default search action
Tanveer Khan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Tanveer Khan, Mindaugas Budzys, Khoa Nguyen, Antonis Michalas:
SoK: Wildest Dreams: Reproducible Research in Privacy-preserving Neural Network Training. Proc. Priv. Enhancing Technol. 2024(3): 144-164 (2024) - [c16]Tanveer Khan, Fahad Sohrab, Antonis Michalas, Moncef Gabbouj:
Trustworthiness of $\mathbb {X}$ Users: A One-Class Classification Approach. AINA (2) 2024: 331-343 - [c15]Eugene Frimpong, Khoa Nguyen, Mindaugas Budzys, Tanveer Khan, Antonis Michalas:
GuardML: Efficient Privacy-Preserving Machine Learning Services Through Hybrid Homomorphic Encryption. SAC 2024: 953-962 - [c14]Tanveer Khan, Mindaugas Budzys, Antonis Michalas:
Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning. SACMAT 2024 - [i14]Eugene Frimpong, Khoa Nguyen, Mindaugas Budzys, Tanveer Khan, Antonis Michalas:
GuardML: Efficient Privacy-Preserving Machine Learning Services Through Hybrid Homomorphic Encryption. CoRR abs/2401.14840 (2024) - [i13]Tanveer Khan, Fahad Sohrab, Antonis Michalas, Moncef Gabbouj:
Trustworthiness of X Users: A One-Class Classification Approach. CoRR abs/2402.02066 (2024) - [i12]Tanveer Khan, Mindaugas Budzys, Khoa Nguyen, Antonis Michalas:
Wildest Dreams: Reproducible Research in Privacy-preserving Neural Network Training. CoRR abs/2403.03592 (2024) - [i11]Tanveer Khan, Mindaugas Budzys, Antonis Michalas:
Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning. CoRR abs/2404.09265 (2024) - [i10]Khoa Nguyen, Mindaugas Budzys, Eugene Frimpong, Tanveer Khan, Antonis Michalas:
A Pervasive, Efficient and Private Future: Realizing Privacy-Preserving Machine Learning Through Hybrid Homomorphic Encryption. CoRR abs/2409.06422 (2024) - 2023
- [c13]Tanveer Khan, Khoa Nguyen, Antonis Michalas:
Split Ways: Privacy-Preserving Training of Encrypted Data Using Split Learning. EDBT/ICDT Workshops 2023 - [c12]Tanveer Khan, Khoa Nguyen, Antonis Michalas:
A More Secure Split: Enhancing the Security of Privacy-Preserving Split Learning. NordSec 2023: 307-329 - [c11]Tanveer Khan, Khoa Nguyen, Antonis Michalas, Alexandros Bakas:
Love or Hate? Share or Split? Privacy-Preserving Training Using Split Learning and Homomorphic Encryption. PST 2023: 1-7 - [c10]Tanveer Khan, Antonis Michalas:
Learning in the Dark: Privacy-Preserving Machine Learning using Function Approximation. TrustCom 2023: 62-71 - [i9]Tanveer Khan, Khoa Nguyen, Antonis Michalas:
Split Ways: Privacy-Preserving Training of Encrypted Data Using Split Learning. CoRR abs/2301.08778 (2023) - [i8]Khoa Nguyen, Tanveer Khan, Antonis Michalas:
Split Without a Leak: Reducing Privacy Leakage in Split Learning. CoRR abs/2308.15783 (2023) - [i7]Tanveer Khan, Antonis Michalas:
Learning in the Dark: Privacy-Preserving Machine Learning using Function Approximation. CoRR abs/2309.08190 (2023) - [i6]Tanveer Khan, Khoa Nguyen, Antonis Michalas:
A More Secure Split: Enhancing the Security of Privacy-Preserving Split Learning. CoRR abs/2309.08697 (2023) - [i5]Tanveer Khan, Khoa Nguyen, Antonis Michalas, Alexandros Bakas:
Love or Hate? Share or Split? Privacy-Preserving Training Using Split Learning and Homomorphic Encryption. CoRR abs/2309.10517 (2023) - 2022
- [i4]Tanveer Khan, Antonis Michalas:
Trust and Believe - Should We? Evaluating the Trustworthiness of Twitter Users. CoRR abs/2210.15214 (2022) - 2021
- [j8]Tanveer Khan, Antonis Michalas:
Seeing and Believing: Evaluating the Trustworthiness of Twitter Users. IEEE Access 9: 110505-110516 (2021) - [j7]Tanveer Khan, Antonis Michalas, Adnan Akhunzada:
Fake news outbreak 2021: Can we stop the viral spread? J. Netw. Comput. Appl. 190: 103112 (2021) - [c9]Tanveer Khan, Alexandros Bakas, Antonis Michalas:
Blind Faith: Privacy-Preserving Machine Learning using Function Approximation. ISCC 2021: 1-7 - [i3]Tanveer Khan, Antonis Michalas, Adnan Akhunzada:
SOK: Fake News Outbreak 2021: Can We Stop the Viral Spread? CoRR abs/2105.10671 (2021) - [i2]Tanveer Khan, Antonis Michalas:
Seeing and Believing: Evaluating the Trustworthiness of Twitter Users. CoRR abs/2107.08027 (2021) - [i1]Tanveer Khan, Alexandros Bakas, Antonis Michalas:
Blind Faith: Privacy-Preserving Machine Learning using Function Approximation. CoRR abs/2107.14338 (2021) - 2020
- [c8]Tanveer Khan, Antonis Michalas:
Trust and Believe - Should We? Evaluating the Trustworthiness of Twitter Users. TrustCom 2020: 1791-1800
2010 – 2019
- 2019
- [j6]Mamdouh Alenezi, Muhammad Usama, Khaled Mohamad Almustafa, Waheed Iqbal, Muhammad Ali Raza, Tanveer Khan:
An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments. Int. J. Inf. Secur. Priv. 13(2): 14-31 (2019) - [j5]Tanveer Khan, Masoom Alam, Adnan Akhunzada, Ali Hur, Muhammad Asif, Muhammad Khurram Khan:
Towards augmented proactive cyberthreat intelligence. J. Parallel Distributed Comput. 124: 47-59 (2019) - [c7]Sapna Ria Chakraborty, Anagha M., Kartikeya Vats, Khyati Baradia, Tanveer Khan, Sandipan Sarkar, Sujoy Roychowdhury:
Recommendence and Fashionsence: Online Fashion Advisor for Offline Experience. COMAD/CODS 2019: 256-259 - 2018
- [j4]Masoom Alam, Naina Emmanuel, Tanveer Khan, Abid Khan, Nadeem Javaid, Kim-Kwang Raymond Choo, Rajkumar Buyya:
Secure policy execution using reusable garbled circuit in the cloud. Future Gener. Comput. Syst. 87: 488-501 (2018) - [j3]Masoom Alam, Naina Emmanuel, Tanveer Khan, Yang Xiang, Houcine Hassan:
Garbled role-based access control in the cloud. J. Ambient Intell. Humaniz. Comput. 9(4): 1153-1166 (2018) - [j2]Naina Emmanuel, Abid Khan, Masoom Alam, Tanveer Khan, Muhammad Khurram Khan:
Structures and data preserving homomorphic signatures. J. Netw. Comput. Appl. 102: 58-70 (2018) - [c6]Mohamed Nassar, Qutaibah M. Malluhi, Tanveer Khan:
A Scheme for Three-way Secure and Verifiable E-Voting. AICCSA 2018: 1-6 - 2017
- [j1]Anam Nazir, Masoom Alam, Saif Ur Rehman Malik, Adnan Akhunzada, Muhammad Nadeem Cheema, Muhammad Khurram Khan, Yang Ziang, Tanveer Khan, Abid Khan:
A high-level domain-specific language for SIEM (design, development and formal verification). Clust. Comput. 20(3): 2423-2437 (2017) - 2016
- [c5]Pir Masoom Shah, Ikram Ullah, Tanveer Khan, Muhammad, Sheraz Hussain, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid:
MobiSink: Cooperative Routing Protocol for Underwater Sensor Networks with Sink Mobility. AINA 2016: 189-197 - [c4]Tanveer Khan, Israr Ahmad, Waqas Aman, Irfan Azam, Zahoor Ali Khan, Umar Qasim, Sanam Avais, Nadeem Javaid:
Clustering Depth Based Routing for Underwater Wireless Sensor Networks. AINA 2016: 506-515 - [c3]Ziaur Rahman, Zaheer Ahmad, Amir Murad, Tanveer Khan, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid:
On Utilizing Static Courier Nodes to Achieve Energy Efficiency with Depth Based Routing for Underwater Wireless Sensor Networks. AINA 2016: 1184-1191 - [c2]Abdul Majid, Irfan Azam, Tanveer Khan, Sangeen, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid:
A Reliable and Interference-Aware Routing Protocol for Underwater Wireless Sensor Networks. CISIS 2016: 246-255 - [c1]Irfan Azam, Abdul Majid, Tanveer Khan, Sajjad, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid:
Avoiding Energy Holes in Underwater Wireless Sensor Networks with Balanced Load Distribution. CISIS 2016: 341-350
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 00:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint