What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Salil S. Kanhere
Google Scholar
ORCID:
0000-0002-1835-3475
33
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/acisp
DARA: Enhancing Vulnerability Alignment via Adaptive Reconstruction and Dual-Level Attention.
Lihua Wang
Jiaojiao Jiang
Salil S. Kanhere
Jiamou Sun
Sanjay K. Jha
Zhenchang Xing
2025
conf/dsn
TOSense: We Read, You Click.
Xinzhang Chen
Hassan Ali
Arash Shaghaghi
Salil S. Kanhere
Sanjay K. Jha
2025
conf/icbc2
Optimizing Energy Costs in Blockchain Mining: A Multi-Source Approach.
Daewoong Cho
Gowri Sankar Ramachandran
Raja Jurdak
Salil S. Kanhere
2024
journals/popets
SoK: Trusting Self-Sovereign Identity.
Evan Krul
Hye-young Paik
Sushmita Ruj
Salil S. Kanhere
2024
journals/popets
SoK: Can Trajectory Generation Combine Privacy and Utility?
Erik Buchholz
Alsharif Abuadbba
Shuo Wang
Surya Nepal
Salil S. Kanhere
2024
conf/sp
Poster: Towards Privacy-Preserving Federated Recommendation via Synthetic Interactions.
Thirasara Ariyarathna
Salil S. Kanhere
Hye-Young Paik
2024
conf/esorics
Bayesian Learned Models Can Detect Adversarial Malware for Free.
Bao Gia Doan
Dang Quang Nguyen
Paul Montague
Tamas Abraham
Olivier Y. de Vel
Seyit Camtepe
Salil S. Kanhere
Ehsan Abbasnejad
Damith C. Ranasinghe
2024
conf/esorics
Exploiting Layerwise Feature Representation Similarity For Backdoor Defence in Federated Learning.
Kane Walter
Surya Nepal
Salil S. Kanhere
2024
conf/asiaccs
VLIA: Navigating Shadows with Proximity for Highly Accurate Visited Location Inference Attack against Federated Recommendation Models.
Thirasara Ariyarathna
Meisam Mohammady
Hye-Young Paik
Salil S. Kanhere
2024
conf/asiaccs
Make out like a (Multi-Armed) Bandit: Improving the Odds of Fuzzer Seed Scheduling with T-Scheduler.
Simon Luo
Adrian Herrera
Paul Quirk
Michael Chase
Damith C. Ranasinghe
Salil S. Kanhere
2024
conf/asiaccs
SoK: False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations.
Mohammad Majid Akhtar
Rahat Masood
Muhammad Ikram
Salil S. Kanhere
2024
conf/asiaccs
Mitigating Distributed Backdoor Attack in Federated Learning Through Mode Connectivity.
Kane Walter
Meisam Mohammady
Surya Nepal
Salil S. Kanhere
2024
conf/icbc2
CypherChain: A Privacy-Preserving Data Aggregation Framework for Blockchain-Based DR Programs.
Samuel Karumba
Volkan Dedeoglu
Raja Jurdak
Salil S. Kanhere
2024
conf/icbc2
CredAct: Privacy-Preserving Activity Verification for Benefits Schemes in Self-Sovereign Identity.
Rahma Mukta
Hye-Young Paik
Qinghua Lu
Salil S. Kanhere
2024
conf/acsac
On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World.
Bao Gia Doan
Dang Quang Nguyen
Callum Lindquist
Paul Montague
Tamas Abraham
Olivier Y. de Vel
Seyit Camtepe
Salil S. Kanhere
Ehsan Abbasnejad
Damith C. Ranasinghe
2024
conf/acsac
Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning.
Hassan Ali
Surya Nepal
Salil S. Kanhere
Sanjay K. Jha
2023
conf/sp
PublicCheck: Public Integrity Verification for Services of Run-time Deep Models.
Shuo Wang
Sharif Abuadbba
Sidharth Agarwal
Kristen Moore
Ruoxi Sun
Minhui Xue
Surya Nepal
Seyit Camtepe
Salil S. Kanhere
2023
conf/esorics
SplITS: Split Input-to-State Mapping for Effective Firmware Fuzzing.
Guy Farrelly
Paul Quirk
Salil S. Kanhere
Seyit Camtepe
Damith C. Ranasinghe
2023
conf/icbc2
BAILIF: A Blockchain Agnostic Interoperability Framework.
Samuel Karumba
Raja Jurdak
Salil S. Kanhere
Subbu Sethuvenkatraman
2023
conf/icbc2
Privacy-preserving Trust Management for Blockchain-based Resource Sharing in 6G-IoT.
Guntur Dharma Putra
Volkan Dedeoglu
Salil S. Kanhere
Raja Jurdak
2022
conf/icbc2
DeTRM: Decentralised Trust and Reputation Management for Blockchain-based Supply Chains.
Guntur Dharma Putra
Changhoon Kang
Salil S. Kanhere
James Won-Ki Hong
2021
conf/icbc2
MB-EHR: A Multilayer Blockchain-based EHR.
Huanyu Wu
Lunjie Li
Hye-young Paik
Salil S. Kanhere
2021
conf/icbc2
BlockTorrent: A privacy-preserving data availability protocol for multiple stakeholder scenarios.
Ambrose Hill
Shailesh Mishra
Ali Dorri
Volkan Dedeoglu
Raja Jurdak
Salil S. Kanhere
2021
conf/icbc2
Towards Privacy-preserving Digital Contact Tracing.
Nadeem Ahmed
Regio A. Michelin
Wanli Xue
Guntur Dharma Putra
Wei Song
Sushmita Ruj
Salil S. Kanhere
Sanjay K. Jha
2021
conf/icbc2
Cost-Effective Blockchain-based IoT Data Marketplaces with a Credit Invariant.
James Meijers
Guntur Dharma Putra
Grammateia Kotsialou
Salil S. Kanhere
Andreas G. Veneris
2020
conf/icbc2
Trust Management in Decentralized IoT Access Control System.
Guntur Dharma Putra
Volkan Dedeoglu
Salil S. Kanhere
Raja Jurdak
2020
conf/icbc2
Leveraging lightweight blockchain to establish data integrity for surveillance cameras.
Regio A. Michelin
Nadeem Ahmed
Salil S. Kanhere
Aruna Seneviratne
Sanjay K. Jha
2020
conf/icbc2
Exploiting constrained IoT devices in a trustless blockchain-based water management system.
Miguel Pincheira
Massimo Vecchio
Raffaele Giaffreda
Salil S. Kanhere
2020
conf/icbc2
Context-based Smart Contracts For Appendable-block Blockchains.
Henry C. Nunes
Roben Castagna Lunardi
Avelino F. Zorzo
Regio A. Michelin
Salil S. Kanhere
2020
conf/icbc2
A Relational Network Framework for Interoperability in Distributed Energy Trading.
Samuel Karumba
Salil S. Kanhere
Raja Jurdak
2019
conf/icbc2
Peer-to-Peer EnergyTrade: A Distributed Private Energy Trading Platform.
Ali Dorri
Ambrose Hill
Salil S. Kanhere
Raja Jurdak
Fengji Luo
Zhao Yang Dong
2019
conf/icbc2
Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing.
Ahsan Manzoor
Madhusanka Liyanage
An Braeken
Salil S. Kanhere
Mika Ylianttila
2015
journals/istr
Trust-based privacy-aware participant selection in social participatory sensing.
Haleh Amintoosi
Salil S. Kanhere
Mohammad Allahbakhsh
Coauthors
Adrian Herrera
(1)
Ahsan Manzoor
(1)
Ali Dorri
(2)
Alsharif Abuadbba
(1)
Ambrose Hill
(2)
An Braeken
(1)
Andreas G. Veneris
(1)
Arash Shaghaghi
(1)
Aruna Seneviratne
(1)
Avelino F. Zorzo
(1)
Bao Gia Doan
(2)
Callum Lindquist
(1)
Changhoon Kang
(1)
Daewoong Cho
(1)
Damith C. Ranasinghe
(4)
Dang Quang Nguyen
(2)
Ehsan Abbasnejad
(2)
Erik Buchholz
(1)
Evan Krul
(1)
Fengji Luo
(1)
Gowri Sankar Ramachandran
(1)
Grammateia Kotsialou
(1)
Guntur Dharma Putra
(5)
Guy Farrelly
(1)
Haleh Amintoosi
(1)
Hassan Ali
(2)
Henry C. Nunes
(1)
Huanyu Wu
(1)
Hye-young Paik
(5)
James Meijers
(1)
James Won-Ki Hong
(1)
Jiamou Sun
(1)
Jiaojiao Jiang
(1)
Kane Walter
(2)
Kristen Moore
(1)
Lihua Wang
(1)
Lunjie Li
(1)
Madhusanka Liyanage
(1)
Massimo Vecchio
(1)
Meisam Mohammady
(2)
Michael Chase
(1)
Miguel Pincheira
(1)
Mika Ylianttila
(1)
Minhui Xue
(1)
Mohammad Allahbakhsh
(1)
Mohammad Majid Akhtar
(1)
Muhammad Ikram
(1)
Nadeem Ahmed
(2)
Olivier Y. de Vel
(2)
Paul Montague
(2)
Paul Quirk
(2)
Qinghua Lu
(1)
Raffaele Giaffreda
(1)
Rahat Masood
(1)
Rahma Mukta
(1)
Raja Jurdak
(8)
Regio A. Michelin
(3)
Roben Castagna Lunardi
(1)
Ruoxi Sun
(1)
Salil S. Kanhere
(33)
Samuel Karumba
(3)
Sanjay K. Jha
(5)
Seyit Camtepe
(4)
Shailesh Mishra
(1)
Sharif Abuadbba
(1)
Shuo Wang
(2)
Sidharth Agarwal
(1)
Simon Luo
(1)
Subbu Sethuvenkatraman
(1)
Surya Nepal
(5)
Sushmita Ruj
(2)
Tamas Abraham
(2)
Thirasara Ariyarathna
(2)
Volkan Dedeoglu
(4)
Wanli Xue
(1)
Wei Song
(1)
Xinzhang Chen
(1)
Zhao Yang Dong
(1)
Zhenchang Xing
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to