default search action
Ehsan Toreini
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Ehsan Toreini, Maryam Mehrnezhad, Aad van Moorsel:
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems. Int. J. Inf. Sec. 23(2): 981-997 (2024) - [j16]Stephen Cook, Maryam Mehrnezhad, Ehsan Toreini:
Bluetooth security analysis of general and intimate health IoT devices and apps: the case of FemTech. Int. J. Inf. Sec. 23(6): 3547-3567 (2024) - [j15]James M. Clarke, Maryam Mehrnezhad, Ehsan Toreini:
Invisible, Unreadable, and Inaudible Cookie Notices: An Evaluation of Cookie Notices for Users with Visual Impairments. ACM Trans. Access. Comput. 17(1): 1-39 (2024) - 2023
- [c13]Ehsan Toreini, Maryam Mehrnezhad, Aad van Moorsel:
Verifiable Fairness: Privacy-preserving Computation of Fairness for Machine Learning Systems. ESORICS Workshops (2) 2023: 569-584 - [c12]Joshua Harrison, Ehsan Toreini, Maryam Mehrnezhad:
A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards. EuroS&P Workshops 2023: 270-280 - [i14]Joshua Harrison, Ehsan Toreini, Maryam Mehrnezhad:
A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards. CoRR abs/2308.01074 (2023) - [i13]James M. Clarke, Maryam Mehrnezhad, Ehsan Toreini:
Invisible, Unreadable, and Inaudible Cookie Notices: An Evaluation of Cookie Notices for Users with Visual Impairments. CoRR abs/2308.11643 (2023) - [i12]Ehsan Toreini, Maryam Mehrnezhad, Aad van Moorsel:
Verifiable Fairness: Privacy-preserving Computation of Fairness for Machine Learning Systems. CoRR abs/2309.06061 (2023) - 2022
- [j14]Maryam Mehrnezhad, Kovila P. L. Coopamootoo, Ehsan Toreini:
How Can and Would People Protect From Online Tracking? Proc. Priv. Enhancing Technol. 2022(1): 105-125 (2022) - [c11]Maryam Mehrnezhad, Laura Shipp, Teresa Almeida, Ehsan Toreini:
Vision: Too Little too Late? Do the Risks of FemTech already Outweigh the Benefits? EuroUSEC 2022: 145-150 - [c10]Teresa Almeida, Laura Shipp, Maryam Mehrnezhad, Ehsan Toreini:
Bodies Like Yours: Enquiring Data Privacy in FemTech. NordiCHI (Adjunct) 2022: 54:1-54:5 - [c9]Kovila P. L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini:
"I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country. USENIX Security Symposium 2022: 287-304 - [i11]Kovila P. L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini:
"I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country. CoRR abs/2202.04682 (2022) - [i10]Magdalene Ng, Kovila P. L. Coopamootoo, Tasos Spiliotopoulos, Dave Horsfall, Mhairi Aitken, Ehsan Toreini, Karen Elliott, Aad van Moorsel:
In Private, Secure, Conversational FinBots We Trust. CoRR abs/2204.10344 (2022) - 2021
- [j13]Patrick McCorry, Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, Feng Hao:
On Secure E-Voting over Blockchain. DTRAP 2(4): 33:1-33:13 (2021) - [j12]Shen Wang, Ehsan Toreini, Feng Hao:
Anti-Counterfeiting for Polymer Banknotes Based on Polymer Substrate Fingerprinting. IEEE Trans. Inf. Forensics Secur. 16: 2823-2835 (2021) - [i9]Shen Wang, Ehsan Toreini, Feng Hao:
Anti-Counterfeiting for Polymer Banknotes Based on Polymer Substrate Fingerprinting. CoRR abs/2103.06184 (2021) - 2020
- [j11]Mhairi Aitken, Ehsan Toreini, Peter Carmichael, Kovila P. L. Coopamootoo, Karen Elliott, Aad van Moorsel:
Establishing a social licence for Financial Technology: Reflections on the role of the private sector in pursuing ethical data practices. Big Data Soc. 7(1): 205395172090889 (2020) - [j10]Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak F. Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, Lana Y. J. Liu:
End-to-End Verifiable E-Voting Trial for Polling Station Voting. IEEE Secur. Priv. 18(6): 6-13 (2020) - [c8]Mhairi Aitken, Magdalene Ng, Ehsan Toreini, Aad van Moorsel, Kovila P. L. Coopamootoo, Karen Elliott:
Keeping it Human: A Focus Group Study of Public Attitudes Towards AI in Banking. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 21-38 - [c7]Magdalene Ng, Kovila P. L. Coopamootoo, Ehsan Toreini, Mhairi Aitken, Karen Elliott, Aad van Moorsel:
Simulating the Effects of Social Presence on Trust, Privacy Concerns & Usage Intentions in Automated Bots for Finance. EuroS&P Workshops 2020: 190-199 - [c6]Ehsan Toreini, Mhairi Aitken, Kovila P. L. Coopamootoo, Karen Elliott, Carlos Gonzalez Zelaya, Aad van Moorsel:
The relationship between trust in AI and trustworthy machine learning technologies. FAT* 2020: 272-283 - [i8]Magdalene Ng, Kovila P. L. Coopamootoo, Ehsan Toreini, Mhairi Aitken, Karen Elliott, Aad van Moorsel:
Simulating the Effects of Social Presence on Trust, Privacy Concerns \& Usage Intentions in Automated Bots for Finance. CoRR abs/2006.15449 (2020) - [i7]Ehsan Toreini, Mhairi Aitken, Kovila P. L. Coopamootoo, Karen Elliott, Vladimiro González-Zelaya, Paolo Missier, Magdalene Ng, Aad van Moorsel:
Technologies for Trustworthy Machine Learning: A Survey in a Socio-Technical Context. CoRR abs/2007.08911 (2020) - [i6]Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak F. Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, Lana Y. J. Liu:
End-to-End Verifiable E-Voting Trial for Polling Station Voting at Gateshead. IACR Cryptol. ePrint Arch. 2020: 650 (2020)
2010 – 2019
- 2019
- [j9]Ehsan Toreini, Siamak F. Shahandashti, Maryam Mehrnezhad, Feng Hao:
DOMtegrity: ensuring web page integrity against malicious browser extensions. Int. J. Inf. Sec. 18(6): 801-814 (2019) - [j8]Maryam Mehrnezhad, Ehsan Toreini:
What Is This Sensor and Does This App Need Access to It? Informatics 6(1): 7 (2019) - [i5]Ehsan Toreini, Maryam Mehrnezhad, Siamak F. Shahandashti, Feng Hao:
DOMtegrity: Ensuring Web Page Integrity against Malicious Browser Extensions. CoRR abs/1905.12951 (2019) - [i4]Ehsan Toreini, Mhairi Aitken, Kovila P. L. Coopamootoo, Karen Elliott, Carlos Gonzalez Zelaya, Aad van Moorsel:
The relationship between trust in AI and trustworthy machine learning technologies. CoRR abs/1912.00782 (2019) - 2018
- [b1]Ehsan Toreini:
New advances in tamper evident technologies. Newcastle University, Newcastle upon Tyne, UK, 2018 - [j7]Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, Feng Hao:
Stealing PINs via mobile sensors: actual risk versus user perception. Int. J. Inf. Sec. 17(3): 291-313 (2018) - 2017
- [j6]Maryam Mehrnezhad, Abbas Ghaemi Bafghi, Ahad Harati, Ehsan Toreini:
PiSHi: click the images and I tell if you are a human. Int. J. Inf. Sec. 16(2): 133-149 (2017) - [j5]Kiavash Satvat, Matthew Forshaw, Feng Hao, Ehsan Toreini:
Erratum to "On the Privacy of Private Browsing - A Forensic Approach" [JISA 19/1(2014), 88-100]. J. Inf. Secur. Appl. 33: 66 (2017) - [j4]Ehsan Toreini, Siamak F. Shahandashti, Feng Hao:
Texture to the Rescue: Practical Paper Fingerprinting Based on Texture Patterns. ACM Trans. Priv. Secur. 20(3): 9:1-9:29 (2017) - [c5]Maryam Mehrnezhad, Ehsan Toreini, Sami Alajrami:
Making sense of sensors: mobile sensor security awareness and education. STAST 2017: 40-52 - [i3]Ehsan Toreini, Siamak F. Shahandashti, Feng Hao:
Texture to the Rescue: Practical Paper Fingerprinting based on Texture Patterns. CoRR abs/1705.02510 (2017) - 2016
- [j3]Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao:
TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript. J. Inf. Secur. Appl. 26: 23-38 (2016) - [i2]Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao:
TouchSignatures: Identification of User Touch Actions and PINs Based on Mobile Sensor Data via JavaScript. CoRR abs/1602.04115 (2016) - [i1]Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao:
Stealing PINs via Mobile Sensors: Actual Risk versus User Perception. CoRR abs/1605.05549 (2016) - 2015
- [c4]Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao:
TouchSignatures: Identification of User Touch Actions based on Mobile Sensors via JavaScript. AsiaCCS 2015: 673 - 2014
- [j2]Kiavash Satvat, Matthew Forshaw, Feng Hao, Ehsan Toreini:
On the privacy of private browsing - A forensic approach. J. Inf. Secur. Appl. 19(1): 88-100 (2014) - 2013
- [c3]Kiavash Satvat, Matthew Forshaw, Feng Hao, Ehsan Toreini:
On the Privacy of Private Browsing - A Forensic Approach. DPM/SETOP 2013: 380-389 - 2012
- [j1]Maryam Mehrnejad, Abbas Ghaemi Bafghi, Ahad Harati, Ehsan Toreini:
SEIMCHA: a new semantic image CAPTCHA using geometric transformations. ISC Int. J. Inf. Secur. 4(1): 63-76 (2012) - 2011
- [c2]Maryam Mehrnejad, Abbas Ghaemi Bafghi, Ahad Harati, Ehsan Toreini:
Multiple SEIMCHA: Multiple semantic image CAPTCHA. ICITST 2011: 196-201 - [c1]Ehsan Toreini, Maryam Mehrnejad:
A novel method in fuzzy data clustering based on chaotic PSO. ICITST 2011: 335-340
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint