart Meter Data Sharing with Energy Disaggregation', in Proceedings 2024 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things Dcoss Iot 2024, pp. 1 - 10, http://dx.doi.org/10.1109/DCOSS-IoT61029.2024.00012
,2024, 'Multi-MedChain: Multi-Party Multi-Blockchain Medical Supply Chain Management System', in Proceedings 2024 IEEE Annual Congress on Artificial Intelligence of Things Aiot 2024, pp. 153 - 159, http://dx.doi.org/10.1109/AIoT63253.2024.00038
,2024, 'On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World', in Proceedings Annual Computer Security Applications Conference Acsac, pp. 940 - 956, http://dx.doi.org/10.1109/ACSAC63791.2024.00079
,2024, 'Passive Identification of WiFi Devices At-Scale: A Data-Driven Approach', in Proceedings Conference on Local Computer Networks LCN, http://dx.doi.org/10.1109/LCN60385.2024.10639764
,2024, 'Poster: Towards Privacy-Preserving Federated Recommendation via Synthetic Interactions', in Proceedings 45th IEEE Symposium on Security and Privacy Workshops Spw 2024, pp. 297, http://dx.doi.org/10.1109/SPW63631.2024.00037
,2024, 'ProfitMax: Optimizing Blockchain Mining for Energy Efficiency and Profitability', in Proceedings 2024 IEEE International Conference on Decentralized Applications and Infrastructures Dapps 2024, pp. 25 - 30, http://dx.doi.org/10.1109/DAPPS61106.2024.00011
,2024, 'SAfER: Simplified Auto-encoder for (Anomalous) Event Recognition', in Proceedings 2024 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things Dcoss Iot 2024, pp. 229 - 233, http://dx.doi.org/10.1109/DCOSS-IoT61029.2024.00041
,2024, 'Synthetic Trajectory Generation Through Convolutional Neural Networks', in 2024 21st Annual International Conference on Privacy Security and Trust Pst 2024, http://dx.doi.org/10.1109/PST62714.2024.10788061
,2024, 'Towards Weaknesses and Attack Patterns Prediction for IoT Devices', in 2024 17th International Conference on Security of Information and Networks Sin 2024, http://dx.doi.org/10.1109/SIN63213.2024.10871298
,2024, 'WiSense 2024: 1st International Workshop on Pervasive Wireless Sensing and Edge Computing - Welcome and Committees', in 2024 IEEE International Conference on Pervasive Computing and Communications Workshops and Other Affiliated Events Percom Workshops 2024, pp. 61 - 62, http://dx.doi.org/10.1109/PerComWorkshops59983.2024.10503163
,2023, 'Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness', in Proceedings of the 37th Aaai Conference on Artificial Intelligence Aaai 2023, pp. 14783 - 14791, http://dx.doi.org/10.1609/aaai.v37i12.26727
,2023, 'A Blockchain-Based Interoperable Architecture for IoT with Selective Disclosure of Information', in Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing Prdc, pp. 53 - 63, http://dx.doi.org/10.1109/PRDC59308.2023.00016
,2023, 'BAILIF: A Blockchain Agnostic Interoperability Framework', in 2023 IEEE International Conference on Blockchain and Cryptocurrency Icbc 2023, http://dx.doi.org/10.1109/ICBC56567.2023.10174967
,2023, 'Deciphering DDoS Attacks Through a Global Lens', in 2023 19th International Conference on Network and Service Management Cnsm 2023, http://dx.doi.org/10.23919/CNSM59352.2023.10327886
,2023, 'Message from Program Chairs and the Steering Committee Chair', in Proceedings 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things Dcoss Iot 2023, pp. xxi - xxii, http://dx.doi.org/10.1109/DCOSS-IoT58021.2023.00005
,2023, 'Privacy-preserving Trust Management for Blockchain-based Resource Sharing in 6G-IoT', in 2023 IEEE International Conference on Blockchain and Cryptocurrency Icbc 2023, http://dx.doi.org/10.1109/ICBC56567.2023.10174987
,2023, 'PublicCheck: Public Integrity Verification for Services of Run-time Deep Models', in Proceedings IEEE Symposium on Security and Privacy, pp. 1348 - 1365, http://dx.doi.org/10.1109/SP46215.2023.10179380
,2023, 'Towards Automatic Annotation and Detection of Fake News', in Proceedings Conference on Local Computer Networks LCN, http://dx.doi.org/10.1109/LCN58197.2023.10223359
,2023, 'Trust and Reputation Management for Blockchain-enabled IoT', in 2023 15th International Conference on Communication Systems and Networks Comsnets 2023, pp. 529 - 536, http://dx.doi.org/10.1109/COMSNETS56262.2023.10041348
,2023, 'VCTP: A Verifiable Credential-Based Trust Propagation Protocol for Personal Issuers in Self-Sovereign Identity Platforms', in Proceedings 2023 IEEE International Conference on Decentralized Applications and Infrastructures Dapps 2023, pp. 109 - 118, http://dx.doi.org/10.1109/DAPPS57946.2023.00023
,2022, 'Reconstruction Attack on Differential Private Trajectory Protection Mechanisms', in ACM International Conference Proceeding Series, pp. 279 - 292, http://dx.doi.org/10.1145/3564625.3564628
,2022, 'Message from Organizers', in Sensys 2022 Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, pp. xix
,2022, 'Transferable Graph Backdoor Attack', in ACM International Conference Proceeding Series, pp. 321 - 332, http://dx.doi.org/10.1145/3545948.3545976
,2022, 'A Novel Emergency Light Based Smart Building Solution: Design, Implementation, and Use Cases', in Proceedings - 2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems, MASS 2022, pp. 577 - 585, http://dx.doi.org/10.1109/MASS56207.2022.00086
,2022, 'Blockchain-Based Decentralized Federated Learning', in 2022 4th International Conference on Blockchain Computing and Applications Bcca 2022, pp. 99 - 106, http://dx.doi.org/10.1109/BCCA55292.2022.9921963
,2022, 'CredTrust: Credential Based Issuer Management for Trust in Self-Sovereign Identity', in Proceedings 2022 IEEE International Conference on Blockchain Blockchain 2022, pp. 334 - 339, http://dx.doi.org/10.1109/Blockchain55522.2022.00053
,2022, 'Deep Reinforcement Learning for Dynamic Things of Interest Recommendation in Intelligent Ambient Environment', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 393 - 404, http://dx.doi.org/10.1007/978-3-030-97546-3_32
,