Projects per year
Personal profile
Biography
I am a researcher in privacy, cryptography and information security:
Privacy :
* Quantifying privacy risks that may lead to user tracking
* Developing formal methods to assess privacy risks of released datasets
* Developing algorithms for differentially private access to data
Cryptography :
* Protocols for private outsourced computation Protocols for secure multiparty computation
* Constructing cryptographic primitives
* Cryptanalysis
Information security:
* Observation resistant authentication protocols for unaided humans
* Continuous/implicit authentication systems using behavioural biometrics
* Mathematical attacks on authentication protocols
My research has involved different areas of mathematics such as number theory, computational geometry, information theory, probability, statistics and combinatorics, as well as different areas of computer science such as cryptography, differential privacy, algorithms, computational complexity and machine learning.
External positions
Research Scientist, CSIRO
Apr 2014 → …
Fingerprint
- 1 Similar Profiles
Collaborations and top research areas from the last five years
-
MQCSH: Macquarie University Cyber Security Hub
Kaafar, D., Selvadurai, N., Wiggins, M., Sheedy, E., Asghar, H., Ikram, M., Shevchenko, P., Berkovsky, S., Bayl-Smith, P., Zhang, X., Yang, J., Modabber, S. & Goldbarsht, D.
2/12/16 → …
Project: Research
-
-
Discussion submission to the 2023-2030 Australian Cyber Security Strategy
Macquarie University Cyber Security Hub, Kaafar, D., Selvadurai, N., Abedin, B., Vatsalan, D., Asghar, H., Ikram, M., Zhao, B. & Chen, M., 2023, 13 p.Research output: Other contribution
-
A differentially private framework for deep learning with convexified loss functions
Lu, Z., Asghar, H. J., Kaafar, M. A., Webb, D. & Dickinson, P., 2022, In: IEEE Transactions on Information Forensics and Security. 17, p. 2151-2165 15 p.Research output: Contribution to journal › Article › peer-review
1 Citation (Scopus) -
Do auto-regressive models protect privacy? Inferring fine-grained energy consumption from aggregated model parameters
Sheikh, N. U., Asghar, H. J., Farokhi, F. & Kaafar, M. A., 2022, In: IEEE Transactions on Services Computing. 15, 6, p. 3198-3209 12 p.Research output: Contribution to journal › Article › peer-review
-
SoK: use of cryptography in malware obfuscation
Asghar, H., Zhao, B., Ikram, M., Nguyen, D. L. G., Kaafar, D., Lamont, S. & Coscia, D., 31 Aug 2022, (Submitted).Research output: Contribution to conference › Paper › peer-review
-
A blockchain-enabled anonymous-yet-traceable distributed key generation
Dehez-Clementi, M., Lacan, J., Deneuville, J. C., Asghar, H. & Kaafar, D., 2021, Proceedings - 2021 IEEE International Conference on Blockchain, Blockchain 2021. Xiang, Y., Wang, Z., Wang, H. & Niemi, V. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 257-265 9 p.Research output: Chapter in Book/Report/Conference proceeding › Conference proceeding contribution › peer-review
2 Citations (Scopus)
Prizes
-
ACM AsiaCCS 2019 Best Paper Award
Zhao, Benjamin Zi Hao (Recipient), Ikram, Muhammad (Recipient), Asghar, Hassan (Recipient), Kaafar, Dali (Recipient), Abdelberi, Chaabane (Recipient) & Thilakarathna, Kanchana (Recipient), 10 Jul 2019
Prize: Other distinction
File
Activities
- 1 Other
-
Submission to the NSW Legislative Council Inquiry into Cybersecurity, Dali Kaafar, Hassan Jameel Asghar, Muhammad Ikram, Niloufer Selvadurai, 2020.
Dali Kaafar (Participant), Hassan Asghar (Participant), Muhammad Ikram (Participant) & Niloufer Selvadurai (Participant)
2020Activity: Other