Conference and Workshop Publications



Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media 

Mainack Mondal, Günce Su Yılmaz, Noah Hirsch, Mohammad Taha Khan, Michael Tang, Christopher Tran, Chris Kanich, Blase Ur, Elena Zheleva.

Proceedings of the ACM Conference on Computer and Communications Security (CCS). London, UK, November 2019.

[ Paper ]



An Empirical Analysis of the Commercial VPN Ecosystem

Mohammad Taha Khan, Joe DeBlasio, Geoffrey M. Voelker, Alex C. Snoeren, Chris Kanich, Narseo Rodriguez.

Proceedings of the ACM Internet Measurement Conference (IMC). Boston, MA, November 2018. 




Poster: Making Retrospective Data Management Usable 

Noah Hirsch, Chris Kanich, Mohammad Taha Khan, Xuefeng Liu, Mainack Mondal, Michael Tang, Christopher Tran, Blase Ur, William Wang, Günce Su Yilmaz, Elena Zheleva. 

Proceedings of the Symposium On Usable Privacy and Security (SOUPS). Baltimore, MD, August 2018. 



Forgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage

Mohammad Taha Khan, Maria Hyun, Chris Kanich, Blase Ur.

Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI). Montreal, QC, Canada, April 2018. 



Old is Still Gold: A Comparison of Cyber and Regular Fraud in the United States

Mohammad Taha Khan, Chris Kanich.

Proceedings of the Workshop on Technology and Consumer Protection (ConPro). San Jose, CA, May 2017.

[ PaperSlides ]



Sneak-Peek: High Speed Covert Channels in Data-Center Networks

Rashid Tahir, Mohammad Taha Khan, Xun Gong, Adnan Ahmed, AmirEmad Ghassami, Hasanat Kazmi, Matthew Caesar, Fareed Zaffar, Negar Kiyavash.

Proceedings of the IEEE Conference on Computer Communications (INFOCOM). San Francisco, CA, April 2016.

[ PaperSlides | Poster ]



High Fidelity, High Risk, High Reward: Using High-Fidelity Networking Data in Ethically Sound Research

Mohammad Taha Khan, Chris Kanich.

Proceedings of the ACM SIGCOMM Workshop on Ethics in Networked Systems (NSEthics). London, UK, August 2015

[ PaperSlides ]



A Classification Based Framework to Predict Viral Threads

Hashim Sharif, Saad Ismail, Shehroze Farooqi, Mohammad Taha Khan, Muhammad Ali Gulzar, Hasnain Lakhani, Fareed Zaffar, Ahmed Abbasi.

Proceedings of the Pacific Asia Conference on Information Systems (PACIS). Singapore, July 2015.

[ Paper ]



Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting

Mohammad Taha Khan, Xiang Huo, Zhou Li, Chris Kanich.

Proceedings of the IEEE Symposium on Security and Privacy (S&P / "Oakland"). San Jose, CA, May 2015. 

[ PaperSlidesPoster ]



Efficient Relaying Strategy Selection and Signal Combining using Error Estimation Codes

Mohammad Taha Khan, Talha Anwar, Muhammad Kumail Haider, Momin Uppal.

Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC). Istanbul, Turkey, April 2014.

[ PaperSlides ]

Technical Reports

Packets Lost in the Wild: An Analysis of Empirical Approaches to Measure Internet Censorship

[ Report | Slides ]

© 2019 by Mohammad Taha Khan

This site was designed with the
website builder. Create your website today.
Start Now