Publications

Group Recommendation with Noisy Subjective Preferences. In Computational Intelligence (2020).
Towards Models for Quantifying the Known Adversary. Proceedings of the New Security Paradigms Workshop (NSPW)
Geographical Security Questions for Fallback Authentication. Proceedings of the 15th International Conference on Privacy, Security and Trust (PST)
Geographic Hints for Passphrase Authentication. Proceedings of the 15th International Conference on Privacy, Security and Trust (PST)
On Password Behaviours and Attitudes in Different Populations. Journal of Information Security and Applications
Enhanced Tacit Secrets. International Journal of Information Security
Empathetic Decision Making in Social Networks. In Artificial Intelligence (2019).
On Conceptually Simple Algorithms for Variants of Online Bipartite Matching. In Theory of Computing Systems.
Reinforcing System-Assigned Passphrases Through Implicit Learning. ACM SIGSAC Conference on Computer and Communications Security (CCS ’18)
Boundedly Rational Voters in Large(r) Networks. In Proceedings of the Seventeenth International Conference on Autonomous Agents and Multiagent Systems (AAMAS’18).
A Simple PTAS for the Dual Bin Packing Problem and Advice Complexity of Its Online Version. In Proceedings of the The 1st Symposium on Simplicity in Algorithms (SOSA’17).
System-Assigned Passwords You Can't Write Down, But Don't Need To. Proceedings of the 15th International Conference on Privacy, Security and Trust (PST)
On Conceptually Simple Algorithms for Variants of Online Bipartite Matching. In Proceedings of the 15th Workshop on Approximation and Online Algorithms (WOAO’17).
An Exploration of Geographic Authentication Schemes. IEEE Transactions on Information Forensics and Security (TIFS)
Preference-oriented Social Networks: Group Recommendation and Inference. In Proceedings of the 9th ACM Conference on Recommender Systems (RecSys’15).
Systems, methods, and computer program products for providing video-passwords for user authentication. Patent number: 8966614
Crypto-Assistant: Towards Facilitating Developer’s Encryption of Sensitive Data. Proceedings of the 15th International Conference on Privacy, Security and Trust (PST)
The Presentation Effect on Graphical Passwords. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’14).
Empathetic Social Choice on Social Networks. In Proceedings of The 13th International Conference on Autonomous Agents and Multiagent Systems (AAMAS’14).
The Presentation Effect on Graphical Passwords. Proceedings of the 32nd SIGCHI Conference on Human Factors in Computing Systems (CHI)
On the Semantic Patterns of Passwords and their Security Impact. Proceedings of the 2014 Network and Distributed System Security Symposium (NDSS)
Ranking Networks. In NIPS’13 Workshop on Frontiers of Network Analysis: Methods, Models, and Applications.
Usability and Security Evaluation of GeoPass: a Geographic Location-Password Scheme. Proceedings of the Symposium on Usable Privacy and Security (SOUPS)
Visualizing Semantics in Passwords: The Role of Dates. Proceedings of the Symposium on Visualization for Cyber Security (VizSec)
Video-Passwords: Advertising While Authenticating. Proceedings of the New Security Paradigms Workshop (NSPW)
Empathetic Social Choice on Social Networks. In The Fourth International Workshop on Computational Social Choice (COMSOC’12).
DART: A Distributed Analysis of Reputation and Trust Framework. In Computational Intelligence.
Exploiting Predictability in Click-Based Graphical Passwords. Journal of Computer Security
The Relationship of Trust, Demand and Utility: Be More Trustworthy, Then I Will Buy More. In Proceedings of the 8th Annual International Conference on Privacy, Security and Trust (PST’10).
Purely Automated Attacks on PassPoints-Style Graphical Passwords. IEEE Transactions on Information Forensics and Security
Trust Models and Con-man Agents: From Mathematical to Empirical Analysis. In Proceedings of Twenty-Fourth AAAI Conference on Artificial Intelligence (AAAI’10).
How Ants Put Advertisements on the Web. In Proceedings of Twenty-Third International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems (IEA-AIE’10).
Tony White, Wayne Chu, and Amirali Salehi-Abari. In Proceedings of The 2nd International Conference on Social Computing (SocialComp’10).
Purely Automated Attacks on PassPoints-Style Graphical Passwords. In IEEE Transactions on Information Forensics and Security.
The Uphill Battle of Ant Programming vs. Genetic Programming. In International Conference on Evolutionary Computation (ICEC’09).
On the Impact of Witness-Based Collusion in Agent Societies. In Proceedings of 12th International Conference on Principles of Practice in Multi-Agent Systems (PRIMA’09).
Towards Con-resistant Trust Models for Distributed Agent Systems. In Proceedings of the Twenty-first International Joint Conference on Artificial Intelligenc (IJCAI’09).
On the Importance of Relational Concept Knowledge in Referral Networks. In Artificial Intelligence Review.
Using Relational Concept Knowledge to Improve Search in Referral Networks. In Proceedings of the Eighth International Joint Conference on Autonomous Agents and Multiagent (AAMAS’09).
The Impact of Naive Agents in Heterogeneous Trust-aware Societies. In The 10th International Workshop on Multi-Agent-Based Simulation (MABS’09).
On Purely Automated Attacks for Click-Based Graphical Passwords. Proceedings of the 24th Annual Computer Security Applications Conference (ACSAC)
On Predictive Models and User-Drawn Graphical Passwords. ACM Transactions on Information and System Security (TISSEC)
Enhanced Generalized Ant Programming (EGAP). In Proceedings of the 10th Annual Conference on Genetic and Evolutionary Computation (GECCO’08).
A Swarm-based Crossover Operator for Genetic Programming. In Proceedings of the 10th Annual Conference on Genetic and Evolutionary Computation (GECCO’08).
Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. Proceedings of the 16th USENIX Security Symposium
Pass-thoughts: Authenticating With Our Minds. Proceedings of the ACSA 2005 New Security Paradigms Workshop
Highlights from the 2005 New Security Paradigms Workshop. 21st Annual Computer Security Applications Conference (ACSAC’05)
Towards Secure Design Choices for Implementing Graphical Passwords. Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC)
Graphical Dictionaries and the Memorable Space of Graphical Passwords. In Proceedings of the 13th USENIX Security Symposium
Analyzing User Choice in Graphical Passwords. Technical Report TR-04-01
The Future and Current State of Honey Pots. 13th Annual Canadian Information Technology Security Symposium (CITSS)