default search action
Mobin Javed
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c22]Emaan Bilal Khan, Emaan Atique, Mobin Javed:
Investigating Phishing Threats in the Email Browsing Experience of Visually Impaired Individuals. CHI Extended Abstracts 2024: 206:1-206:11 - 2023
- [c21]Sumair Ijaz Hashmi, Niklas George, Eimaan Saqib, Fatima Ali, Nawaal Siddique, Shafay Kashif, Shahzaib Ali, Nida ul Habib Bajwa, Mobin Javed:
Training Users to Recognize Persuasion Techniques in Vishing Calls. CHI Extended Abstracts 2023: 294:1-294:8 - [c20]Afaq Ashraf, Afaq Taha, Nida ul Habib Bajwa, Cornelius J. König, Mobin Javed, Maryam Mustafa:
"Stalking is immoral but not illegal": Understanding Security, Cyber Crimes and Threats in Pakistan. SOUPS 2023: 37-56 - [c19]Jiameng Pu, Zain Sarwar, Sifat Muhammad Abdullah, Abdullah Rehman, Yoonjin Kim, Parantapa Bhattacharya, Mobin Javed, Bimal Viswanath:
Deepfake Text Detection: Limitations and Opportunities. SP 2023: 1613-1630 - [e1]Marie-José Montpetit, Aris Leivadeas, Steve Uhlig, Mobin Javed:
Proceedings of the 2023 ACM on Internet Measurement Conference, IMC 2023, Montreal, QC, Canada, October 24-26, 2023. ACM 2023 [contents] - 2022
- [c18]Noshaba Nasir, Faqia Iqbal, Mahnoor Zaheer, Mariam Shahjahan, Mobin Javed:
Lures for Money: A First Look into YouTube Videos Promoting Money-Making Apps. AsiaCCS 2022: 1195-1206 - [c17]Sheza Naveed, Hamza Naveed, Mobin Javed, Maryam Mustafa:
"Ask this from the person who has private stuff": Privacy Perceptions, Behaviours and Beliefs Beyond W.E.I.R.D. CHI 2022: 105:1-105:17 - [i6]Jiameng Pu, Zain Sarwar, Sifat Muhammad Abdullah, Abdullah Rehman, Yoonjin Kim, Parantapa Bhattacharya, Mobin Javed, Bimal Viswanath:
Deepfake Text Detection: Limitations and Opportunities. CoRR abs/2210.09421 (2022) - 2021
- [c16]Zainab Iftikhar, Qutaiba Rohan ul Haq, Osama Younus, Taha Sardar, Hammad Arif, Mobin Javed, Suleman Shahid:
Designing Parental Monitoring and Control Technology: A Systematic Review. INTERACT (4) 2021: 676-700 - [c15]Ahmadreza Azizi, Ibrahim Asadullah Tahmid, Asim Waheed, Neal Mangaokar, Jiameng Pu, Mobin Javed, Chandan K. Reddy, Bimal Viswanath:
T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification. USENIX Security Symposium 2021: 2255-2272 - [c14]Jiameng Pu, Neal Mangaokar, Lauren Kelly, Parantapa Bhattacharya, Kavya Sundaram, Mobin Javed, Bolun Wang, Bimal Viswanath:
Deepfake Videos in the Wild: Analysis and Detection. WWW 2021: 981-992 - [i5]Jiameng Pu, Neal Mangaokar, Lauren Kelly, Parantapa Bhattacharya, Kavya Sundaram, Mobin Javed, Bolun Wang, Bimal Viswanath:
Deepfake Videos in the Wild: Analysis and Detection. CoRR abs/2103.04263 (2021) - [i4]Ahmadreza Azizi, Ibrahim Asadullah Tahmid, Asim Waheed, Neal Mangaokar, Jiameng Pu, Mobin Javed, Chandan K. Reddy, Bimal Viswanath:
T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification. CoRR abs/2103.04264 (2021) - 2020
- [j6]Talha Javed, Muhammad Haseeb, Muhammad Abdullah, Mobin Javed:
Using application layer banner data to automatically identify IoT devices. Comput. Commun. Rev. 50(3): 23-29 (2020)
2010 – 2019
- 2018
- [j5]Shehar Bano, Philipp Richter, Mobin Javed, Srikanth Sundaresan, Zakir Durumeric, Steven J. Murdoch, Richard Mortier, Vern Paxson:
Scanning the Internet for Liveness. Comput. Commun. Rev. 48(2): 2-9 (2018) - [c13]Qasim Lone, Matthew J. Luckie, Maciej Korczynski, Hadi Asghari, Mobin Javed, Michel van Eeten:
Using Crowdsourcing Marketplaces for Network Measurements: The Case of Spoofer. TMA 2018: 1-8 - [c12]Michael Carl Tschantz, Sadia Afroz, Shaarif Sajid, Shoaib Asif Qazi, Mobin Javed, Vern Paxson:
A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability. FOCI @ USENIX Security Symposium 2018 - [i3]Sadia Afroz, Michael Carl Tschantz, Shaarif Sajid, Shoaib Asif Qazi, Mobin Javed, Vern Paxson:
Exploring Server-side Blocking of Regions. CoRR abs/1805.11606 (2018) - [i2]Sadia Afroz, Mobin Javed, Vern Paxson, Shoaib Asif Qazi, Shaarif Sajid, Michael Carl Tschantz:
A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability. CoRR abs/1806.00459 (2018) - 2017
- [c11]Grant Ho, Aashish Sharma, Mobin Javed, Vern Paxson, David A. Wagner:
Detecting Credential Spearphishing in Enterprise Settings. USENIX Security Symposium 2017: 469-485 - 2016
- [b1]Mobin Javed:
Detecting Credential Compromise in Enterprise Networks. University of California, Berkeley, USA, 2016 - [j4]Sakshi Jain, Mobin Javed, Vern Paxson:
Towards Mining Latent Client Identifiers from Network Traffic. Proc. Priv. Enhancing Technol. 2016(2): 100-114 (2016) - [j3]Hamed Haddadi, Rishab Nithyanand, Sheharbano Khattak, Mobin Javed, Narseo Vallina-Rodriguez, Marjan Falahrastegar, Julia E. Powles, Emiliano De Cristofaro, Steven J. Murdoch:
The Adblocking Tug-of-War. login Usenix Mag. 41(4) (2016) - [c10]Sheharbano Khattak, David Fifield, Sadia Afroz, Mobin Javed, Srikanth Sundaresan, Damon McCoy, Vern Paxson, Steven J. Murdoch:
Do You See What I See? Differential Treatment of Anonymous Users. NDSS 2016 - [c9]Rishab Nithyanand, Sheharbano Khattak, Mobin Javed, Narseo Vallina-Rodriguez, Marjan Falahrastegar, Julia E. Powles, Emiliano De Cristofaro, Hamed Haddadi, Steven J. Murdoch:
Adblocking and Counter Blocking: A Slice of the Arms Race. FOCI 2016 - [i1]Rishab Nithyanand, Sheharbano Khattak, Mobin Javed, Narseo Vallina-Rodriguez, Marjan Falahrastegar, Julia E. Powles, Emiliano De Cristofaro, Hamed Haddadi, Steven J. Murdoch:
Ad-Blocking and Counter Blocking: A Slice of the Arms Race. CoRR abs/1605.05077 (2016) - 2015
- [c8]Mobin Javed, Cormac Herley, Marcus Peinado, Vern Paxson:
Measurement and Analysis of Traffic Exchange Services. Internet Measurement Conference 2015: 1-12 - 2014
- [j2]Ayesha Binte Ashfaq, Sajjad Rizvi, Mobin Javed, Syed Ali Khayam, Muhammad Qasim Ali, Ehab Al-Shaer:
Information theoretic feature space slicing for statistical anomaly detection. J. Netw. Comput. Appl. 41: 473-487 (2014) - [c7]Sheharbano Khattak, Mobin Javed, Syed Ali Khayam, Zartash Afzal Uzmi, Vern Paxson:
A Look at the Consequences of Internet Censorship Through an ISP Lens. Internet Measurement Conference 2014: 271-284 - 2013
- [c6]Mobin Javed, Vern Paxson:
Detecting stealthy, distributed SSH brute-forcing. CCS 2013: 85-96 - [c5]Sheharbano Khattak, Mobin Javed, Philip D. Anderson, Vern Paxson:
Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion. FOCI 2013 - [c4]Vern Paxson, Mihai Christodorescu, Mobin Javed, Josyula R. Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin, Kurt Thomas, Wietse Z. Venema, Nicholas Weaver:
Practical Comprehensive Bounds on Surreptitious Communication over DNS. USENIX Security Symposium 2013: 17-32 - 2011
- [j1]Hassan Khan, Mobin Javed, Syed Ali Khayam, Fauzan Mirza:
Designing a cluster-based covert channel to evade disk investigation and forensics. Comput. Secur. 30(1): 35-49 (2011) - 2010
- [c3]Ayesha Binte Ashfaq, Mobin Javed, Syed Ali Khayam, Hayder Radha:
An Information-Theoretic Combining Method for Multi-Classifier Anomaly Detection Systems. ICC 2010: 1-5
2000 – 2009
- 2009
- [c2]Mobin Javed, Khurram Aziz:
A survey of quantum key distribution protocols. FIT 2009: 39:1-39:5 - [c1]Mobin Javed, Ayesha Binte Ashfaq, M. Zubair Shafiq, Syed Ali Khayam:
On the Inefficient Use of Entropy for Anomaly Detection. RAID 2009: 369-370
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint