![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Hassan Khan
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Jiayi Chen, Urs Hengartner, Hassan Khan:
SHRIMPS: A framework for evaluating multi-user, multi-modal implicit authentication systems. Comput. Secur. 137: 103594 (2024) - [j23]Samad Riaz, Amna Saghir, Muhammad Junaid Khan, Hassan Khan, Hamid Saeed Khan, Muhammad Jaleed Khan:
TransLSTM: A hybrid LSTM-Transformer model for fine-grained suggestion mining. Nat. Lang. Process. J. 8: 100089 (2024) - [j22]Jiayi Chen
, Urs Hengartner
, Hassan Khan
:
MRAAC: A Multi-stage Risk-aware Adaptive Authentication and Access Control Framework for Android. ACM Trans. Priv. Secur. 27(2): 17 (2024) - 2023
- [j21]Sohail Habib
, Hassan Khan
, Andrew Hamilton-Wright
, Urs Hengartner
:
Revisiting the Security of Biometric Authentication Systems Against Statistical Attacks. ACM Trans. Priv. Secur. 26(2): 21:1-21:30 (2023) - [c26]Reesha Arshad
, Abdur Raheem, Uzair Ahmed, Hassan Khan:
Business Model Evaluation for Peer-to-peer Energy Sharing Systems: Insights from Off-grid DC Microgrid Deployment in Pakistan. GHTC 2023: 77-83 - [c25]Jason Ceci, Jonah Stegman, Hassan Khan:
No Privacy in the Electronics Repair Industry. SP 2023: 3347-3364 - [c24]Jonah Stegman, Patrick J. Trottier, Caroline Hillier, Hassan Khan, Mohammad Mannan:
"My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software. USENIX Security Symposium 2023: 3583-3600 - 2022
- [j20]Hajira, Hassan Khan
, Qasim Khan
, Poom Kumam
, Fairouz Tchier
, Gurpreet Singh, Kanokwan Sitthithakerngkiet
:
A Modified Approach of Adomian Decomposition Method to Solve Two-Term Diffusion Wave and Time Fractional Telegraph Equations. IEEE Access 10: 77475-77486 (2022) - [j19]Yong Jin
, Huifang Gao
, Xiaoliang Fan
, Hassan Khan, Youxing Chen:
Defect Identification of Adhesive Structure Based on DCGAN and YOLOv5. IEEE Access 10: 79913-79924 (2022) - [j18]Asif Ullah Hayat, Ikram Ullah, Hassan Khan
, Wajaree Weera
, Ahmed M. Galal
:
Numerical Simulation of Entropy Optimization in Radiative Hybrid Nanofluid Flow in a Variable Features Darcy-Forchheimer Curved Surface. Symmetry 14(10): 2057 (2022) - [c23]Zhenning Xu, Hassan Khan, Radu Muresan:
TMorph: A Traffic Morphing Framework to Test Network Defenses Against Adversarial Attacks. ICOIN 2022: 18-23 - [c22]Jiayi Chen, Urs Hengartner, Hassan Khan:
Sharing without Scaring: Enabling Smartphones to Become Aware of Temporary Sharing. SOUPS @ USENIX Security Symposium 2022: 671-685 - [i3]Jonah Stegman, Patrick J. Trottier, Caroline Hillier, Hassan Khan, Mohammad Mannan:
"My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software. CoRR abs/2209.11878 (2022) - [i2]Jason Ceci, Jonah Stegman, Hassan Khan:
No Privacy in the Electronics Repair Industry. CoRR abs/2211.05824 (2022) - 2021
- [c21]Jason Ceci, Hassan Khan, Urs Hengartner, Daniel Vogel:
Concerned but Ineffective: User Perceptions, Methods, and Challenges when Sanitizing Old Devices for Disposal. SOUPS @ USENIX Security Symposium 2021: 455-474 - 2020
- [j17]Izaz Ali
, Hassan Khan
, Umar Farooq
, Dumitru Baleanu
, Poom Kumam
, Muhammad Arif
:
An Approximate-Analytical Solution to Analyze Fractional View of Telegraph Equations. IEEE Access 8: 25638-25649 (2020) - [j16]Haobin Liu
, Hassan Khan
, Rasool Shah
, Aisha Abdullah Alderremy, Shaban Aly
, Dumitru Baleanu:
On the Fractional View Analysis of Keller-Segel Equations with Sensitivity Functions. Complex. 2020: 2371019:1-2371019:15 (2020) - [j15]Hassan Khan, Urs Hengartner, Daniel Vogel:
Mimicry Attacks on Smartphone Keystroke Authentication. ACM Trans. Priv. Secur. 23(1): 2:1-2:34 (2020) - [c20]Hassan Khan, Jason Ceci, Jonah Stegman, Adam J. Aviv, Rozita Dara, Ravi Kuber:
Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond. ACSAC 2020: 249-262 - [c19]M. Hamza Bin Waheed
, Rao Naveed Bin Rais
, Hassan Khan, Mukhtiar Bano, Syed Sherjeel A. Gilani:
Indoor Mobile Localization Using Wireless Sensor Networks (WSNs). AINA Workshops 2020: 341-351 - [c18]Jiayi Chen, Urs Hengartner, Hassan Khan, Mohammad Mannan:
Chaperone: Real-time Locking and Loss Prevention for Smartphones. USENIX Security Symposium 2020: 325-342 - [i1]Hassan Khan, Jason Ceci, Jonah Stegman, Adam J. Aviv, Rozita Dara, Ravi Kuber:
Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond. CoRR abs/2008.10697 (2020)
2010 – 2019
- 2019
- [j14]Hassan Khan
, Shoaib, Dumitru Baleanu, Poom Kumam
, Jameel F. Al-Zaidy:
Families of Travelling Waves Solutions for Fractional-Order Extended Shallow Water Wave Equations, Using an Innovative Analytical Method. IEEE Access 7: 107523-107532 (2019) - [j13]Rasool Shah
, Hassan Khan
, Umar Farooq, Dumitru Baleanu
, Poom Kumam
, Muhammad Arif
:
A New Analytical Technique to Solve System of Fractional-Order Partial Differential Equations. IEEE Access 7: 150037-150050 (2019) - [j12]Rasool Shah
, Hassan Khan
, Dumitru Baleanu
:
Fractional Whitham-Broer-Kaup Equations within Modified Analytical Approaches. Axioms 8(4): 125 (2019) - [j11]Umar Farooq, Hassan Khan, Dumitru Baleanu
, Muhammad Arif
:
Numerical solutions of fractional delay differential equations using Chebyshev wavelet method. Comput. Appl. Math. 38(4) (2019) - [j10]Rasool Shah, Hassan Khan
, Muhammad Arif
, Poom Kumam
:
Application of Laplace-Adomian Decomposition Method for the Analytical Solution of Third-Order Dispersive Fractional Partial Differential Equations. Entropy 21(4): 335 (2019) - [j9]Rasool Shah
, Hassan Khan
, Saima Mustafa
, Poom Kumam
, Muhammad Arif
:
Analytical Solutions of Fractional-Order Diffusion Equations by Natural Transform Decomposition Method. Entropy 21(6): 557 (2019) - [j8]Hassan Khan
, Rasool Shah
, Poom Kumam
, Muhammad Arif
:
Analytical Solutions of Fractional-Order Heat and Wave Equations by the Natural Transform Decomposition Method. Entropy 21(6): 597 (2019) - [j7]Shahid Mahmood, Rasool Shah, Hassan Khan
, Muhammad Arif
:
Laplace Adomian Decomposition Method for Multi Dimensional Time Fractional Model of Navier-Stokes Equation. Symmetry 11(2): 149 (2019) - [j6]Hassan Khan
, Shoaib Barak, Poom Kumam
, Muhammad Arif
:
Analytical Solutions of Fractional Klein-Gordon and Gas Dynamics Equations, via the (G′/G)-Expansion Method. Symmetry 11(4): 566 (2019) - [j5]Lei Shi
, Hari Mohan Srivastava
, Muhammad Arif
, Shehzad Hussain, Hassan Khan
:
An Investigation of the Third Hankel Determinant Problem for Certain Subfamilies of Univalent Functions Involving the Exponential Function. Symmetry 11(5): 598 (2019) - 2018
- [j4]Hassan Khan, Amir Razmjou
, Majid Ebrahimi Warkiani
, Ajay Giri Prakash Kottapalli
, Mohsen Asadnia
:
Sensitive and Flexible Polymeric Strain Sensor for Accurate Human Motion Monitoring. Sensors 18(2): 418 (2018) - [c17]Hassan Khan, Urs Hengartner, Daniel Vogel:
Evaluating Attack and Defense Strategies for Smartphone PIN Shoulder Surfing. CHI 2018: 164 - [c16]Hassan Khan, Urs Hengartner, Daniel Vogel:
Augmented Reality-based Mimicry Attacks on Behaviour-Based Smartphone Authentication. MobiSys 2018: 41-53 - 2016
- [b1]Hassan Khan:
Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios. University of Waterloo, Ontario, Canada, 2016 - [c15]Hassan Khan, Urs Hengartner, Daniel Vogel:
Targeted Mimicry Attacks on Touch Input Based Implicit Authentication Schemes. MobiSys 2016: 387-398 - [c14]Lalit Agarwal, Hassan Khan, Urs Hengartner:
Ask Me Again But Don't Annoy Me: Evaluating Re-authentication Strategies for Smartphones. SOUPS 2016: 221-236 - 2015
- [c13]Hassan Khan, Urs Hengartner, Daniel Vogel:
Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying. SOUPS 2015: 225-239 - 2014
- [c12]Aaron Atwater, Hassan Khan, Urs Hengartner:
POSTER: When and How to Implicitly Authenticate Smartphone Users. CCS 2014: 1415-1417 - [c11]Sardar Ali, Kui Wu, Hassan Khan:
Traffic Anomaly Detection in the presence of P2P traffic. LCN 2014: 482-485 - [c10]Hassan Khan, Aaron Atwater, Urs Hengartner:
Itus: an implicit authentication framework for android. MobiCom 2014: 507-518 - [c9]Hassan Khan, Aaron Atwater, Urs Hengartner:
A Comparative Evaluation of Implicit Authentication Schemes. RAID 2014: 255-275 - [c8]Hassan Khan, Urs Hengartner:
Towards application-centric implicit authentication on smartphones. HotMobile 2014: 10:1-10:6 - 2013
- [j3]Muhammad Qasim Ali, Ehab Al-Shaer, Hassan Khan, Syed Ali Khayam:
Automated Anomaly Detector Adaptation using Adaptive Threshold Tuning. ACM Trans. Inf. Syst. Secur. 15(4): 17:1-17:30 (2013) - 2012
- [c7]Rajesh Narayanan, Saikrishna Kotha, Geng Lin, Aimal Khan, Sajjad Rizvi, Wajeeha Javed, Hassan Khan, Syed Ali Khayam:
Macroflows and Microflows: Enabling Rapid Network Innovation through a Split SDN Data Plane. EWSDN 2012: 79-84 - 2011
- [j2]Hassan Khan, Mobin Javed, Syed Ali Khayam, Fauzan Mirza
:
Designing a cluster-based covert channel to evade disk investigation and forensics. Comput. Secur. 30(1): 35-49 (2011) - [j1]Hassan Khan, Fauzan Mirza
, Syed Ali Khayam:
Determining malicious executable distinguishing attributes and low-complexity detection. J. Comput. Virol. 7(2): 95-105 (2011) - [c6]Florian Adamsky, Hassan Khan, Muttukrishnan Rajarajan, Syed Ali Khayam, Rudolf Jäger:
Poster: Destabilizing BitTorrent's clusters to attack high bandwidth leechers. CCS 2011: 725-728 - [c5]Sardar Ali, Hassan Khan, Muhammad Ahmad
, Syed Ali Khayam:
Progressive Differential Thresholding for Network Anomaly Detection. ICC 2011: 1-5 - 2010
- [c4]Irfan Ul Haq
, Sardar Ali, Hassan Khan, Syed Ali Khayam:
What Is the Impact of P2P Traffic on Anomaly Detection? RAID 2010: 1-17
2000 – 2009
- 2009
- [c3]Muhammad Qasim Ali, Hassan Khan, Ali Sajjad, Syed Ali Khayam:
On achieving good operating points on an ROC plane using stochastic anomaly score prediction. CCS 2009: 314-323 - [c2]Junaid Jameel Ahmad, Hassan Khan, Syed Ali Khayam:
Energy efficient video compression for wireless sensor networks. CISS 2009: 629-634 - [c1]Hassan Khan, Yousra Javed, Fauzan Mirza
, Syed Ali Khayam:
Embedding a Covert Channel in Active Network Connections. GLOBECOM 2009: 1-6
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint