Ehsan Toreini
Ehsan Toreini
Department of Computer Science, University of Surrey
Verified email at - Homepage
Cited by
Cited by
The relationship between trust in AI and trustworthy machine learning technologies
E Toreini, M Aitken, K Coopamootoo, K Elliott, CG Zelaya, A Van Moorsel
Proceedings of the 2020 conference on fairness, accountability, and†…, 2020
Stealing PINs via mobile sensors: actual risk versus user perception
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
International Journal of Information Security 17 (3), 291-313, 2018
On the privacy of private browsing–a forensic approach
K Satvat, M Forshaw, F Hao, E Toreini
Journal of Information Security and Applications 19 (1), 88-100, 2014
Touchsignatures: identification of user touch actions and PINs based on mobile sensor data via javascript
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
Journal of Information Security and Applications 26, 23-38, 2016
Simulating the effects of social presence on trust, privacy concerns & usage intentions in automated bots for finance
M Ng, KPL Coopamootoo, E Toreini, M Aitken, K Elliot, A van Moorsel
2020 IEEE European symposium on security and privacy workshops (EuroS&PW†…, 2020
Establishing a social licence for Financial Technology: Reflections on the role of the private sector in pursuing ethical data practices
M Aitken, E Toreini, P Carmichael, K Coopamootoo, K Elliott, ...
Big Data & Society 7 (1), 2053951720908892, 2020
Texture to the rescue: Practical paper fingerprinting based on texture patterns
E Toreini, SF Shahandashti, F Hao
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-29, 2017
Technologies for trustworthy machine learning: A survey in a socio-technical context
E Toreini, M Aitken, KPL Coopamootoo, K Elliott, VG Zelaya, P Missier, ...
arXiv preprint arXiv:2007.08911v3, 2020
How can and would people protect from online tracking?
M Mehrnezhad, K Coopamootoo, E Toreini
Proceedings on Privacy Enhancing Technologies 1, 105-125, 2022
What is this sensor and does this app need access to it?
M Mehrnezhad, E Toreini
Informatics 6 (1), 7, 2019
An acoustic side channel attack on enigma
E Toreini, B Randell, F Hao
School of Computing Science Technical Report Series, 2015
Vision: Too Little too Late? Do the Risks of FemTech already Outweigh the Benefits?
M Mehrnezhad, L Shipp, T Almeida, E Toreini
Proceedings of the 2022 European Symposium on Usable Security, 145-150, 2022
" I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country
KPL Coopamootoo, M Mehrnezhad, E Toreini
31st USENIX Security Symposium (USENIX Security 22), 287-304, 2022
DOMtegrity: ensuring web page integrity against malicious browser extensions
E Toreini, SF Shahandashti, M Mehrnezhad, F Hao
International Journal of Information Security 18, 801-814, 2019
Anti-counterfeiting for polymer banknotes based on polymer substrate fingerprinting
S Wang, E Toreini, F Hao
IEEE Transactions on Information Forensics and Security 16, 2823-2835, 2021
Touchsignatures: Identification of user touch actions based on mobile sensors via javascript
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
Proceedings of the 10th ACM Symposium on Information, Computer and†…, 2015
SEIMCHA: A New Semantic Image CAPTCHA Using Geometric Transformations.
M Mehrnejad, AG Bafghi, A Harati, E Toreini
ISeCure 4 (1), 2012
Multiple seimcha: multiple semantic image captcha
M Mehrnejad, AG Bafghi, A Harati, E Toreini
2011 International Conference for Internet Technology and Secured†…, 2011
A novel fuzzy metric to evaluate clusters for prolonging lifetime in wireless sensor networks
P Neamatollahi, H Taheri, E Toreini, M Naghibzadeh, MH Yaghmaee
2011 International Symposium on Artificial Intelligence and Signal†…, 2011
Clustering data with Particle Swarm Optimization using a new fitness
E Toreini, M Mehrnejad
2011 3rd Conference on Data Mining and Optimization (DMO), 266-270, 2011
The system can't perform the operation now. Try again later.
Articles 1–20