Ehsan Toreini
Ehsan Toreini
Department of Computer Science, University of Surrey
Verified email at - Homepage
Cited by
Cited by
The relationship between trust in AI and trustworthy machine learning technologies
E Toreini, M Aitken, K Coopamootoo, K Elliott, CG Zelaya, A Van Moorsel
Proceedings of the 2020 conference on fairness, accountability, and†…, 2020
Stealing PINs via mobile sensors: actual risk versus user perception
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
International Journal of Information Security 17 (3), 291-313, 2018
Simulating the effects of social presence on trust, privacy concerns & usage intentions in automated bots for finance
M Ng, KPL Coopamootoo, E Toreini, M Aitken, K Elliot, A van Moorsel
2020 IEEE European symposium on security and privacy workshops (EuroS&PW†…, 2020
On the privacy of private browsing–a forensic approach
K Satvat, M Forshaw, F Hao, E Toreini
Journal of Information Security and Applications 19 (1), 88-100, 2014
Establishing a social licence for Financial Technology: Reflections on the role of the private sector in pursuing ethical data practices
M Aitken, E Toreini, P Carmichael, K Coopamootoo, K Elliott, ...
Big Data & Society 7 (1), 2053951720908892, 2020
Touchsignatures: identification of user touch actions and PINs based on mobile sensor data via javascript
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
Journal of Information Security and Applications 26, 23-38, 2016
Texture to the rescue: Practical paper fingerprinting based on texture patterns
E Toreini, SF Shahandashti, F Hao
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-29, 2017
Bodies like yours: Enquiring data privacy in FemTech
T Almeida, L Shipp, M Mehrnezhad, E Toreini
Adjunct Proceedings of the 2022 Nordic Human-Computer Interaction Conference†…, 2022
How can and would people protect from online tracking?
M Mehrnezhad, K Coopamootoo, E Toreini
Proceedings on Privacy Enhancing Technologies 1, 2021
Vision: too little too late? do the risks of femtech already outweigh the benefits?
M Mehrnezhad, L Shipp, T Almeida, E Toreini
Proceedings of the 2022 European Symposium on Usable Security, 145-150, 2022
" I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country
KPL Coopamootoo, M Mehrnezhad, E Toreini
31st USENIX Security Symposium (USENIX Security 22), 287-304, 2022
Technologies for trustworthy machine learning: A survey in a socio-technical context
E Toreini, M Aitken, KPL Coopamootoo, K Elliott, VG Zelaya, P Missier, ...
arXiv preprint arXiv:2007.08911v3, 2020
On secure e-voting over blockchain
P McCorry, M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
Digital Threats: Research and Practice (DTRAP) 2 (4), 1-13, 2021
What is this sensor and does this app need access to it?
M Mehrnezhad, E Toreini
Informatics 6 (1), 7, 2019
An acoustic side channel attack on enigma
E Toreini, B Randell, F Hao
School of Computing Science Technical Report Series, 2015
DOMtegrity: ensuring web page integrity against malicious browser extensions
E Toreini, SF Shahandashti, M Mehrnezhad, F Hao
International Journal of Information Security 18, 801-814, 2019
Anti-counterfeiting for polymer banknotes based on polymer substrate fingerprinting
S Wang, E Toreini, F Hao
IEEE Transactions on Information Forensics and Security 16, 2823-2835, 2021
Multiple seimcha: multiple semantic image captcha
M Mehrnejad, AG Bafghi, A Harati, E Toreini
2011 International Conference for Internet Technology and Secured†…, 2011
Touchsignatures: Identification of user touch actions based on mobile sensors via javascript
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
Proceedings of the 10th ACM Symposium on Information, Computer and†…, 2015
SEIMCHA: A New Semantic Image CAPTCHA Using Geometric Transformations.
M Mehrnejad, AG Bafghi, A Harati, E Toreini
ISeCure 4 (1), 2012
The system can't perform the operation now. Try again later.
Articles 1–20