Publications

List of all citations: Google Scholar

Bibtex Representation: Bibtex

2020

  • Ehsan Toreini, Mhairi Aitken, Kovila PL Coopamootoo, Karen Elliott, Vladimiro Gonzalez Zelaya, Paolo Missier, Magdalene Ng, Aad van Moorsel. "Technologies for Trustworthy Machine Learning: A Survey in a Socio-Technical Context" . Submitted to ACM Computing Surveys.
    ePrint

  • Magdalene Ng, Kovila PL Coopamootoo, Ehsan Toreini, Mhairi Aitken, Karen Elliot, Aad van Moorsel. "Simulating the Effects of Social Presence on Trust, Privacy Concerns & Usage Intentions in Automated Bots for Finance" . EuroUSEC 2020, The 5th European Workshop on Usable Security.
    ePrint

  • Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak F Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, Lana Liu. "End-to-End Verifiable E-Voting Trial for Polling Station Voting at Gateshead" . IEEE Security & Privacy Journal, 2020
    ePrint

  • 2019

    • Ehsan Toreini, Mhari Aitken, Aad van Moorsel, Karen Elliot, Kovila Koopamootoo. "The relationship between trust in AI and trustworthy machine learning technologies" . ACM conference on Fairness, Accountability and Transparency in Machine Learning (ACM FAT*), Spain, 2020.
      ePrint | Presentation | Video

    • Ehsan Toreini, Siamak F. Shahandashti, Maryam Mehrnezhad, Feng Hao. "DOMtegrity: Ensuring Web Page Integrity against Malicious Browser Extensions" . International Journal of Information Security.

    • Maryam Mehrnezhad, Ehsan Toreini. "What Is This Sensor and Does This App Need Access to It?" . Informatics Journal.

    2018

    • Maryam Mehrnezhad, Ehsan Toreini, Sami Alajrami. "Making sense of sensors: mobile sensor security awareness and education" . 7th Workshop on Socio-Technical Aspects in Security and Trust.

    • Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, Feng Hao. "Stealing PINs via Mobile Sensors: Actual Risk versus User Perception" . International Journal of Information Security.
      ePrint | Source Code | (Listed as top 5% of all research outputs scored by Altmetric)

    2017

    2016

    • Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, Feng Hao. "Touchsignatures: identification of user touch actions and pins based on mobile sensor data via javascript" . Journal of Information Security and Applications 26, 23-38.
      Publication | Source Code |

    • Maryam Mehrnezhad, Abbas Ghaemi Bafghi, Ahad Harati, Ehsan Toreini. "PiSHi: click the images and I tell if you are a human" . International Journal of Information Security, 1-17.
      Publication |

    • Patrick McCorry, Ehsan Toreini, Maryam Mehrnezhad. "Removing Trusted Tallying Authorities" . Newcastle University.
      Technical Report

    2015

    • Dylan Clarke, Ehsan Toreini, Feng Hao. "Determining User Passwords From Partial Information" . Newcastle University.
      Technical Report

    • Ehsan Toreini, Brian Randell, Feng Hao. "An acoustic side channel attack on enigma" . Newcastle University.
      Technical Report

    2014

    • Saman Poursiah Navi, Ehsan Toreini, Maryam Mehrnejad, Seyyed Kazem Shekofteh. "Analysis Of The Usage Of Chaotic Theory In Data Clustering Using Particle Swarm Optimization" . Indian Journal of Scientific Research 4 (3), 335-353.
      Publication

    • Kiavash Satvat, Matthew Forshaw, Feng Hao, Ehsan Toreini. "On the privacy of private browsing–a forensic approach" . Data Privacy Management and Autonomous Spontaneous Security, 380-389.
      ePrint

    2012

    • Maryam Mehrnejad, Abbas Ghaemi Bafghi, Ahad Harati, Ehsan Toreini. "SEIMCHA: a new semantic image CAPTCHA using geometric transformations" . The ISC International Journal of Information Security 4 (1), 63-76.
      ePrint

    2011

    • Maryam Mehrnejad, Abbas Ghaemi Bafghi, Ahad Harati, Ehsan Toreini "Multiple seimcha: multiple semantic image captcha" . International Conference for Internet Technology and Secured Transactions (ICITST), 2011.
      ePrint

    • Ehsan Toreini, Maryam Mehrnejad. "A novel method in fuzzy data clustering based on chaotic PSO" . International Conference for Internet Technology and Secured Transactions (ICITST), 2011.
      ePrint

    • Maryam Mehrnejad, Ehsan Toreini, Abbas Ghaemi Bafghi. "Security analyzing and designing GUI with the resources model" . International Conference for Internet Technology and Secured Transactions (ICITST), 2011.
      ePrint

    • Ehsan Toreini, Maryam Mehrnejad. "Clustering Data with Particle Swarm Optimization using a new fitness" . Data Mining and Optimization (DMO), 2011 3rd Conference on, 266-270.
      ePrint

    • Peyman Neamatollahi, Hoda Taheri, Ehsan Toreini, Mahmoud Naghibzadeh, Mohhamad Hossein Yaghmaee. "A novel fuzzy metric to evaluate clusters for prolonging lifetime in wireless sensor networks" . Artificial Intelligence and Signal Processing (AISP), 2011 International.
      ePrint

    • Maryam Mehrnejad, Abbas Ghaemi Bafghi, Ahad Harati, Ehsan Toreini. "A new image based CAPTCHA based on geometric transformations" . 8thInternational ISC Conference on Information Security and Cryptology, FUM.
      ePrint