Sledovat
Ehsan Toreini
Ehsan Toreini
Department of Computer Science, University of Surrey
E-mailová adresa ověřena na: surrey.ac.uk - Domovská stránka
Název
Citace
Citace
Rok
The relationship between trust in AI and trustworthy machine learning technologies
E Toreini, M Aitken, K Coopamootoo, K Elliott, CG Zelaya, A Van Moorsel
Proceedings of the 2020 conference on fairness, accountability, and …, 2020
3722020
Simulating the effects of social presence on trust, privacy concerns & usage intentions in automated bots for finance
M Ng, KPL Coopamootoo, E Toreini, M Aitken, K Elliot, A van Moorsel
2020 IEEE European symposium on security and privacy workshops (EuroS&PW …, 2020
972020
Stealing PINs via mobile sensors: actual risk versus user perception
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
International Journal of Information Security 17 (3), 291-313, 2018
892018
On the privacy of private browsing–a forensic approach
K Satvat, M Forshaw, F Hao, E Toreini
Journal of Information Security and Applications 19 (1), 88-100, 2014
752014
Establishing a social licence for Financial Technology: Reflections on the role of the private sector in pursuing ethical data practices
M Aitken, E Toreini, P Carmichael, K Coopamootoo, K Elliott, ...
Big Data & Society 7 (1), 2053951720908892, 2020
742020
Touchsignatures: identification of user touch actions and PINs based on mobile sensor data via javascript
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
Journal of Information Security and Applications 26, 23-38, 2016
652016
Bodies like yours: enquiring data privacy in femtech
T Almeida, L Shipp, M Mehrnezhad, E Toreini
Adjunct Proceedings of the 2022 Nordic Human-Computer Interaction Conference …, 2022
432022
Vision: too little too late? do the risks of femtech already outweigh the benefits?
M Mehrnezhad, L Shipp, T Almeida, E Toreini
Proceedings of the 2022 European symposium on usable security, 145-150, 2022
412022
Texture to the rescue: Practical paper fingerprinting based on texture patterns
E Toreini, SF Shahandashti, F Hao
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-29, 2017
392017
A practical deep learning-based acoustic side channel attack on keyboards
J Harrison, E Toreini, M Mehrnezhad
2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2023
382023
How can and would people protect from online tracking?
M Mehrnezhad, K Coopamootoo, E Toreini
Proceedings on Privacy Enhancing Technologies 1, 2021
362021
" I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country
KPL Coopamootoo, M Mehrnezhad, E Toreini
31st USENIX Security Symposium (USENIX Security 22), 287-304, 2022
282022
On secure e-voting over blockchain
P McCorry, M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
Digital Threats: Research and Practice (DTRAP) 2 (4), 1-13, 2021
242021
An acoustic side channel attack on enigma
E Toreini, B Randell, F Hao
School of Computing Science Technical Report Series, 2015
232015
Technologies for trustworthy machine learning: A survey in a socio-technical context
E Toreini, M Aitken, KPL Coopamootoo, K Elliott, VG Zelaya, P Missier, ...
arXiv preprint arXiv:2007.08911v3, 2020
222020
Anti-counterfeiting for polymer banknotes based on polymer substrate fingerprinting
S Wang, E Toreini, F Hao
IEEE Transactions on Information Forensics and Security 16, 2823-2835, 2021
172021
DOMtegrity: ensuring web page integrity against malicious browser extensions
E Toreini, SF Shahandashti, M Mehrnezhad, F Hao
International Journal of Information Security 18, 801-814, 2019
172019
What is this sensor and does this app need access to it?
M Mehrnezhad, E Toreini
Informatics 6 (1), 7, 2019
162019
Keeping it human: A focus group study of public attitudes towards AI in banking
M Aitken, M Ng, E Toreini, A van Moorsel, KPL Coopamootoo, K Elliott
Computer Security: ESORICS 2020 International Workshops, DETIPS, DeSECSys …, 2020
142020
SEIMCHA: A New Semantic Image CAPTCHA Using Geometric Transformations.
M Mehrnejad, AG Bafghi, A Harati, E Toreini
ISeCure 4 (1), 2012
122012
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–20