Login / Signup
Mohammad Taha Khan
Publication Activity (10 Years)
Years Active: 2014-2021
Publications (10 Years): 6
Top Topics
Motion Deblurring
Error Estimation
High Risk
Cloud Storage
Top Venues
USENIX Security Symposium
IEEE Symposium on Security and Privacy
PACIS
CCS
</>
Publications
</>
William J. Tolley
,
Beau Kujath
,
Mohammad Taha Khan
,
Narseo Vallina-Rodriguez
,
Jedidiah R. Crandall
Blind In/On-Path Attacks and Applications to VPNs.
USENIX Security Symposium
(2021)
Mohammad Taha Khan
,
Christopher Tran
,
Shubham Singh
,
Dimitri Vasilkov
,
Chris Kanich
,
Blase Ur
,
Elena Zheleva
Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage.
USENIX Security Symposium
(2021)
Mainack Mondal
,
Günce Su Yilmaz
,
Noah Hirsch
,
Mohammad Taha Khan
,
Michael Tang
,
Christopher Tran
,
Chris Kanich
,
Blase Ur
,
Elena Zheleva
Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media.
CCS
(2019)
Mohammad Taha Khan
,
Joe DeBlasio
,
Geoffrey M. Voelker
,
Alex C. Snoeren
,
Chris Kanich
,
Narseo Vallina-Rodriguez
An Empirical Analysis of the Commercial VPN Ecosystem.
Internet Measurement Conference
(2018)
Mohammad Taha Khan
,
Maria Hyun
,
Chris Kanich
,
Blase Ur
Forgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage.
CHI
(2018)
Rashid Tahir
,
Mohammad Taha Khan
,
Xun Gong
,
Adnan Ahmed
,
AmirEmad Ghassami
,
Hasanat Kazmi
,
Matthew Caesar
,
Fareed Zaffar
,
Negar Kiyavash
Sneak-Peek: High speed covert channels in data center networks.
INFOCOM
(2016)
Mohammad Taha Khan
,
Chris Kanich
High Fidelity, High Risk, High Reward: Using High-Fidelity Networking Data in Ethically Sound Research.
NS Ethics@SIGCOMM
(2015)
Hashim Sharif
,
Saad Ismail
,
Shehroze Farooqi
,
Mohammad Taha Khan
,
Muhammad Ali Gulzar
,
Hasnain Lakhani
,
Fareed Zaffar
,
Ahmed Abbasi
A Classification Based Framework to Predict Viral Threads.
PACIS
(2015)
Mohammad Taha Khan
,
Xiang Huo
,
Zhou Li
,
Chris Kanich
Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting.
IEEE Symposium on Security and Privacy
(2015)
Mohammad Taha Khan
,
Talha A. Anwar
,
Muhammad Kumail Haider
,
Momin Uppal
Efficient relaying strategy selection and signal combining using error estimation codes.
WCNC
(2014)