Publications

Stochastic Subgraph Neighborhood Pooling for Subgraph Classification. In Proceedings of the 32nd ACM International Conference on Information & Knowledge Management (CIKM’23).
PiXi: Password Inspiration by Exploring Information. In Proceedings of Twenty-Fifth International Conference on Information and Communications Security (ICICS’23)
Dissecting Nudges in Password Managers: Simple Defaults are Powerful. In Proceedings of the 19th Symposium on Usable Privacy and Security (SOUPS’23)
Sampling Enclosing Subgraphs for Link Prediction. In Proceedings of the 31st ACM International Conference on Information & Knowledge Management (CIKM’22).
Do Password Managers Nudge Secure (Random) Passwords?. In Proceedings of the 18th Symposium on Usable Privacy and Security (SOUPS’22)
Improving Peer Assessment with Graph Neural Networks. In Proceedings of the 15th International Conference on Educational Data Mining (EDM’22)
A Large-Scale Analysis of the Semantic Password Model and Linguistic Patterns in Passwords. In ACM Transactions on Privacy and Security (2021)
Long Passphrases: Potentials and Limits. In Proceedings of the 18th International Conference on Privacy, Security and Trust (PST’21)
DeepGroup: Group Recommendation with Implicit Feedback. In Proceedings of the 30th ACM International Conference on Information & Knowledge Management (CIKM’21).
Variational Autoencoders for Top-K Recommendation with Implicit Feedback. In Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’21).
A Study on Priming Methods for Graphical Passwords. In Journal of Information Security and Applications (2021).
Password Guessers Under a Microscope: An In-Depth Analysis to Inform Deployments. In International Journal of Information Security (2021).
Group Recommendation with Noisy Subjective Preferences. In Computational Intelligence (2020).
Towards Models for Quantifying the Known Adversary. In Proceedings of the New Security Paradigms Workshop (NSPW’19)
Geographical Security Questions for Fallback Authentication. In Proceedings of the 15th International Conference on Privacy, Security and Trust (PST’19)
Geographic Hints for Passphrase Authentication. In Proceedings of the 15th International Conference on Privacy, Security and Trust (PST’19)
On Password Behaviours and Attitudes in Different Populations. In Journal of Information Security and Applications (2019)
Enhanced Tacit Secrets. In International Journal of Information Security (2019)
Empathetic Decision Making in Social Networks. In Artificial Intelligence (2019).
On Conceptually Simple Algorithms for Variants of Online Bipartite Matching. In Theory of Computing Systems (2019).
Reinforcing System-Assigned Passphrases Through Implicit Learning. ACM SIGSAC Conference on Computer and Communications Security (CCS ’18)
Boundedly Rational Voters in Large(r) Networks. In Proceedings of the 17th International Conference on Autonomous Agents and Multiagent Systems (AAMAS’18).
A Simple PTAS for the Dual Bin Packing Problem and Advice Complexity of Its Online Version. In Proceedings of the 1st Symposium on Simplicity in Algorithms (SOSA’17).
System-Assigned Passwords You Can't Write Down, But Don't Need To. In Proceedings of the 15th International Conference on Privacy, Security and Trust (PST’17)
On Conceptually Simple Algorithms for Variants of Online Bipartite Matching. In Proceedings of the 15th Workshop on Approximation and Online Algorithms (WOAO’17).
An Exploration of Geographic Authentication Schemes. In IEEE Transactions on Information Forensics and Security (2016)
Preference-oriented Social Networks: Group Recommendation and Inference. In Proceedings of the 9th ACM Conference on Recommender Systems (RecSys’15).
Systems, methods, and computer program products for providing video-passwords for user authentication. Patent number: 8966614
Crypto-Assistant: Towards Facilitating Developer’s Encryption of Sensitive Data. In Proceedings of the 15th International Conference on Privacy, Security and Trust (PST’14)
The Presentation Effect on Graphical Passwords. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’14).
Empathetic Social Choice on Social Networks. In Proceedings of the 13th International Conference on Autonomous Agents and Multiagent Systems (AAMAS’14).
The Presentation Effect on Graphical Passwords. In Proceedings of the 32nd SIGCHI Conference on Human Factors in Computing Systems (CHI’14)
On the Semantic Patterns of Passwords and their Security Impact. In Proceedings of the 2014 Network and Distributed System Security Symposium (NDSS’14)
Ranking Networks. In NIPS’13 Workshop on Frontiers of Network Analysis: Methods, Models, and Applications.
Usability and Security Evaluation of GeoPass: a Geographic Location-Password Scheme. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS’13)
Visualizing Semantics in Passwords: The Role of Dates. In Proceedings of the Symposium on Visualization for Cyber Security (VizSec’12)
Video-Passwords: Advertising While Authenticating. In Proceedings of the New Security Paradigms Workshop (NSPW’12)
Empathetic Social Choice on Social Networks. In Proceedings of the 4th International Workshop on Computational Social Choice (COMSOC’12).
DART: A Distributed Analysis of Reputation and Trust Framework. In Computational Intelligence (2012).
Exploiting Predictability in Click-Based Graphical Passwords. In Journal of Computer Security (2011)
The Relationship of Trust, Demand and Utility: Be More Trustworthy, Then I Will Buy More. In Proceedings of the 8th Annual International Conference on Privacy, Security and Trust (PST’10).
Purely Automated Attacks on PassPoints-Style Graphical Passwords. In IEEE Transactions on Information Forensics and Security (2010)
Trust Models and Con-man Agents: From Mathematical to Empirical Analysis. In Proceedings of 24th AAAI Conference on Artificial Intelligence (AAAI’10).
How Ants Put Advertisements on the Web. In Proceedings of the 23rd International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems (IEA-AIE’10).
Purely Automated Attacks on PassPoints-Style Graphical Passwords. In IEEE Transactions on Information Forensics and Security (2010).
Media Monitoring Using Social Networks. In Proceedings of the 2nd International Conference on Social Computing (SocialComp’10).
The Uphill Battle of Ant Programming vs. Genetic Programming. In Proceedings of the International Conference on Evolutionary Computation (ICEC’09).
On the Impact of Witness-Based Collusion in Agent Societies. In Proceedings of 12th International Conference on Principles of Practice in Multi-Agent Systems (PRIMA’09).
Towards Con-resistant Trust Models for Distributed Agent Systems. In Proceedings of the 21st International Joint Conference on Artificial Intelligence (IJCAI’09).
On the Importance of Relational Concept Knowledge in Referral Networks. In Artificial Intelligence Review (2009).
Using Relational Concept Knowledge to Improve Search in Referral Networks. In Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent (AAMAS’09).
The Impact of Naive Agents in Heterogeneous Trust-aware Societies. In the 10th International Workshop on Multi-Agent-Based Simulation (MABS’09).
On Purely Automated Attacks for Click-Based Graphical Passwords. In Proceedings of the 24th Annual Computer Security Applications Conference (ACSAC’08)
On Predictive Models and User-Drawn Graphical Passwords. In ACM Transactions on Information and System Security (TISSEC’08)
Enhanced Generalized Ant Programming (EGAP). In Proceedings of the 10th Annual Conference on Genetic and Evolutionary Computation (GECCO’08).
A Swarm-based Crossover Operator for Genetic Programming. In Proceedings of the 10th Annual Conference on Genetic and Evolutionary Computation (GECCO’08).
Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. In Proceedings of the 16th USENIX Security Symposium (2007)
Pass-thoughts: Authenticating With Our Minds. In Proceedings of the ACSA 2005 New Security Paradigms Workshop
Highlights from the 2005 New Security Paradigms Workshop. In Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC’05)
Towards Secure Design Choices for Implementing Graphical Passwords. Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC)
Graphical Dictionaries and the Memorable Space of Graphical Passwords. In Proceedings of the 13th USENIX Security Symposium
Analyzing User Choice in Graphical Passwords. Technical Report TR-04-01
The Future and Current State of Honey Pots. 13th Annual Canadian Information Technology Security Symposium (CITSS)