default search action
Muhammad Naveed 0001
Person information
- affiliation: University of Southern California, USA
- affiliation: University of Illinois at Urbana-Champaign, USA
Other persons with the same name
- Muhammad Naveed (aka: Naveed Muhammad) — disambiguation page
- Muhammad Naveed 0002 — Muhammad Ali Jinnah University, Karachi, Pakistan
- Muhammad Naveed 0003 (aka: Naveed Muhammad 0003) — National University of Sciences and Technology, Department of Robotics and Artificial Intelligence, Islamabad, Pakistan (and 1 more)
- Muhammad Naveed 0004 (aka: Naveed 0001) — Karachi Institute of Economics and Technology, PAF-KIET, Pakistan
- Muhammad Naveed 0005 — University of Central Punjab, Department of Biotechnology, Lahore, Pakistan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Dimitris Stripelis, Umang Gupta, Hamza Saleem, Nikhil J. Dhinagar, Tanmay Ghai, Chrysovalantis Anastasiou, Rafael Sanchez, Greg Ver Steeg, Srivatsan Ravi, Muhammad Naveed, Paul M. Thompson, José Luis Ambite:
A federated learning architecture for secure and private neuroimaging analysis. Patterns 5(8): 101031 (2024) - 2022
- [c19]Weizhao Jin, Bhaskar Krishnamachari, Muhammad Naveed, Srivatsan Ravi, Eduard Sanou, Kwame-Lante Wright:
Secure Publish-Process-Subscribe System for Dispersed Computing. SRDS 2022: 58-68 - [i11]Mehrdad Kiamari, Bhaskar Krishnamachari, Muhammad Naveed, Seokgu Yun:
Blizzard: a Distributed Consensus Protocol for Mobile Devices. CoRR abs/2201.02002 (2022) - [i10]Dimitris Stripelis, Umang Gupta, Hamza Saleem, Nikhil J. Dhinagar, Tanmay Ghai, Rafael Sanchez, Chrysovalantis Anastasiou, Armaghan Asghar, Greg Ver Steeg, Srivatsan Ravi, Muhammad Naveed, Paul M. Thompson, José Luis Ambite:
Secure Federated Learning for Neuroimaging. CoRR abs/2205.05249 (2022) - 2021
- [c18]Sojhal Ismail Khan, Dominika C. Woszczyk, Chengzeng You, Soteris Demetriou, Muhammad Naveed:
Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing Services. ACSAC 2021: 944-956 - [i9]Dimitris Stripelis, Hamza Saleem, Tanmay Ghai, Nikhil J. Dhinagar, Umang Gupta, Chrysovalantis Anastasiou, Greg Ver Steeg, Srivatsan Ravi, Muhammad Naveed, Paul M. Thompson, José Luis Ambite:
Secure Neuroimaging Analysis using Federated Learning with Homomorphic Encryption. CoRR abs/2108.03437 (2021) - [i8]Sojhal Ismail Khan, Dominika Woszczyk, Chengzeng You, Soteris Demetriou, Muhammad Naveed:
Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing Services. CoRR abs/2110.08517 (2021) - [i7]Weizhao Jin, Bhaskar Krishnamachari, Muhammad Naveed, Srivatsan Ravi, Eduard Sanou, Kwame-Lante Wright:
Secure Publish-Process-Subscribe System for Dispersed Computing. IACR Cryptol. ePrint Arch. 2021: 1668 (2021) - 2020
- [c17]Mehrdad Kiamari, Bhaskar Krishnamachari, Muhammad Naveed, Seokgu Yun:
Distributed Consensus for Mobile Devices using Online Brokers. IEEE ICBC 2020: 1-3
2010 – 2019
- 2019
- [j3]Erman Ayday, Muhammad Naveed, Haixu Tang:
GenoPri'17: International Workshop on Genome Privacy and Security. IEEE ACM Trans. Comput. Biol. Bioinform. 16(4): 1322-1323 (2019) - [c16]Kien Nguyen, Gabriel Ghinita, Muhammad Naveed, Cyrus Shahabi:
A Privacy-Preserving, Accountable and Spam-Resilient Geo-Marketplace. SIGSPATIAL/GIS 2019: 299-308 - [c15]Gowri Sankar Ramachandran, Kwame-Lante Wright, Licheng Zheng, Pavas Navaney, Muhammad Naveed, Bhaskar Krishnamachari, Jagjit Dhaliwal:
Trinity: A Byzantine Fault-Tolerant Distributed Publish-Subscribe System with Immutable Blockchain-based Persistence. IEEE ICBC 2019: 227-235 - [i6]Kien Nguyen, Gabriel Ghinita, Muhammad Naveed, Cyrus Shahabi:
A Privacy-Preserving, Accountable and Spam-Resilient Geo-Marketplace. CoRR abs/1909.00299 (2019) - 2017
- [c14]Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, Thomas Ristenpart:
Leakage-Abuse Attacks against Order-Revealing Encryption. IEEE Symposium on Security and Privacy 2017: 655-672 - 2016
- [c13]Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov:
Breaking Web Applications Built On Top of Encrypted Data. CCS 2016: 1353-1364 - [i5]Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, Thomas Ristenpart:
Leakage-Abuse Attacks against Order-Revealing Encryption. IACR Cryptol. ePrint Arch. 2016: 895 (2016) - [i4]Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov:
Breaking Web Applications Built On Top of Encrypted Data. IACR Cryptol. ePrint Arch. 2016: 920 (2016) - 2015
- [j2]Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy in the Genomic Era. ACM Comput. Surv. 48(1): 6:1-6:44 (2015) - [c12]Muhammad Naveed, Seny Kamara, Charles V. Wright:
Inference Attacks on Property-Preserving Encrypted Databases. CCS 2015: 644-655 - [c11]Vincent Bindschaedler, Muhammad Naveed, Xiaorui Pan, XiaoFeng Wang, Yan Huang:
Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward. CCS 2015: 837-849 - [c10]Soteris Demetriou, Xiao-yong Zhou, Muhammad Naveed, Yeonjoon Lee, Kan Yuan, XiaoFeng Wang, Carl A. Gunter:
What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources. NDSS 2015 - [c9]Nan Zhang, Kan Yuan, Muhammad Naveed, Xiao-yong Zhou, XiaoFeng Wang:
Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android. IEEE Symposium on Security and Privacy 2015: 915-930 - [i3]Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy in the Genomic Era. IACR Cryptol. ePrint Arch. 2015: 563 (2015) - 2014
- [c8]Dongjing He, Muhammad Naveed, Carl A. Gunter, Klara Nahrstedt:
Security Concerns in Android mHealth Apps. AMIA 2014 - [c7]Tongxin Li, Xiao-yong Zhou, Luyi Xing, Yeonjoon Lee, Muhammad Naveed, XiaoFeng Wang, Xinhui Han:
Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services. CCS 2014: 978-989 - [c6]Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, XiaoFeng Wang, Erman Ayday, Jean-Pierre Hubaux, Carl A. Gunter:
Controlled Functional Encryption. CCS 2014: 1280-1291 - [c5]Muhammad Naveed, Xiao-yong Zhou, Soteris Demetriou, XiaoFeng Wang, Carl A. Gunter:
Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android. NDSS 2014 - [c4]Muhammad Naveed:
Hurdles for Genomic Data Usage Management. IEEE Symposium on Security and Privacy Workshops 2014: 44-48 - [c3]Xiao-yong Zhou, Yeonjoon Lee, Nan Zhang, Muhammad Naveed, XiaoFeng Wang:
The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations. IEEE Symposium on Security and Privacy 2014: 409-423 - [c2]Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter:
Dynamic Searchable Encryption via Blind Storage. IEEE Symposium on Security and Privacy 2014: 639-654 - [i2]Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy and Security in the Genomic Era. CoRR abs/1405.1891 (2014) - [i1]Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter:
Dynamic Searchable Encryption via Blind Storage. IACR Cryptol. ePrint Arch. 2014: 219 (2014) - 2013
- [c1]Xiao-yong Zhou, Soteris Demetriou, Dongjing He, Muhammad Naveed, Xiaorui Pan, XiaoFeng Wang, Carl A. Gunter, Klara Nahrstedt:
Identity, location, disease and more: inferring your secrets from android public resources. CCS 2013: 1017-1028 - 2012
- [j1]Muhammad Naveed, Wasim Habib, Usman Masud, Ubaid Ullah, Gulzar Ahmad:
Reliable and Low Cost RFID Based Authentication System for Large Scale Deployment. Int. J. Netw. Secur. 14(3): 173-179 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint